Wednesday, September 10, 2008

Vista Optimizer 4.4.17

Vista Optimizer 4.4

Vista Optimizer is a suite of high-power utilities that tunes your PC for maximum security and performance. Removing junk files to save valuable space and to prevent crashes, it boosts system speed, virtually eliminates error messages, securely deletes sensitive data and safeguards internet privacy. With just a few clicks, it can fix registry errors and vastly improve system performance.

* Optimizes speed by compacting wasted space and gaps in the registry.
* File Shredder securely deletes unwanted files so they cant be recovered by prying eyes.
* Uninstaller helps you remove any unwanted software.
* Sys Info provides every detail about what is installed on your Computer .
* Tracks Eraser deletes navigation and appliction history to protect privacy.
* Startup Manager prevents spy apps from compromising your system.
* Program safely backs up everything so you can revert back if needed.



Vista Rainbar v4.3

Vista Rainbar v 4.3

Vista Rainbar v4.3 | 6,9 MB

Vista Sidebar clone for Rainmeter, Vista Rainbar is easy for using. This sidebar, whose you can change the background between around ten choice, offers many gadgets such as clock, calendar, RSS feeds, weather... with the possibility, for most of them, to customize settings and skins... the program is easy to install. It takes very little ram therefore does not slow down your computer, and of course, it runs on Windows XP and on Vista 100%...

Category - Launchers
Version - 4.3
System - Windows XP / Vista

Download Software:

Vista Recovery Disc 32bit and 64 bit

Vista Recovery Disc 32bit and 64 bit

If you're like most PC users, you probably got Windows Vista with a new PC or laptop. And if you're like 99% of the population, you get your new machines from one of the major manufacturers. Dell, Acer, HP, Toshiba, Lenovo, they all have one thing in common: they don't give you a real Windows Vista installation disc with your purchase. Instead, they bundle what they call a "recovery disc" (that's if you're lucky - otherwise you'll have a recovery partition instead) with your machine and leave it at that.
It doesn't matter that you just paid a thousand dollars for a machine that comes with a valid Windows Vista license - your computer manufacturer just don't want to spend the money (or perhaps take on the responsibility) of giving you a Windows Vista installation DVD to accompany your expensive purchase.
The problem is, with Windows Vista, the installation media serves more than one purpose. It's not just a way to get Windows installed, it's also the only way of recovering a borked installation. The Windows Vista DVD has a "recovery center" that provides you with the option of recovering your system via automated recovery (searches for problems and attempts to fix them automatically), rolling-back to a system restore point, recovering a full PC backup, or accessing a command-line recovery console for advanced recovery purposes.
Microsoft seems to have realized this problem, and have thankfully made a recovery disc for this purpose. It contains the contents of the Windows Vista DVD's "recovery center," as we've come to refer to it. It cannot be used to install or reinstall Windows Vista, and just serves as a Windows PE interface to recovering your PC.
Just burn with a program such as Nero, onto a CD or DVD, and then boot into it with your PC!

Ever since we first made available the Windows Vista Recovery Disc , we've been inundated with requests for an x86 and x64-compatible version . Flash-forward to three months later, and it's finally here!
If you don't already know what the Windows Vista Recovery Disc is and what's used for, take a quick look at the original article - good luck catching up on the half-a-thousand comments there!
What it does: The Windows Vista Recovery Disc can be used to access a system recovery menu, giving you options of using System Restore, Complete PC Backup, automated system repair, and a command-line prompt for manual advanced recovery.
What it doesn't do: You cannot use the Windows Vista Recovery Disc to re-install Windows - it only fixes (not replaces!) Windows.
Why you need it: If you bought your PC from a major retailer, you didn't get this CD with your hefty purchase.
Vista Recovery Disc 32bit


Vista Recovery Disc 64 bit


Thursday, September 4, 2008

File Extensions List

Here are some file extension which we generally see

.a - library (unix)

.ad - screen saver data (AfterDark)

.adi - graphics (AutoCAD)

.adl - MCA adapter description library (QEMM)

.afi - Truevision bitmap graphics

.afm - Type 1 font metric ASCII data for font installer (ATM - many)

.all - format file for working pages (Always)

.all - general printer information (WordPerfect for Win)

.ani - animation (Presidio - many)

.anm - animation (Deluxe Paint Animator)

.ans - ANSI graphics (character animation)

.ans - ASCII text ANSI character set (NewWave Write)

.asc - ASCII text file

.avi - Audio Video Interleaved animation file (Video for Windows)

.bak - backup file

.bas - BASIC source code file

.bat - batch file (DOS)

.bbm - brush (Deluxe Paint)

.bbs - Bulletin Board System announce or text info file

.bch - batch process object file (dBASE Application Generator)

.bcp - Borland C++ makefile

.bdf - Bitmap Distribution Format font file (X11)

.bga - bitmap graphics

.bib - bibliography (ASCII)

.bib - database - not compatible with TeX format (Papyrus)

.bib - literature database (TeX/BibTeX)

.bif - Binary Image Format b&w graphics (Image Capture board)

.bin - binary file

.bio - OS2 BIOS

.bit - bitmap X11

.bm - BitMap graphics

.bmk - Help Bookmarks (Windows 3.x)

.bmp - BitMaP graphics (PC Paintbrush - many)

.bpt - bitmap fills file (CorelDRAW)

.btm - Batch To Memory batch file (4DOS)

.bup - backup file

.c - C source code file

.c - compressed unix file archive created by COMPACT

.c++ - C++ source code file

.cal - calendar file (Windows 3.x)

.cal - spreatsheet (SuperCalc)

.cbl - COBOL source code file

.cbm - compiled bitmap graphics (XLib)

.cbt - Computer Based Training (many)

.cc - C++ source code file

.ceg - bitmap graphics (Tempra Show - Edsun Continuous Edge Graphics)

.cga - CGA display font (Ventura Publisher)

.chk - recovered data (DOS CHKDSK)

.chk - temporary file (WordPerfect for Win)

.clp - clip art graphics (Quattro Pro)

.clp - clipboard file (Windows 3.x)

.cls - C++ class definition file

.cmd - batch file (OS/2)

.cmd - command (dBASE - Waffle)

.cmd - external command menu (1st Reader)

.cpp - C++ source code file

.cpp - presentation (CA-Cricket Presents)

.cpt - compressed Mac file archive created by COMPACT PRO (

.cur - cursor image file (Windows 3.x)

.dat - data file in special format or ASCII

.dbd - debug info (Clarion Modula-2)

.dbg - symbolic debugging information (MS C/C++)

