Friday, 25 April 2008

Total Commander v7.03



Features in Total Commander 7.03 now include :

* Two file windows side by side
* Multiple language support
* Enhanced search function
* Compare files (now with editor) / synchronize directories
* Quick View panel with bitmap display
* ZIP, ARJ, LZH, RAR, UC2, TAR, GZ, CAB, ACE archive handling + plugins
* Built-in FTP client with FXP (server to server) and HTTP proxy support
* Parallel port link, multi-rename tool
* Tabbed interface, regular expressions, history+favorites buttons
* Thumbnails view, custom columns, enhanced search
* New: Updated interface+icons, compare editor, cursor in lister, separate trees, logging, enhanced overwrite dialog etc.

FileGeneral ControlCenter v1.09



File general control center is a file manager with proven two-file window technology that in addition can be switched to an individual file window. Apart from the conventional functions such as copying, moving and deletion of files and folders various auxiliary functions are made available. These functions are for renaming, displaying of characteristics, changing of attributes and sorting of files. Other functions provides the possiblity to search drive assembly-spreading for duplicate files and to depict a folder and drive fill level chart. A picture preview, a multimediaplayer, an id3 tag-editor and a jpeg-tester is integrated as well.

Total Uninstall 4.8.0.562



Total Uninstall creates a snapshot of your system prior to installing a new application. It then takes an additional snapshot after the installation has completed. It then compares the two snapshots and displays all changes in a graphical tree view, marking all registry values and/or files that have been added, changed or deleted. Total Uninstall saves these changes and if you decide to uninstall the application, it will reverse the changes to the previous state.

SpyHunter Security Suite V3.4.9 + Crack



* Detect, remove and block spyware, adware, keyloggers, cookies, trojans, worms and other types malware.
* Remove spyware programs that may be slowing down your computer.
* Online updates of the latest Trojan and Spyware threats.
* Interactive one-on-one customer support service.
* Scan your entire computer - NEW spyware definitions added every week.
* Easy to use interface with intelligent automatic protection.
* Custom fixes for your specific Spyware problems.
* SpyHunter is one of the most reliable detection, removal, and protection anti-spyware/anti-trojan programs on the web.
*Used by Millions worldwide!

See Password 2.05



When a password appears on screen as a series of asterisks or dots, you simply view it through SeePassword’s magnifying glass to reveal the actual password text. SeePassword has no problems with passwords stored by Internet Explorer -- all the sites will yield their secrets. SeePassword provides users with an easily applied retrieval tool for forgotten passwords.

Panda Antivirus 2008



The new Panda Antivirus 2008 is the easiest-to-use protection for your computer. Just install it and forget about all viruses, spyware and online fraud. And you hardly have to lift a finger, so you can chat, share photos and videos with friends, read your favorite blogs or simply surf the Web, with complete peace of mind. And it's so light, you won't even notice it.

** Panda Antivirus 2008 Including Key

LTTE terrorists commit bloodbath against civilians; many killed and wounded - Piliyandala

LTTE terrorists have carried out a cowardly bomb attack targeting innocent civilians who were returning home after office hours at Pliyandala this evening. According to the available information the bomb has been exploded inside a Ceylon Transport Board bus parked at Piliyandala, public bus stand.

Several civilians have been killed and many injured in the explosion. The injured are being rushed to the Kalubowila Hospital .

LTTE is a ruthless terrorist outfit notorious for committing crimes against innocent civilians. In its pursuit for a mono ethnic separate homeland for Tamils, the outfit has killed and maimed over tens and innocent people in routine bus bombing , train bombing, village massacres and etc.

Access Administrator Pro 4.8



Password protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user’s identity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user “User” can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user “Admin” has the full access at any time. You can define a timetable and a list of restricted files for each user individually as you like. Need to keep your children off your files and the Internet? You can define time periods for your kids when they are able to use Internet, games or the other programs. Also, Access Administrator may protect files from casual or unauthorized removal. The program is reliably protected by the password. You will find the program interface very easy to negotiate. Excellent online help is available. Try our password and security tools.

