|
www.jaf.fora.pl PROGRAMY ,FILMY , MUZA , AUTA ,GRY , XXX
|
Zobacz poprzedni temat :: Zobacz następny temat |
Autor |
Wiadomość |
macohs
ADMINISTRATOR
Dołączył: 11 Lip 2006
Posty: 2421
Przeczytał: 0 tematów
Pomógł: 35 razy Ostrzeżeń: 0/5
|
Wysłany: Śro 23:06, 08 Lis 2006 Temat postu: troche programow 1 |
|
|
1st Disk Drive Protector
Protect your PC from abusive use of removable media with 1st Disk Drive Protector. This software will easily help you enforce whether your users are allowed to use removable media or access your local drives. You can not only hide, lock and prevent usage of local, network, Floppy and USB drives but also disable the AutoRun feature for them. This will let you significantly reduce the risk of unauthorized software installations and cluttering of local disk drives. The design of the program offers you functionality in a very simple way. The main window of the program shows you all available drive letters in group boxes along with the settings you can apply to the drives that the letters represent. You can hide and lock all the drive letters you do not normally use to prevent any inserted removable media from appearing and being accessible in My Computer. The AutoRun feature can be disabled for specific drives or drive types. If you disable the AutoRun feature for drive types, you can, for example, disable the AutoRun feature for all USB drives, for all CD/DVD drives, for all RAM disks or for all removable HDD drives. A password protection can be applied to the program to prevent your users form changing the security settings you enforce.
Here are more details on what these features mean to you and how they can help you use 1st Disk Drive Protector:
Hiding your local, network, Floppy and USB drives - After you hide the chosen drives, they will disappear from My Computer and from all Open/Save dialog boxes in most of Windows software such as Windows Explorer, Outlook Express and Microsoft Office.
Disabling access to your local, network, Floppy and USB drives - After you disable access to the chosen drives, they will become inaccessible from My Computer and from all Open/Save dialog boxes in most of Windows software such as Windows Explorer, Outlook Express and Microsoft Office.
Disabling the AutoRun feature for specific drives - The AutoRun feature will be disabled for only the chosen drives.
Disabling the AutoRun feature for chosen drive types - The AutoRun feature will be disabled for all the drives of a chosen type. This will allow you to disable the AutoRun feature for all USB drives, for all CD/DVD drives and so on.
Password-protecting this program to prevent unauthorized access to it - Nobody will be able to undo the security settings you apply without knowing the password you specify.
1.11 MB
Kod: | http://rapidshare.de/files/32019883/1st_Disk_Drive_Protector.rar |
-------------------------------------------------------------------------------
Advanced Emailer 3.1
Whether you have a small business or large enterprise. There is always a problem of communicating quickly and reliably with your customer base and your subscribers. When you need to let them know you have a new product or a special promotion, it is very tiresome to call or email each and everyone of them individually. And when your customer database is large, even such an obvious task as sending the invoices or tracking the packages sent by mail, could become a major problem. Advanced Emailer gives you a compact and fast solution to all those and other problems that can arise when you are actively communicating with your customers.
Advanced Emailer will completely automate such tasks as:
Notifying your existing customers and subscribers about new products and promotions.
Automatically mailing invoices and tracking numbers to online customers.
Sending a daily or weekly newsletter to your subscribers and many more.
Below is the detailed description of major functions and features:
Multithreading - Advanced Emailer utilizes a windows multithreading technology so whenever a new email message is generated, one of the available threads (user can specify the number of threads standing by) will grab the message and send it.
Multiple SMTP Servers- When you send mail messages, they usually go through an SMTP (Simple Mail Transfer Protocol) Server, that is located on your Internet Provider. If you are like most regular users, your Internet Provider gives you just one SMTP server. This should be more than enough for most uses, but in cases where you need to send large amounts of emails out fast, for example, when you need to deliver financial information bulletin to your users, you might want to consider sending it through more than one Server. This way you will reduce the load on each individual server and cut your send time proportionally. Advanced Emailer allows you to specify any number of connections and manages an even distribution of load automatically. It will drop some connections as necessary, if part of the servers are not responding or busy.
Standard Message formats - Advanced Emailer allows you to create a message in all popular formats used today. You can create a plain text, HTML or even use Microsoft Outlook Express, to generate a rich media content message, or to cut and paste a web page.
