WELCOME

2011年3月17日 星期四

Painless Partition Recovery

Partition Find & Mount implements a new concept of deleted or lost partition recovery. It works in the most convenient way possible — by locating and mounting partitions into the system, thus making those lost partitions available to you like any generic disk volume. Partition Find & Mount will also work in case any Boot Record (including the Master Boot Record) is missing, damaged or overwritten.
Partition Find & Mount is:
  • Easy to use. You do not need special knowledge to use the software.
  • Safe to your data. There is no possible way you could get things worse.
  • Free for personal use. Use it as much as you like.
Lost important data? Give it a try. Partition Find & Mount is free for personal use!
Partition recovery with Partition Find and Mount
  • 3 modes of partition search
  • Non-standard disk layouts are supported
  • All versions of NTFS and FAT are supported
  • Allows to create and mount images

MHDD

MHDD
License: Freeware
Author: Dmitry Postrigan
Operating System: pure MS-DOS (boot-floppy and boot-CD available)
Discussion: Forum
MHDD is the most popular freeware program for low-level HDD diagnostics.
MHDD supports these interfaces: IDE, Serial ATA, SCSI. Also there is a possibility to access an USB storage, there are drivers for emulation (USB->SCSI).
This software can make precise diagnostic of the mechanical part of a drive, view SMART attributes, perform Low-level format, bad sector repair, different tests and tens of other functions.

2011年3月14日 星期一

WebBrowserPassView

WebBrowserPassView is a password recovery tool that reveals the passwords stored by the following Web browsers: Internet Explorer (Version 4.0 - 8.0), Mozilla Firefox (All Versions), Google Chrome, and Opera. This tool can be used to recover your lost/forgotten password of any Website, including popular Web sites, like Facebook, Yahoo, Google, and GMail, as long as the password is stored by your Web Browser.
After retrieving your lost passwords, you can save them into text/html/csv/xml file, by using the 'Save Selected Items' option (Ctrl+S).


System Requirements And Limitations

  • This utility works on any version of Windows, starting from Windows 2000, and up to Windows 7, including 64-bit systems. Older versions of Windows (Windows 98/ME) are not supported, because this utility is a Unicode application.
  • Currently, WebBrowserPassView cannot retrieve the passwords if they are encrypted with a master password. Support for master password will probably be added in future versions.
  • Currently, WebBrowserPassView cannot retrieve passwords from external hard-drive. Support for that might be added in future versions.
  • On Internet Explorer 7.0-8.0, the passwords are encrypted with the URL of the Web site, so WebBrowserPassView uses the history file of Internet Explorer to decrypt the passwords. If you clear the history of Internet Explorer, WebBrowserPassView won't be able to decrypt the passwords.
  • On Google Chrome - passwords originally imported from Internet Explorer 7.0-8.0, cannot be decrypted.

Using WebBrowserPassView

WebBrowserPassView doesn't require any installation process or additional DLL files. In order to start using it, simply run the executable file - WebBrowserPassView.exe After running it, the main window of WebBrowserPassView displays the list of all Web browser passwords found in your system. You can select one or more passwords and then copy the list to the clipboard (Ctrl+C) or export them into text/xml/html/csv file (Ctrl+S).

2011年3月11日 星期五

BitMate - BitTorrent for the Less Privileged

BitTorrent is a hugely popular peer-to-peer file sharing system. In countries where broadband Internet is widespread, BitTorrent accounts for as much as 70% of the overall Internet traffic. In contrast, in developing countries, BitTorrent is almost unusable on the typically low bandwidth dialup connections and accounts for less than 10% of the overall traffic.

BitMate is designed to enhance the performance of hosts with low-bandwidth connections. Importantly, BitMate enhances the performance of low-bandwidth nodes without cheating, circumventing the fairness policy of BitTorrent or adversely affecting the performance of other peers.