Startup Faster! 3.02



Computer is getting slower and slower? Does Windows spend more and more time loading? Does your hard drive make a loud noise when you boot Windows? Here's the complete solution! Startup Faster! makes Windows startup faster than ever before! Startup Faster! is a revolutionary tool that makes your computer startup much faster; it even protects your hard disk from sudden failures. Just setup Startup Faster! and you’ll see immediate results.

Thursday, 24 April 2008

Wednesday, 23 April 2008

View photo slideshows in Yahoo! Mail



Yahoo! has added the ability to view photos in email messages as slideshows without downloading them first. Honestly, we're not entirely certain when this feature was added, but it was brought to our attention by a reader comment. When we looked into it, we found that at least five months ago, there was no photo slideshow feature. And now there is. So we're going to call it a new feature.

In order to view attached images as a slideshow, you'll need to switch to the Yahoo! Mail beta interface. This feature is not available in Yahoo! Mail classic. When you receive an email with attached images, you should see an option to show images. Once you click the button, you should see several thumbnails at the bottom of your message, and the option to view those images as a slideshow.

CTIA 2008 - Nokia N810 Internet Tablet WiMAX Edition Coming Soon




At the recent CTIA 2008, the new Nokia N810 Internet Tablet WiMAX Edition debuts amid a flurry of response. Its a beautiful piece of work with Wimax!

The Nokia N810 Internet Tablet WiMAX Edition is expected to be released in the U.S. during the summer of 2008 where WIMAX is available.

It features a big 4.13-inch touchscreen, a built-in webcam for video calls, slide-out QWERTY keyboard, Mozilla browser, integrated GPS , 2GB of internal memory and a microSD expansion slot. Nokia says this thingy can also “access the Internet over WiFi or via conventional cellular data networks by pairing to a compatible mobile phone via Bluetooth technology”.

The Nokia N810 Internet Tablet WiMAX Edition has the newly updated OS2008, which includes support for Chinese characters showing up in the browser , an enhanced e-mail client , RSS feeds and “Seamless Software Update functionality” too.

Dell Goes Green with new Eco PC



This mini new greeny and earth friendly PC by DELL looks pretty sleek. It would be good if it was green but black is an alright color since the keyboard looks pretty sleek too. Its supposed to be 70% less energy-consuming and 81% smaller than a mini tower sized PC.

“I think it’s the right thing to do,” said Michael Dell. “These are important issues. When you think about our industry, we produce 260 million computers a year. There’s a responsibility that comes with that.”

Its noted that Dell said the company will invest more in technology to reduce its energy consumption and participate in programs such as efforts to plant more trees. In fact, Dell is expanding its “Plant a Tree for Me” program for private consumers to “Plant a Forest for Me,” for companies buying in bulk.

It comes in recycled and recyclable packaging, (duh) and lets hope it’s friendly to consumer pockets too.

Good job Micheal Dell !

Tuesday, 22 April 2008

Textbook of Surgery: Expert Consult



This distinguished reference carries on a 70-year legacy as the world's most thorough, useful, readable, and understandable text on the principles and techniques of surgery. Its peerless contributors deliver all the well-rounded, state-of-the-art knowledge you need to richly grasp the pathophysiology and optimal management of every surgical conditionso you can make the best clinical decisions, avoid complications, manage unusual situations, and achieve the best possible outcomes. It is an absolute requisite for the American Board of Surgery exam, and an indispensable source of guidance on overcoming the challenges that arise in everyday practice.As an Expert Consult title, this thoroughly updated 18th edition comes with access to the complete contents online, fully searchableenabling you to consult it rapidly from any computer with an Internet connection.



http://www.megaupload.com/?d=RD0XAXW3
http://www.megaupload.com/?d=UTAIJF3I
http://www.megaupload.com/?d=9XUBY6N8
http://www.megaupload.com/?d=HXJ0AKM9

Nursing Procedures



The newly revised Fourth Edition of this popular and widely used reference is a start-to-finish guide for nearly 400 basic and advanced nursing procedures. It provides step-by-step instructions for each procedure, explains how to use and troubleshoot equipment, and presents key information on rationales, cautions, complications, patient teaching, and documentation. The user-friendly format includes checklists, quick-scanning tables, logos that flag essential information, and more than 700 illustrations and photographs of equipment and techniques. This edition features a brand-new chapter on psychiatric nursing procedures and new entries on prone positioning, surgical site verification, ST segment monitoring, swallowing and aspiration precautions, and bispectral index monitoring (BIS).