Macro substitution- This feature will help you create customized and personalized messages for your users. each individual message sent out will be created and packaged from the database, so that you can address your users by name, or even create an invoice to the user specifying their balance.
Filtering- Not all customers are equal, some want to get certain promotions and newsletters, others want to receive something else. How will you manage who gets what? Advanced Emailer comes with a set of filters that allow you to enable or disable particular users in the list just before you do the actual sending. Using this feature, you can temporarily disable some users that decided not to get that particular type of correspondence, and then re-enable them at a later time. This way you don't need to create a separate list for each mailing thus avoiding a maintenance nightmare, that would have otherwise been created.
Removing duplicates- Sometimes you will get the same email address more than once for one customer. To avoid sending multiple messages to that customer, you will need to scan your lists regularly for the duplicate emails. Advanced Emailer automates that feature and lets you do it with one push of a button. It will even check if all the rest of the information for that customer is different in two places, and merge them into one complete record.
Scheduled send- When you need to send your postings at certain predefined times (for example a daily newsletter). You can use Advanced Emailer's schedule facility. It allows you to set multiple time intervals for sending mailings so you can fully control the times when it happens. Moreover, when the schedule turns sending off, you can manually override it to continue the sending or stop it completely.
It is highly recommended that you use your ISP's SMTP server for sending your mailing. It will help you to relay your email quicker and in a more reliable fasion since your provider's SMTP server is located on the same network as you are, it is the closest high capacity SMTP server, thus will relay email messages faster.
1.75 MB
Kod: | http://rapidshare.de/files/32232075/Advanced_Emailer_3.1.zip |
--------------------------------------------------------------------------------
Evidence Destructor 2.2
When you are working on your computer performing the day to day activity like surfing the Internet, paying your bills online and logging into the websites with passwords, your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures you downloaded, all the pages and text you see, are being recorded by the system. It is done so when you log in to the web site later, you don't have to type a whole name and you don't have to complete forms and enter passwords again. In many cases it is done for your ease of use, but the problem with that is you compromise on your security when you use all these features. If somebody were to look at your PC, which happens quite often. For example your wife wanted to use it for something, or your kids would need to play with it. Or if your computer is at work, your coworkers or your boss would have access to it. Most of the sources of information that may represent your sensitive information are stored on your computer unprotected, and can be recovered by people with some minimal knowlege of computers. It can even affect you when you least suspect it. If you, for example, let your kids download some stuff from the internet. They may download a virus or a malicious program or pictures or other offensive content without you even knowing anything about it or suspecting anything like that has happened. They can also use your computer to make purchases on the Internet (remember, your credit card an all the details are stored there and you will be left to bare the consequences of all their actions. To solve this problem, you need to clean up all the unwanted garbage that is cluttering your computer to get rid of the unwanted evidence that may be used against you one day. You need Evidence Destructor to do the job for you. This program will let you remove all the unwanted evidence from your computer and continue getting rid of it on a scheduled basis as the clutter starts to collect on your computer. Download Evidence Destructor now and try it for 30 days for free.
Here are the major features of Evidence Destructor:
Advanced wipeout engine.
Wipes out most of the known evidence.
Easy and intuitive.
Extendable.
Here is what these features mean to you:
Advanced wipeout engine- Advanced wipeout engine that will wipeout everything needed and if for whatever reason, it is unable to wipe something out at the present point of time, it will record it and will wipeout on the next reboot.
Wipes out most of the known evidence- Evidence Destructor wipes out most of the known evidence left on your computer while you are working on it. It knows how to clean up after commonly used software that is known to leave tracks on your computer.
Easy and intuitive- User interface of Evidence Destructor is easy and intuitive to use. We have done a great deal of thinking to explain and thoroughly document in an easy and accessible way what are cleaning and why it can be a security risk to you. This way, you understand what is going on and you are in total control of what data is going to be removed from your computer and which one will stay.
Extendable - As new programs start to emerge, we will continue adding them to our program to provide you the constant and uninterrupted protection and confidence. We have built the engine of our program in such a way that it can be easily extended to clean up after new programs as they emerge.
1.19 MB
Kod: | http://rapidshare.de/files/32232173/Evidence_Destructor_2.2.zip |
-------------------------------------------------------------------------------
1st Desktop Guard 1.8
With personal computers becoming part of our lives and everyone in the household using them, it's hard to keep track of the icons that are located on the desktop. Many times, you might want to arrange them differently for different jobs. Moreover in case the computer is located in a shared environment like public library or university or internet cafe, a lot of people can use it and rearrange the icons or change the wallpaper. Many times icons get accidentally deleted and it is no longer possible to restore. To avoid this problem altogether, we created this software, that will help you tidy up your personal desktop space. It will allow you to make your work faster and easier, with a few easy steps and will rid you of the hassles related to your desktop.