BitMate outperforms vanilla BitTorrent by as much as 70% in download performance, while at the same time improving upload contribution by as much as 1000%! BitMate also outperforms strategic clients like BitTyrant in low-bandwidth conditions by as much as 60% in download performance (without cheating). bitmate1.jpg

BitMate Client

BitMate is a BitTorrent client fully compliant with the BitTorrent protocol and compatible with existing BitTorrent clients. BitMate is implemented using azureus (Vuze) code base. We have subtly changed the underlying mechanism (GPL'ed) without changing the UI or the codebase that deals with the Vuze platform.

BitMate is designed to specifically improve the performance of low-bandwidth peers (5-20 KB/sec); in our target conditions, Bitmate can almost double your download performance. At the same time, it performs at least as well as the traditional BitTorrent clients for high-bandwidth peers (but you'll see most performance benefit for low-bandwidth peers in the developing-world).

Design

A BitMate client achieves good performance under low-bandwidth conditions by the following key design principles:
  • Minimize Wasted Goodwill:
    A BitMate client minimizes "wasted" goodwill. Instead of trying to earn goodwill from high-bandwidth nodes, which rarely reciprocate due to a bandwidth mismatch, a BitMate client utilizes its limited bandwidth to earn goodwill with other low-bandwidth peers with which it can establish the most mutually beneficial tit-for-tat connections. As a result, low-bandwidth clients talk to each other more often, helping each other download faster. In doing so, BitMate clients also reduce the arbitrage between their upload and download bandwidth, minimizing the element of free-riding associated with low-bandwidth peers.
  • Don't Compete Unnecessarily:
    Instead of competing with each other to download the same blocks from high-bandwidth peers, BitMate clients download distinct blocks of a file (that other low-bandwidth nodes have not already downloaded) from high bandwidth peers. This improves performance since low-bandwidth clients download from (reluctant) high-bandwidth peers only when necessary. In essence, by avoiding competition for the same blocks, low-bandwidth BitMate clients "pool" their bandwidth when talking to high bandwidth clients. This also improves fairness since it minimizes the data gratuitously downloaded by low-bandwidth clients from higher bandwidth peers -- instead encouraging mutually beneficial tit-for-tat connections between matching low-bandwidth peers.
  • Avoid Redundant Downloads:
    A BitMate client is watchful when downloading data from other clients and only downloads from those peers that have it unchoked at the time of download. As a result, a low-bandwidth BitMate node makes faster progress in stringing together a piece and avoids redundant downloads due to "premature chokes" by higher bandwidth peers. This also reduces the element of free riding by not downloading from nodes that have choked a low-bandwidth node.
  • Share Aggressively:
    A BitMate client does not wait for a piece to download completely before sharing it with other peers. Instead, BitMate implements pipelined uploads to enable uploading by low-bandwidth clients that are otherwise struggling to string together a piece in the face of repeated chokes by other peers. As a result, a BitMate client can start earning goodwill with other peers (by uploading blocks of a piece) quickly while traditional clients are struggling to string together a piece before starting upload
  • Minimize Cross-ISP Traffic:
    BitMate is designed to minimize cross-ISP traffic without adversely affecting the performance of a low-bandwidth client. However, unlike previous work like Ono, which bias peer selection solely based on the proximity of the peers, BitMate matches peer locality as well as bandwidth. The goal of our work is not to find local peers that may offer better bandwidth due to better path properties, but to find bandwidth-matched peers that may also help reduce congestion on the upstream link of a developing-world ISP.
Overall, a low-bandwidth BitMate client prefers stable, bandwidth-matched peers over the greedy strategy of vanilla BitTorrent. Instead of wasting optimistic unchokes on high bandwidth peers, a BitMate client optimistically unchokes those peers that have a similar low-bandwidth. As a result, a BitMate client invests its scarce upload bandwidth on peers that are most likely to reciprocate. At the same time, BiTMate leaves the tit-for-tat reciprocal unchoke policy untouched to uphold the fairness of BitTorrent. This leads to both increased performance and fairness since low-bandwidth clients can quickly form mutually beneficial peer-to-peer connections.
cluster.jpg