.dcf - disk image file

.dd - compressed Macintosh file archive created by DISKDOUBLER

.deb - DEBUG script (DOS Debug)

.def - defaults - definitions

.dem - demonstration

.dem - graphics (VistaPro)

.dgs - diagnostics

.dic - dictionary

.dir - directory file (VAX)

.diz - description file (Description In Zip)

.dlg - dialog resource script file (MS Windows SDK)

.dll - Dynamic Link Library (Windows 3.x - OS/2)

.dll - export/import filter (CorelDRAW)

.dmp - dump file (eg. screen or memory)

.doc - document text file

.dos - network driver (eg. pkt_dis.dos)

.dos - text file containing DOS specific info

.drv - device driver eg. for printer

.dsk - project desktop file (Borland C++ - Turbo Pascal)

.dss - screensaver file (DCC)

.ega - EGA display font (Ventura Publisher)

.emu - terminal emulation data (BITCOM)

.env - Enveloper macro (WOPR)

.env - environment file (WordPerfect for Win)

.err - error log

.err - error messages for command line compilers

.esh - Extended Shell batch file

.exc - REXX source code file (VM/CMS)

.exc - exclude file for Optimize (do not process) (QEMM)

.exe - directly executable program (DOS)

.exm - MSDOS executable, system-manager compliant (HP calculator)

.ext - extension file (Norton Commander)

.fac - FACE graphics

.faq - Frequently Asked Questions text file

.fax - fax (raster graphics) (most Fax programs)

.fdw - form (F3 Design and Mapping)

.fix - patch file

.frm - form (Visual Basic)

.ftp - configuration (FTP Software PC/TCP)

.fx - on-line guide (FastLynx)

.fxd - phonebook (FAXit)

.gbl - global definitions (VAXTPU editor)

.gfb - compressed GIF image created by GIFBLAST (gifblast.exe)

.gft - font (NeoPaint)

.gif - Graphics Interchange Format bitmap graphics (CompuShow)

.gly - glossary (MS Word)

.gph - graph (Lotus 1-2-3/G)

.gr2 - screen driver (Windows 3.x)

.grb - MS-DOS Shell Monitor file (MS-DOS 5)

.grp - group file (Windows 3.x - Papyrus)

.hlp - help information

.hof - Hall Of Fame (game scores)

.hp8 - ASCII text HP Roman8 character set (NewWave Write)

.htm - HTML document (Mosaic)

.html - Same as .htm

.htx - Hypertext file

.iax - bitmap graphics (IBM Image Access eXecutive)

.ibm - compressed file archive created by ARCHDOS (Internal IBM only)

.icn - ICON source code file

.ico - icon (Windows 3.x)

.id - disk identification file

.ifs - system file (OS/2) hpfs.ifs

.img - bitmap graphics (Ventura Publisher - GEM Paint)

.inc - include file (several programming languages)

.inf - information text file (ASCII)

.inf - install script

.ini - initialization file

.ins - (WordPerfect) wp51.ins

.ins - installation script (1st Reader)

.jas - graphics

.jbd - datafile (SigmaScan)

.jpc - graphics (Japan PIC)

.jpg - JPEG Joint Photography Experts Group format bitmap graphics

.jtf - graphics (TIFF file with JPEG compression)

.key - security file eg. Shareware Registration info

.kps - IBM KIPS bitmap graphics

.kyb - keyboard mapping (FTP Software PC/TCP)

.lbm - bitmap graphics (DeluxePaint)

.lbm - linear bitmap graphics (XLib)

.lcl - (FTP Software PC/TCP)

.ldb - (MS Access)

.lgo - startup logo code (Windows 3.x)

.lib - library file (several programming languages)

.lis - listing (VAX)

.log - log file

.lpc - printer driver (TEKO)

.m3d - 3D animation macro

.mac - bitmap graphics (Macintosh MacPaint)

.mac - macro

.mai - mail (VAX)

.mak - makefile

.mak - project file (Visual Basic)

.man - command manual

.map - color palette

.map - format data (Micrografx Picture Publisher)

.map - linker map file

.map - map (Atlas MapMaker)

.map - network map (AccView)

.mbx - mailbox data (ZERBERUS)

.mci - MCI command script (Media Control Interface)

.mcp - printer driver (Mathcad)

.mcw - text file (MacWrite II)

.mdm - modem definition (TELIX)

.meu - menu group (DOS Shell)

.mid - standard MIDI file (music synthetizers)

.mke - makefile (MS Windows SDK)

.mod - MODULA-2 source code file (Clarion Modula-2)

.mod - Windows kernel module

.mon - monitor description (ReadMail)

.mov - movie (AutoCAD AutoFlix)

.mp2 - MPEG audio file (xing)

.mpc - calender file (MS Project)

.mpg - MPEG animation

.msg - message

.msp - bitmap graphics (Microsoft Paint)

.mst - setup script (MS Windows SDK)

.mth - math file (Derive)

.mtm - MultiTracker Module music

.mtw - datafile (Minitab)

.mu - menu (Quattro Pro)

.mus - sound file (MusicTime)

.mvf - stop frame file (AutoCAD AutoFlix)

.mvi - movie command file (AutoCAD AutoFlix)

.mvw - log file (Saber LAN)

.mxt - (MS C)

.nws - info text file (latest news) (ASCII)

.nxt - sound (NeXT format)

.obj - object code (Intel Recolatable Object Module)

.ocx - OLE custom control

.off - Object File Format vector graphics

.old - backup file

.ovl - overlay file (part of program to be loaded when needed)

.ovr - overlay file (part of program to be loaded when needed)

.pac - STAD Image (graphics ?)

.pac - package (SBStudio II)

.pal - color palette

.par - permanent output file (Windows 3.x)

.pcc - cutout picture vector graphics (PC Paintbrush)

.pch - patch file

.pct - bitmap graphics (Macintosh b&w PICT1 - color PICT2)

.pcw - text file (PC Write)

.pcx - bitmap graphics (PC Paintbrush)

.pda - bitmap graphics

.pdv - printer driver (Paintbrush)

.pgm - Portable Grayscale bitMap graphics

.pgm - program (Signature)

.pgp - support file (Pretty Good Privacy RSA System)

.pgs - manual page (man4dos)

.pic - PIXAR picture file (SDSC Image Tool)

.pic - bitmap graphics (Macintosh b&w PICT1 - color PICT2)

.pic - bitmap graphics (many eg. Lotus 1-2-3 - PC Paint)

.pif - Program Information File (Windows 3.x)

.pif - vector graphics GDF format (IBM mainframe computers)

.pit - compressed Mac file archive created by PACKIT (unpackit.zoo)

.pll - pre-linked library (Clipper 5)

