Welcome

Find topics using the search boxes above and in the footer which can search multiple blogs, the SEARCH BLOG in the navbar at the top left corner of the page, using the Labels or the Archives in the left sidebar.

Search

Google

1.1.08

VirtualBox for Windows 1.5.4

VirtualBox is a general-purpose full virtualizer for x86 hardware. Targeted at server, desktop and embedded use, it is now the only professional-quality virtualization solution that is also Open Source Software.

Latest Changes


  • USB 2.0 support
  • PulseAudio backend
  • GUI: ?xed accelerators in German translation
  • GUI: ?xed registration dialog crashes
  • GUI: allow to enter unicode characters to the name of the registration dialog
  • GUI: pre-select attached media in the disk manager when opened from the VM settings dialog
  • GUI: remember the last active VM
  • GUI: don’t accept empty paths for serial/parallel ports in XML
  • GUI: ?xed NumLock / CapsLock synchronizazion on Windows hosts
  • GUI: don’t start the kernel timer if no VM is active (Linux host)
  • VMM: improved compatibility with FreeBSD guests
  • VMM: properly restore CR4 after leaving VT-x mode
  • VMM: patch code and disassembler updates
  • VMM: with VT-x a pending interrupt could be cleared behind our back
  • VMM: workaround for missed cpuid patch (some Linux guests refuse to boot on multi-core CPUs)


Screenshot
Released: December 29, 2007
Publisher: innotek GmbH
Homepage: VirtualBox for Windows
License: Freeware

File Size: 17,010 KB
Download
http://www.virtualbox.org/download/1.5.4/VirtualBox_1.5.4_Win_x86.msi


Best regards
----- http://Freestufftutorial.blogspot.com -----

Read More......

Process Lasso (x64) 2.38

Process Lasso improves system performance, responsivenss, and stability in high load situations. It watches for processes consuming too much of the CPU and automatically restrains them to improve system responsiveness. It can also automatically terminate undesired processes, apply default priorities to an application each time it is run, or log all processes launched. It is not a task manager replacement, but does have task manager like capabilties only as a compliment to its core functions.

Process Lasso for Windows XP/2003 x64.


Screenshot
Released: December 28, 2007
Publisher: Bitsum Technologies
Homepage: Process Lasso (x64)
License: Freeware
OS Support: Windows 2003/Vista/XP

File Size: 341 KB
Download
http://www.bitsum.com/files/pssetup64.zip


Best regards
----- http://Freestufftutorial.blogspot.com -----

Read More......

Process Lasso (x32) 2.38

Process Lasso improves system performance, responsivenss, and stability in high load situations. It watches for processes consuming too much of the CPU and automatically restrains them to improve system responsiveness. It can also automatically terminate undesired processes, apply default priorities to an application each time it is run, or log all processes launched. It is not a task manager replacement, but does have task manager like capabilties only as a compliment to its core functions.


Latest Changes:

  • Fix.Core: Propogated previous Vista fix to the GUI to the core engine, which should save a few CPU cycles, though probably not noticeable since consumption was so low to start with
  • Fix.GUI: Fixed change of systray icon type not immediately taking effect (required a restart of Process Lasso before)
  • Change.GUI: Turned systray balloon messages on by default
  • Change.GUI: Moved balloon tip notification menu item setting to its own submenu
  • Addition.Core: Added default CPU affinity management
  • Addition.GUI: Added default CPU affinity rules config dialog
  • Addition.GUI: Added default CPU affinity right-click process item
  • Addition.GUI: Added toggle to log default CPU affinity adjustments
  • Change.GUI: Changed balloon text when priority automatically lowered due to excessive CPU utilization to include the word 'temporary', as the log file already does
  • Change.GUI: A few misc. tweaks, fixes, and changes
  • Addition.Installer: Included TweakScheduler utility to set scheduler time slice parameters
  • Addition.GUI: Added menu option to launch TweakScheduler utility
  • Installer: Removed OOC config dialog display at initial start

Screenshot:

Released: December 28, 2007
Publisher: Bitsum Technologies
Homepage: Process Lasso (x32)
License: Freeware
OS Support: Windows 2000/2003/XP


File Size: 558 KB
Download
http://www.bitsum.com/files/pssetup.zip


Best regards
----- http://Freestufftutorial.blogspot.com -----


Read More......

