Profile Facebook Twitter My Space Friendster Friendfeed You Tube
Kompas Tempo Detiknews
Google Yahoo MSN
Blue Sky Simple News Simple News R.1 Simple News R.2 Simple News R.3 Simple News R.4

Free File Hosting Service»

Latest

  • Can a browser really make the Web better? Yes ! Download the new Firefox 3.6
  • What Is The Best Browser? All answers

Posts Recentes

Saturday, November 22, 2008 | 3:11 PM | 0 Comments

Apple Safari 3.1.1 Portable




The fastest web browser on any platform, Safari loads pages up to 2 times faster than Internet Explorer 7 and up to 1.7 times faster than Firefox 2.
And it executes JavaScript up to 3 times faster than Internet Explorer 7 and up to 2 times faster than Firefox 2.
What does all that mean for you? Less time loading pages and more time enjoying them.
Performance measured in seconds. Testing conducted by Apple in November 2007 on a 2.4GHz Intel Core 2 Duo-based iMac system running Windows XP Professional SP2, configured with 1GB of RAM and an ATI Radeon HD 2600 with 256MB of VRAM. HTML and JavaScript benchmarks based on VeriTest’s iBench Version 5.0 using default settings. Testing conducted with a beta version of Safari; all other browsers were shipping versions. Performance will vary based on system configuration, network connection, and other factors

http://rapidshare.com/files/108276928/Safari.u3p

Portable Mozilla Firefox 3 Hacked 10X times more faster


Portable Mozilla Firefox 3 Hacked 10X times more faster
Mozilla Firefox - faster, more secure, easier to use and sporting a new look, this latest Firefox release sets a new standard for web browser innovation. Mozilla Firefox project (formerly Firebird, which was formerly Phoenix) is a redesign of Mozilla's browser component, written using the XUL user interface language and designed to be cross-platform. It is small, fast and easy to use, and offers many advantages over other web browsers, such as the tabbed browsing and the ability to block pop-up windows.

Mozilla Firefox 3 is focused on improved memory handling, performance, and stability, improved XUL, and new core components such as application data stored in SQLite. Mozilla Firefox 3 could break a few existing extensions and applications built on top of Firefox, and it will definitely include new optimizations if you like to build on the popular browser. Mozilla Firefox 3 should have additional JavaScript and SVG features if you're into that sort of thing.

get here
http://rapidshare.com/files/138838031/Mozilla_Firefox_3_Hacked_Portable_10X_TIMES_FASTER_.rar

Planned System Shutdown 1.5.0.0

Planned System Shutdown description

Automaticaly shutdown your PC with running countdown timer!

Planned System Shutdown is an easy-to-use application which allows users to schdeule when they want their system to be shutdown.

Here are some key features of "Planned System Shutdown":

· Command Line Input Line Input
· Interface Input
· Stability
· Easy to use
· No Muss/Fuss simple Install/Uninstall
· No limits on countdown timing input
· Application Exit forcing with optional delay
· Automatic time calculations (E.G. 120 Seconds = 2 Minutes)
· Hi->Low Semi-Numerical Inputs (E.G. D:M:H:S or S or H:S or M:H:S)
· Alpha Numeric Inputs (E.G. 3 days 4 hours 10 minutes 19 seconds)
· Random Alpha Numeric Inputs (E.G. 1minute 1 Hour 10s 365 DAYS)
· Inconsequential use of system resources
· Shows shutdown initialization date when forcing apps to close
· Can report extended information about days when days exceed 999
· Small application file size (less than 50 KB!)
· LARGE COUNTDOWN DISPLAY
· Hide the application
· Disable cancel button
· Force closing with delay from command line
· Restart or shutdown
· Supported by and developed FOR its user

Get Here

Vista Start Menu SE 3.02

Vista Start Menu SE description

This application is a superior alternative to the windows Start menu

Each time you start programs from the Start menu, you use the interface that has not changed for 10 years. No wonder that it becomes more and more difficult to use it due to the increase in the number of programs...

Vista Start Menu is a completely another approach to the interface. In the process of development we were oriented towards how people perceive information and also towards the ability to remember the position of items.

All you see in the standard menu is a long list and you have to read most names in order to find the program you need.
Vista Start Menu will show only program icons. That is why it is a lot easier to find the program you need with just one glance.

Besides, in Vista Start Menu, the programs are arranged in a table visually divided into sections, which also contributes to finding what you need in no time.

With Vista Start Menu, you just open the menu and click the program icon. If you need supplemental files installed together with the program, just move the mouse pointer over the icon and you will see a submenu where you can find all you need.

Vista Start Menu retains the position of icons that is why when you install or remove programs, icons remain in their places. You do not have to spend time on looking for an icons that has "slid away" as it usually happens in the standard menu.

Here are some key features of "Vista Start Menu SE":

· fully edit the menu by dragging the items into/out of it and within;
· add a divider line to the main menu;
· call out a context menu for the main menu items.

Requirements:

· 128 MB RAM

Get Here

Sunday, November 9, 2008 | 7:04 AM | 0 Comments

ArchiveMac v1.0.2

Info-http://www.broadreachsoftware.com/

ArchiveMac is an application for Mac OS X Leopard which supports archiving large files to CD, DVD or Blu-Ray. It can split large files and directories so that they span multiple discs.

When restoring, the original file or directory is restored regardless of how large it is. There is no file or directory size limit. Write up to 50GB per Blu-Ray disc.



http://rapidshare.com/files/155720943/AMac_1.0.2_upsmack.rar

Speed Download Lite v1.0.4

Speed Download Lite v1.0.4
INFO : Speed Download 5 and Speed Download Lite both use the same state of the art Speed Download download engine to give you the fastest and most reliable download experience on your Mac.

Speed Download Lite is simply a stripped down version of Speed Download 5 offering just the download manager - without any of the extra features (i.e. FTP, File Sharing, WEBDAV, etc) found in Speed Download 5. With regards to the interface and browser integration, both versions of SD offer the same top of the line performance and reliabilty that you’d expect from a download manager.


http://rapidshare.com/files/155746610/SDownload_Lite_1.0.4_upsmack.rar

Tuesday, November 4, 2008 | 2:12 PM | 0 Comments

Nokia PC Suite 7.1.14.0 Beta / 7.0.9.2

Nokia PC Suite description

Free applications for Nokia phones that lets you edit, synchronize and back up many of your phone's files

Nokia PC Suite is a package of Windows-based PC applications developed especially for use with Nokia phones.

Depending on your phone model, Nokia PC Suite lets you edit, synchronize and back up many of your phone's files on a compatible PC through a cable or wireless connection.

