Thứ Ba, 16 tháng 6, 2015

Flash Cookies Cleaner






Flash Cookies are files that can be stored on the user's computer system. They are often used for tracking purposes but also to store preferences and session data, for instance to save games on online gaming sites. These cookies can be deleted by visiting the Flash controls on the Internet that Adobe makes available there, or by using third party programs like CCleaner.
What makes them particularly nasty is that they are - usually- not removed when you delete the cookies in your web browser. That's actually the main reason why they are used for tracking purposes, since most Internet users do not know that they exist let alone how to delete them.
The portable software Flash Cookies Cleaner is another program that can be used to quickly remove all cookies created by Flash applications from a computer system.
The software program will automatically analyze the system and display all Flash cookies that it finds during the analysis in its interface.
flash cookies cleaner
A click on the Delete button will remove all Flash cookies from the PC. There is unfortunately no option to remove only selected cookies from the system.
Users who want to delete specific sites that have placed Flash cookies on the computer system need to use the Adobe web controls instead to do so. This is recommended for users who play online games or visit websites that save preferences and settings in Flash cookies.
Here you can select individual cookies that you want to delete from your PC. Please note that you need an Internet connection to access the page, which may not always be available.  The portable program is a useful alternative to Adobe's Internet-only solution to remove cookies from an operating system. The program does not need to be installed which makes it ideal for a repair disc or USB Flash Drive.
Flash Cookies Cleaner can be downloaded from Softpedia.
download

Running Virtual PC 2007 on Windows 7

vpc20072
There is a fair amount of confusion out there about this – so I would like to start by simply stating that “Yes, it is possible to run Virtual PC 2007 on Windows 7”.
You might be wondering why you would want to do this.  The most common reason is that you want to run Virtual PC on Windows 7 on a system that does not have hardware virtualization support.
There are, however, two issues that you should be aware of if you want to do this:
  1. To reiterate, this is not officially supported.  Microsoft has not tested / qualified to combination, and has not made any commitment to ever do so.  So “buyer be warned”.
  2. A number of people have reported that when they try to install Virtual PC 2007 they receive a compatibility warning like this:

    vpc20073

    What you need to know is that you will only receive this warning if you have installed Windows Virtual PC.  If you get this, and you want to use Virtual PC 2007 instead of Windows Virtual PC, you will need to uninstall Windows Virtual PC.  Note – it will not work if you just uncheck Windows Virtual PC under the Windows Features dialog.  You need to actually uninstall the Windows Virtual PC update:

    VPC2007

    Once you have done this you can install Virtual PC 2007.

Cheat Engine 6.4


Download 

or


Games - this is probably the most popular and expensive industry, which is now associated with personal computers. Even not all programs can be compared with them, and therefore corporate giants earn their design and implementation of games is very big money.

Buy the game is nice, but there are situations when the game is really very interesting story just grabs, music also not satisfactory, but that pass a certain part of the game just does not work. Having spent several hours in the same place starts psychosis, which causes the game to throw or even delete it from your computer. That is why the programmers made this an interesting program as Cheat Engine 6.4 . The essence of this program is to enable the user to take advantage of some loopholes, which he helped to pass a certain part of the game or did facilitate the flow of the game.

Cheat Engine - this is a fairly simple program that allows you to scan the game, and in particular any of the file and look for places there, where the parameters are entered character or any other object with which a character interacts with. You can give a simple example is when you play a game where you have to ride in cars, so-called competition, and you can not pass a certain section of the route. It's okay here it, you just open the program Cheat Engine, you scan your game folder and find a particular file specification car, which of course allows you to change the program. This will give you the opportunity to understate the parameters rivals or raise their own.   
- See more at: http://cheatengine.ru/english.html#sthash.ghb6wPJa.dpuf

