Sunday, October 31, 2010

How to Control p2p uploads risk using Zapshares

Sharing Files Puts You At Risk If you use P2P file sharing software such as LimeWire, uTorrent, Azureus Vuze, FrostWire, BitTorrent, Shareaza, Ares, eMule, or other similar file sharing software to share music, movies, or software, then you may be unintentionally sharing files that can put you at risk of lawsuits and identity theft.

       P2P file sharing software automatically shares files on your computer, and files you download, with all other P2P users. Some of the files being shared however can contain  sensitive information.

      ZapShares is FREE award winning software used by millions of users worldwide that works in conjunction with any P2P file sharing software you currently use, and allows you to continue downloading any files you want while protecting you against expensive lawsuits and identity theft.
       ZapShares scans and monitors your computer, identifying potential security threats caused by file sharing software, and ensures that you or someone in your household doesn't accidentally share files that could expose you to expensive lawsuits by copyright holders, or expose you and your private information to identity theft.
       It does that by blocking file uploads in the supported P2P programs but only after the files have been downloaded.This works well in P2P clients where the user does not upload the bits received while downloading the rest. Zapshares will spring into action once the download of a file has been completed. It will automatically move the file into another location so that it is not offered and shared by the user.
         Zapshares is definitely not the holy grail that protects users from sharing files in P2P networks. We already mentioned that users are uploaders in many P2P networks for as long as they download the files. It should also be noted that Zapshares did not detect the uTorrent installation on our test system.It is also bothersome that there is no option to close Zapshares once it runs in the system tray. 
     
     Downloading ZapShares is a quick and simple process that can save you countless hours of frustration and millions of dollars by helping to protect you against lawsuits and identity theft. To download ZapShares, CLICK HERE. 

     System Requirements : To use ZapShares, your computer must be running Microsoft Windows 7, Windows Vista, Windows XP, or Windows 2000.
[source : Ghacks ]

 

Friday, October 29, 2010

Rescue or Recover Data on CD/DVD-Abyssal Recovery

Yet another tool to recover data from CDs/DVDs.Data on CDs and DVDs will become unreadable over time. That’s true for every disc regardless of it being a commercial one or self-burned media. CD recovery software like Abyssal Recovery are the last option users have to restore data on discs that have become partially unreadable.

Abyssal Recovery is just one of the recovery tools that Windows users can use to recover files on CDs and DVDs. Computer users in need for data recovery software can also take a look at previously reviewed applications like Isobuster, CD Recovery Toolbox, CD Check or Dataminer. Abyssal Recovery is a basic disc recovery software that will copy files on the byte level ensuring that everything that can still be read will be copied to the destination directory.

The program lacks the advanced options of comparable recovery software apps such as Isobuster. The recovery process is divided into three steps. It begins with the selection of the files that should be recovered from the disk. The destination directory is then selected in the next step which is followed by the actual process of copying the files to that directory.

Abyssal Recovery can rescue corrupted or lost data from damaged, scratched, or defective CD and DVD discs.


Abyssal Recovery can copy the files to another destination on your hard drive.
Abyssal Recovery will skip the bytes which are not readable from file and copy all other bytes to extract maximum data. You can set the program to copy byte with byte to minimize the losses, or you can set a higher number of bytes to be copied once for a faster recovery.
Please note that badly corrupted files recovery is not always possible. Abyssal Recovery will skip any read error encountered.
Abyssal Recovery is free for non commercial purpose.
  

Abyssal Recovery is compatible with 32-bit and 64-bit editions of the Windows operating system. It can be downloaded from the developer’s homepage or  below.


Name:     Abyssal Recovery
Version:     1.0
Platform:     Windows
License:     Freeware
File size:     0.7 Mb

Thursday, October 28, 2010

Create Proxy Email Addresses [Email Alias]

 
In tis post I would like to share a service of http://tempalias.com . Have a service that you want to signup to but prefer not to signup with your own email address? You could use a disposable email address for that purpose if the new account does not contain sensible information.

Another option is to use a proxy email address provided by services such as Tempalias. A proxy email address basically sits between a service or recipient and the real email address. The benefit of this is that the service or recipient do not receive information about the real email address of the user.

Tempalias makes it very easy to create a proxy email address. The user needs to enter the real email address the emails are forwarded to from the proxy email and specify the days or number of received messages the email should be valid for.

Tempalias will automatically generate a random – but never used before – email address for the user that can then be used until the time or mail count runs out.