Here are some key features of "Nokia PC Suite":

· Back up and restore phone files
· Transfer information, pictures, and music from phone to phone or phone to PC
· Synchronize your phone and PC calendars
· Edit contacts, pictures, and phone file names
· Install Java-based applications in your phone
· Convert ringing tone formats
· Play multimedia messages and videos
· Send text messages from the PC
· Connect by using your phone as a modem

Requirements:

Nokia Mobile Phone connected to your PC

Download

or

Here

Norton AntiVirus 2009 16.0.0.125



Norton AntiVirus 2009 description

Blocks certain more sophisticated worms (such as Blaster and Sasser) before they enter your computer

Norton AntiVirus was designed to remove viruses, worms, and Trojan horses automatically - without interrupting your work.

New Norton Internet Worm Protection blocks certain more sophisticated worms (such as Blaster and Sasser) before they enter your computer. Norton AntiVirus can also detect spyware and other non-virus threats.

Key TechnologiesAntispyware
Antivirus
Internet Worm Protection
Rootkit Detection

NOTE:
In order to test the new Norton Internet Security you need to register an account here: http://nct.digitalriver.com/fulfill/0184.078

Here are some key features of "Norton AntiVirus 2009":

· Norton Internet Worm Protection stops certain damaging Internet worms at their attempted point of entry.
· QuickScan tool automatically searches for and removes viruses whenever new virus protection updates are downloaded.
· PreInstall Scan quickly detects and removes infections that can interfere with installing and launching Norton AntiVirus.
· Automatically removes viruses, worms, and Trojan horses.
· Scans and cleans both incoming and outgoing email messages.
· Blocks viruses in instant message attachments.
· Detects spyware and certain non-virus threats such as adware and keystroke logging programs.
· Scans compressed file archives before you open them and risk infecting your computer.
· Downloads new virus protection updates automatically to protect against new threats.
· Worm Blocking and Script Blocking can detect new threats even before virus protection updates are created for them.
· Improved performance delivers faster scans
· One click access to expert support
· Works quietly in the background.
· Network mapping provides a view of your home network.
· Detects and removes spyware and viruses
· Blocks spyware and worms automatically
· Protects email and instant messaging from viruses
· Prevents virus-infected emails from spreading
· Rootkit detection finds and removes hidden threats
· Includes protection updates and new product features as available throughout the renewable service period
· Remove dangerous threats from files you download
· Block spyware from hijacking your computer
· Stop spyware from tracking you online
· Block Internet worms at point of entry
· Remove viruses from email and instant messages

Requirements:

· 300MHz or higher processor
· 256MB of RAM
· 300MB of available hard disk space

Limitations:

· 15 days trial

us(exe)
ro (exe)

GMail Drive shell extension 1.0.13

GMail Drive shell extension description

A Shell Namespace Extension that creates a virtual filesystem around your Google GMail account

GMail Drive is a Shell Namespace Extension that creates a virtual filesystem around your Google GMail account, allowing you to use GMail as a storage medium.

GMail Drive creates a virtual filesystem on top of your Google GMail account and enables you to save and retrieve files stored on your GMail account directly from inside Windows Explorer.

GMail Drive literally adds a new drive to your computer under the My Computer folder, where you can create new folders, copy and drag'n'drop files to.GMail Drive shell extension is a tool that creates a virtual filesystem.

Ever since Google started to offer users a GMail e-mail account, which includes storage space of a 1000 megabytes, you have had plenty of storage space but not a lot to fill it up with.

With GMail Drive you can easily copy files to your GMail account and retrieve them again. When you create a new file using GMail Drive, it generates an e-mail and posts it to your account.

The e-mail appears in your normal Inbox folder, and the file is attached as an e-mail attachment. GMail Drive periodically checks your mail account (using the GMail search function) to see if new files have arrived and to rebuild the directory structures.

But basically GMail Drive acts as any other hard-drive installed on your computer.
You can copy files to and from the GMail Drive folder simply by using drag'n'drop like you're used to with the normal Explorer folders.

Because the GMail files will clutter up your Inbox folder, you may wish to create a filter in GMail to automatically move the files (prefixed with the GMAILFS letters) to your archived mail folder.

Please note that GMail Drive is still an experimental tool. There's still a number of limitations of the file-system (such as total filename size must be less than 40 characters), and it doesn't make full use of the secure internet protocols available.

You can try Xmail alternative for portability.

Requirements:

· Internet Explorer 5 or better


Mirror (US) [ZIP]
Mirror (RO) [ZIP]

Avira AntiVir Personal - Free Antivirus 8.2.0.334

Avira AntiVir Personal - Free Antivirus description

Free, effective protection against computer viruses

AntiVir Personal Edition is a software that helps you protect and monitor your PC.

AntiVir software is a reliable free antivirus solution, that constantly and rapidly scans your computer for malicious programs (such as viruses, Trojans, backdoor programs, hoaxes, worms, dialers etc.), monitoring every action executed by the user or by the operating system and being able to react promptly when a malicious program is detected.

Protects your computer against dangerous viruses, worms, Trojans and costly dialers.

Avira AntiVir Personal gives you the following functions:
Control Center for monitoring, administering and controlling the entire program
Central configuration with user-friendly standard and advanced options and context-sensitive help
Scanner (On-Demand Scan) with profile-controlled and configurable search for all known types of virus and malware
Integration into the Windows Vista User Account Control allows you to carry out tasks requiring administrator rights
Guard (On-Access Scan) for continuous monitoring of all file access attempts
Integrated quarantine management to isolate and process suspicious files
Rootkit protection for detecting hidden malware installed in your computer system (rootkits) (Only for 32-bit systems)
Direct access to detailed information on the detected viruses and malware via the Internet
Simple and quick updates to the program, virus definitions, and search engine through Single File Update and incremental VDF updates via a webserver on the Internet
Integrated Scheduler to plan one-off or recurring tasks, such as updates or test runs
Very high rates of virus and malware detection using innovative search technologies (search engines) and heuristic search processes
Detection of all common archive types, including detection of nested archives and smart extensions
High-performance multithreading function (simultaneous high-speed scanning of multiple files)

Here are some key features of "Avira AntiVir Personal - Free Antivirus":

· Protection against viruses, worms and Trojans
· Protection against expensive dialers
· Detects and deletes rootkits
· Raised scan speed
· Redesigned visual appearance

Requirements:

· Pentium I 133 MHz or better
· 30 MB of free HDD
· 20 MB of free RAM

Softpedia Secure Download (US) [EXE]
Softpedia Secure Download (RO) [EXE]

Microsoft Invites Online Advertising Players to Test Its Ad Playing Field

The ad:tech New York conference was the perfect moment for Microsoft to send out invitations to online advertising industry players to come and test its playing field. The Redmond company is planning to debut the test-driving of a new federated system for online advertising built by AdECN, a wholly owned Microsoft subsidiary. The software giant revealed that the AdECN exchange model would bring a functionality which is not shared by any other online ad exchange system.