Perfect Keylogger 1.68 full seria

Options Screen
Once we run the installation file it informs us we need to enter the password to decrypt it. We put in the password kindly provided by BlazingTools Software, developers of Perfect Keylogger, and wait for a while. What we see next is"User Account Control" window asking us to confirm changes on the computer. We click "Yes", and the setup program launches.
During the installation we pass through the following set of screens: Welcome → EULA → Enter Your Keyword(Perfect Keylogger has a Smart Rename feature that renames all its executable files using the keyword specified) → Select Program Folder → Finishing Installation.
Once the keylogger is installed we see its icon in System Tray. We click it and choose "Options…" from Perfect Keylogger's context menu. As a result, "BlazingTools Perfect Keylogger: Options" window opens.
The interface of this window is made the way we like the most. All the configuration options are grouped into categories, that are shown in a tiny left column of the window. Clicking any of the categories opens the corresponding options in the right, main, part of the window. Because of such grouping configuring the keylogger doesn't take much time, that's why we like such a way of interface the most.
In order to launch the log viewer of Perfect Keylogger we double click its icon in System Tray. As a result, the window with self explanatory name "Log Viewer" opens. On the top of it we see the calendar, where we can choose the day or days' interval to view the logs for. On the right of the calendar, various log management options are located. All the intercepted information is grouped into four categories, namely "Keystrokes""Chats""Images" and "Websites". Switching between the categories is made by clicking one of the corresponding buttons, located below the calendar. The intercepted information is located below the categories, in the main, and the biggest, part of "Log Viewer"window. Summing up, we can say that the interface of "Log Viewer" is simple, yet very handy to use.

Chủ Nhật, 14 tháng 6, 2015

DU Meter 6.20 (FULL + Patch)

             DU Meter 6.20 (FULL + Patch)

“DU Meter is an Internet usage monitor for your computer. It shows real-time graphs and can create reports and alerts based on your downloads and uploads”

Get a grip on your network traffic
Keep an eye on your Internet connection: see data coming in or going out

Have you ever found yourself wondering why some downloads seem to take an eternity to complete, or why your e-mail program seems to be stuck in the middle of e-mail retrieval. Is it really hanging, or maybe it’s just downloading a large e-mail attachment? DU Meter provides the answer to these and other mysteries, and can also alert you of dangerous or unexpected work activity. Watching your data transfer rates can be very enlightening no matter what you do online, and you’ll soon be wondering how you managed without DU Meter before.

DU Meter for parents and business managers
Receive alerts about dangerous or unexpected work activity

If you have teenage children or if you own or manage a small business, you already know how hard it is to enforce certain rules for work usage, while respecting child’s or employee’s privacy.

If you install DU Meter on your child’s or employee’s computer, you can configure it to report back to you via email when monthly or weekly worktraffic exceeds a certain threshold. DU Meter will let you know if someone is breaking your rules (For example using peer-to-peer software to share films and music). Since DU Meter 5, the software can even prevent any further Internet connectivity once the alert condition has been met, without any user intervention.

Remember, you are legally responsible for what your kids are doing online. And while sharing music or videos may seem benign to them, copyright holding companies are suing peer-to-peer work users for thousands of dollars for copyright violations. DU Meter can alert you in time, so this kind of activity can be prevented.

Is your “unlimited” Internet really unlimited?
Protect yourself from unexpected charges or Internet service disruption

Many Internet users believe their “unlimited” account lets them surf the Internet, send large email attachments and download as many movies and songs as they choose. However it is well documented by the media that many Internet Service Providers, both in the U.S. and elsewhere, do in fact set definite usage limits, even though they may advertise to the contrary. Some will take drastic measures like termination of an account without any advance warning, if these limits are exceeded. DU Meter can create detailed reports of the total network traffic volume on your computer and can alert you if certain limits are surpassed. If you have teenage children or if you own or manage a business, DU Meter can be especially useful for you to you too.

DU Meter 6.20 has been released.
This update to version 6.x introduces several improvements and numerous bug fixes.

New feature: Command-line access to DU Meter. It is possible to operate DU Meter’s stopwatch from scripts and batch files.
New feature: Clearing the DU Meter graph. If DU Meter’s graph scaling or averaging gets in your way, you can clear the graph with just one click.
New translation: Thanks to Pierluigi Callegarin, DU Meter is now available in Italian!
Change in functionality: The less frequently used functions of DU Meter pop-up menu are demoted to a secondary (alternative) menu. It can be accessed by holding the SHIFT key while opening the pop-up menu.
Improved performance and better error reporting.
Numerous bug fixes and minor enhancements.