2parts
http://rapidshare.com/files/51402279/NURSP.part1.rar
http://rapidshare.com/files/51632551/NURSP.part2.rar

Written by authors have a wide experience in teaching and practicing adult nursing, Key Nursing Skills will be invaluable to nurses who really want to get to grips with the more common procedures.

Each chapter focuses on a specific area of care and related skills and considers the main practice issues. Each intervention is presented within a nursing problem which states the nature of the patient problem and goal. The available current evidence base is outlined and related to the problem before the procedure is explained in straightforward terms.

Experienced nurses’ tips have been integrated into the procedures, so alerting the reader to anticipate individual patients’ needs or anxieties, or improve upon their own performance.

http://rapidshare.com/files/59078105/KeyNursingSkills.rar

Lippincott Manual of Nursing Practice


Completely updated for its Eighth Edition, this full-color classic reference is the one source every nurse needs for essential patient assessment and treatment guidelines. In an easy-to-read outline format, this clinically focused guide covers all disorders and patient problems in Medical-Surgical, Maternal-Neonatal, Pediatric, and Psychiatric nursing, and includes over 150 step-by-step procedures.Each Eighth Edition chapter incorporates and identifies official guidelines that shape clinical practice. New and expanded material includes several new orthopaedic, connective tissue, infectious, and dermatologic conditions, patient safety, personal safety, culturally sensitive care, HIPAA, palliative care, advocacy for the disabled, chest physical therapy, interventional cardiology, hyperbaric therapy, neurologic findings, intracranial monitoring systems, vertebral compression fracture, immunization information, emerging infections, biological weapons preparedness, pediatric asthma guidelines, substance-related disorders, and adolescent problems.


(2 Parts)
http://www.megaupload.com/?d=8YLGXNOX
http://www.megaupload.com/?d=WYQ5PZKK

Monday, 21 April 2008

Free Encyclopedia Britannica 2008



Encyclopedia Britannica 2008 Ultimate gives you an all-in-one reference tool for better reasearch and faster learning. It combines three different versions of the Encyclopedia Britannica - Adult, Student & Elementary. It also has thousands of articles, magazine & Web links to make it easy to look up any topic. The included Dictionary & Thesaurus, Atlas and Timelines help you write the best and most accurate papers - and complete assignments like an expert.

