background preloader

Software

Facebook Twitter

10 Free desktop Search Software. User Ratings: [Total: 0 Average: 0/5] Here are 10 Free Desktop Search software that let you search for all types of files and folders on your PC. These desktop search software are normally more advanced than the default search that come with Windows. All these desktop search software are completely free. Google Desktop Sponsored Links Google Desktop is widely regarded as the best desktop search software. The app works for your computer in the same manner as you use Google search engine; the application is designed to provide you most relevant details along with file name and a brief snippet with your search names highlighted. Read more about Google Desktop Search, or download free here. Windows Search Windows Search is another free desktop search engine that not only helps you to find and arrange contents of your system, but also helps you to look for the info and attachments that resides in your email account and web.

Read more about Windows Search, or download free here. Hulbee Desktop. Codebox Software - BitMeter II. BitMeter 2 is a bandwidth meter - it allows you to visually monitor your internet connection by displaying a scrolling graph that shows your upload and download speed over time. BitMeter is freeware - ie. it is given away completely free of charge, there is no trial period, no time-limited features, no spyware, and no adware, guaranteed. This is what BitMeter looks like. The different colours on the graph represent your upload and download speeds, the display updates every second, and the current speeds are also displayed numerically in the lower part of the window. If you want to see historical data you can use the Statistics window to see what's been going on over the last few hours, days or weeks.

The data shown in each of the graphs is also available numerically, and can be exported to a spreadsheet for detailed analysis. As well as keeping a record of your connection usage, BitMeter has a lot of other handy features - for example a web interface: Other BitMeter features: Send Feedback. CursorFX - Create custom mouse cursors with CursorFX. Comodo Mobile Antivirus | Free Mobile Security App for Android. 5 Quick Steps to Manage Software Updates with SUMo. When you open a program to work with it, do you have the nerve to download and install an available update first? I didn’t think so. But will you do it after you’re done? Probably not. Keeping all of your software up to date is essential for several reasons. SUMo, which stands for Software Updates Monitor, is such a tool. There are five quick steps to secure a top notch system when it comes to software updates: 1. To benefit from SUMo, you must make sure that you will actually use it.

Tim recently explained how to Run Programs Automatically Using Windows Task Scheduler. Pick a time when you will likely have the time and patience for this task, and don’t forget to test whether your scheduled task works properly. 2. When SUMo pops up for the first time, hit the Scan button, so that SUMo can detect installed software. 3. Now, hit the Check button and come back in 3 to 5 minutes to see which software requires your attention. 4. 5. Image credits: iprole. Endpoint Security Manager 3 from Comodo | Endpoint Security Protection. Comodo Endpoint Security Manager (ESM) software brings 7 layers of defense – antivirus, firewall, web URL filtering, host intrusion prevention, auto-sandbox (containment), file reputation and viruscope (behavioral analysis) – together under a single offering for customers of all sizes, to protect them from both known and unknown threats.

Whether deployed as a complete security suite or by using the sandbox as a standalone to fortify existing AV solutions, Comodo ESM offers unrivalled endpoint protection for Microsoft Windows servers, desktops, laptops and tablets. The full Comodo Endpoint Security suite brings 7 layers of protection to the point of impact – the endpoint environment. Its disruptive auto-sandbox technology eliminates malware outbreaks and operating system contamination by automatically running untrusted/unknown process in a virtual environment within the existing system and with low system usage requirements. 1 Terms and conditions apply. Features Hardware requirements. Independent Tests of Anti-Virus Software - Real World Protection Test Overview.

CodeSpeak | My thoughts on programming, software and related matters. Sorry, this post is spanish only. En la tarde de hoy jueves, un compañero de trabajo me comenta que la página principal del sitio www.google.com.py fue modificada. Descartando algún problema con Google en sí (en donde trabajan algunos de los mejores expertos en seguridad del mundo), mi primer sospecha fue que el servicio DNS a nivel Paraguay fue comprometido.

Lo cual es evidente siguiendo el enlace a la página de los "hackers" iraníes, que relata el detalle del ataque realizado: DN... ¿qué? El sistema de DNS (Domain Name System o Sistema de Nombres de Dominio) es un componente crucial en el funcionamiento de Internet. Estos números tienen por nombre "dirección IP" y sirven para que una máquina pueda establecer una conexión con otra dentro de Internet. ¿Y cómo me afectaría algo así? La clave para entender la gravedad de lo que ocurrió, es que el sistema DNS funciona de manera jerárquica. Download IObit Freeware. Pdfchain y pdftk. Manipulación de ficheros PDF.