.pnt - Macintosh painting

.pop - messages index (PopMail)

.pop - pop-up menu object (dBASE Application Generator)

.prd - printer driver (many)

.pub - public key ring file (Pretty Good Privacy RSA System)

.qpr - print queue device driver (OS/2)

.qpx - compiled query program (FoxPro)

.qrt - QRT ray tracing graphics

.qry - query (dBASE IV)

.qt - QuickTime movie (animation)

.qwk - QWK reader message file

.qxd - document (QuarkXPress)

.qxl - element library (QuarkXPress)

.rar - winrar file (compression s/w)

.rdi - device-independent bitmap file (RIFF RDIB format)

.rdx - datafile (Reflex)

.rec - datafile (EpiInfo)

.rec - record file (Sprint)

.rec - recorded macro file (Windows 3.x)

.red - path info (Clarion Modula-2)

.ref - cross-reference

.reg - OLE Registration (Windows 3.x)

.reg - registration (Corel programs)

.rem - remarks

.rgb - SGI RGB image file (SDSC Image Tool)

.rif - RIFF bitmap graphics (Fractal Design Painter)

.rip - graphics (Remote Access)

.rix - bitmap graphics (ColorRIX VGA Paint)

.rmk - makefile (RMAKE)

.rpt - report

.rtf - Windows Help file script

.rtl - text file

.sav - backup file (saved file)

.sav - configuration

.sav - saved game situation (eg. NetHack)

.sbd - storyboard (Storyboard Editor)

.sbi - Sound Blaster Instrument file (Creative Labs)

.sbr - support file (Source Browser)

.scc - text file

.scr - DEBUG source code file (DOS Debug)

.scr - screen saver (Windows 3.x)

.scx - bitmap graphics (ColorRIX)

.sea - Self-Extracting compressed Macintosh file Archive

.sec - secret key ring file (Pretty Good Privacy RSA System)

.sec - secured animation file (Disney Animation Studio)

.set - setup options file

.sgi - graphics (IRIS - Silicon Graphics)

.sig - current program settings (Signature)

.sig - signature file (PopMail)

.sit - compressed Macintosh archive created by STUFFIT (

.smp - sample (sound file)

.smt - text file (Smart Ware II)

.snd - digitized sound file (Macintosh/ATARI/PC)

.spl - sample

.sum - Summary

.swp - swap file (DOS)

.sys - datafile (SYGRAPH - SYSTAT - SPSS/PC)

.sys - system file - device driver or hardware configuration info (DOS)

.tbl - graphics (native format) (PageMaker TableEditor)

.tbl - table of values (OS/2)

.tel - host file (Telnet)

.tga - TrueVision Targa bitmap graphics

.tmp - temporary file

.toc - Table Of Contents

.tre - directory tree file (PC-Tools)

.trm - terminal settings (Windows 3.x)

.tut - tutorial

.ub - audio file (unsigned byte)

.uhs - Universal Hint System (binary file)

.uif - long prompts for windows (WordPerfect for Win)

.unx - text file containing UNIX specific info

.upd - program update info

.usr - user database file (Procomm Plus - Turbo C++ tour)

.vbx - Visual Basic eXtension (Visual Basic)

.vga - VGA display driver

.vga - VGA display font

.vgd - VGA display driver (Generic CADD)

.vid - MS-DOS Shell Monitor file (MS-DOS 5)

.vid - bitmap graphics (YUV12C M-Motion Frame Buffer)

.vid - screen device driver (Word)

.voc - digitized samples (Creative Voice file)

.vst - Truevision Vista bitmap graphics

.vue - animation (3D Studio)

.vxd - Windows 3.x virtual device driver (QEMM)

.w31 - startup file (Windows 3.1)

.wav - Waveform audio file (RIFF WAVE format)

.wbf - MS Windows Batch File (Catch)

.wbt - batch file (WinBatch)

.web - WEB source code file

.woa - swap file (Windows 3.x)

.wrs - Windows Resource eg. printer driver (WordPerfect for Win)

.xbm - X11 Bitmap graphics

.xll - Excel Dynamic Link Library (MS Excel)

.xmi - compressed eXtended MIdi music

.xwd - X Window System window dump image graphics (SDSC Image Tool)

.xx - compressed file ASCII archive created by XXENCODE (uuexe515.exe)

.xxe - compressed file ASCII archive created by XXENCODE (uuexe515.exe)

.zip - compressed file archive created by PKZIP (pkz204g.exe)

.zoo - compressed file archive created by ZOO (zoo210.exe)

Tuesday, September 2, 2008

How to Enable Cookies

To enable cookies, follow the instructions below for the browser version you are using.

Mozilla Firefox (1.0 final release and earlier)

* Go to the "Tools" menu.
* Select "Options".
* Select the "Privacy" icon in the left panel.
* Check the box corresponding to "Allow sites to set cookies".
* Click "OK" to save changes.

Netscape 7.1/Mozilla 5.0

* Select "Preferences" from the Edit menu.
* Click on the arrow next to "Privacy & Security" in the scrolling window to expand.
* Under "Privacy & Security", select "Cookies."
* Select "Enable all cookies".
* Click "OK".

Microsoft Internet Explorer 6.0+

* Select "Internet Options" from the Tools menu.
* Click on the "Privacy" tab.
* Click the "Default" button (or manually slide the bar down to "Medium") under "Settings".
* Click "OK".

Microsoft Internet Explorer 5.x

* Select "Internet Options" from the Tools menu.
* Click on the "Security" tab.
* Click the "Custom Level" button.
* Scroll down to the "Cookies" section.
* To enable:
o Set "Allow cookies that are stored on your computer" to "Enable".
o Set "Allow per-session cookies" to "Enable".
* Click "OK".

Microsoft Internet Explorer 4.x

* Select "Internet Options" from the View menu.
* Click on the "Advanced" tab.
* Scroll down to find "Cookies" within the "Security" section.
* To enable:
o Select "Always accept cookies".
* Click "OK".

Netscape Communicator 4.x

* Select "Preferences" from the Edit menu.
* Find the "Cookies" section in the "Advanced" category.
* To enable:
o Select "Accept all cookies" (or "Enable all cookies").
* Click "OK".