2011年3月9日 星期三

免程式修改[傳送至]選單

c:\Users\Username\appdata\roaming\microsoft\windows\sendto  (加入你要加的捷徑就可以)

2011年3月8日 星期二

提升Copy 速度

Talent Copy

  • Quick specs
  • Version: 0.139 beta
  • Date added: February 09, 2011
  • Price: Free
  • Operating system: Windows 2000/XP/2003/Vista/Server 2008/7
  • Total Downloads: 1,498
  • Downloads last week: 67
  • See full specifications

Publisher's description

From Ventsislav Alexandriyski:
Speed copy files in HDD friendly way, preventing HDD fromwearing and damage, when source and destination are located on same physical drive. Speed is better than default windows copy and difference increase rapidly with increasing count of small files. Talent Copy uses advanced algorithm to limit empty HDD head moves, HDD waste, noise and power on file copying and increase file copy speed dramaticaly.

Link

GPU Stress Test and OpenGL Benchmark

FurMark - OpenGL Benchmark

FurMark

GPU Stress Test and
OpenGL Benchmark

NVIDIA GeForce, ATI Radeon




Link

2011年3月2日 星期三

Look up any Windows or Mac error codes

Look up any Windows or Mac error codes to find out
what they actually mean.

http://www.errorgoblin.com/

Drive-Thru

網址

Manage your HDD with this tool.

Drive-Thru is an easy to use, very useful program designed to enable you to manage your hard drives and other storage devices.

2011年3月1日 星期二

簡單幾步驟 關閉Windows Server的UAC

使用者帳戶控制(UAC)Windows Server 2008Windows Server 2008 R2Windows 7以及Windows Vista之中的一項機制,它提供了可能由不同的程式所呼叫的管理工作之間的互動通知。安裝在伺服器上的微軟與非微軟的應用程式都會受到UAC的影響。檔案是否有使用UAC的最明顯指標就是捷徑上的盾牌圖示(參見圖 A)
圖 A

Windows Server 2008Windows 7UAC功能的確很棒,但我卻不認為僅供作一般用途系統使用的伺服器平台有此需要。你可以在Group Policy Object (GPO)之中設定三個數值,就可以設定電腦帳戶不要執行UAC。這些數值位在Computer Configuration | Policies | Windows Settings | Security Settings | Local Policies | Security Options,它們具有以下數值:
User Account Control: Admin Approval Mode之中提升對管理者的提醒
User Account Control: 偵測應用程式安裝與提升的提醒
User Account Control: 開啟Admin Approval Mode
這些數值分別被設定成在關閉電腦帳戶的UAC時,無需提醒提升、關閉與啟動。這個GPO顯示在圖B,數值則是用來設定組態元件。
圖 B

在此範例之中,這個名為Filter-GPO-ServerOSGPO是透過電腦帳戶的安全群組來設定過濾器。最好養成好習慣將GPO設定到包含有伺服器電腦帳戶的安全群組,並且將一個設定給特定的工作站帳戶。這些數值需要電腦重新啟動才能夠夠過Group Policy啟用。此外,UAC的盾牌圖示仍然不會消失,但是後續對應用程式的存取將再也不會提示UAC

2011年2月28日 星期一

windows 7 不見了語言列

今天開機就發現右下角的語言列不見了
不管我開幾次都一樣


雖然我也另外有在用無蝦米
所以這兩天都在用無蝦米打字
可是
電腦又不只我一個人用.....................