ENJOY this FULL Software DU Meter 6.20 with Working Patch.


Process Explorer



Introduction


Ever wondered which program has a particular file or directory open? Now you can find out. Process Explorer shows you information about which handles and DLLs processes have opened or loaded.
The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you'll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded.
The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the way Windows and applications work.

Related Links

  • Windows Internals Book
    The official updates and errata page for the definitive book on Windows internals, by Mark Russinovich and David Solomon.
  • Windows Sysinternals Administrator's Reference
    The official guide to the Sysinternals utilities by Mark Russinovich and Aaron Margosis, including descriptions of all the tools, their features, how to use them for troubleshooting, and example real-world cases of their use.

Wireshark



Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source multi-platform network protocol analyzer. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tshark is included. One word of caution is that Wireshark has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences). For downloads and more information, visit the Wireshark homepage.

UltraISO



 
 
ISO CD image creator, editor and BIN to ISO converter - UltraISO can extract/create/edit/convert CD and DVD image files directly, make bootable CDs and convert BIN to ISO.
 


 
 
     Along with the large capacity hard disk popularity,  people were already used to copying compact discs to CD/DVD image files, generally used  is the famous ISO 9660 international standards format, therefore CD/DVD image files are called ISO files. Because the ISO file retained complete data information of the compact disc (including compact disc boot information), you were allowed the convenience to use commonly used CD/DVD burning software (for example Nero-Burning ROM ) to record the disc with your CD-R/RW or DVD-R/RW over and over forever, it can also be used directly through Virtual CD/DVD-ROM drive software (for example Daemon-Tools ) .
     UltraISO  is an ISO CD/DVD image file creating/editing/converting tool and a bootable CD/DVD maker , it can directly edit the CD/DVD image file and extract files and folders from it, as well as directly make ISO files from your CD/DVD-ROM or  hard disk. At the same time, you can maintain the ISO bootable information, thus creating your own bootable CD/DVDs. You now have the power tomake and  edit your own ISO filesand then burn them to CD/DVD for your own needs.
     UltraISO is in sole possession of the intellectualized ISO document format analyzer, it can process at the present time almost all types of image files, including  ISO and BIN, it may even support newimage files which are yet to be created. UltraISO can open these image files, directly extract files and folders, edit it and convert other image files to the standard ISO format.
    UltraISO uses the double window unification user contact interface, you have the choice to only use the quick buttons and/or the mouse Drag & Drops, you can handle any CD/DVD image file easily.
 
 
 
   
 System Requirement 
 
  • Windows 8.1/8/7/Vista, Windows Server 2012/2008/2003, Windows XP/2000, ME, 98SE, 98, or Windows NT4.0 SP6a+ operating system .
  • Intel Pentium 166MHz or above.
  • 64MB memory.
  • At least 10MB free hard disk space .
  • CD-ROM, CD-R/RW, DVD-ROM, the DVD-R/RW driver (copy compact disc image needs).
  • Mouse.
 
 Main Features 
 
  • Can directly edit the ISO image file.
  • Can directly extract files and folders from ISO image file
  • Can add / delete /create new directory /rename ISO file image content.
  • Can make ISO file from hard disk document.
  • Can create CD/DVD image from CD/DVD-ROM, maintain bootable information.
  • Can process the compact disc boot information, you can directly add/remove/extract boot image of the ISO image.
  • Supports nearly all known CD/DVD image file formats (.ISO, .BIN, .IMG, .CIF, .NRG, .MDS, .CCD, .BWI, .ISZ, .DMG, .DAA, .UIF, .HFS and so on) , and can convert them to the industry standard and widely supported ISO image format.
  • May directly set the file/folder to hidden attribute
  • Supports ISO 9660 Level1/2/3 and Joliet extension
  • Automatically optimizes the ISO image file structure, saves the disc space.
  • Supports the shell document type integration, Open Image files through double clicking them or the Right Click menu of the mouse with the open dialog.
  • The double window user interface is extremely convenient to use.
  • There are rich add-on tools, you can create ALL in 1 bootable compact discs, CD/DVD imagefile management, even the virtual CD/DVD drive , those functions are really powerful.
 