Catalencoder 0.7.8

Catalencoder is a MPEG2/DVD to DivX/XviD converter. It is very simple to use and has a very good quality on output.

Latest Changes:

  • [Installeur] Update NSIS to version 2.34
  • [Catalencoder] Update FFDShow to version Beta 4 20071206-rev1685
  • [Catalencoder] Update DGIndex to version 1.5.0rc2
  • [Catalencoder] Update Lame to version 3.98b6
  • [Catalencoder] Update MediaInfo to 0.7.5.6
  • [Catalencoder] Update Media Player Classic to 6.4.9.1 du 12-06-2007
  • [Catalencoder] Add DTS audio format
  • [Catalencoder] Improvement on resize
  • [Catalencoder] Fix a bug in resize
  • [CatalanSoundCoder v1.1] Add multithreading

screenshot
Released: December 29, 2007
Publisher: SASTeam66
Homepage: Catalencoder
License: Open Source
OS Support: Windows 2000/XP


File Size: 9,459 KB
Download
http://sourceforge.net/project/downloading.php?group_id=164293&filename=CatalencoderSetup_078.exe


----- http://Freestufftutorial.blogspot.com ---------

Read More......

FreeBASIC for Windows 0.18.3b

FreeBASIC is an open source, 32-bit BASIC compiler with the syntax the most compatible possible with MS-QuickBASIC that adds new features such as pointers, unsigned data types, inline-assembly and many others.


Released: December 28, 2007
Publisher: Andre Victor
Homepage: FreeBASIC for Windows
License: Open Source
OS Support: Windows (All)

File Size: 5,491 KB
Download
http://optusnet.dl.sourceforge.net/sourceforge/fbc/FreeBASIC-v0.18.3b-win32.exe

Read More......

SpeedFan 4.34 Beta 37

SpeedFan monitors fan speeds, temperatures and voltages in computers with hardware monitor chips. It can even access S.M.A.R.T. info for those hard disks that support this feature and show hard disk temperatures too, if supported. It can even change the FSB on some hardware. At the lowest level, it is a hardware monitor software, but its main feature is that it can control fan speeds according to the temperatures inside your pc, thus reducing noise and power consumption

Latest Changes:

  • Beta 37 has some minor fixes and improvements. 4.34 final is approaching


Screenshot
Released: December 29, 2007
Publisher: Alfredo Milani-Comparetti
Homepage: SpeedFan
License: Freeware
OS Support: Windows 2000/2003/9x/XP

File Size: 1,300 KB
Download
http://www.almico.com/sfbetaprogram.php

Read More......

WildBit Viewer 5.1 Beta 3.0

WildBit Viewer is compact & fast image viewer with slide show and editor. Eye catching interface within blazing fast folder, file list and thumbnail viewer. Viewer includes also Image Info with Image EXIF meta data JPEG and TIFF support and IPTC (IIMV4) information (like PhotoShop file info) from JPEG and TIFF, Thumbview has changeable views, sorting and thumbnail predefined sizes for fast thumbnail size setting. Viewer also includes shell toolbar, you can drop your favorite folder there and use it as an organizer.


Screenshot:


Released: December 30, 2007
Publisher: Marko Hietanen
Homepage: WildBit Viewer
License: Freeware
OS Support: Windows (All)

File Size: 3,908 KB
Download
http://koti.mbnet.fi/mhieta/download/dev/5_1/ViewerSetupwohelp.exe

Read More......

µTorrent 1.8 Build 7398 Alpha

µTorrent is an efficient and feature rich BitTorrent client for Windows sporting a very small footprint. It was designed to use as little cpu, memory and space as possible while offering all the functionality expected from advanced clients.

Latest Changes:

  • Change: better error when file exceeds filesystem size limit
  • Fix: "{ERROR}" sometimes appearing in download limit in the transfer tab
  • Fix: Logging options if "Log Traffic to Logger Tab" is chosen from the peers tab menu
  • Fix: rare crash with hashfails
  • Fix: season column showing episode for torrent items

Screen shot
Released: December 31, 2007
Publisher: Ludvig Strigeus
Homepage: µTorrent
License: Freeware
OS Support: Windows (All)

File Size: 248 KB
Download
http://download.utorrent.com/beta/utorrent-1.8-alpha-7398.upx.exe

Read More......