Keyboard Shortcuts

Help and Support Shortcuts


Display the System menu.
SHIFT+F10 Display the Help and Support shortcut menu.
ALT+TAB Switch between the Help and Support Center and other open windows.
CTRL+TAB Switch to the next pane.
CTRL+SHIFT+TAB Switch to the previous pane.
UP ARROW Move up one item in the Index, search results, or list of Help topics.
DOWN ARROW Move down one item in the Index, search results, or list of Help topics.
PAGE UP Move up one page in the Index, search results, or list of Help topics.
PAGE DOWN Move down one page in the Index, search results, or list of Help topics.
F6 Switch focus between the different panes in Help and Support Center.
UP ARROW or DOWN ARROW Scroll through a topic.
CTRL+HOME Move to the beginning of a topic.
CTRL+END Move to the end of a topic.
CTRL+A Select all text in a pane.
CTRL+P Print a topic.
ALT+LEFT ARROW Move back to the previously viewed topic.
ALT+RIGHT ARROW Move forward to the next (previously viewed) topic.
ALT+F4 Close Help and Support Center.

Thursday, August 28, 2008

Hide 'User Accounts' from users

Here is the procedure..

Go to Start/Run, and type:


Open the path

User Config > Admin Templates > Control Panel

doubleclick "Hide specified Control Panel applets"

put a dot in 'enabled', then click 'Show"

click Add button,

type "nusrmgt.cpl" into the add box

Thursday, August 21, 2008

Hardware Troubleshooting

Trouble Shooting Tips after Installing a New Hard Drive

Basic Troubleshooting Tips after Installing a New Hard Drive
Based on Seagate IDE hard drives.
If you have installed your drive and it does not function properly, perform the following checks:

Warning: Always turn off the computer before changing jumpers or unplugging cables and cards.

* Verify compatibility. Verify that the host adapter and drive are appropriately matched to each other and to your computer. Refer to the relevant documentation for details.
* Check all cards. Verify that all cards are seated in their slots on the motherboard and secured with mounting screws.
* Check all connectors and cables. Make sure all ribbon and power cables are securely connected. Ribbon cables are easily damaged, especially at the connector. Try a new cable that you know is good. Make sure no connector pins are bent. Verify that pin 1 on the interface cable is aligned with pin 1 on the drive and host adapter.
* Verify jumper settings. Review the instructions in this guide and in your host adapter installation guide. Make sure all appropriate jumpers are installed or removed as necessary.
* Check your power-supply specifications. Each time you add a new device to your computer, make sure your computer’s internal power supply can support the total power demand. If necessary, consult your dealer for a new power supply.
* Verify the drive-type settings in the system setup program. The drive-type settings in the system BIOS must not exceed the physical specifications of your drive. Also, the settings must not exceed the limitations set by the operating system and BIOS.
* Check for viruses. Before you use someone else's diskette in your system for the first time, scan the diskette for viruses.

2. After you install your new drive, your computer will not boot, and no error message appears on the screen.

1. Check your computer manual or BIOS manufacturer to determine whether your BIOS supports drives that have more than 4,092 cylinders. If your system has this limitation, use the following procedure to configure your computer:
1. Turn off your computer, open the case, and remove your new drive.

CAUTION: To avoid electrostatic discharge damage to your computer or hard drive, make sure you are well grounded before touching the drive, cable, connector or jumpers.
2. Move the jumper on the alternate-capacity jumper, as shown in Figure 6. This causes the drive to appear to your BIOS as having a 2.1-Gbyte capacity (4,092 cylinders, 16 heads, 63 sectors per track). You may need third-party partitioning software, such as Disk Manager, to achieve full capacity of the drive.
3. Remount your drive in the computer and replace the computer cover.
4. Insert a bootable system diskette into drive A and turn on the computer. It should boot from drive A and automatically detect the new drive as a 2.1 –G.byte drive.
5. Insert your Disc Wizard diskette into drive A and type A:XDM. Then press ENTER. This runs the Disk Manager program.
6. Follow the Disk Manager instructions to install the dynamic drive overlay and to partition and format your new drive to its full capacity.
7. After Disk Manager is done, reboot your system. You should see the Disk Manager banner and be able to access the full capacity of your new drive.

3. The screen remains blank when you power up the system.
If the steps listed above do not remedy this problem, try the following:

* Make sure the monitor is plugged in and turned on.
* Check all cards.
* Make sure the video card is seated in its slot and secured with mounting screws.
* Turn off the computer and remove the drive host adapter. If the screen turns on after you reboot, the host adapter may be incompatible or defective. If so, see your dealer.

4. The system does not recognize the drive.
* Check all cables.
* Make sure the power supply is adequate for system needs.
* Reboot the computer and listen to make sure the drive motor starts up. If the drive is very quiet, it may be difficult to hear its discs reach operating speed. If the drive motor does not start up, recheck all drive cables.
* Verify that for each drive, a drive-type is listed in the system setup program.
* Try rebooting your computer by pressing the CTRL, ALT and DELETE keys simultaneously. If the drive is recognized after you reboot the system, the computer BIOS test may be completing before the drive is ready.
One solution is to slow the processor speed during startup. If your computer has a turbo switch, set it to slow speed before turning the computer on. If there is no turbo switch, you may be able to use keyboard commands; see your computer manual for details. After the computer is up and running, return the processor to the fast speed.
Another solution is to warm-boot your computer after every power-on.
* Check for I/O address conflicts. To isolate the conflict, verify that the drive and host adapter are compatible with your computer. Turn off the computer and remove all the peripheral adapter cards except for the video card and host adapter. If the computer recognizes the drive when you reboot the computer, turn off the computer. Reinstall the other peripheral cards, one at a time, until the conflict reoccurs. After you have isolated the source of the address conflict, you can resolve the conflict by changing the 1/0 address of the peripheral that appears to cause the conflict.

5. The system error message, "Drive not Ready," appears.
* Check all cable connections. Make sure pin 1 of the drive is connected to pin 1 of the hard-disc controller or host adapter.
* Make sure the power supply is adequate for system needs.
* Reboot the computer and make sure the drive spins up.

6. The DOS message "Disk Boot Failure," "Non-System Disk" or "No ROM Basic - SYSTEM HALTED" appears.
* Reinstall the DOS system files using the DOS SYS utility.
* Check all cables.
* Use FDISK to verify that the primary partition is active.
* Check for viruses.

Wednesday, August 13, 2008

Some Useful Commands in Windows

Display Connection Configuration: ipconfig /all

Display DNS Cache Info Configuration: ipconfig /displaydns

Clear DNS Cache: ipconfig /flushdns

Release All IP Address Connections: ipconfig /release

Renew All IP Address Connections: ipconfig /renew

Re-Register the DNS connections: ipconfig /registerdns

Change/Modify DHCP Class ID: ipconfig /setclassid

Network Connections: control netconnections

Network Setup Wizard: netsetup.cpl

Test Connectivity: ping

Trace IP address Route: tracert

Displays the TCP/IP protocol sessions: netstat

Display Local Route: route

Display Resolved MAC Addresses: arp

Display Name of Computer Currently on: hostname

Display DHCP Class Information: ipconfig /showclassid

Tuesday, August 12, 2008

How to find MAC address

MAC address
means Media Access Control address
or Ethernet Hardware Address (EHA), hardware address, adapter address or physical address is a quasi-unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number.