Save and restore all the desktop icons- You can use the program to save and restore any number of desktop icons layouts at any time You can arrange the icons and desktop any way you want them and save the layout. This way multiple people can enjoy the comfort of their customized desktop settings without any problems.
Restoring deleted icons- The program saves not only the position of each icon on the desktop, but also the shortcuts themselves. This way, if the icons is deleted, 1st Desktop Guard will restore it from it's own repository. There is no need to worry about lost or deleted icons any more.
Password protect your configuration- You can protect the program with a password, so that only you can login and change, save, restore or delete any layouts.
Assign different privileges to different users- You can specify different privileges to each of the user profiles you have on your Windows. You can control if the user has access to the program, can the user change security options, save or delete desktop layouts and allow the user access to tray icon. Each user can be fine-tuned subset of these options on this screen.
Restoring desktop wallpaper- The program also saves the desktop image in it's own repository. Thus eliminating the need to change it back after each person. This is especially useful for public places that need to have a logo on their desktop or a disclaimer. Many public places could also use the desktop to place phone number and email of the support or helpdesk and periodically change it for different shifts.
Automatic desktop restoration- You can assign a layout that will always be kept by default. No matter how the icons or wallpaper gets rearranged, they will be restored after each reboot automatically, eliminating the need to even run the program at all.
1.03 MB
Kod: | http://rapidshare.de/files/32302333/1st_Desktop_Guard_1.8.zip |
-------------------------------------------------------------------------------
1st SMTP Server 2.8
1st SMTP Server - is a simplest, easy to use SMTP mail relay server. It is used for relaying your email messages to its destinations quickly and easily. Nowadays, many Internet providers are closing their SMTP servers and filtering all the incoming SMTP traffic to fight Spam. They let everybody in from their local network. And filter everybody out who is not. This means that as long as you are using their services, your email client is working fine, but what happens when you go on a business trip or vacation and you want to send an email from an airport or hotel room? In most cases your SMTP server is not accessible to you anymore since you are trying to get to it from outside of your ISP's network. If you use our 1st SMTP Server, you will not have that problem since it is going to deliver your email directly to it's destination bypassing your ISP's SMTP server.
Direct messages relay- This server is built as a straight relay. Whenever your email client connects to it and sends it a message, it will, in turn, connect directly to the destination for that message and send it right away. The email client will not be released until the message has either been delivered successfully or was rejected for some reason.
Remote access- Whenever you are on the move or away from your base location, it might be problematic to send emails, because most ISP's block customers that access their servers from outside their network. This will create a problem for you, because each time you arrive at a different location, whether it's another company or your friend's house, each time you are on different network, you will most probably be forced to change your SMTP server in your email client settings.This will force you to find out exact address and possibly username and password of the mail server each time you switch. When you use 1st SMTP server, you don't have that problem, because it is going to send email directly without using any ISP.
Your email is secure- Did you know that when you send your email through your provider's SMTP server, they have the option of opening your messages and reading them? This way your email can be viewed by your ISP. That leaves all your private conversations and business data completely open for unnecessary exposure. When you use 1st SMTP server, we connect directly to the destination SMTP server, bypassing your ISP and only they can see your message.
Very lightweight and simple - This means much less hassle for you. You don't need to go deep into complex installation and configuration procedure. Just run the set up program and be done with it in seconds. It doesn't even ask you any questions. The program is usually ready to run immediately out of the box.
1.25 MB
Kod: | http://rapidshare.de/files/32410384/1st_SMTP_Server_2.8.zip |
-------------------------------------------------------------------------------
Best SMTP Server 1.7
Best SMTP Server is a high-performance SMTP/POP3 server program.
It can be used as a local POP3/SMTP server for your corporation or as a desktop application on your laptop. It will accept mail on behalf of your users and store it, until your users will retrieve it using POP3. Our main purpose in developing this server was to deliver the easiest possible configuration, while allowing you to be able to tweak any advanced features you want. We have completely redesigned the internal engine of the server, and made every possible effort to make it as fast and robust as possible. This way you will be able to concentrate on your day to day tasks instead of trying to tweak your mail server.