How to Increase Your Home Security

1. Lock your doors. Even if you may have grown up in a place where it was ok to leave your door unlocked, the world is different now.
2. Lock the windows. Ground level windows and sliding doors are easy to open from the outside. A slightly more motivated thief will check.
3. Leave the lights on. When you go out, leave a light on in any room in the house or invest in a light timer to automatically turn on lights at whatever time you want. Let the thief hesitate about breaking in.
4. Don't leave notes on the door. Example: "Hi delivery company, I wont be home all day just leave my packages on the back porch." Not only will a thief look on your porch, he'll also know definitively that you're not home for the day.
5. Report strange things to the police. If you see a strange car driving through the neighborhood several times a day, report it! If someone is sitting in their car parked on your street for a long time, report it! A moving van at your neighbors house with no for sale sign, report it!
6. Install security lighting to your yard. It is harder for a thief to break in if there are lights placed at entry points to your house.
7. Make sure your hedges are trimmed below the level of the window sill.


Tips

* When buying any appliance such as a computer or TV, do you just throw the box outside? Anyone can drive by and see a Plasma screen TV box in your garbage and know you have a new TV. Same thing goes for a computer, stereo, video game and any other item that is easily portable and may be expensive. If the average thief sees you have just gotten new stuff why would he go next door to steal?
* Mow the lawn. If a potential thief comes by and sees that the grass is not cut and the newspapers are still on the porch, he sees an opportunity. Nobody's home or nobody cares. This is especially important when selling your house or going on vacation. Pay someone to collect your mail and mow your lawn make your house secure by making it looked lived in. People being home means the thief will move on to easier pickings. Thieves are generally lazy they try to make the easy money in the easy way. Don't give them a break.




Read More......

How to Get a Street Light Fixed in the Carolinas

#Note whether the malfunctioning light is at your home, along a street, or at a business.


[If your street light is not burning brightly, report it right away]
# Note the nearest physical street address of the light or lights.
# Note whether the light is never on, cycles on and off, or is damaged in some way.
# Temporarily identify the pole with tape or ribbon.
# Be ready to provide specific directions from main road or intersection to the light pole in question.
# Go to the website for Duke Energy, as seen in external links.
# Look for the Residential Customers section at upper left. Choose your state and click GO.
# Look for Request Service and click on Report an Outage
# Scroll down and click on Request Lighting Repair
# Fill in the form with the information you have gathered above as well as your name and address and other vitals.
# Click send.


Tips

* A quick link is provided below which will take you directly to the correct page for the reporting of street light outages.
* Under normal circumstances, you can expect the light to be repaired fairly quickly once you report it.
* If you live in a different area of the country or world, check the website of your power company. The procedure may be quite similar to that listed here.

Read More......

How to Get Into Your House when You Lock Yourself Out

1. Borrow a screwdriver from a neighbor.
2. Take off the screws on your letterbox. Lift up the flap and you should see them.
3. Pull off the letterbox, trying to not damage the door-frame that much.
4. Put your hand through the hole in your door, and try to reach either a set of keys or the handle to open the door.
5. If this doesn't work, try to find an open window that you might be able to get through.
6. If you have a tiled roof and a ladder, you may be able to climb onto the roof, and gain access by removing tiles.


Tips

* Keep a spare key outside somewhere safe, or leave one with a trusted neighbor to avoid this situation.

Read More......

How to Fit a Security Chain

1. Choose a height for your security chain and mark it on the door. Make two marks so it is level.
2. Select a screw head drill bit and attach it to the drill. You will be using this to attach the slide channel to the door.
3. Align the slide channel with your pencil marks and drill the screws into position.
4. Use your pencil to mark the position of the slide channel on the door frame. Hold the chain holder over your pencil marks and draw around it. You will need this outline in order to chisel out a recess.
5. Make a series of deep cuts along your pencil outline.
6. Remove the wood.
7. Hold the chain holder in the recess and drill it into place.


-- Tips --
* Look at the diagrams in the instruction manual when in doubt.
* Before you start drilling, remember drill safety. Put on your safety goggles. Make sure that all loose items of clothing, and hair are tucked away.