SiZE…….: 1XDVDR
CoMPANY….: britannica.com
Serial : D7DA1AAA00044642

Download:
http://rapidshare.com/files/58577855/EB2K8US-DVD.part01.rar
http://rapidshare.com/files/58577894/EB2K8US-DVD.part02.rar
http://rapidshare.com/files/58577854/EB2K8US-DVD.part03.rar
http://rapidshare.com/files/58577869/EB2K8US-DVD.part04.rar
http://rapidshare.com/files/58577913/EB2K8US-DVD.part05.rar
http://rapidshare.com/files/58577922/EB2K8US-DVD.part06.rar
http://rapidshare.com/files/58577887/EB2K8US-DVD.part07.rar
http://rapidshare.com/files/58577866/EB2K8US-DVD.part08.rar
http://rapidshare.com/files/58577864/EB2K8US-DVD.part09.rar
http://rapidshare.com/files/58577858/EB2K8US-DVD.part10.rar
http://rapidshare.com/files/58577882/EB2K8US-DVD.part11.rar
http://rapidshare.com/files/58577874/EB2K8US-DVD.part12.rar
http://rapidshare.com/files/58577896/EB2K8US-DVD.part13.rar
http://rapidshare.com/files/58577925/EB2K8US-DVD.part14.rar
http://rapidshare.com/files/58577958/EB2K8US-DVD.part15.rar
http://rapidshare.com/files/58577876/EB2K8US-DVD.part16.rar
http://rapidshare.com/files/58577886/EB2K8US-DVD.part17.rar
http://rapidshare.com/files/58577868/EB2K8US-DVD.part18.rar
http://rapidshare.com/files/58577991/EB2K8US-DVD.part19.rar
http://rapidshare.com/files/58577879/EB2K8US-DVD.part20.rar
http://rapidshare.com/files/58577875/EB2K8US-DVD.part21.rar
http://rapidshare.com/files/58577883/EB2K8US-DVD.part22.rar
http://rapidshare.com/files/58577935/EB2K8US-DVD.part23.rar
http://rapidshare.com/files/58577889/EB2K8US-DVD.part24.rar
http://rapidshare.com/files/58577989/EB2K8US-DVD.part25.rar
http://rapidshare.com/files/58577888/EB2K8US-DVD.part26.rar
http://rapidshare.com/files/58577904/EB2K8US-DVD.part27.rar
http://rapidshare.com/files/58577902/EB2K8US-DVD.part28.rar
http://rapidshare.com/files/58577893/EB2K8US-DVD.part29.rar
http://rapidshare.com/files/58577899/EB2K8US-DVD.part30.rar
http://rapidshare.com/files/58577977/EB2K8US-DVD.part31.rar
http://rapidshare.com/files/58577928/EB2K8US-DVD.part32.rar
http://rapidshare.com/files/58578062/EB2K8US-DVD.part33.rar
http://rapidshare.com/files/58577898/EB2K8US-DVD.part34.rar
http://rapidshare.com/files/58577975/EB2K8US-DVD.part35.rar
http://rapidshare.com/files/58577851/EB2K8US-DVD.part36.rar
Password:
www.forumshare.net

Free Registry Repair Wizard 2008


Your system will run faster and error free. The backup/restore function of the tool let you backup your whole Windows Registry so you can use it to restore the registry to the current status in case you encounter some system failure. Besides above, the startup and BHO organizer feature let you manage your startup and IE BHO items with ease, and you can control the programs started with Windows and IE more handy with this feature!

Linux Password Cracking: Explain unshadow and john commands ( john the ripper tool )


It clearly shows that the more complex and non-dictionary words we use, the longer it takes for John to crack them.

Thursday, 17 April 2008

Vacation checklist: prepare your PC


Whether you're leaving the office for the holidays, going on vacation, or are going on a business trip, there are a number of things you can do to prepare your computer for your time away. Cancelling appointments and letting people know you'll be gone are just a few of the things you can do to make sure your responsibilities are covered and people aren't trying to meet with you. Here are some best practices to make sure your work goes on smoothly, even when you're gone.

Get maximum performance from Windows Vista


EVERY WINDOWS USER HAS EXPERIENCED sudden, mysterious slowdowns in system performance. Routine actions that normally take a few microseconds suddenly cause your computer to stop responding. Your hard disk chatters incessantly. You’re forced to wait when switching between programs. Surprisingly, you don’t need an engineering degree, an oscilloscope, or expensive third-party software to determine the cause of and solution to problems such as these.

Avoid the Commute: Work at Home

Millions of people around the world work at home at least one day each month. Better technology and the availability of broadband connections have made it easier than ever to answer e-mail, fine tune a presentation, or work on a report within the comfort of your home office. If you're not already set up, give it a try. Explore these pages to learn how to get started.

Linux Start up and Run Levels

Linux utilizes what is called "runlevels". A runlevel is a software configuration of the system that allows only a selected group of processes to exist. Init can run the system in one of eight runlevels. These runlevels are 0-6 and S or s. The system runs in only one of these runlevels at a time. Typically these runlevels are used for different purposes. Runlevels 0, 1, and 6 are reserved. For Redhat Linux version 6, the runlevels are..

Wednesday, 16 April 2008

Military-grade password protection!