To find the MAC address in WindowsXP And Newer

* Go to the DOS prompt
o Click on Start button, select Run
o Type cmd and press ENTER
* In the DOS prompt, type ipconfig /all and press ENTER
You should see the MAC address in this format 00:00:00:00:00:00

To find the MAC address in Unix/Linux

* Go to a terminal (you should know how!)
* In the terminal, type ifconfig and press ENTER
You should see the MAC address in this format 00:00:00:00:00:00 following H/W address

To Find the MAC Address on the Macintosh

You can find MAC addresses on the Macintosh in the TCP/IP Control Panel. If the system is running Open Transport, the MAC address appears under the "Info" or "User Mode/Advanced" screens. If the system is running MacTCP, the MAC address appears under the "Ethernet" icon.

so, follow the following summary for your operating system
use command in
  • Windows 95 and newer: winipcfg
  • Windows NT and newer: ipconfig /all
  • Linux and some Unix: ifconfig -a
  • Macintosh with Open Transport: TCP/IP Control Panel - Info or User Mode/Advanced
  • Macintosh with MacTCP: TCP/IP Control Panel - Ethernet icon

Saturday, July 26, 2008

Configure Power Management in Windows XP

1. Log on to your computer as an administrator. Click Start, and then click Control Panel.

2. Click Performance and Maintenance.

3. Click Power Options.

4. In the Power Options Properties dialog box, on the Power Schemes tab, click the Power schemes drop-down list and select the power scheme that most closely matches how you use your computer. Different computers have different power management capabilities, so your Power Options Properties dialog box may look slightly different from the one shown here.

5. If available, adjust the System standby and System hibernates settings if you are not happy with the default selection. Standby reduces power usage when your computer is not in use by turning off the parts of your computer that use the most energy. It only takes a few seconds to start a computer from standby. Hibernation saves your programs and shuts your computer down completely. Hibernation uses no power, but it takes a few seconds longer to recover from hibernation when you need to use your computer again. Setting shorter delays before standby and hibernation reduces power usage, but waiting for your computer to start may be inconvenient.

6. On the Advanced tab, you can adjust the default behavior of the power buttons on your computer. If you have a notebook computer, you will also see settings for closing the lid of your computer and pressing the sleep button on your computer. On notebook computers, you can significantly extend the battery life by setting the When I close the lid on my portable computer option to Stand by.

7. On the Hibernate tab, select Enable hibernation if it is not already selected.

** Power managements options, such as System standby and System hibernation, are a compromise between power usage and convenience. If you find it annoying when your computer goes into standby or hibernation, repeat these steps to increase the length of the delay or to disable those features completely.

Thursday, July 24, 2008

Remove Thumb.db File

Thumb.db is is a cache of the current picture in that directory.

You may find this file anywhere in your computer. You may be just get rid of this file. This file is not a virus related file nor it is a scam. Still it looks like a virus related file. Anyway there is no harm in that file but if you still don't want to see this file there is a option for that also.

Following are the steps you have to perform for that ......


2>go to "TOOLS".


4>go to "VIEW".

5>1st section "FILES & FOLDERS".

6>click on the "DO NOT CACHE THUMBNAILS".

now the thumbnail file will be removed from your computer once u do this the file will be never created.

Wednesday, July 23, 2008

Obtain New IP address Quickly

You some time need to obtain the new IP address without restarting the Modem provided by your ISP. This only works to the Connections which provide Dynamic IP Address.

Do the following step for that...

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

Tuesday, July 22, 2008

Download From Rapidshare without wait

Rapid Share one of the Best File sharing website that allows you to share your files with anyone .As the name suggest "Rapid" its the Rapid way of sharing the files.But If you want multiple file to download from Rapid share then you need a Premium Rapid share account and it costs a lot , So what to do ?

Here are some of the tips about "How to download from rapid share without time limits"

The main idea behind the tricks is that Rapidshare traces the users IP address who downloads anything from there servers and assigns some limits to specific IP adress . To get around this, you need to show the rapidshare server a different IP address.

Here are some methods for doing this:

For the BroadBand users it is very easy to download from Rapid share if they have Dynamic IP.
1.Download the file which you want
2.After completing the first download, make your modem off..
3.Wait for 3-5 sec and restart it.
4.Again follow the normal steps of downloading the file from Rapid share.

Short-Out the JavaScript:

1. Goto the page you want to download
2. Select FREE button
3. In the address bar put the following:


4. Click OK
5. Click OK to the pop-up box
6. Enter the captcha
7. Download Your File

Request a new IP address from your ISP server.

Here's how to do it in windows:
1. Click Start
2. Click run
3. In the run box type cmd.exe and click OK
4. When the command prompt opens type the following. ENTER after each new line.

ipconfig /flushdns
ipconfig /release
ipconfig /renew

5. Erase your cookies in whatever browser you are using.
6. Try the rapidshare download again.

Frequently you will be assigned a new IP address when this happens. Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work.

Use a proxy with SwitchProxy and Firefox:

1. Download and install Firefox if you have not already
2. Download and install SwitchProxy
3. Google for free proxies
4. When you hit your download limit, clean your cookies and change your proxy

You can use a bookmarklet to stop your wait times:

1. Open IE
2. Right Click On This Link
3. Select Add to Favorites
4. Select Yes to the warning that the bookmark may be unsafe.
5. Name it "RapidShare No Wait"
6. Click on the Links folder (if you want to display it in your IE toolbar)
7. Click OK
8. You may need to close and reopen IE to see it
9. Goto rapidshare and click the bookmarklet when you are forced to wait

Monday, July 14, 2008

Latest Kaspersky Internet Security

Kaspersky Internet Security 2009

Kaspersky Antivirus is a top of the line program that offers all the protection you will need. With low scan times and high detection rates, as well as an interface that can't be beat.


Sunday, July 13, 2008

ESET Smart Security 3.0.669

ESET Smart Security Home Edition 3.0.669


This is the best I found, use it and share the experince.

ESET Smart Security
is a tightly integrated solution designed to protect computers from a range of threats. Built on the award-winning ESET NOD32® Antivirus and its powerful ThreatSense® engine, ESET Smart Security provides antispyware, antispam and customized firewall features. Utilizing ThreatSense — the industry's most advanced heuristics — the window of vulnerability between virus outbreak and signature update is reduced.