Things You'll Need
* Security chain kit including screws
* Battery drill with drill bits
* Chisel
* Hammer
* Pencil
* Pair safety goggles

Read More......

How to Fend off an Attacker

1st Remember that every part of your body and everything about yourself has the potential to be used as a weapon. This includes items can be found in your pocket as pens, keys, or small pistols.
2nd Scream. Screaming May scare and the attention of the murderer.
3rd Block or dodge oncoming attack. What use another defense tactic when you knocked out?
4th Close your fists, unless you plan, with an open hand for a particular strike, block, or attack. An open hand is much more to those injured in a fight than a closed fist. You can easily make your fingers disrupted or interrupted by an attacker strikes have open if your hands when they are not needed.
5th Aim for sensitive areas such as abdomen, bar, face and thigh. These areas are easy to take and will likely knock down the enemy for your chance to escape. Remember, a severe blow to a person's face is highly effective, they lose their meaning. A broken nose or a strike, for the eyes severely hinder your opponent is the ability to observe and react. Do not strike a person in the mouth - it can damage your hands.
6th If you are in close proximity to your attacker, jabbing with the elbows and knees can be an effective method of defence. To headbutting.
7th If necessary, use hard item available to browse or scratches jab your attacker's face: a stick, a stone, a pen, a piece of glass, etc. The eyes and throat, are particularly vulnerable areas.
8th Editors winds. If an attacker gets a hold of you and does not have a firearm on the head or a knife to the neck, squirm. Herauswindend and pinching the attacker can help you out of his clutches. If the attacker has a weapon, keep it out.
9th If your attacker down, and they are no longer a threat, assault stop. Kicking the jaw from an unconscious person is not self-defence, it's a lack of self-control.
10th Call the police as soon as your attacker is no longer a threat.


--tips--
* If you are attacked, it is very likely that you will want to hurt you if you resist or not. However, if you have the choice in the matter, try to avoid a fight if possible. No argument is worth it hurt, or hurt somebody else.
* What you can to get themselves out of immediate danger, but you use your decision whether or not to a violent method of self-defense.
* A martial arts class will contribute to the development of techniques, self-defense and personal discipline.
* If an attacker demands money or other personal possessions, it is often better, as they try to self-defence. Do not worry if he or she tries to steal your purse, wallet, MP3 player, etc. My life is only important if you are attacked.
* If you are stuck up for that money, throw it low and behind the attackers. He / She is worried about more money than you and will turn away to get it. This gives you a chance to run away or get hurt. Running away is better.
* If it is a bullying attack for the purpose of intimidation, not to commit another crime and the fight is unavoidable, remember that responses to violations of the attackers discourage repeat attacks. This also applies if you are injured or not "the winner" of this time.
* Tell your surroundings and be prepared. Get your keys ready before you for your car, so that you are not at risk, since one of the bags / purse for her.
* Avoid walking alone in strange, dark places.
* Trust your instincts.
* Scream loudly, if someone attacks. It can be afraid of the person away.
* Consider using a knife or pepper spray for self-defense, but only if you have an adequate training and are in compliance with the law.
* If it is legal, you might want to use a firearm for self-defense - this is probably a concealed weapon permit.
* Please note that nearly everything, and everything around you can be used as a weapon. If you are alone in the area and where you will probably attack, in your environment, as you walk along. Even something as small as a pen in your purse can be an effective weapon against your attacker.

-- things you`ll need it ---
  • A knack for self-preservation
  • Awareness
  • Discipline

Read More......

How to Clean a Child's Room

1 Go into the room and all the trash in a garbage bag.
2 Next, everything is not in this room in a pile.
3 Well, the kind of clothing staple child in dirty, away, away, to save (out of season), and tidy.
4 Hang \ Fold all, the clothes away.
5 Toss away all the clothes in the garbage bag.
6 Add all the dirty clothes in a hamper.
7 Fold all the clothes and give them away in a garbage bag. Then they donate to clothing pantry or goodwill.
8 Add all clothing shop in a long, flat box, and save the child's bed.
9 Sort toys every child in the pile-store, give away, the removal and storage.
10th Repeat # 's 7 and 8 only with toys this time.
11 Put toys in bins or shelves sorted by category (dolls, trains, ect.)
12nd Put books on shelves.
13rd Toss or storage of the old school papers.
14th Changing the child in the bed sheets.
15th Vacuum \ sweep the floors.
16th Dust buffets, night stands, head boards, ect.
17th Wash windows and mirrors.
18th If the full hamper wash the clothes hamper and put back into the room, if not only impede the spray with some air freshener to keep smelling fresh.
19th As you leave the room spray the air with air freshener.