Unfortunately, we all have to deal with modern life’s little cyber-burden, the password. Some of us do so by simply re-using an old password when the system asks you to change it. Other times we use the same password but just add the month at the end. Some people even resort to keeping their passwords written on yellow stickey notes or in their wallet. None of these options, however, is very effective for protecting your valuable data. Instead, we would like to present a superior solution brought to you compliments of the US Military.

The Mandylion Password Manager is a secure, convenient and cost-effective device built specifically for generating and protecting your passwords. Tested and matured for 3 years in real warfare environments, it is now available for commercial use. Built as a small keyring device, it can securely manage up to 50 logins, safe combinations, security codes, etc. that can be individually generated to meet the composition requirements of any login policy. Passwords can be any length up to 14 characters or namespaces. It can create passwords based on your settings for various criteria (such as length, alpha-numeric, special characters, etc.) and prompt you to change your passwords at preset time intervals (90 days, 1 year, etc.) Also, all data is stored in permanent memory, so it is unaffected by battery life or loss of power. Tamper-resistant features have been employed both inside and out, making the device a superior choice to storing passwords on your PDA, PC or worse, writing them down.

Using the device is very easy. There are 5 buttons used for navigation and data entry. The device is activated by entering a unique button sequence that is user-defined. Totally self-contained and air-gapped from any system, passwords are viewed on the token's LCD display which has a limited viewing angle to prevent shoulder surfing. There are also user-defined lockout settings, including a self-destruct feature for high risk scenarios. The device will also indicate failed activation attempts (with a "Tampered" message displayed upon successful activation.) Included Policy Master software makes describing the login policy (length, expiration, composition) for each login record and configuring the token a snap. The token does the rest.

This little unit has been designed to meet U.S. Military standards for secure creation and management of passwords (use authorized under Army Regulation 25-2 IA.) This device helps creates a strong security policy for your work environment (so naturally you can brag to the boss about it) and provides cost savings in the form of reduced help desk support and password changing downtime. When used for personal password management the personal password manager eliminates having to remember all those annoying passwords and usernames.

Has these great features.


* Manages up to 50 login records simultaneously
* Generates cryptographically strong passwords
* Complies with all DoD, Govt. & Industry Password Security Policies
* Multiple tamper-resistant features and lockout alarms
* Manages Root and Group passwords
* Cradle connection via USB
* Kit containing: token, a configuration cradle, Policy Master Configuration Software (Windows only)
* Device and software not Mac compatible (sorry)
* Dimensions: Approx. 2.5" x 1.5" x .375" (65mm x 45mm x 10mm)
* Takes a CR2032 battery (replaceable)
* One-year warranty


In our effort to always bring you the latest and greatest gadgets, ThinkGeek presents this Stainless Steel Video Watch with a massive 8GB of internal flash memory as well as a full color 1.8" screen. Made completely from shiny stainless steel for the ultimate in style and coolness.

High pixel count and frames per second make viewing a joy. Plus this watch has a built-in voice recorder, multiple OSD languages to choose from, a built-in high quality speaker as well as a earphone jack, the ability to view JPEG pictures and listen to music at the same time, and so much more. What more could you ask of such a beautiful looking watch? Be the envy of all your friends and blow them away with your new toy.


* Display: 1.8 Inch TFT LCD
* Video Format: MTV
* Conversion formats: AVI, MP4, WMV, ASF, MPG, MPEG, DAT, RM, MOV
* Video Resolution: 160x128
* FPS (Frames per Second): 20
* Music Format: MP3, WMA, WAV
* Bit rate: 32~320Kbps
* Built In Watch with Digital Time Display
* 24 Hour Style Time
* Time/ Date/ Day Display
* Built in MIC
* Record Format: WAV
* Built In Speaker
* Languages: English, Chinese, Portuguese, French, Korean, Spanish, Japanese, German, Italian, Polish
* USB 2.0
* System: Windows 98/SE/ME/2000/XP/Vista
* Power Source: Built-in Rechargeable Li-ion Battery
* Dimensions: Watch Face- 45x55x13mm (LxWxD)

Khet - The Laser Game


The Khet Laser Game is the first strategic board game to incorporate laser technology. So it provides you with hours of game playing fun that will see you through to a sunny day.