Thứ Tư, 10 tháng 6, 2015

FFSJ: The Fastest File Splitter and Joiner Version 3.3

FFSJ: The Fastest File Splitter and Joiner

Version 3.3


Copyright © Le Minh Hoang. All rights reserved.
FFSJ consists of two main programs: File Splitter and File Joiner. File Splitter enables you to split a large file into small chunks which are easy to be sent and stored, while File Joiner allows you to join these split parts together so that the original file is restored.
 

Features

FFSJ is...
Very fast: FFSJ can optimize disk-cache and memory usage, this makes FFSJ 3-5 times faster than HJ-Split, WinSplit, MasterSplitter in both splitting and joining tasks. Of course, it is much faster than any compression program.
Simple: FFSJ works well on all Windows platforms. FFSJ-Lite doesn't need any requirement of installations or complicated DLLs. FFSJ-Standard has only one simple installation package for integrating FFSJ into shell context menu.
Small: Both FFSJ-Lite and FFSJ-Standard editions are small enough to fit on a floppy disk.
Easy to use: FFSJ has a friendly user-interface, it can be used to split any file. FFSJ-standard can also create its shell context menus in order to perform splitting and joining tasks directly from Windows Explorer.
Easy to be integrated: Since v3.0, FFSJ published its command-line interface. End-users can split/join multiple files using a .BAT file. Developers can write their own interface (in any language) to perform splitting/joining tasks from their applications.
Secure: FFSJ uses an advanced encryption algorithm to make your data much more secure from unauthorized access. Since v2.9, MD5 checksum algorithm has also been integrated to verify data integrity.
Compatible: FFSJ can join parts produced by HJ-Split.
Free and Safe: FFSJ-Lite and FFSJ-Standard are free and clean, both editions do not contain any form of adwares, spywares, viruses, trojans and backdoors.

Download

Download
FFSJ-Lite
A small .EXE file consisting of all basic features, appropriate for all users.
Download
FFSJ-Standard
An installation package required administrator privilege to install full features.

User Manuals

FFSJ-Lite vs. FFSJ-Standard

FFSJ-Lite is only one .EXE file, it does not need to be installed, you can directly run FFSJ by double-clicking FFSJ.exe.
FFSJ-Standard = FFSJ-Lite + Shell Context Menu Plug-in. For Windows 2000/XP/Vista, you must log on as an administrator to install FFSJ-Standard. After installation, you can launch FFSJ from Shell Context Menu:

How to split a file?

1. Switch to the "Splitting" tab:
2. Select the source file. There are several ways to select the source file:
- Choose the source file from open dialog
- Drag a file from Windows Explorer and drop to the "Splitting" tab
- Edit source file name directly.
- If you have FFSJ-standard installed, you can right click a file and click "Split" from Shell context menu.
3. Setup parameters according to your preference: change output directory, change number of split parts, change part limit, etc.

4. Click "Split" button, enter your password if you want to encrypt the data, and wait until File Splitter completed the task. You will see the message:
5. Done.

How to join split parts together?

All split parts must have the same name, except for their extensions (.001, .002, .__a, .__b, etc.). Joining split parts is equivalent to restoring original file.
1. Switch to the "Joining" tab:
2. Select the first split part (.001 or .__a file). There are several ways to select the first split part:
- Choose the first part from open dialog
- Drag the first part from Windows Explorer and drop to the "Joining" tab
- Edit the first part name directly
- If you have FFSJ-standard installed, you can right click a split part and click "Join" from Shell context menu.
3. Check the list of split parts from drop-down list.
4. Setup parameters according to your preference: Change output file, specify your split parts are in different locations, etc.
5. Click "Join" button, enter the password if your split parts are password-protected, and wait until File Joiner complete the task. You will see the message:
6. Done.

How to get MD5 signature of a file?