“Our goal is to provide a fair and level playing field for all the online advertising industry players to play on,” revealed Jeff Green, co-founder of AdECN. “The federated system simplifies online buying and selling. It will allow ad networks to use their own tools in which they have invested large amounts of time and money, to connect advertisers and publishers across the industry.”

Essentially, the new federated system developed as an extension of the AsECN platform is a replica of the New York Stock Exchange model. The Redmond company is working to deliver what is has defined as a “neutral auction house that automates the buying and selling of online display advertising”.

Via the new exchange model, Microsoft is delivering advanced flexibility in the hands of ad networks. In this regard, the company informed that players in its ad exchange model would be able to use their own proprietary technology, including optimization tools and solutions designed to perform behavioral and demographic targeting.

“Since being acquired by Microsoft, we now have the fuel we needed to build and test our new model,” Green added. “Pricing every ad impression in a neutral auction environment levels the playing field and will help us start to address the pricing issues we’ve seen in display marketing.”

RapidWeaver Web Design App for Mac Reaches V. 4.2


Realmac Software has updated RapidWeaver, its website creation tool and flagship app for Mac OS X. Version 4.2 adds full localization for four additional languages (French, German, Italian and Japanese), while it also tweaks some of the existing features, and fixes a number of bugs as well.

Founded in November 2002, Realmac Software is focused on developing useful, easy-to-use programs for Mac OS X. RapidWeaver, the flagship app of the company, was released in June 2004. According to its makers, it continues to receive excellent reviews to this day.

Realmac's web design application helps users “create professional looking web sites in minutes,” the company says. RapidWeaver allows anyone to publish photos, movies and blogs online instantly, since no knowledge of complex codes is required, according to the developers. However, while you don't need to be aware of how XHTML or CSS work in order to get started with RapidWeaver, code-savvy users do have the ability to place HTML, PHP or CSS codes throughout the application, for even better results.

As noted above, the latest version of RapidWeaver brings a slew of changes and tweaks, some of which we've highlighted below:

- German, French, Italian and Japanese localization added;
- Webpage source list now remembers the previous width;
- Growl no longer displays notifications when RapidWeaver is in the foreground;
- Holding down the Command key, whilst starting RapidWeaver, now disables third-party plugins until the application is restarted;
- Holding down Command and Option, whilst starting RapidWeaver, now disables all third-party add-ons (themes, snippets, plugins) until the application is restarted;
- Images dragged into a styled text view now have Web friendly, unique filenames;
- Saving a document that has missing files is no longer treated as an error;
- Improvements to smart publishing / “Credit RapidWeaver” metadata handling to reduce future uploads.

RapidWeaver 4.2 is a free upgrade for registered users of RapidWeaver 3.6 or higher. One user license goes for US$79, while users of RapidWeaver 3.5, or earlier, can benefit from an upgrade offer that has them pay just $30 in order to get the latest version. A download link for RapidWeaver 4.2 is available below.

External Mirror 1 - Leopard [DMG]

External Mirror 2 - Tiger [DMG]

http://www.softpedia.com/

Saturday, October 25, 2008 | 8:39 PM | 1 Comments

Malware Destroyer 4.1.5



Malware Destroyer description

Malware Destroyer is a unique malware removal tool with a new and faster scanning engine!

Malware Destroyer is a unique malware removal utility with a new and faster scanning engine!

It only takes about ~10 seconds to scan your whole computer for over 7900 real targeting definitions.

The current version supports most types of malwares like, adware, trojans, worms, spyware and dialers.

EMCO Malware Destroyer is a marvelous addition in the category of virus scanning and removal. The main idea is to keep your machine clean from different viruses with just one click.

Users of EMCO Malware Destroyer can also request for the addition of new virus definition to the database if that virus definition doesn't already exists. In this way you can save a lot of money that you waste on buying virus scanner for your networks. Why go for expensive antivirus tools when you can get you machine secured in much less price.

The main thing that you must keep in mind is that EMCO Malware Destroyer is not a real time scan engine rather it's basic purpose is to check for the existence of any Virus, Warms, Trojan and Aware and to clean them.

Here are some key features of "Malware Destroyer":

· Clean Worm, Virus, Adware, Trojan EMCO Malware Destroyer scan and clean a machine infected by different Worm, Virus, Adware, Trojan.
· One click scan for local machine EMCO Malware Destroyer provides one click scan and clean option. So, you can scan and clean your local machine with just a single click.
· Built in Virus definition database- EMCO Malware Destroyer comes up with a built-in versatile database that is continuously growing with the discovery of new viruses.
· User can request addition of specific virus definitions EMCO Malware Destroyer enables users to request EMCO Software for the addition of a particular virus to the virus definition database, and that virus definition is added on the same day.
· Low cost solution for system security It's a low cost solution in the sense that no special skill is required to scan and clean a machine, its as simple that you can make you PC malware free by yourself. Hence you don't need to hire and pay a system security expert any more.
· Built-in virus removal tools - EMCO Malware Destroyer comes up with built-in virus removal tools for most common Adwares and Spywares.
· Self progress indicator - EMCO Malware Destroyer has self progress indicator to show the scan and clean progress on your machine.
· Built in live update - EMCO Malware Destroyer has a built-in live update option to download updated virus definitions or software updates from EMCO website.


Requirements:

· Microsoft Windows 98, Me, 2000, Windows NT 4.0, (SP6a or later), or Windows XP installed and configured on your system.
· Windows NT 4.0 users require Internet Explorer 4.0 or later.
· 90MHz processor (500 MHz recommended)
· 64MB of RAM (128MB recommended)
· 15MB of free hard disk space
· Administrator account to your local computer.
· Remote Registry Service started on your local computer.
· File and Print sharing enabled / installed on your local computer.

External Mirror 1
[EXE]
External Mirror 2
[ZIP]



Malwarebytes' Anti-Malware 1.30



Malwarebytes' Anti-Malware description

Perform a quick scan or a full system scan on your computer to detect and quarantine/remove the malware found on your PC

Malwarebytes' Anti-Malware is a full-blown anti-malware program that has recently left our labs and can be considered the next step in the detection and removal of malware. A new technologies that were especially designed to quickly detect, deter and destroy any malware that could reside in your computer.

The Malwarebytes Anti-Malware application was designed to monitor every process and actually stops malicious processes before they even start. It uses our impressive technology that is in fact a completely novel way of heuristic scanning and it is our response to the increasingly complex malware threats.

And, as we did with our Malwarebytes' RogueRemover we also have added a threats center. You can simply check online which pests are removed the most and thus are the most prevalent.