¿Cómo saber si una solución de software libre funcionará bien en tu empresa u organización? Este artículo tiene cerca de 5 años. Es probable que algunas partes del mismo hayan quedado desactualizadas. La adopción de software libre puede ser tan simple como descargar un paquete de software, instalarlo y usarlo en una sola estación de trabajo, o tan complejo como la implementación de un clúster de servidores Linux para hacer tareas informáticas complejas. Aquí nos centraremos en las implementaciones de menor escala del software libre, que son más relevantes para la mayor parte de las empresas y organizaciones. Todas las empresas y organizaciones deberían considerar la implementación de software libre. Conceptos Hay tres conceptos a considerar para evaluar software: Costo Total de Propiedad (TCO), valor estratégico, y la compatibilidad de la “misión” de tu empresa u organización con la filosofía del software libre.

Valor estratégico:El valor estratégico toma en cuenta otros factores más allá de los costos económicos vinculados a la tecnología en sí misma. Costos de implementación. 14 terminales en Linux para los fans del intérprete de comandos. Aunque es cierto que para los usuarios nuevos el Terminal es prácticamente un ‘cuco’, no menos cierto es que para muchos constituye la herramienta más poderosa en cualquier sistema de la familia Unix.

Según Wikipedia, el terminal (emulador) es un programa que simula el funcionamiento de un terminal (físico) de un ordenador central a través de una red de telecomunicaciones, entre dicho ordenador central y el ordenador que ejecuta el emulador de terminal. A continuación veremos en detalle algunas de las aplicaciones terminales para GNU/Linux y comparar cada una de ellas. Xterm Xterm es el emulador de terminal para el sistema de ventanas X Window, aunque su origen es anterior a este. Fue desarrollado originalmente como un emulador independiente para VAXStation 100 (VS100) por Mark Vandevoorde, estudiante de Jim Gettys en 1984, al mismo tiempo que se comenzaba el trabajo del sistema X Window Rxvt Gnome-terminal Konsole Konsole es el emulador de terminal por defecto del escritorio KDE.

Tmux Yakuake. Distribuciones hechas para ser Firewall. Los que estamos inmersos en el mundo de GNU/Linux y Software Libre, estamos acostumbrados a que cada día conocemos una distribución distinta, orientadas a cosas muy distintas. Hoy les traigo un pequeño ejemplo de esto. Pues existen varias (Muchas) Distribuciones basadas o enfocadas en ser FireWall O Cortafuegos. Pero primero.. ¿Que coño es un cortafuegos? Según SAN Wikipedia. Un cortafuegos (firewall en inglés) es una parte de un sistema o una red que está diseñada para bloquear el acceso no autorizado, permitiendo al mismo tiempo comunicaciones autorizadas.Se trata de un dispositivo o conjunto de dispositivos configurados para permitir, limitar, cifrar, descifrar, el tráfico entre los diferentes ámbitos sobre la base de un conjunto de normas y otros criterios.

Básicamente un cortafuegos, como es usualmente representado. Cabe aclarar también que cualquier distribución se puede usar como Firewall o Router. Cada una de estas distribuciones tienen sus PRO y sus CONTRA. ClearOs <h3Devil Linux. Synfig Studio… a que no lo conocías. No soy un diseñador, tampoco soy animador ni nada por el estilo, pero estoy rodeado de ellos, a donde mire tengo un diseñador al lado y esto me hace estar enterado (quiera o no) del mundo del software para diseño y diseño en general, es básicamente una consecuencia, un efecto colateral.

En fin, mas allá de que pueda tener chorrocientos amigos diseñadores (o intentos de los mismos) siempre me terminan metiendo en las típicas discusiones de “eres un friki no se como sobrevives con Linux” (la verdad es que no se como ellos sobreviven con Windows) y además me toca escuchar las mil y un maravillas sobre Adobe y lo “hermosa que es su suite”, que no lo niego, es poderosa. La cosa se pone interesante porque dentro de ese grupo hay un subgrupo que me ha visto trabajar, que ha tenido el privilegio de tocar a mi preciosa (mi pc) y les ha resultado cómodo, atractivo y hasta productivo… a ese grupo los llamo “disidentes hipsters” por cariño. ¿Que pasa con estos disidentes hipsters? Pero necesita ayuda. Cameyo Presentation. KC Softwares. KC Softwares. Is Your Antivirus Tracking You? You'd Be Surprised At What It Sends.

Your antivirus software is watching you. A recent study shows that popular antivirus applications like Avast assign your computer a unique identifier and send a list of all web addresses you visit to the manufacturer. If the antivirus finds a suspicious document, it will send the document to the antivirus company. Yes, your antivirus company might have a list of web pages you’ve visited along with your sensitive personal documents! AV-Comparatives’ Data Transmission Report We’re getting this information from AV-Comparative’s Data transmission in Internet security products report, released on May 8, 2014.