ESET Smart Security provides:
* Proactive Protection: award winning ThreatSense technology combines multiple layers of detection protecting you from Internet threats before it is too late. The included antispam and personal firewall features provide you with a total security solution.
* Precise Detection: ESET accurately identifies known and unknown threats. It consistently wins top awards from testing labs and is recognized for having zero false positives.
* Lightweight Design: Smart Security requires less memory and CPU power, allowing your computer to run fast, making more room for games, web browsing, and emailing.
* Fast Scanning Speeds: ESET Smart Security is a highly efficient program ensuring fast file scanning and product updates, while running quietly in the background.

ESET Smart Security
is a new product designed to provide comprehensive protection against a variety of threats. It features the following:
• The next version of ESET's anti-malware engine with comprehensive protection against adware, rootkits, spyware, Trojan horses, viruses, worms and other types of malicious software
• A personal firewall with port stealthing and advanced filtering features
• An antispam filter with Bayesian filtering, whitelisting and blacklisting.

ESET NOD32 Antivirus + Antispyware
• This component is in fact an improved version of the award-winning scanning engine of NOD32 Antivirus v2.7. With respect to program's unprecedented scanning speed, the following improvements have been made:
• Improved system of cleaning and deleting infiltrations. The antivirus system now intelligently cleans and deletes infiltrations with no need for user interaction.
• Computer scan can be run in background in order to use only a part of system resources. Thus scanning will not affect the
performance of your computer and you will be able to work on it as usual.
• The resident protection supports archive scanning.
• Update optimization, smaller update package size than in version 2.7, more effective management and protection of update files against damage.
• Email protection for users of Outlook Express.

ESET Personal Firewall
• Firewall monitors all traffic between a protected computer and other computers in the local network and in the Internet. High quality protection is provided by the following functions:
• Scanning of application protocols HTTP and POP3 (used for Internet browsing and for retrieving email from servers) for infiltrations.
• Checking low-level network communication which helps to avoid many of various remote attacks.
• Ability to recognize the character of network connections established by various types of infiltrations and ability to automatically terminate them.
• Filtering of incoming and outgoing communication based on user defined rules.
• Monitoring changes in executable files.
• Interactive and automatic mode.

ESET Anti Spam
• ESET Anti Spam serves to filter unsolicited email, which makes your work with email more effective. The key features of the ESET Anti Spam are:
• Support for the RCF email format
• Supports several scanning techniques including the combination of Bayesian filter, virus signatures and user defined rules.
• Supports the creation of Blacklist and Whitelist.
• Integration with the Microsoft Outlook messaging and collaboration client.
• Ability to control multiple messages simultaneously.


Wednesday, May 28, 2008

Make Money Online

At these kind of sites, you get paid to click on ads and visit websites.

The process is easy; you simply click a link and view a website for 30 seconds to earn money. You can earn even more by referring friends. You'll get paid $0.01 for each website you view and $0.01 for each website your referrals view.
Payment requests can be made every day and are processed through Alertpay. The minimum payout is $10.00.

The regular member has 10 to 20 ads or more a day.

So you click an ad, wait for the page to load, then wait for the timer to countdown, and then see if you get a green check mark or a red cross mark. Green check mark means the ad you viewed validated and you earned your one cent. Wash rinse repeat ad nauseum. Now, every time one of your referrals, a person that signs up as your referral, clicks a link, you also receive one cent for his advertisement that he viewed.

Click here to join these sites



1. No blog, no own Website.
2. No initial money to pay.
3. Just you should have valid E-mail adderss and vaild Alert Pay e-mail address.

Again there is no charge to make a account on Alert Pay.
you can just make the account by clicking on the following link.

Just join these program. They are absolutely free and are paying one.
You don't have to spend a single bux.

Newly Updated Softwares

Avast Pro v4.8.1201

avast! 4 Professional antivirus, anti-spyware & anti-rootkit for Windows
avast! 4.8 Professional box
The professional solution to great protection

All-inclusive, comprehensive protection avast! 4 Professional Edition includes ANTI-SPYWARE protection, certified by the West Coast Labs Checkmark process, to protect against the latest spyware threats and ANTI-ROOTKIT DETECTION based on the best-in class GMER technology, built in to the scan engine. No additional purchase is required.

Simple to use and automated Just install and go. Automatic incremental updates provide real-time protection of your system, including web surfing. We've made avast! antivirus as simple to use as possible, while allowing full control of your security.

Tried and Trusted With over 50 million users of avast!, you can rest assured that you are using one of the most tried and trusted products in Windows security. We support more Windows versions (from Windows 95 to Vista 64 Bit) than any other anti-malware product. No matter what system you have, at home or on a corporate network, avast! has it covered.



NOD 32 Eset Smart Security v.3.0.621 WITH Woking Keys

ESET Smart Security prevents, detects and removes malware such as adware, bots, rootkits, spyware, trojans, viruses, worms and other Internet threats you face on the job, at home and everywhere your computer goes.

* Stay Healthy: ESET Smart Security blocks more than 70% of new malware threats proactively.
* Fewer Email Threats: New spam blocker works to prevent annoying junkmail, scams and phishes from your inbox.
* Protect Your Privacy: Prevents, detects and disables spyware. We keep an eye out for them to make sure they’re not keeping an eye on you.
* Increased Safety: Bidirectional firewall with intrusion detection features to protect both incoming and outgoing Internet connections.
* Lightweight: ESET Smart Security consumes far fewer resources than similar products, which means your computer can spend more time working on other tasks.

ESET Smart Security: A Fully Integrated Security Solution

There is no better protection for your computer than ESET Smart Security, built on the award-winning ESET NOD32® Antivirus and its powerful ThreatSense® engine.
Four Simple Reasons to Choose ESET Smart Security

Proactive Protection:
ESET Smart Security was designed and built as a single integrated solution to provide the most proactive threat detection in the world. Engineered to provide the fastest scanning speeds available with the least overhead.

Lightweight and Fast:
ESET Smart Security detects and disables Internet threats with minimal impact on your computer's system performance.

Utilizes advanced technology to ensure accurate detection of viruses, trojans, spyware and other evolving threats. This means you can surf the web, play games, email your friends and use your computer with complete confidence.

Antivirus + Antispyware + Antispam + Personal firewall = ESET Smart Security


Working Keys

AVG Anti-Virus 8 Pro

AVG Anti-Virus & Anti-Spyware

Antivirus and antispyware protection for Windows from the world's most trusted security company. Use the Internet with confidence in your home or small office.