Limitations:

· Malwarebytes' Anti-Malware is FREEWARE, however you may upgrade to the PRO version which contains realtime protection, scheduled scanning and updating.


Note: Some antivirus and antispyware programs flag ... as being infected/malware, although the application is perfectly safe and does not pose a threat to your system. This is called a 'false positive'. The term false positive is used when antivirus software wrongly classifies an innocuous ( inoffensive ) file as a virus. The incorrect detection may be due to heuristics or to an incorrect virus signature in a database. [Similar problems can occur with antitrojan or antispyware software.]



Download

Protector Plus 2008 Antivirus 8.0.D02



Protector Plus 2008 Antivirus description

An antivirus which includes email scanning, InstaUpdate, scheduled scanning, memory scanning, de-activation of viruses in memory and quarantine

Protector Plus detects all types of viruses, trojans and worms before they enter the computer and removes the virus.

Protector Plus ensures that the computer is virus free. Protector Plus is packed with many useful features like email scanning, InstaUpdate, scheduled scanning, memory scanning,de-activation of viruses in memory, quarantine, user defined scan tasks, rescue disk, compressed files scanning and many more.

Protector Plus is a tool that will surely help you protect your PC from numerous types of malware threats.

The email scan feature scans all the emails received before they enter the Inbox and ensures that all the emails and attachments are virus free. On detecting an infected email the virus will be removed.

Protector Plus email scan can be configured to send an alert to the sender of the infected email. The real-time scan feature will scan all the files accessed and automatically removes any virus found.

The InstaUpdate feature of Protector Plus will automatically download the virus database updates from the developer's web site free of cost. The updates are released every week and also in case of emergencies.

Protector Plus is easy to install and use. This software works on Windows XP, Windows 2000 and Windows 4.0 servers and workstations.

Protector Plus is the prefered antivirus software solution for both large-scale users and the home users.

Requirements:

· Pentium 100 MHz
· 64 MB RAM

Limitations:

· 30-day trial
· Nag screen
External Mirror 1 [EXE]
External Mirror 2 [EXE]

Norman Malware Cleaner



Norman Malware Cleaner description

A Norman program utility that may be used to detect and remove specific malicious software

Norman Malware Cleaner is a Norman program that can be used to detect and remove specific malicious software (malware).

Note that it should not be used as a substitute for running normal proactive antivirus protection, but rather as a reactive tool to handle systems that are already infected.

By downloading and running Norman Malware Cleaner it will clean an infected system completely:

kill running processes that are infcted
remove infections from disk (including ActiveX components and browser helper objects)
reveal and remove rootkits
restore correct registry values
remove references created by malware in hosts file
remove windows firewall rules for malicious programs


Note
To give Norman Malware Cleaner the best working conditions possible, we recommend that you start the computer in Safe mode before running the program.

To do this, tap the F8 key on your keyboard during startup, before Windows starts, and select Safe mode from the menu that appears.
Pressing the F8 key at just the right time may be a little difficult (after the firmware POST process completes, but before Windows displays graphical output). If the F8 method does not work, repeat the procedure, but press the F8 key more quickly, or press it several times.

On some (older) computers, the F8 key method may not work. In these Windows versions you may also configure your computer to start in Safe mode through the System Configuration Utility (msconfig).

Download

Trojan Guarder Gold 7.72

Trojan Guarder Gold description

Detect and eliminate viruses, Trojans, and macro viruses even new and unknown ones.

Trojan Guarder Gold will detect and eliminate viruses, Trojans and macro viruses, even new and unknown ones, on your computer

Trojan Guarder initates a system named Guard Ghost to supervise all running processes in memory system, Windows files and open ports to search worms and trojan horses at any time.

Once a trojan or worm appears, even it is hidden in other programs, Trojan Guarder will display a signal for warning and eliminate it consequently. Meanwhile, Trojan Guarder will clear all trojan-system-linked files as well as relative registered files.

Trojan Guarder can also provide assistance to protect and manage your computer: Windows Ghost and IE Doctor.

Windows Ghost can strengthen your computer system.

IE Doctor can recover any damage caused by java script viruses and activeX viruses. It can also prevent hackers from attacking the Internet Explorer of your computer.

Requirements:

· About 2 MB of free disk space
· At least 8M RAM
· A color monitor supporting at least 256 colors


Download

AVG Internet Security


description

Complete security protection against all of the most serious Internet threats, including viruses, worms, spyware, trojans, etc

AVG Internet Security provides complete security protection against all of the most serious Internet threats, including viruses, worms, spyware, trojans, adware, hackers and spam.

AVG Internet Security includes:

Anti-Virus protects from viruses, worms and trojans
Anti-Spyware protects from spyware, adware and other malicious programs
Anti-Spam filters spam and protects against phishing attacks
Firewall protects from hackers

Here are some key features of "AVG Internet Security":

· 100% virus detection - AVG's scanning engine has received numerous awards for its excellent detection of "in the wild" viruses, including the VB100% award. Its unique combination of detection methods provides full protection against viruses, worms and trojans.
· Cutting-edge anti-spyware technology - Using the latest state-of-the-art detection technology, AVG detects spyware, adware, DLL-trojans, keyloggers, and much more. Malware hidden in data streams, archives, or the Windows registry is also detected.
· Full on-access protection - The powerful AVG Resident Shield provides maximum protection by scanning every file opened, executed, or saved. It also prevents the opening or executing of infected files.
· Flexible intelligent scanning - The AVG Resident Shield can include/exclude files from being scanned based on individual file extensions and can handle exceptions for potentially unwanted programs such as adware.
· Full e-mail protection - AVG checks every e-mail sent or received, providing full protection from e-mail-borne threats. AVG supports all leading e-mail clients, including MS Outlook, The bat!, Eudora, and all other SMTP/POP3-based e-mail clients, such as Outlook Express. Encrypted connections using SSL are also supported.
· E-mail spam and phishing filtering - AVG checks every e-mail received, using the latest technology and up-to-the-minute spam signatures to ensure maximum detection rates for spam and phishing attacks.
· Automatic threat handling - AVG can automatically heal or remove infected files and other threats such as trojans, worms and spyware.
· Control over all network access - The AVG Firewall monitors all communication to and from the computer, blocking external attacks and preventing trojans from exporting confidential data. The AVG Firewall configuration wizard automatically creates access rules for all popular software. In addition the firewall can switch profiles automatically, based upon the current conection type, ensuring seamless changeover for notebooks.
· Powerful scheduling - AVG automatically provides recommended daily schedules for scanning and updating, and also allows you to create custom-scheduled events.
· Multiple language support - No need to buy a special language

Requirements:

· CPU Intel Pentium, 300 MHz
· 70 MB free hard drive space
· 64 MB RAM

External Mirror 1 - 8.0.196a1383 [EXE]
External Mirror 2 - 7.5.549a1382 [EXE]


Avira Premium Security Suite description

The new Avira Premium Security Suite protects you in a comprehensive way against the dangers from the Internet

Do you surf on the Internet, make online purchases, communicate by email, or make bank transactions on your PC?