This server can be used along with virtually any mailer or email client program that is compliant with SMTP protocol. It is simple, light-weight, powerful and absolutely bullet-proof. It has a lot of security features and options that allow you to protect the server from DDoS attacks as well as safely block most of the SPAM and spammers. SMTP and POP3 servers work as NT services therefore they will keep working even when no users are logged in. For software debugging and testing purposes, the program has a testing mode you can use to check if your email clients work correctly. All messages will be accepted, but will not be sent further. They will be immediately discarded so that you can check if your mail client works correctly according to SMTP protocol. You can have multiple SMTP gateways in your server if you travel a lot with your laptop. This way, even if you cannot deliver your email directly to the destination, you will be able to still send it using one of the gateways.
Newly added feature is advanced, parameterized mailing list management. This is not present in any of the other SMTP servers. Using this feature you can actually use this server as a mass mailer. You can create as many parameterized mailing lists as you like and customize each message that is sent to the member of the mailing list with up to 50 string parameters.
Best SMTP Server offers the following features:
Local and Internet delivery of email messages for your users.
Easy and intuitive configuration without lots of complicated configuration files. Everything is configured through the standalone GUI interface.
Works well as corporate server and as a personal SMTP relay that you can take with you on the road. No need to reconfigure.
Delivers email directly or using a gateway in cases where direct delivery is not possible.
High-performance multithreaded engine for mail sending and mail receiving.
Anti-spam and anti-DDoS attack prevention mechanism built into the server.
Encryption of messages in the message queue and in local user's directories for added protection of privacy.
2.94 MB
Kod: | http://rapidshare.de/files/32411095/Best_SMTP_Server_1.7.zip |
--------------------------------------------------------------------------------
Active@ UNDELETE 5.1
Active@ UNDELETE - Data Recovery is a powerful data recovery software that helps you to recover lost, deleted and formatted data from hard drives, floppy disks, basic and dynamic volumes, hardware or software RAID<RAID0 & RAID5>. Compressed, encrypted and fragmented files are supported. Besides hard disk drives and floppies program supports recovery from removable devices like Secure Digital, Compact Flash, SmartMedia, SONY Memory Stick, ZIP drives, USB Hard drives etc.
Active@ UNDELETE - Data Recovery will help you to restore data residing on the hard drives formatted in FAT12, FAT16, FAT32, NTFS, NTFS5, NTFS+EFS file systems and it works under all Windows family operating systems: Windows 95, Windows 98, Windows ME, Windows NT, Windows 2000, Windows 2003 Server and Windows XP.
Active@ UNDELETE - Data Recovery incorporates many Wizards, that gives expert users full control over the process of data restoration. You can even perform manual data recovery via virtual editing of any drive parameters and using of Hex/Text Viewer and Editor. To get a better understanding of the product, you can download free evaluation version. While having full functionality of the product, it has a limitation on maximum size of the file being restored.
Active@ UNDELETE Enterprise Edition has advanced capabilities to access and perform data recovery on remote machines, as well as supports data recovery from RAID: Spanned, Mirrored (RAID-1), Stripped (RAID-0) and RAID-5 Volumes.
2.52 MB
Kod: | http://rapidshare.de/files/32350492/Active__UNDELETE_5.1.rar |
---------------------------------------------------------------------------------
Da Vinci Encryption System
Da Vinci Encryption System - The need for data protection, previously reserved for corporations protecting sensitive data from competitors, has now spread to virtually all computer users.
Widespread Internet access has placed millions of computers at risk of data compromise, accompanied by high risk of financial loss. To be effective, any data encryption system has to fill several roles. It must protect data on the computer from casual observers when the user leaves his desk, and also provide strong protection from online threats. It should additionally prepare encrypted files for safe transport to another computer without decryption facilities and, for maximum flexibility, also encrypt clipboard contents. Finally, it must be easy to incorporate into the user’s daily routine.
Da Vinci uniquely meets these requirements. It was designed with emphasis on cost-effectiveness and ease of use while employing the strong and widely-accepted AES 256-bit encryption algorithm. This system is for all practical purposes unbreakable, since enormous resources are required to break Da Vinci.