1. Switch to "MD5 Checksum" tab:

2. Select a file to get MD5 signature. There are several ways:
- Choose a file from open dialog
- Drag a file from Windows Explorer and drop to the "MD5 Checksum" tab
- Edit the file name directly
- If you have FFSJ-standard installed, you can right click a file and click "MD5 Checksum" from Shell context menu.
3. Click "Get & Copy" button, and wait until File Checksum complete the task. You will see the message:
4. Done. MD5 signature has been copied to clipboard, you can paste MD5 signature to somewhere and keep this signature with your file.

User manuals in other languages:

In Spanish (by Raul P.J.)


Command-Line Interface

Since v3.0, FFSJ has published its command-line interface (CLI) in order to make FFSJ more flexible.

Command-Line Format:

"FFSJ.exe" "Parameter 1" "Parameter 2" ...
  • FFSJ.exe: FFSJ program file, including the full path if needed, e.g. c:\Windows\System\FFSJ.exe
  • Parameters must be separated by spaces, and each parameter should be surrounded by double quote characters (").

Notes:

  • If the command-line parameters provided enough information, FFSJ performs the task immediately and exit; otherwise, users have to complete all missing fields in FFSJ window before performing the task.
  • Try not to execute more than 1 task at once, this make FFSJ run much slower. To split (join) multiple files, let's split (join) them successively using a .BAT file, or using WaitForSingleObject Windows API function if you execute FFSJ command-lines from your application.
  • Unicode file names are supported in FFSJ command-line interface. However, Unicode file names are not supported in .BAT file; to split/join multiple files named in Unicode, you have to write your own application to launch FFSJ. (AFAIK, please let me know if you have any better solution).

Command-Line Parameters to split

Parameter
Description
-Task=SplitRequired. The task to perform (Splitting)
-Input=Path\FileNameRequired. Path\FileName: full path to the input file (source file)
-Output=PathOptional. Path is the full path to the output directory. If this parameter is omitted, the source directory will be used.
-PartCount=NPresented if you want to split the source file to N equal-size parts (0<N<1000). If this parameter is omitted, -Limit parameter must be presented
-Limit=SPresented if you want to split the source file after every S bytes of data (valid only if the -PartCount parameter was omitted).
-Password=PWDOptional. PWD is the password used to encrypt data in output split parts. If this parameter is omitted, the output files will be named with extensions: .001, .002,..., otherwise they will be named with extensions: .__a, .__b, ...Password is case-sensitive
-DeleteInputOptional. If this parameter is presented, FFSJ will delete the source file after splitting
-HideOptional. Hide FFSJ window, perform the task silently.
Examples:
To split file c:\test\LargeFile.dat to 5 equal-size parts, save to c:\test\SP directory:
FFSJ.exe "-Task=Split" "-Input=c:\test\LargeFile.dat" "-Output=c:\test\SP\" "-PartCount=5"
To split file c:\test\LargeFile.dat after every 700MB, apply data encryption with password 0123456789, save split parts to the source directory (c:\test):
FFSJ.exe "-Task=Split" "-Input=c:\test\LargeFile.dat" "-Limit=734003200" "-Password=0123456789"

Command-Line Parameters to join

Parameter
Description
-Task=JoinRequired. The task to perform (Joining)
-Input=Path\1stFileNameRequired. Path\1stFileName: full path to the file containing the first part. (.001 or .__a file)
-Output=Path\FileNameOptional. Path\FileName: full path to the output file. If this parameter is omitted, the output file name will be implied from first part name by removing the last 4 characters.
-Password=PWDPWD is the password used to decrypt data if input split parts were encrypted. You must specify the correct password as was used to split. Password is case-sensitive.
-MultiLocationsOptional. Specify this parameter if your split parts are in different locations, FFSJ will ask for another location containing next parts after completely transferring data from current parts to the output file.
-DeleteInputOptional. If this parameter is presented, FFSJ will delete input split parts after joining.
-HideOptional. Hide FFSJ window, perform the task silently.
Examples:
To join files, started from c:\test\SP\LargeFile.dat.001, to file c:\test\LargeFile.dat, delete split parts after joining:
FFSJ.exe "-Task=Join" "-Input=c:\test\SP\LargeFile.dat.001" "-Output=c:\test\LargeFile.dat" -DeleteInput
To join files started from c:\test\LargeFile.dat.__a to file c:\test\LargeFile.dat, decrypt data with password 0123456789:
FFSJ.exe "-Task=Join" "-Input=c:\test\LargeFile.dat.__a" "-Password=0123456789"