所以爬文爬很久
都只找到"XP".或是一堆雜七雜八的解決方法
終於
讓我找到了


原始文章:http://www.mobile01.com/topicdetail.php?f=300&t=1156355


語言列不見了1.png
1.先開啟工作管理員.按下"新工作".輸入""C:\Windows\System32\ctfmon.exe".通常這時候語言列就會出現


語言列不見了2.png
2.接下來要去看設定有沒有被刪掉.搜尋"regedit".就會跑出一個登錄編輯程式
  左邊的資料夾開始一個一個開""HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run"找到"Run"資料夾.找找看有沒有Ctfmon


語言列不見了3.png
3.沒有的話.就按滑鼠右鍵新增"字串值".輸入"Ctfmon"


語言列不見了4.png
4.然後點兩下.輸入數值資料"C:\Windows\system32\ctfmon.exe"

BB FlashBack Express


Create great demos and tutorials
with BB FlashBack Express
- the free screen recorder

Very simple to use... a great product Richard Goode, FilePlus
More testimonials for BB FlashBack >>
Record your screen, sound and webcam

Share movies with one-click upload to Youtube and other video sharing sites

Save movies as Flash or AVI files

See more features BB FlashBack is available in 3 editions: Express, Standard and Pro.
Compare them here

EMCO Malware Destroyer - Overview

Malware Destroyer

Protect Your PC from Malware Using Free Antivirus with Fast Scan Engine

A free personal antivirus with an ultra-speed scan engine. It helps you to organize personal malware protection and effectively find and destroy various threats. Unique malware scan engine allows you to spend only 10 seconds for complete PC analysis of over 10,000 real threat definitions, including viruses, trojans, worms and other malware types. Up-to-date malware database includes virus information provided by leading virus labs and thousands of users.

ContextEdit Delete 滑鼠右鍵選單中多餘的功能

Lets you control which items appear on your context menu

ContextEdit will allow you easily control the items that appear on your context menu--the menu that appears when you right-click on an item in Windows Explorer.

The context menu often contains numerous rarely-used commands. These commands come from one of two places: shell commands stored within the system Registry, and context menu handlers.

The source of the menu item is transparent to the end-user, but still has an impact. Windows Explorer lets you add or remove simple shell commands, but gives you no control over context menu handlers.

ContextEdit lets you control both types of context menu items. It also allows you to disable context menu items without removing them entirely.

Another unique feature is the ability to add shell commands to all files regardless of type, or to all files without an associated program.
What's New in This Release: [ read full changelog ]

· Fixed a bug that caused the program to get stuck in an endless loop when reading the registry if it encountered a circular reference (specifically, an extension key whose default value contains the name of the same key). The program also presents a warning message when you select such a key in the master list. This rare situation doesn't cause any problems for Windows itself, so ContextEdit doesn't offer to repair it.

2011年2月23日 星期三

Windows 7 Enterprise Downgrade

:iconmp7000:

Windows 7 Enterprise Downgrade by ~MP7000

Customization / Skins & Themes / Windows Utilities / Applications

FindHidden

Utility portable untuk menemukan file-file dan juga folder-folder tersembunyi pada disk anda, dengan cepat dan mudah anda dapat me-manage file-file maupun folder-folder tersebut.
Current Version: 0.6.7a (January 11, 2011) => Some minor bugs in 0.6.7 fixed.

Screenshot program:
FindHidden - Fast Find Hidden File and Folders
Fitur:
File Manager (Delete, Copy, Change Attributes).
Binary viewer.
Create Report (dalam format Text Document).
System Tools: Show hidden files and Show protected operating system files (for Win XP).
Search files/folders by size and by date (created, modified and last accessed).

FotoFrame

Fit more photos on your digital photo frame

* Resizes your photos to your digital photo frame’s native resolution.
* Bulk-resizes thousands of photos in one go.
* Enables you to load up to 15,000 photos onto a photo frame with 2GB storage.
* Runs on Windows or Mac OS X
Digital photo frames have become a popular way of showing off your favourite photos. But unless you’re prepared to buy a large flash card, there’s a limit on the number of photos you can load up.
The average digital photo from a 10-megapixel camera is about 5MB. If your digital photo frame as 2GB of on-board storage, that means you’re limited to 400 photos.
FotoFrame makes it possible to boost that number of 400 to over 15,000. Here’s how it works.
Your average digital photo frame has a screen resolution of around 800×600-pixels (some are as small as 480×234-pixels, others up to 1024×768-pixels). If you copy your 10MP photos straight from the camera to the digital photo frame, the frame will display those photos – but it first has to shrink them down to fit that 800×600-pixel (or similar) display. That means it’s actually throwing away most of the pixels, pixels that unnecessarily take up storage.
FotoFrame does the shrinking or “resizing” first, but it makes it incredibly easy to do. All you do is choose the folder of photos you wish to resize, another folder where you want to save the resized photos, select the resolution of your digital photo frame, select a quality setting and press the Convert button.
FotoFrame will then resize all of those photos automatically, whether the folder has one photo or 10,000 photos in it. When it’s done, you copy those photos to your digital photo frame and you’ll be able to fit far more than just the original 400. In fact, you should be able to load up as many as 15,000 photos on a typical 2GB frame or 2GB flash card.