The Avira Security Suite was designed to protect you and has an extra FireWall as well as an AntiSpam and a backup function in addition to the award-winning virus protection.
· AntiVir
· AntiAd/Spyware
· AntiPhishing
· AntiRootkit
· AntiDrive-by
· AntiBot
· EmailScanner
· WebGuard
· RescueSystem
· BackupSystem
· AntiSpam
· FireWall
· GameMode

Here are some key features of "Avira Premium Security Suite":

· Protection against viruses, worms and Trojans
· Protection against expensive dialers
· Detects and deletes rootkits
· Protection against phishing
· Raised scan speed
· Redisigned visual appearance
· Protection against spyware and adware
· Special protection against email viruses (POP 3)
· Fast updates through the Premium server
· System to create a Rescue-CD
· Proactive AntiPhishing
· Inclusive FireWall
· Inclusive AntiSpam
· WebGuard to surf and download safely
· Function for Data BackUp


Requirements:

· Computer: Pentium or higher, at least 133 MHz
· RAM: 192 MB / 512 MB RAM for Windows Vista
· 40 MB free memory on the hard disk (more if quarantine is used)
· 100 MB temporary memory on the hard disk
· Administrator rights are required for the installation


External Mirror 1 [EXE]

External Mirror 2
[ZIP]

Trojan Remover


description

This application aids in the removal of Trojan Horses from a computer

Trojan Remover was written to aid in the removal of Trojan Horses and Internet Worms when standard anti-virus software has either failed to detect the problem or is unable to effectively eliminate it.

Trojan Remover's database currently contains 16903 individual trojan/worm signatures (including variants) [as at 8th October 2005].

The majority of Virus and Trojan Scanners are well able to detect malicious Trojan Horses and Internet Worms but are not always very efficient in removing them once they have been triggered.

Trojan Remover was written specifically to carry out such a removal without the user having to manually edit system files, including the Registry.

The program also removes the additional system modifications some Trojans carry out which are ignored by other Virus and Trojan Scanners.

Trojan Remover examines the system files, including Windows Registry and will determine the programs and files that are loaded at boot time. The vast majority of trojans are loaded this way.

Trojan Remover will scan ALL the files loaded at boot time for Remote Access Trojans ('backdoors', like NetBus, SubSeven, Optix Pro, Back Orifice etc.), Internet Worms and other malware.

For each identified Trojan Horse, Worm, or other malware, Trojan Remover will pop up an alert screen showing the file location and name; it will offer to remove the program's reference from the system files and allow you to rename the file to stop its activation.

Limitations:

· The program will work for 30 days
· Nag screen

get Here

Friday, October 24, 2008 | 11:04 PM | 0 Comments

Panda Virus Signature File


description

The most recent Virus Signature File for your Panda Antivirus

Panda Virus Signature File - The most recent Virus Signature File for your Panda Antivirus

Panda Antivirus is the latest generation of antivirus solution.

Its innovative technology and ease of use make it the most powerful antivirus on the market.

Panda Antivirus Titanium features a new UltraFast scan engine, 30% faster than its predecessors, Panda's exclusive SmartClean technology, which not only disinfects viruses but also restores system settings damaged by the latest trojan horse technologies, and its low use of system resources.

Coupled with a new best-of-breed truly automatic update system which takes advantage of your Internet connection to transparently update the virus signature files incrementally and its new innovative ease of use interface, Panda Antivirus Titanium is the first truly "install-and-forget" antivirus for the home user.

Download

Kaspersky Virus Removal Tool


description

Another virus scanner and detection software from Kaspersky.

The Kaspersky Virus Removal Tool application was designed to be another virus scanner and detection software from Kaspersky. The produst will scan the specified locations for any virus threats and remove them or send to Quarantine folder.



free weblin download


OpenOffice.org description


A free, Open Source alternative to Microsoft Office

OpenOffice.org is a free, Open Source alternative to MS Office with a Word compatible word processor, a complete Excel compatible spread sheet program and a Power Point like presentation software and drawing program and also allows to save to PDF file.

In addition, OpenOffice.org offers enhanced printing capabilities and options for direct connection with external email programs as well as form-letter management to send letters to addresses from a database.

WRITER is OpenOffice.org's word processor: use it for anything from writing a quick letter to producing an entire book with embedded illustrations, cross-references, tables of contents, indexes, bibliographies... Auto-complete, auto-format, and real-time spelling check make light work of the hardest task. Writer is powerful enough to tackle desktop publishing tasks such as creating multi-column newsletters, brochures the only limit is your imagination.

Use CALC to bring your numbers under control. This powerful spreadsheet has all the tools you need to calculate, analyse, summarise, and present your data in numerical reports or sizzling graphics. A fully-integrated help system makes entering complex formulas a breeze. Sophisticated decision-making tools are just a few mouse clicks away. Pull in external data using the Data Pilot, and sort it, filter it, and produce subtotals and statistical analyses. Use previews to select from thirteen categories of 2-D and 3-D charts including line, area, column, pie, XY, stock and net with dozens of variants.

IMPRESS is the fastest, most powerful way to create effective multimedia presentations. Your presentations will truly stand out with special effects, animation and high-impact drawing tools.

DRAW will produce everything from simple diagrams to dynamic 3D illustrations and special effects.

As the name suggests, OpenOffice.org is the most open office suite available:
no commercial licences or software compliance issues to worry about
no language barriers - if it's not yet available in your language, the chances are it will be soon
available on all major computing platforms
the first office suite to comply with the OASIS OpenDocument format
the source code for the software is freely available under a full OSI certified licence

OpenOffice.org is synonymous with quality
the roots of OpenOffice.org go back twenty years, creating a huge wealth of experience
hundreds of thousands of users have participated in the beta testing of version 2
with a fully open development process, OpenOffice.org has nothing to hide - the product stands or falls on its reputation

OpenOffice.org is friendly
the software looks and feels familiar and is instantly usable by anyone who has used a competitive product
it's easy to change to OpenOffice.org - the software reads all major competitors' files
OpenOffice.org is supported by a global community of friendly volunteers, only too happy to provide assistance to newcomers and advanced users alike

Here are some key features of "OpenOffice.org":