The study was performed by analyzing antivirus products running in a virtual machine to see what they sent to the antivirus company, reading each antivirus product’s end user license agreement (EULA), and sending a detailed questionnaire to each antivirus company so they could explain what their products do. A Unique Identifier And Web Addresses You Visit Why All the Data Collection? Free ModSecurity rules | What is ModSecurity and how it works. Soft2Base Automatically Updates 61 Popular Windows Applications. Software packagers like Ninite are at an uptick in popularity now that the old seek-and-download method is quickly drawing close towards extinction.

Imagine what your kids will think when you tell them that you actually had to search for and manually update certain essential software in the future. Crazy, right? iOS and other platforms come built around automatic updates to core functionality and additional software that you should install. That’s one huge benefit of having the App Store. Soft2Base is a software manager for Windows that scans for over 60 of the most popular applications and ensures that your computer is running the very latest version.

On launch, Soft2Base makes it easy for you by displaying all of their supported software. You can then check off the software you’d like to update and click Next. Soft2Base will automatically begin downloading your software and the installation prompts will automatically pop up if you’ve chosen to install them manually. 11 Hidden Windows Secrets and Tricks. TinyWall Brings Advanced Settings To The Windows Firewall. Do you like using the Windows Firewall, but wish it came with better controls? TinyWall, a free program for Windows Vista and Windows 7, gives you just that – a tray icon you can use to quickly edit the Window Firewall settings.

If you like the simplicity and protection offered by the lightweight Windows Firewall but miss the control offered by whitelist-oriented options, TinyWall is what you’ve been looking for. With the second service pack of Windows XP, Microsoft added a feature to Windows too few users were adding themselves – a firewall. The XP firewall was infamously porous, but it’s pretty good in Vista and 7. It’s also, for good or for ill, very easy to use. Chris recently showed you how the Windows 7 firewall compares to other firewalls. Put simply: TinyWall allows you to control which applications can access the Internet and gives you access to advanced options, without the need to install a third-party firewall. Using TinyWall Download Are you ready to install TinyWall? Process Explorer - The Most Powerful Task Manager Replacement [Windows] Let’s be honest, the Windows Task Manager isn’t that great for understanding and managing the processes running on your computer.

Even on Windows 8, where it’s much-improved, the task manager can’t come close to the power of Process Explorer. It’s part of the Sysinternals set of tools that Microsoft purchased – and for good reason. They’re among the most powerful system utilities for Windows. In addition to its power, Process Explorer is also flexible. It’s available from Microsoft as a single .exe file. That makes it a portable app you can throw on a USB drive and run on any computer. Understanding The Processes Running On Your Computer Perhaps the greatest thing about Process Explorer – from a power-user perspective – is the way it helps visualize the processes running on your computer and their relation to each other. The task manager included with Windows is a bit of a mess, displaying all running processes in a flat list.

Process Explorer helps make much more sense of this. How To Securely Delete Files From Your HDD Or SSD In Windows. When you hit the delete button, where does that file go? Does it just evaporate and leave a blank space on your drive? If you’ve been around computers long enough, you know that’s not what happens. But if you’re mostly an email and Facebook type of computer user, you might not know, or not even thought about it. You should think about it though, for a couple reasons. The first reason is so that you know you might be able to recover an accidentally deleted file. What Happens To A File When It is Deleted Hard Disk Drives (HDDs) When you delete a file it goes to the Recycle Bin. The index is called the Master File Table (MFT) for Hard Disk Drives. When the file is ‘deleted’ the information stays on the drive, but the MFT is changed to say, “Hey, you know that spot where Secret-File.txt was? Here’s an example. Solid State Drives (SSDs) It’s not exactly the same for Solid State Drives.

Well, you can’t really. What is ‘Secure’? Least Secure Method Mildly Secure Method (HDD Only) HDD – Formatting. How to Automatically Backup Your Web Server Files With WinSCP over FTP. You’ve heard it time and time again: back up your data. There are plenty of backup solutions, but nothing is better than an easy and free solution. So with a few lines of code and a very helpful program called WinSCP, we’re going to set up an automatic sync between your FTP server and your home computer.

FTP (File Transfer Protocol) is an Internet protocol that allows users to transfer files between computers. Despite its old age (think pre-TCP/IP era), FTP and its sister protocol SFTP (Secure File Transfer Protocol) are still very popular today and are viewed as an easy way to transfer files locally and over the Internet. It also happens to be a very good way to keep a remote backup of important files you keep on your FTP server.

If you don’t want to pay for a third-party FTP solution, check out this article on how to build your own FTP server written by the fine folks over at Lifehacker. Requirements An FTP server and access credentialsA Windows computerA copy of WinSCP (Windows only) Backup your Hard-Drive with SyncBack. Five Best Disk Defragmentation Tools. Useful Code Comparing Tools for Web Developers. 10 Tools for Distributed Developer Teams. 25 Open Source Alternatives For Costly Applications! 25 Font Management Tools Reviewed.