Command-Line Parameters to perform MD5 checksum

Parameter
Description
-Task=ChecksumRequired. The task to perform (Checksum)
-Input=Path\FileNameRequired. Path\FileName: full path to the file for generating MD5 signature.
-Output=OutputFormRequired. if OutputForm is Clipboard, MD5 signature of input file will be copy to clipboard, if OutputForm is File:FileName, MD5 signature of input file will be write to a text file specified by FileName.
-HideOptional. Hide FFSJ window, perform the task silently.
Examples:
Copy MD5 signature of c:\test\LargeFile.dat to clipboard
FFSJ.exe "-Task=Checksum" "-Input=c:\test\LargeFile.dat" "-Output=Clipboard"
Write MD5 signature of c:\test\LargeFile.dat to file: c:\test\LargeFile.dat.md5
FFSJ.exe "-Task=Checksum" "-Input=c:\test\LargeFile.dat" "-Output=File:c:\test\LargeFile.dat.md5"

FAQs

- I cannot join files, FFSJ asked me for the password, please send me the password to join.
- Contact the person who sent you the files, I cannot help in this case. FFSJ uses an advanced encryption algorithm to make the data much more secure from unauthorized access. No one, no program, no computer can decrypt data and join parts without password to restore the original file. Trying to crack or bypass the password verification would make the output file corrupt.

- I tried to join N parts, but FFSJ showed that  only M parts have been joined (M < N)?
- The file numbered M + 1 is missing or incorrectly named.

- I tried to join a big file, but FFSJ stopped incompletely?
- This seems like your output file exceeded the maximum size limit of file system. For example, FAT32 file system does not allow files to grow bigger than ~4GB bytes.

- How to perform multiple splitting/joining tasks?
- (1) Make a command-line to split/join one file, (2) use DOS command: DIR/B > FileList.txt to get the file list, (3) import file list and the command line to MS Excel and generate command-lines for all tasks, (4) save all command-lines to a text file named with .BAT extension and run this .BAT file. That is what I usually did, you can do in other ways.

- How to verify whether a downloaded file is corrupt or not?
- Ask the person who sent you the file for the authentic MD5 signature, also get MD5 signature from your downloaded file. If these two signatures are different, your downloaded file is corrupt.

- Does FFSJ have editions in other languages?
- The program file has English GUI only, but developers can write their own GUI (in any language) and perform splitting/joining tasks using FFSJ command-line interface. For example, click here to download the tool to split/join multiple files (GUI in Vietnamese)

Change Log.

Changes from v3.2 to v3.3
1. Bug fixed: Auto drop shadow effects
2. Bug fixed: Drag n Drop behaviors
3. Bug fixed: FFSJ Shell Context Menu on Vista
4. FFSJ now uses Segoe UI font on Windows Vista

Changes from v3.1 to v3.2
1. FFSJ 3.2 mainly focuses on Vista compatibility.
2. Added File Associations to FFSJ standard.
3. Some bugs were fixed.

Changes from v3.0 to v3.1
1. I/O Buffer Optimization.
2. Minor changes.

Changes from v2.9 to v3.0
1. File-SJ has been renamed to FFSJ due to the conflict of names between my product and another registered product.
2. Command-line interface has been published. Users can use a .BAT file to perform a list of splitting/joining tasks. Developers can write their own interface (in any language) and perform splitting/joining tasks from their applications.
3. Multiple-disk archive is now supported.
4. Nov 28, 2006: Fixed a small bug in the FFSJ-Standard package, no change in file version.

Changes from v2.8 to v2.9
1. MD5 checksum algorithm has been integrated into File-SJ for verifying data integrity.
2. Minor changes.

Contact

Please email filesjsoftware@gmail.com with your suggestions. Thank you.