It has to be noted that the email address will never be accessible again once it runs out. That’s different from most disposable email services where email addresses are always accessible by anyone.

The developers are currently working on a bookmarklet to make it even easier to use the proxy email address service.This is not hack.

Monday, October 18, 2010

Delete, Move or Rename Files being used by Person or Application[UNLOCKER]


On Microsoft Windows system, it is more often that you come across an non-new error saying File is currently in use by another user or application while trying to have some operation on some files. This is also somewhat similar which can Delete, Move or Rename File in Use.I googled it many times and at last found this tool.

This may occur even the file is corrupted some times. Such files are generally auto executed or Virus like files which cannot be deleted by Anti virus program sometimes.This is not a hack. Yes, you are not actually running these files on your own will but it becomes difficult to perform any operation on files currently in use. So, Unlocker is a free small program which can take care of such files and processes.
Install it and you can see a option named UNLOCKER when you right click any file. So you just click it and that's it you can delete, move, rename as you wish.You can download it here.


Enjoy.........Have fun..!!




Wednesday, October 13, 2010

How to send ' .exe ' files in gmail

I've found a silly but interesting trick to send executable files ( .exe )in gmail.Sometimes it seems easy to send small executable files like flash,poke games etc,.But it rejects. So do the following. Just open folder options from your menu bar and then click on view tab.Make sure to un-check the option " Hide extensions for known file types ".Now rename the file with any extension other than .exe. That's it.You are done. Attach the file(which is renamed) and send it. But the receptor have to change the extension to .exe again to execute it.
Enjoy ......Have fun

Tuesday, October 12, 2010

Create Bootable USB Kaspersky Rescue Disk 10 easiest way

Kaspersky is one of the biggest name in the field of Computer Security. Their Security products allow you to disinfect computer system without actually entering into the system which is a general case when PC is critically infected to the extent that you are unable to boot.
Antivirus products offer an option to create a rescue Disc to handle such situation and Kaspersky Rescue Disk 10 is one such solution. These Disks are generally provided in ISO format which has to be burnt on CD / DVD but here we will learn to create Bootable USB Kaspersky Rescue Disk 10 easiest way using one click Recording tool called asKaspersky USB Rescue Disk Maker.

How to create Bootable USB Kaspersky Rescue Disk using Kaspersky USB Rescue Disk Maker?



Download the ISO image of 10 Kaspersky Rescue Disk (194 MB);
Download the utility Kaspersky Rescue Disk USB Maker from here and unpack it to any folder. Will start automatically.
Select the USB drive on which to install Kaspersky Rescue Disk 10 from the pulldown menu (eg M:) and click the first button Browse, to select the features of an ISO image, then click START to begin copying the program on the pendrive.
When process is completed (it takes a few seconds), you are free to use your Kaspersky Rescue Disk 10 on any infected computer that does not boot properly anymore. The only thing to keep in mind is that you must set boot from USB in the BIOS before using it.

Sunday, October 10, 2010

Download Torrents via HTTP Direct Links without Seedbox

 
Torrents are the ultimate source to find and download almost anything from internet. Unfortunately, Torrents are not legal or Bittorent restrictions in some regions and even if it is allowed, number of seeds are too low resulting into waste of time downloading it. Solution is download Torrents via HTTP direct link which are Fast and legal.

We have already seen How to setup Seedbox on Web server but that’s a tedious job for someone not so friendly with PHP and Linux servers. Here is a smart and simple solution to do that using Torrific which also works on same concept as TorrentFlux. The Torrent file is queued up and downloaded to their server space and then you can download torrents via HTTP Direct link to your Computer.

Signup and Login to Torrific

Find the torrent you want to download from ThePirateBay Alternatives and enter the URL ending with (.torrent) in the box and hit Get.
It is now queued to their download list and will be downloaded to their servers and till the time you have to wait. In my case, it took some 20 minutes to complete. It depends upon the size of the torrent you are downloading; You can check to get notified when torrent download finishes via Email.


Go to your account and download the files via HTTP which are hosted on Btaccel.com using any Internet Download Manager. Did I mention the service is free? yes, it is and you can go premium which gives your downloads priority.

Note that the files remain on their servers for 24 hours available for download.

Merge two images into one with online tool

ometimes we quickly want to merge two images and if we are using a computer which is not our own or if we are using one at an internet cafe then you might be left stumped because our favorite image editing software wont be on it. In this case how does one merge two images into one. Toolwerk Image Merger works like a charm as it can merge two image files uploaded irrespective of their file formats.