LinkToPremium

Home   |  Link to premium blog   |  About us & How to download
greenTrash

LinkToPremium is a premium link generator, which lets you download as if you werepremium user, without limits.

You can download from: Megaupload . FileServe . Megavideo. Hotfile

直接複製CMD文字

在每句COMMAND 後加 "| clip" ,之後按Ctrl+V 到記事簿.

開機文件檔記錄

1:在開始功能表輸入msconfig轉到 [開機] 一頁,再選擇 [開機紀錄],確定後重新開啟電腦.

2:重新開機後,Win+R 輸入notrpad %systemroot%\nbtlog.txt 檢示開機紀錄.

2011年2月18日 星期五

PDF Password Remover Tool

PDF Password Remover Tool

Remove PDF Passwords PDF Password Remover tool is a simple tool that can be used to decrypt password protected PDF files which have their "owner" password set. PDF files with the owner password set would prevent viewers from editing, selecting text, printing and otherwise changing any of the pdf properties such as form fields etc. This PDF Password Remover tool will decrypt and remove owner passwords from any PDF document.

The Password Remover tool will NOT work with PDF files that have a "user password" set.

Please use this tool to remove passwords from PDF files that belong to you. It was developed to help you recover PDF files in cases where you forget the owner passwords you once set and can no longer remember.

It can be life-saving when you misplace your originals.

Best of all, we provide this wonderful tool absolutely free for personal use.

Download the Free PDF Password Remover Tool

2011年2月16日 星期三

PDF 任你重組頁碼


A simple tool to rearrange/merge/delete pages from PDF files. The modular backend system uses either JPedal or JPod to display PDFs and iText or Apache PDFBox to save them.

Project Home

sf.net/projects/pdfjumbler

Develop

sf.net/projects/pdfjumbler/develop

Support

sf.net/tracker/?func=add&group_id=384833&atid=1599866

Recommended By

5 users

Last Update

2011-01-31

License

Affero GNU Public License
Download
pdfjumbler-0.16.jar

Other Versions

Browse all files

More Detail

Show

2011年2月9日 星期三

SlimComputer


Slim Down
Your New Computer
Tired of Getting Resource-Draining Promotions on a New PC? The solution is innovative software with community-sourced feedback to remove & disable unneeded software.

Download Now

WSUS Offline Update

Modifications in version 6.7.2

- Optional installation of Internet Explorer 9 Beta on Windows Vista, 7 and Server 2008(R2) (x86/x64) systems
- Optional download and automatic update of Windows Defender definition files
- Optional installation of Windows Defender on Windows XP and Server 2003 (x86/x64) systems
- CreateISOImage.cmd and CopyToTarget.cmd scripts will now log to ..\log\download.log file (Thanks to "Matjes")
- Optional verification of digital file signatures will now include .NET, MSSE and Windows Defender packages
- HashDeep utility updated to version 3.7
- Fix: Microsoft removed the Office File Converter Pack (oconvpck.exe) from their servers (Thanks to "-Iwan-", "harry" and "Denniss")
- Fix: CreateISOImage.cmd script did not properly signal errors (Thanks to "AlBundy")

2011年1月27日 星期四

Disabling the Windows Firewall

This document describes three methods for turning off the Windows Firewall. The first method is for any user with administrative privileges on an individual machine not remotely or collectively managed in any way. The other two methods are for use only by IT administrators on managed systems.
Note that you still need some kind of firewall protection, so don't disable the Windows Firewall unless you have the Symantec Firewall from BevoWare or other appropriate firewall software installed.