Designed for personal and corporate use, Da Vinci is simple to incorporate into daily computer use while providing powerful data protection. Its features include drag-and-drop to move information in and out of the protected area, self-decrypting files for recipients without Da Vinci, network compatibility and clipboard content encryption. Data is encrypted and placed in a Private Data Container, part of the computer’s existing hard drive, but accessible only by entering the correct password. When connected to the Private Data Container, it carries a designation like any other disk, so it can be used just like any other disk. Data is automatically encrypted and decrypted on-the-fly, so the user works unaware of the process. When disconnected from the data container, the disk designation disappears and data is protected from casual observers, online hackers and anyone else that may want to access personal files.
Your important files can be securely stored on encrypted volumes.Only authorized users can access (and modify) your files. Ease of access means data security can become an integral part of your activities with no added effort. All data in encrypted volumes is inaccessible to LAN and Internet intruders.
3.66 MB
Kod: | http://rapidshare.de/files/32670903/Da_Vinci_Encryption_System.rar |
--------------------------------------------------------------------------------
RegDoctor 1.69
Is your computer running too slow? Are you experiencing computer crashes or windows error messages? Do you want to improve your system performance and stability? If you are answering yes, then you very likely need to clean up your Windows registry.
Registry problems are the common cause of Windows crashes, error messages, and degraded performance! RegDoctor can safely and quickly clean and repair Windows registry problems with a few simple mouse clicks! RegDoctor uses an intelligent, high-performance detection engine to accurately identify missing and invalid references in your Windows registry. Identified registry problems are listed and rated by risk level using an easy to understand color-coded system for your information. You can choose to have RegDoctor automatically repair all identified problems, or more selectively choose which problems to repair immediately. RegDoctor also offers a Restore feature to create registry backup files, giving you the capability to safely undo any registry changes.
The auto-start feature of RegDoctor helps to support its regular use. By using RegDoctor regularly to clean and repair your registry, your system should not only be more stable but it will also help Windows and your software run faster. Click here for more information on why you need software for cleaning your Windows registry.
2.34 MB
Kod: | http://rapidshare.de/files/33006790/RegDoctor_1.69.rar |
-------------------------------------------------------------------------------
UltraCompare 4.10a
UltraCompare Professional is a powerful compare/merge application loaded with features to enable users to track differences between files, directories, and .zip archives! File Compare features include text and binary compare of two or three files at a time and users can merge differences between compared files.
Folder Compare supports comparison of local/network directories (and subdirectories with recursive compare) and .zip archives as well and users may merge differences between them. With automatic integration with UltraEdit-32 or UEStudio '05, UltraCompare Professional is a tool no user should be without!
What Can UltraCompare do for you?
Chances are if you're reading this you already use UltraEdit, but you probably don't have UltraCompare Professional yet. Some users may not realize how important such a tool is or how versatile it can be.
Text Editing: Do you work with text files and ever lose your place or forget which is the most current file? Ever wonder what the differences are between file versions?
Programming: Have you ever changed source code file or an html file and suddenly found you've corrupted it somehow -- but are unsure how? Would you like to be able to compare the file against a prior known working version to identify the new changes that could be at fault? Whether you are a lone developer or work as part of a team, how many times have you wanted to compare your files to modified versions or merge your changes into the newer versions?
System Administration: We all know to make backups - but what happens when something goes wrong and you need to compare your legacy backup with your current backup? That's where a compare/merge/sync tool comes in.
Remote Files: Do you work with remote files that you need to compare? Use FTP/SFTP to download your remote files, perform compare/merge operations, then save your files back to the server. FTP/SFTP Support
Everyday use: How many times have all of us downloaded a software update or file and wondered what's changed since the last release or version?
UltraCompare Professional Features :
- Text Compare Features
- Folder Compare Features
- Word Compare Features
- Fast Binary Compare Features
- Smart Binary Compare Features
- Merge Features
- Print/Output Features
- File Management Features
- Display Features
- Miscellaneous Features
- UltraCompare Lite Features
5.92 MB
Kod: | http://rapidshare.de/files/33080225/UltraCompare_4.10a.rar |
-----------------------------------------------------------------------------
Post został pochwalony 0 razy
|
|
Powrót do góry |
|
|
|
|
|
|
Nie możesz pisać nowych tematów Nie możesz odpowiadać w tematach Nie możesz zmieniać swoich postów Nie możesz usuwać swoich postów Nie możesz głosować w ankietach
|
fora.pl - załóż własne forum dyskusyjne za darmo
Powered by phpBB © 2001, 2005 phpBB Group
|