--Tips--
  • Listen to the radio while you work.
  • Have the child help you.
  • Encourage the child to keep their room clean by picking up toys, clothes, trash, ect. daily.

Things You'll Need

  • Trash Bags
  • Hamper
  • Time
  • Boxes\Bins
  • Air Freshener

Read More......

How to Avoid Buying Counterfeit Products

1. Learn to spot a fake. Don't rely on retailers or the government to protect you from counterfeit products. The sheer quantity of these products makes this nearly impossible. The most important tip? If a deal is too good to be true, the product is probably fake. Check out the related wikiHow for more tips on how to spot a fake.
2. Shop at reputable retailers. Counterfeit goods do make their way onto the shelves of even the largest, most established stores, but less reputable retailers are far more likely to sell counterfeit products. Discount retailers, such as "dollar stores," are easy targets for suppliers of counterfeit goods because these stores often sell an ever-changing variety of lower-quality items and cater to customers who are very price-conscious. Small stores that sell a dizzying array of (mostly) junk are also prime outlets for counterfeits, especially those stores that haven't been in business for very long.

  • Shop at authorized retailers. Many companies, particularly those that sell appliances, electronics, and luxury goods, sell only through authorized retailers. You can find out if a retailer is authorized to sell a certain brand by calling the manufacturer or checking its website.
  • Thrift shops, fairs, and flea markets are great places to get used and handmade items, but you should be very wary of new brand-name goods at these types of venues. While you can find legitimate bargains on used goods, it's also a good idea to carefully examine any used product, such as tools or electronics, that could pose a safety hazard.
  • Be particularly careful when buying online. Online auction sites are rife with counterfeits, and since you can't inspect the goods first, it's hard to tell what you're buying. Look for sellers with lots of good feedback, and ask questions about where they got the merchandise. Also ask for the seller's address and phone number; if they won't give it to you, there may be something amiss. Spam emails will almost always direct you to illegitimate sites. If you order from one of these sites, chances are you'll get fake goods--if you get anything at all. Once again, whether you're shopping online or at the corner store, be wary of deep discounts.


3. Be careful when shopping abroad. You can find counterfeit products just about anywhere, but in some developing nations and in popular worldwide tourist destinations, you can be almost certain that the goods you're buying are counterfeit. Once again, if a deal is too good to be true, the product's probably a fake.
4. Keep up with recalls. In many developed nations, if a batch of products is found to be counterfeit, it will be recalled. Recalls are also issued for faulty or potentially dangerous products. You'll often hear about recalls in the news, but if you want to stay abreast of the latest information, your government may offer a service to help you do so. In the U.S., you can check Recalls.gov for recall information, and you can even sign up for email notifications of new recalls.
5. Report suspected counterfeits. If you see or have purchased a product you think may be a fake, contact authorities so that they can investigate. If the suspected counterfeit product could pose a danger to others, contact local law enforcement or law enforcement agencies such as the FBI (in the U.S.) or the RCMP (in Canada). Otherwise, contact the brand-name manufacturer whose product has been counterfeited, or report the suspected counterfeit to one of the organizations listed in the External Links section below.
--

Tips --


  • Not sure if a store is on the level? Ask for a receipt. If there's sales tax in your jurisdiction, make sure the retailer charges it--if not, they're not operating legally. If they won't give you a receipt, that's a big red flag. Of course, just because they provide a receipt and charge sales tax doesn't mean they're not selling counterfeit goods. This is just one more way to test the waters.
  • Save your receipts, especially for high-dollar items. If a product is counterfeit or otherwise defective, you may need your receipt to get a refund.
  • Buy local. It's not feasible for most people to buy only products that are made in their hometowns or even in their home countries. When possible, though, consider buying local foods and products. The more you know about where a product comes from, and the smaller the distance a product has to travel to get to you, the lower the chance that the product will be counterfeit.


Read More......

Zonealarm

Template Design | Elque 2007