OpenOffice.org writer - The powerful word processor:
· The powerful word processor
· Wizards to produce standard documents such as letters, faxes, agendas, minutes.
· Styles and Formatting to put the power of style sheets into the hands of every user.
· AutoCorrect dictionary, which can check your spelling as you type.
· AutoComplete to make typing easy
· Text frames and linking for newsletters, flyers, etc..
· Table of contents, index for complex documents
· OpenDocument and MS-Word .doc format compatible

OpenOffice.org impress - Impress your audience:
· Master Pages and Layouts simplify the task of preparing your materials.
· Complete range of Views are supported: Normall / Outlline / Slide Sorter / Notes / Handouts to meet all the needs of presenters and audiences.
· Easy-to-use drawing and diagramming tools to spice up your presentation.
· Slide show Animation and Effects to bring a presentation to life.
· Fontworks provides stunning 2D and 3D images from text.
· OpenDocument and MS-Powerpoint .ppt file format compatibility

OpenOffice.org calc - The full-featured spreadsheet:
· Natural language formulas let you create formulas using words (e.g. "sales - costs").
· Hundreds of spreadsheet functions with built-in expert help
· Scenario Manager allows "what if ..." analysis at the touch of a button.
· Powerful graphics to extract the meaning from your numbers
· Pull in data from external databases with DataPilot technology
· OpenDocument and MS-Excel .xls file format compatibility

Requirements:

· 128 Mbytes RAM
· 200 Mbytes available disk space
· 800 x 600 or higher resolution with at least 256 colours


Download
http://www.weblin.com/

Saturday, October 18, 2008 | 10:26 PM | 0 Comments

instantly hide what you're doing on a computer



Working on something sensitive or reading a personal e-mail and someone walks in? Or maybe you're just seeing what you'd look like as the opposite gender in photoshop. Well in under a second, it can be gone several different ways.


Step1
The simplest way of hiding everything is with the show desktop command. On any PC with a modern PC keyboard, there should be a "windows key" between the left control and alt buttons. It has a little windows flag on it and may also say "start." Hold that down and press D and tada, everything is minimized. Of course, what you have open is still shown in the task bar on the bottom of the screen so if you want full privacy, right click on it, uncheck "lock the taskbar," then drag the resizer bar at the top all the way down so the taskbar is basically gone. That or set the start menu to auto-hide and then just don’t mouse over it.

Step2
It's odd for someone to walk up and see no task bar and nothing open when you were obviously doing something on the computer a second ago. So to be even stealthier, hold the windows key from step 1 and instead press the L key. That will lock your computer. In XP Home it shows the login screen but it didn't actually log you out. Everything you had open is still running. In XP Pro it just brings up a little box saying that the computer was locked. For maximum security, make sure your windows account has a password on it so people would need that to unlock it. Then when someone walks in, do that quick keyboard combination and pretend like you just finished and were getting up to do something else.

Step3
My favorite method is to have a full screen program like a game running. Have whatever you really wanted to do open and then hold down alt and then hit tab until it brings you to the other program. Then you do whatever you really want to do and if someone walks up, just quickly hold alt and then press tab and quickly release both again. That will switch you back to your full screen program/game because that was the last program you were using and they won't be able to see what else is running.

Step4
Sometimes you just need to close one thing that you had open. In that case, pressing alt and F4 terminates whatever program is open and currently in the foreground. So if you're typing away in internet explorer and press alt-F4, internet explorer closes. Be aware that some programs don't close immediately. Word will ask you to save if you hit alt-F4 and IE7 will ask if you want to close all tabs for example. If your hands are on the mouse, forget about clicking file, exit or a bunch of red X’s. Just double click any folder or program's icon in the top left corner. That will close it.

Step5
If for some reason none of these other methods will work and you're on a PC, keep the tower on the ground and place it so the restart button is within kicking distance. That will look extremely obvious if you don't say that it's some weird power problem or you had to restart for an update though. It's also really bad and slightly dangerous for files on the hard drive to suddenly restart the computer.

Install Microsoft Windows Defender



Microsoft Windows Defender will protect your system from security threats, sluggish performance, and pop-ups from spyware and other useless applications. It is a free program available from Microsoft to download. It comes installed with Microsoft Windows Vista, but is also available to other Microsoft Windows users from their website. Microsoft Windows Defender will run in the background virtually unnoticed and has real-time Protection. You will receive notification and recommendations for detected problems. Your system will be protected continuously against all threats.

Go online to the Microsoft Windows Defender page listed under "Resources" below.

Step2
Select “Download It Here.”

Step3
A page will open with details about the program. You can read all about the many features and options available, and many other fine points of the software. You will have to have your copy of Microsoft Windows validated to proceed with the download. Select “Continue” to begin the validation process. This necessary requirement will only take a few moments to complete.

Step4
Once your system is validated, the “Download” button will be available. Click on it.

Step5
A file download window will appear. Select “Run” to install the software now, or “Save” to download it now and install it at a later time. Select “Run.”

Step6
You will see a window showing the program being downloaded, the estimated time and the transfer rate. It will download to a Temporary Folder, unless you have selected “Save.” This will only take a few moments to complete.

Step7
An Internet Explorer Security Warning box will appear. Select “Run.”

Step8
An Install Wizard will appear. Select “Next.”

Step9
You will have to validate your copy of Microsoft Windows (again). Select “Validate.”

Step10
The Windows Defender License Agreement will appear. You must accept the terms to continue. Click on “I accept the terms in the license agreement” and then select “Next.”

Step11
You will have to choose if you want to become part of the Microsoft SpyNet online community. The details are explained. You could choose to not join by selecting “Install definition updates only,” but it is suggested to select “Use recommended settings” by placing a check in the box. Then select “Next.”

Step12
You will then have to select a “Setup Type” of either “Complete” (the default setting) or “Custom.” It is not recommended to use the second option unless you are an advanced user. Select “Next.”

Step13
If you need to make any changes select the “Back” button, otherwise select the “Install” to begin.

Step14
You will see the program being installed on your system. A window will appear and show a successful installation with a check mark selected to “Check for updated definitions and run a quick scan now.” Select “Finish.”

Step15
The program will check for available updates. They will automatically be downloaded and installed onto your system.

Step16
You will now have a Windows Defender icon in the lower right of your screen. Your system is now being fully protected.

Install Microsoft Silverlight




Microsoft Silverlight is Microsoft's new rich meda platform for the web designed to provide a richer, interactive web experience. It is designed to work across the most common web browsers and computer platforms.

Make sure your computer is running an operating system and browser that is compatible with Microsoft Silverlight. This includes Microsoft Windows Vista and XP with Internet Explorer or Firefox and Mac OS 10 with Safari.

Go to: http://www.microsoft.com/Silverlight/resources/install.aspx to install Silverlight. If you are running Internet Explorer, it will prompt you to download and install Silverlight. Click on Run to start the installation.