* Easy to download, install and use
* Protection against viruses, spyware, adware, worms and trojans
* Real-time security while you surf and chat online
* Top-quality protection that does not slow your system down
* Free support and service around the clock and across the globe
* Compatible with Windows Vista and Windows XP

Integrated protection

* Anti-Virus: protection against viruses, worms and trojans
* Anti-Spyware: protection against spyware, adware and identity-theft
* Anti-Rootkit: protection against hidden threats (rootkits)
* Web Shield & LinkScanner: protection against malicious websites

Easy-to-use, automated protection

Real-time protection, automatic updates, low-impact background scanning for on-line threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is monitored, so nothing can get onto your system without your knowledge. AVG scans in real time:

* All files including documents, pictures and applications
* E-mails (all major email clients supported)
* Instant messaging and P2P communications
* File downloads and online transactions such as shopping and banking


Monday, May 5, 2008

Best "Keyloggers"

Perfect Keylogger v1.6.7

Do you want to know what your buddy or co-workers are doing online? Or perhaps you want to check up on your children or spouse and know what they are doing on the computer? With Perfect Keylogger it is possible in just 2 minutes! This program runs on the installed computer, fully hidden from its users, and logs everything that is typed in a protected file. Install Perfect Keylogger and take total control of the PC!

Perfect Keylogger is a new generation keylogger which is absolutely undetectable. It was created as an alternative to very expensive commercial products like iSpyNow, Spector Keylogger or E-Blaster. It has the same functionality, but is significantly easier to use. Complex internal mechanisms are hidden from the user behind the friendly interface. You can install Keylogger and immediately use it without changing of its settings.


SpyBoss KeyLogger Pro v4.2.3

SpyBoss Pro leading keylogger computer & Internet monitoring
software tool SpyBoss Pro records every detail of what is done on a
computer – records chats, instant messages, emails, web sites visited,
what is searched for, what is done on, pictures posted and
looked at, keystrokes typed, the programs run and much much more... Spy
Boss also uses advanced surveillance screen snapshot features, you get
to see not only what they do, but the exact order in which they do it,
step by step. With SpyBoss Pro, you will never doubt who is doing what
on the computer.


Ardamax Keylogger v2.8

Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.

This invisible spy application is designed for Windows 98, ME, NT4, 2000, XP and 2003.

Keylogger Features:

* Remote Installer - creates a customized Ardamax Keylogger engine file. You can email this file to your target for remote monitoring.
* Invisible mode makes it absolutely invisible to anyone. Ardamax Keylogger is not visible in the task bar, system tray, Windows 98/2000/XP/2003/Vista Task Manager, process viewers (Process Explorer, WinTasks etc.), Start Menu and Windows Startup list.
* Email log delivery - keylogger can send you recorded logs through e-mail delivery at set times - perfect for remote monitoring!
* FTP delivery - Ardamax Keylogger can upload recorded logs through FTP delivery.
* Network delivery - sends recorded logs through via LAN.
* Clipboard logging - capture all text copied to the Windows Clipboard.
* Visual surveillance - periodically makes screenshots and stores the compressed images to log.
* Chat monitoring
* Security - allows you to protect program settings, Hidden Mode and Log file.
* Web Update - Ardamax Keylogger can check the availability of updates, download and install them automatically. Thus, the latest version of Ardamax Keylogger will always be installed on your computer.
* Application monitoring - keylogger will record the application that was in use that received the keystroke!
* Time/Date tracking - it allows you to pinpoint the exact time a window received a keystroke!
* Powerful Log Viewer - you can view and save the log as a HTML page or plain text with keylogger Log Viewer.
* Small size – Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is smaller and the performance is higher.
* Ardamax Keylogger fully supports Unicode characters which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets.
* It records every keystroke. Captures passwords and all other invisible text.

Other Features:
* Windows 2000/XP/Vista support
* Monitors multi-user machines
* Automatic startup
* Friendly interface
* Easy to install

Tested and works 100%
This is the best keylogger out there.


Anti-keylogger Elite v3.3.3

Anti-Keylogger Elite(AKE) is a utility designed to detect keyloggers and give you the power to Prevent Or Allow the keylogger to function. AKE can prevent known and unknown keyloggers from infiltrating your computer Logging everything you type on your keyboard and see on screen. Keyloggers are created to let others spy on what you are doing at any time and either store the information for the person to obtain it later or send it over the internet to their computer. Keyloggers are more of a threat than people give them credit: Keyloggers log everything that you type including Usernames, Passwords, Credit Card Numbers, Private and confidential information. They can also now take lots of pictures of your computer\'s screen so that they can monitor and \"See\" everything that you do. There is a way to stop it, You can use AKE to give you all round protection from all these threats.

Basic Function List
· Detecting keyloggers by their actions in real-time, no scan time needed, no update needed.
· Blocking keylogger to log anything even it looks like they are running normal.
· Lists all keylogger programs detected by AKE.
· All rules can been modified and deleted.
· Password protection for openning and uninstalling AKE.
· Auto block keyloggers, no manual needed.
· Displaying Notification box when keyloggers detected.
· Logging to file is supported.

Advance Function List
· Kernel mode protection, detecting and blocking kernel mode keyloggers.
· The AKE can block all privacy threats in your system, they are Keylogger, Password thief, Screen Shooter and Clipboard logger. All of them are very dangerous for your security and privacy.
· Secure keyboard for high level privacy inputting. It can cross these type of threats: All hardware keyboard loggers; Windows kernel level keyloggers;Windows application level keyloggers and windows message hooks.

Supported OS
·AKE works on Windows 2000 Sp4, Windows XP Sp1 Sp2, Windows 2003.


Saturday, April 19, 2008

Torrent Download (Mac, Windows)

µTorrent 1.7 Final

µTorrent is an efficient and feature rich BitTorrent client for Windows sporting a very small footprint. µTorrent was designed to use as little cpu, space and memory as possible while offering all the functionalites expected from advanced clients. With BitTorrent, you can download files faster and contribute by sharing files and bandwidth.

--- 2007-07-12: Version 1.7 (build 3341)
- Change: use cached scrape stats if scrapes fail (up to 24 hours)
- Change: "When µorrent has reached the seeding goal" -> "When µorrent Reaches Seeding Goal" in Queue preferences to make capitalization consistant
- Change: Implement auto-resizing when header a divider in the addtorrent dialog treeview is double-clicked
- Change: Rework accelerator keys of toplevel menus in the download list right-click menu so that there are no duplicate accelerator keys
- Change: Use 48x48 icon
- Fix: crashes with addtorrent dialog treeview with torrents with a very large number of files in the same folder (100+)


Bitcomet 0.98 - Fastest Easiest Torrent Retriever Yet

Bitcomet is a p2p file-sharing freeware fully compatible with BitTorrent, designed for the high-speed distribution of 100MB or GB sized files.
BitComet is a easy-to-use multitorrent client for Win32 platforms, along with lots of improvements.
Support download certain files within torrent, disk cache, fast resume, port mapping, speed limits, etc. Small, clean, and fast.
No adware or spyware.