Disabling the Firewall Using the Control Panel

This method is for any user with administrative access to unmanaged systems such as: home, RESNET, and campus unmanaged system, and self-managed.
  1. From the Start menu, select Control Panel, then select Windows Firewall.
  2. Select Off, then click Ok.

Disabling the Firewall Using Local Policy

This method is for IT administrators with administrative access to unmanaged systems or locally managed systems where the machine is not part of a Windows 2000 or higher domain.
  1. From the Start menu, select Run, then enter gpedit.msc.
  2. Expand the Computer Configuration folder, then the Administrative Templates folder.
  3. Expand the Network folder, then the Network Connections folder, then the Windows Firewall folder.
  4. Select the Standard Profile folder.
  5. Double-click the Windows Firewall: Protect all network connections option.
  6. Select Disabled, then click OK.
  7. Select the Domain Profile folder.
  8. Double-click the Windows Firewall: Protect all network connections option.
  9. Select Disabled, then click OK.
  10. Close the Group Policy dialog box.

Disabling the Firewall Using Group Policy

This method is for IT administrators with administrative access to UT-managed machines that are part of a Windows 2000 or 2003 Active Directory domain.
  1. Create a new Group Policy object, and give the object a descriptive name (for example, ITS-Turn off Windows Firewall).
  2. Select the newly created group policy.
  3. Right-click on the newly created policy and select Edit.
  4. Expand the Computer Configuration folder, then the Administrative Templates folder.
  5. Expand the Network folder, then the Network Connections folder, then the Windows Firewall folder.
  6. Select the Standard Profile folder.
  7. Double-click the Windows Firewall: Protect all network connections option.
  8. Select Disabled, then click OK.
  9. Select the Domain Profile folder.
  10. Double-click the Windows Firewall: Protect all network connections option.
  11. Select Disabled, then click OK.
  12. Close the Group Policy dialog box.
  13. In the Security Filter section, click Add.
  14. Search for the objects that this group policy will be applied to, then click OK.
  15. Close the Group Policy editor.

Oleansoft Hidden Camera 250x1

Monitor and record everything your employees do!
How to know that your employees do «right» things?
What if they are looking for adult pictures or chatting with numerous friends instead of preparing urgent documents or writing an important code?
What if they sometimes send confidential materials to your competitors?
Or, what if some novices can't use internal software in a proper way?
Would you like to control all computers remotely?
Would you like to see your office or rooms via web cameras?
Would you like to hear that your employees say?
Would you like to send messages to single employee or group of employees?

The solution is: Oleansoft Hidden Camera 250x1

More than 700 companies from 35 countries use the Hidden Camera 250x1 software now!

SchemeAll you need is to install the «manager» part on your computer and the «employee» part on each computer you want to monitor. After this, you will be able to control all the computer screens and office through webcams in real time and off-line modes. The program can capture either entire desktops or only active applications (up to 250 employees per each manager station !!!). You can record voice via microphones and then play any mp3 audio file anytime.

Screenshots are captured smartly in case of any screen changes, and excluding screensavers. All screenshots / snapshots are saved and you can view («play») them at any time. For example, at the end of a working day or when any productivity problems occur.
The off-line work time counter allows to see all statistic information about work time of any employee.

Hidden Camera has «split screen» mode, when you can view all monitored computers simultaneously. Besides, it works inside almost any modern network, even through proxy. There is a very good feature which provides extremely fast installation of the program from the command line.

Remote control
You view the remote computer's screen on your own monitor, all your mouse movements and keyboard signals are transferred directly to the remote computer. You work on the remote computer just as if it were right there in front of you. You have complete, unlimited control of the remote computer so you can launch applications, work on documents, transfer files, even shut it down. Of course, that is provided you are the system administrator or have been granted these permissions by the system administrator.