Verify that your Microsoft Silverlight install was successful by visiting the Microsoft Silverlight site:
http://www.microsoft.com/Silverlight/

Install Additional Fonts in Windows



Windows supports TureType fonts or fonts that come with programs designed to run on Windows. Many times printers will come with additional fonts to install that are supported by Windows. This procedure applies for Windows XP, Windows 2000, and Windows NT.

Click on the “Start” menu and then select “Run”

In the “Open” field type: %windir%\fonts, and then click OK

In the Windows file box, select File, Install New Fonts…

Select the Drive that has the fonts you want to install, then select the folder by double clicking on it in the Folders box.

In the fonts list box either select all or select the ones you want to install by holding down the CTL-key and selecting each with the mouse. Click OK and your fonts will be installed.

increase font and text size in Internet Explorer



This how-to guide will show you how to increase the font and text size while you are using Internet Explorer. Sometimes web pages can be cluttered and have small font. This does not necessarily mean you have to be stuck with the small or large font. You can change the font and text size with three easy steps.

Launch Internet Explorer. Once you've launched your homepage, you are ready to learn to how to increase your font and text sizes.

Internet Explorer To increase the font and text sizes you must first locate the "View" option drop down menu in the upper right of your Internet Explorer browser.

Get rid of those glasses After you have chosen "View" proceed with choosing "Text Size". "Text Size" will produce five separate options for increasing or decreasing text and font sizes. The five options should include smallest, smaller, medium, larger, and largest. Proceed with choosing the text size that fits your style and reading abilities.

Include Pictures In Your Visual Basic Application



If you are writing a visual basic application that you intend to sell, and you want to include image files within the program and have the image change based on a selection from something like a listbox or an option button, you’ll need to retrieve the files from another location. This article shows a convenient way to accomplish this.

If you want to display CAD files, or other images and pictures, within your visual basic application, there are a number of ways to accomplish this. If you are displaying a static picture (one that doesn't change),you can just load it into a picture box.

There are several ways to store and call graphics files to display based upon a user selection, using the "Image" feature. However, there are disadvantages to at least two of the most obvious methods.

You can include the graphics files in your .cab file, and have them load into the applications working directory. The problem with this is that if the files get lost, it causes a run-time error in your application, and your user will not be happy. Basically, this can cause your program to crash because your application calls for a file that is no longer there.

You can use the visual basic recommended method of storing and retrieving your files from a resource file. The problem with this is that the resource file feature will only accept bitmap image files. The bitmaps tend to be rather large in file size, but more importantly, the image quality is poor.

I have found that Windows meta files (*.wmf) work best when trying to display images created in a CAD system. These images, when loaded into an "Image" box, can be made to automatically "stretch", or scale, themselves to fit the box provided. This way, your images don't have to be all exactly the same size to look proportionate. In addition, the image resolution is much beter than a bitmap file.

Image provided by DZynSource, LLC Let's assume that you are writing an application, and you want to call various pictures to one "Image" box displayed on a form. Let's further assume that you want the image to change based on a user selection, like the form shown in the picture to the left. Once your image files are created, and saved in Windows Meta File format, they are ready to be imported into your application.

Create a form called something like "frmPicture". Add as many picture boxes as you desire to this form. Click on a picture box, go to the "properties" dialog box, and name the picturebox with a name that is something meaningful to you. If you are going to show pictures of a car, you could call this picture box "car", for example.

While in the properties dialog box, scroll down to the "picture" property. When you click on the picture name, in the properties column, a command button with three dots on it appears at the end of the picture property row. Click on it. This opens a direcory list box that allows you to search your computer to find your files. Select your desired car picture file. The picture will display in the picture box that you just created.

Now go to the form where you want to display these interchangeable pictures. Create an "Image" box, and size it to suit your application. Call this image box "Image1", or whatever makes sense to you. Go to the Properties dialog box and set the stretch property equal to true.

We use an Image box here because it has this property called "stretch" that allows our pictures to re-size to fit the box created.

If you are going to use an option button to select the image to be displayed, you can use code like the following to retrieve the picture:

Private Sub optCar_Click()
If optCar.Value = True Then

Set Image1.Picture = frmPicture.Car.Picture
Image1.Refresh

You can change the code to suit whatever selction feature and file names you decide to use.

This tells the program that Image1's picture property is the car picture from the form called frmPicture.

In this case, every time the user selects a different option button, based on the textual description next to the button, the image changes to show a graphical representation of the choice. This is a visual aid to the user, and makes the software interface more user friendly.

Using this method accomplishes several things:

The images are internal to your application, that is, they are contained within the application.
You don't have to ship pictures and images as separate files that can get lost from the root directory, and ruin the performance of your software.
The Windows meta files give a reasonably good image quality, and scale to fit the image box supplied.

Improve Your Computer Skills



Improving your computer skills is necessary, in these times of changing technology. Having great computer skills can present alot of opportunities, including an increase in your income. Take a look at some of my suggestions below.

A great way to improve your computer skills, is to enroll in a computer course. If you don't want to take it in a traditional classroom, try enrolling in an online program.

There are alot of computer learning softwares, that you can purchase in the stores or online. Amazon.com is a great place to start. You can start from the basic learning programs and move your way up to the more advance levels.

Visit computer forums online. There are so many technical information that can be learnt from those forums. If you are not sure about something, post your questions and it will be answered.

Improve your computer skills by reading technical literatures. Rent books from the library or surf the internet. There are alot of educational information that can be found on the internet.

Do you know anyone who have a geeky background? Now is the time to be-friend them. They have a wealth of information to share. I am sure that they would be more than happy to share some of their technical skills with you.

Improve Outlook 2003's Performance After Initial Setup



Sometimes MS Outlook will freeze or perform very slowly after setting it up for the first time. This can occur to accounts in an organization and home users alike. Follow the steps below to fix this potential issue.

The main solution is to turn off Cached Exchange Mode. To do so, launch MS Outlook and go to the Tools menu. Next, select "E-mail Accounts."

Select the option to "View or change existing e-mail accounts", click "next."

Next, click/select your Exchange Server e-mail account (ask your administrator), then click "Change."

Once chosen, under the Microsoft Exchange Server option, click to clear the "Use Cached Exchange Mode" check box. Click next, then Finish.

Quit the program and re-launch MS Outlook.

Tuesday, October 14, 2008 | 12:49 PM | 0 Comments

Find Lost Computer Files

Have you saved a file to your computer and now getting frustrated because you can't seem to remember where you saved it? Don't worry, Windows has you covered. Within a few clicks you'll be happily reunited with your file once again.

Click the Start button on your taskbar.

Click 'Search' (or in older versions, 'Find').

Select 'All Files and Folders' from the next pop up window.

Type in at least part of the file name in the box.