SlySoft CloneDVD 2.9.1.6


CloneDVD 2 copies movies to create unparalleled picture quality DVD backups, whether it’s the main title you’re copying or the complete DVD. CloneDVD will compress long footage at high speed to the highest of quality using specialised transcoding technology, allowing you to select your audio and language settings and also the final target size. Easy for even the novice user, CloneDVD’s intuitive Filmstrip assistant guides you through all the available configuration settings, allowing you to choose which chapters to include and offering the option to trim individual chapters.
A visual quality bar shows how your configuration choices affect the quality of the final copy. Note that copying protected DVDs also requires AnyDVD.

http://rapidshare.com/files/103920153/SlyClneCd.rar

Disney Print Fonts


http://rapidshare.com/files/103796866/DizKneFnt.rar

Power Video Capture/Convert/Burn DVD Studio 8.0.8.24


Power™ Video Capture/Convert/Burn DVD Studio is refined as a premier video solution. Video Capture, edit, Convert and Burn are all supported by this powerful tool. The program is your one-way-ticket to unlimited video converting and burning.
Not only can you capture your memories from your DV or other video devices but also edit videos and burn them to DVD. You can even convert videos to the format required for a website. Within 4-steps, Power Video Capture/Convert/Burn Studio will express your creative ideas and share them with your friends.

http://rapidshare.com/files/104072375/Pwrvidcapcvrtbrn.rar

Shooting within is more painful than shooting from outside; Weerawansa speaks sentimentally in the parliament


Lanka-e-News, 2008 April 08, 3.25 PM) JVP Propaganda Secretary and the Parliamentary Group leader Wimal Weerawansa made a special statement in the parliament today (08) and said that the JVP Central Committee had decided to sack him from the party.

Protests on Olympics Intensify Over China's Human-Rights Record




San Francisco braces for demonstrations on Wednesday, when the Olympic torch makes its only North American stop....

Monday, 7 April 2008

Why ignore the tips given by the foreign intelligence unit about approaching 2 Black Tigers to Jeyaraj?


(Lanka-e-news, 7th April 2008, 11.30pm) It is revealed by now that Minister Jeyaraj Fernandopulle was assassinated due to lack of security, provided by the Special Task Force.

From last February, security of Minister Fernandopulle was transferred to STF from MSD as per request made by the Senior DIG, who is in charge of the MSD, to the Commandant, STF.

MSD is a specially trained division for VIP security. When a VIP is scheduled to visit a certain place, MSD always have discussions with the Police Officers of the area, prior to the visit of VIP, and make suitable security plans as per the discussions the Police and MSD had. This security arrangements are carrying on by MSD until the VIP departs the place.

When Minister Jeyaraj arrived at Weliweriya yesterday, there were no such security arrangements. The opinion of most of the people is that STF is not a special trained unit for VIP security like MSD.

In a situation like this, instead of taking the responsibility of yesterday's incident, STF, who provided security to the Minister, is now trying to put the blame on to the Minister and his personal body guard saying that these two never listened to the security advises, and as a result of same, yesterday's incident was happened. However, to reply STF, Minister and his personal body guard are no more as both of them were died yesterday (6th).

In the meantime, an important information was received by Lanka-e-news, ie: one of the foreign intelligent units have informed a Chief of the special intelligent unit in Sri Lanka 14 days ago that 2 black tigers were approached the Minister. Further the foriegn intelligent unit has informed that as close friends of the Minsiter, they were reached an important place of the Sri Lankan economy, and Chief of the special intelligent unit of Sri Lanka have advised the informant that necessary actions are taking by them.

However, after the unfortunate incident of yesterday, this special intelligent unit says that their advices are pointless as they are not accepted by the VIP.

(This rare photograph shows how Minister Jeyaraj's body was lying after the bomb explosion)