· Support preview of video file which is being downloaded.
· Support DHT Network, download trackerless torrent!
· Completely new core written in C++, stable and fast, very low CPU usage. (detail)
· Ability to limit the upload speed as well as download speed. (detail)
· Clean and free, without any adware or spyware. ( Please note: Spybot may misreport "Comet Cursor" )
· Multiple simultaneous downloads, ability to select download files in one torrent and set file priority.)
· Intelligent Connection Optimize, Auto Optimization for different connections, runs well using all default settings.
· Intelligent Rate Control, optimize the upload distribution in order to get the max download rate.
· Intelligent Disk Cache, decrease the potential damage to the hard disk when high-speed downloading (>500KB/s) by decrease the read / write frequency, extra memory usage is the cost. (detail)
· Intelligent Disk Allocating, no long-time disk allocation, also decrease the disk fragment to almost zero.
· Intelligent Hash Scan, no time-consuming scanning when seeding / resume. (detail)
· Firewall and NAT Traversal, users behind differect NAT can now connect to each other (detail)
· Auto config ICF (Internet Connection Firewall) and ICS (Internet Connection Sharing) in Windows XP
· Auto config port mapping in router (UPnP support is required in router, Windows XP is required). (detail)
· Ability to block IP temporarily or permanently, compatiable with eMule ipfilter.dat.
· Ability to chat with other downloaders ( disabled by default )
· Compatiable with Windows XP SP2 TCP/IP restriction (detail)
· ZIP package is also provided, which runs withoust installation.
· Using only one TCP listening port. (detail)
· Support Multi-tracker, and utf-8 extension, UDP tracker Protocol v2.
· [Please Note]: It is reported that Zone Alarm 5.0 conflict with BitComet (and other p2p maybe). (discussion here)
· Support automatically power off with conditions.


Tomato Torrent 1.5(A Macintosh BitTorrent Client)

BitTorrent promotes the accessibility of data on the Internet by allowing anyone to share information with a large audience For more information, take a look at the pretty images over at bitconjurer.
BitTorrent promotes the accessibility of data on the Internet by allowing anyone to share information with a large audience For more information, take a look at the pretty images over at bitconjurer.

The main goal of this project was to separate the BitTorrent code from the Macintosh code, so that either can be updated without having to modify the other.

I got 80% of the download window’s current functionality implemented within 3 days of starting the project. Then I decided to finish “just a bit more,” and the project just kept getting bigger and bigger.

Here are some key features of “Tomato Torrent”:

· Built on BitTorrent 3.4.2
· Remembers recent downloads and where you’ve saved them to, making resumes quick and easy
· Shows detailed download statistics
· Shows detailed information about torrent files
· User interface for torrent generation allows you to specify torrent comments
· User interface for starting a torrent tracker on your Mac
· Most BitTorrent options are fully customizable
· Supports Unicode torrents


pass: mechodownload

Monday, April 7, 2008

Corel, Playstation,Evidence Eliminator




PlayStation 2 Emulator

PlayStation 2 Emulator +Bios Fully Working

Tried Resident Evil Outbreak 1 over (22fps) & Resident Evil Outbreak 2 (37.53fps)
Japan,Eur,U.S.A. bios are included in my release.
Instructions included within 2 mins you will be playing a game.


Evidence Eliminator 6.01

Applications : Windows : English

Evidence Eliminator v6.01**Vista Compatible**

Type.......: Security Utility
Protection.: Serial


Did you know... that the government and police are installing black boxes in ISPs to record your Internet surfing and downloads for evidence?

Deleting "internet cache and history", will not protect you... your PC is storing deadly evidence. Even FORMATTING the disk won't work.

Defend yourself! Make your Internet access safer. Get yourself a truly clean and faster "Like New" PC! Very Happy

Protect your life and your privacy with the new Evidence Eliminator. Evidence Eliminator™ is simply the first and only top-quality professional PC cleaning program that is capable of defeating all known investigative Forensic Software! You can remove all evidence of your internet activity from your PC in a totally non-recoverable way. Evidence Eliminator is an internet washer that deletes in one click your cache, your temporary files, your index.dat. Evidence Eliminator can even remove in a non-recoverable way files that are locked by your operating system. Hundreds of customers trust their onlone privacy on Evidence Eliminator as it is a software that can beat forensic software costing at least a hundred times more than Evidence Eliminator. Check out the full features and functionality now and protect your privacy! ...

Key Features of Evidence Eliminator™

Evidence Eliminator™ destroys in one click:

* Windows SWAP file
* Windows Application logs
* Windows Temporary Files
* Windows Recycle Bin
* Windows Registry Backups
* Windows Clipboard Data
* Start Menu Recent Documents history
* Start Menu Run history
* Start Menu Find Files History
* Start Menu Find Computer History
* Start Menu Order Data
* Start Menu Click History
* Microsoft Internet Explorer temporary typed URLs, index files, cache and history
* Microsoft Internet Explorer AutoComplete memory of form posts and passwords
* Microsoft Internet Explorer Cookies (Selective cookie keeping for versions 5 and above)
* Microsoft Internet Explorer Internet components (Selective keeping of components)
* Microsoft Internet Explorer Download Folder memory
* Microsoft Internet Explorer Favorites List
* Microsoft Outlook Express v5+ database of (Selective keeping of mail and news groups)
* Windows Media Player History
* Windows Media Player PlayLists in Media Library
* America OnLine Instant Messenger contacts
* Netscape Navigator temporary typed URLs, files, cache and history.
* Netscape Navigator Cookies (Selective cookie keeping for versions 4 and above)
* Netscape Mail v4+ sent and deleted e-mails
* Netscape Mail hidden files
* Customizable lists of files and folders, with or without their contents
* Customizable scan lists of file types in specific folders
* Customizable scan lists of file types on all drives
* Deleted filenames, sizes and attributes from drive directory structures
* Free cluster space ("Slack") from all file tips
* Magnetic remenance from underneath existing files/folders
* All free unallocated space on all hard drives
* Evidence of activity in many other programs, using Plug-In modules
* Slack space and deleted entries in the Windows registry
* Created and modified dates and times on all files and folders
* Windows Registry Streams
* Common Dialog load/save location history
* Instant secure deletes of Windows registry data (NT4/2000/XP)