Select the drive where you think the file may be. This could be in a folder or perhaps even the entire C: drive.

Click Search.

A window will come up that will show you the progress as it is searching. Several files may come up in this window.

When you see the file you're looking for, you can double click it to open.

Find Highly Rated and Recommended Anti-virus Softwares for Absolutely FREE?

Is your so called 'free' Anti-virus software that came with your computer expiring? Why should you again pay for Anti-virus softwares when you can find equally competent anti-virus softwares for Absolutely FREE? Here I am listing three of most commonly used & highly rated FREE anti-virus softwares. They have a great reviews from users as well as experts.

AVG Anti-Virus Free Edition 8.0.1: Very well-known, absolutely FREE of charge for LIFE! Easy to use and will not make your system crawl, low system resource requirements, automatic updating, real-time protection. The Direct link of the software is given in the resource section of the article.

Avast Home Edition: On Demand Scanner with simple skinnable interface, just select what you want to scan in which way and press Play button, email scanner for most available email clients, P2P protection for Kazaa, Bittorent, web-shield and much more. The direct link of the software page is give in the resource section of the article.

BitDefender Free Edition: Virus Scan, Scheduler, Live Updates, Quarantine, Reports, On demand scanning. Less known, but very powerful Antivirus software. Automatic and manual update. The direct link of the software page is give in the resource section of the article.

Find Gif Creation Programs Online

This is a listing of where and to find GIF creation programs online.


To find a program that creates GIFs, one can perform an internet search with basic keywords like "GIF"," create", "construction", "set", and "free". Although the search won't likely bring up any completely free programs to download, some will bring up free trials, which will give a good opportunity to try the GIF process at least and see if buying them to make the GIFs is ideal.

One such site that will come up is the link for GIF Construction set. This is available at mindworkshop.com and is recommended by the author of the "Sam's Teach Yourself in 24 Hours" book about HTML and XHTML.

Another program download that comes up is a link to Gif Animator. This is available at gif-animator.com.

Download.com has a try before you buy program download for Easy Gif Animator that will likely also come up in your search.

The other option is to create GIFs online. Although this can be a pain due to speed and internet disconnection, it is another great way to create GIFs. I found the following sites for this:
www.gifup.com, gickr.com, picasion.com, and gifworks.com.

The last bit of advice I have is to tell all that people are supposed to get permission to use GIFs online or in any other way that is not personal use.

Find and Delete Duplicate Images and Photographs

Visual Similarity Duplicate Image Finder will find all similar and duplicate images in a folder and its sub folders. It uses advanced algorithms in order to find similar images in a way that a human does. Due to that fact it can find similar images even if they are in different image formats and sizes.

Download and install the product at http://www.mindgems.com/products/VS-Duplicate-Image-Finder/VSDIF-Download.htm
There is a free demo available for download

Find Duplicate and Similar Photos Install the product. Start the program. The main window will appear.

Add folder(s) that you want to scan using "Add Folder" button (1)
Note: You can disable scanning a folder if you double click on the folder name. This is useful if you want to recursively scan a folder, but you want not to scan some folders inside

Select "Visual Compare" method from the drop down list (2).

Note: "CRC32 Checksum" method do not scan images for visual similarity. Using this method you can find only 100% binary equal images. "File Size" method will find duplicates with equal file sizes.

Adjust the "Similarity" spin button with the desired value (3). The default similarity value is 95%.
Note: Similarity value is used only when the selected method is "Visual Compare".

Select "New Cache" from "Cache" drop down list (4) or existing cache if you have previously created one.
Note: Using image cache files speeds up the first phase of the scanning process. It is recommended to use new cache only on folders you still didn't scan.
inside the selected folder.

Find and Delete Duplicate Photographs and Images Press "Start Scan" button (5)

After the scanning process is finished the following screen will appear:

Duplicate images are grouped in with different color. Depending on the "Auto Check " settings, the program automatically checks smaller images in every duplicate group. If you un/checked some duplicates by hand, you can always use "Auto Check " button (1)

After checking which files you want to move or delete press "Move Checked Files" (2) or "Delete Checked Files" button (3)

You can delete the checked files to the Recycle Bin if you checked "Delete files to Recycle Bin" option. Otherwise the files will be deleted permanently.
You can move the checked files to a custom folder if you adjust "Move checked files to ..." option selecting the destination folder. Duplicates folder structure will be maintained in the selected folder.

From this version the duplicates list supports multiple selection and you can select files using mouse and Ctrl/Shift keys. Note the difference between checked and selected files. You can then delete the selected files from the list and from the hard disk using the Delete key.

Fill Out a PDF Form With PowerPoint



Often websites use a PDF file to put forms on the Internet. Filling out a PDF form is difficult if you do not have a PDF editor. When run with PowerPoint, the Ghostscript program has the capabilities to allow users to fill out PDF forms without a PDF editor.


Download Ghostscript and the Ghostscript viewer. Ghostscript is an open source software free for download.

Install Ghostscript and save the PDF file you want to edit. Run the Ghostscript viewer and Click "Open."

Select the PDF you want to edit and click "Open." Go to the File menu and choose "Convert."

Pick "Jpeg" in the "Device" option in the Convert window. Set the resolution to 300. Choose the pages you want to edit from the Pages list. Select a location to save the picture and click "OK."

Run PowerPoint and go to "Page Setup" in the File menu. Edit the slide's height to 11 and the slide's width to 8.5.

Click on the "View" tab and move down to "Master." Select "Slide Master." Repeat this for all the pages.

Insert the pictures of the form. Create text boxes in the slides around the lines on the forms. Click on "Insert" and select "Text Box." Type the information in the text boxes.

Print the PDF form out or save the file in order to email or print the document later.

Extend Your Laptop's Battery Life



Most laptop manufactors promoise that the battery of the Laptop you have will last a long time, they lied! The laptop battery always seems to stop working very early (when you're watching a dvd). Take the proper steps yourself to ensure you get the most out of your laptop's battery life!

The well lit screen on your laptop takes up more power than you think. While the screen is bright, you don't have to have it up to the maximum brightness in order to use it. Go to your screen settings and decrease the brightness so it's still comfortable for you to use.

Discontinue your wireless signal if you have one, while you're not using your laptop. 20-30 minutes of your laptops battery life goes towards supporting your WiFi wireless feature. Right click on your wireless icon and click disable.

Make sure you have the correct power scheme set on your laptop. You can choose to use maximum power or low power when not using your laptop. Play around with the settings until you find one you feel comfortable with.

 
Copyright © 2010 - All right reserved | Template design by Herdiansyah Hamzah | Published by Jurnalborneo.com
Proudly powered by Blogger.com | Best view on mozilla, internet explore, google crome and opera.