Tuesday, August 31, 2010

Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint File Formats

Users of the Microsoft Office XP and 2003 programs Word, Excel, or PowerPoint—please install all High-Priority updates from Microsoft Update before downloading the Compatibility Pack.

By installing the Compatibility Pack in addition to Microsoft Office 2000, Office XP, or Office 2003, you will be able to open, edit, and save files using the file formats in newer versions of Word, Excel, and PowerPoint . The Compatibility Pack can also be used in conjunction with the Microsoft Office Word Viewer 2003, Excel Viewer 2003, and PowerPoint Viewer 2003 to view files saved in these new formats. For more information about the Compatibility Pack, see 924074.

Note: If you use Microsoft Word 2000 or Microsoft Word 2002 to read or write documents containing complex scripts, please see 925451 for information to enable newer versions of Word documents to be displayed correctly in your version of Word.

Administrators: The administrative template for the Word, Excel, and PowerPoint converters contained within the Compatibility Pack is available for download.

Update: The Microsoft Office Compatibility Pack has been updated to include SP2. Additionally, with the updated Compatibility Pack, if .DOCX or .DOCM files contain custom XML tags, those tags are removed when the file is opened in Word 2003. For more information, please see KB978951

Download Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint File Formats
Read more...

Wednesday, August 25, 2010

Norton Ghost 15.0.1.3652 Incl. Serial

Norton Ghost 15.0.1.3652 Incl. Serial


Professional Grade Backup and Recovery! Norton Ghost creates full system and file backups, restores from system failures, enables convenient, secure offsite backup, backs up on schedules and events. Norton Ghost protects PCs-including all applications, settings, folders, and files-with advanced backup and recovery. It provides powerful protection with new features such as offsite backups and Symantec ThreatCon integration, as well as enhanced performance, one-to-one remote management, LightsOut Restore capability, and more.
With Norton Ghost you have a choice of backup types: full system (disk image) or specific files and folders. Backups include encryption and error checking to help keep your data safe, while compression, incremental backups, and automatic backup file management minimize storage space. Plus, you can now copy recovery points to a FTP site for easier offsite backup management.

Norton Ghost is ready whenever you need to recover, whether that involves restoring individual files or an entire system. The Software Recovery Disk allows you to start your computer, scan for viruses or hard disk errors, and start the recovery process even if your operating system won't start.

With the advanced tools included in Norton Ghost, you can take data protection to the next level. One-to-one remote management backs up other computers on your network that have Norton Ghost 12.0 or higher installed, and LightsOut Restore lets you install the Software Recovery Environment on your hard disk so you'll always be ready to recover. And now you can also take advantage of up-to-the-minute intelligence from Symantec's industry-leading Internet security research organization by having your backups automatically triggered whenever ThreatCon reaches a specified threat level.

Your PC drive now contains more than text files. There are contacts, financial documents, pictures, and (valuable) music and video downloads. They aren't as safe as you think. A glitch may accidentally occur to corrupt and even delete your files. That's where Norton Ghost comes in. It helps you backup your precious data automatically. Prompt it or let it work in the background like a ghost - quietly protecting your files, transferring them to backup drives, and even optimizing the performance of your PC's drives. There may be a ghost of a chance that you'll ever need Ghost but it's far better to have Ghost fighting on your side. After all, your PC contains key aspects of your life. Protect them with Ghost.

Key Technologies:
• NEW! Cold imaging
• NEW! Blu-ray Disc support
• File and folder backups
• NEW! Windows® 7 Bitlocker™ support
• NEW! Symantec ThreatCon integration
• Advanced compression and encryption
• NEW! Cold imaging
• NEW! Blu-ray Disc support
• File and folder backups
• NEW! Windows® 7 Bitlocker™ support
• NEW! Symantec ThreatCon integration
• Advanced compression and encryption
• Incremental backup
• Event based backups
• Onsite and offsite backups
• Full system (disk image) backup and restore

Key Benefits:
• Creates full system and file backups — Safeguards your system, settings, applications, and files with flexible, comprehensive backup protection.
• Restores from system failuress — Recovers your system and data even when you can’t restart your computer.
• Enables convenient, secure offsite backups — Saves recovery points to an FTP site for easier offsite management and even backs up your data to network-attached storage devices.
• Backs up on schedules and eventss — Lets you decide what is backed up and when so you can customize backups based on how you use your computer.

Features:
• NEW! Cold Imaging lets you back up files without installing Ghost.
• NEW! Blu-ray Disc allows you to back up large amounts of data to high-capacity Blu-ray Disc — up to 25 GB per disc (50 GB dual-layer).
• NEW! Windows® 7 support including support for Bitlocker™ provides enhanced data protection through drive encryption and integrity checking.
• NEW! Symantec ThreatCon integration leverages intelligence from Symantec’s industry-leading security research organization to automatically backup files whenever ThreatCon reaches a specified threat level.
• Full system (disk image) backup lets you easily backup everything on a hard drive or partition.
• File and folder backup lets you back up only the files and folders you choose, rather than backing up and entire disk.
• File backup search finds and backs up only the types of files you choose, such as photos, MP3 files, and documents.
• Incremental backup copies only files that have changed for fewer, faster backups.
• Customizable, event-based backup triggers backups based on key events, such as when you install a new program or when there are sudden increases in data storage.
• Offsite backup copies recovery points to a FTP site for easier offsite backup management.
• NAS backup gives you the option of backing up your files to network-attached storage devices.
• Advanced compression automatically compresses files so you can store more files in less space.
• Advanced encryption helps keep your sensitive documents safe from prying eyes.
• System protection lets you easily restore your system, applications and files even when you can’t restart the operating system.
• Google Desktop™ integration makes data recovery even faster with searchable backup indexes.
• LightsOut Restore lets you quickly restore your system without needing a bootable CD.
• Remote management lets you remotely control other Norton Ghost installations (12.0 and higher) on your local area network.
• Scheduled P2V allows you to automatically create a virtual disk from your most recent backup.
• Version support lets you restore older disk images made with Ghost 10, 12 and 14.
• Multiple storage options let you back up to almost any media, including Blu-ray Disc®, CDR/RW and DVD+-R/RW drives, USB and FireWire® (IEEE 1394) devices, network drives, and Iomega® Zip® and Jaz® drives.

Serial :

04-4408-4167-069767
07-4405-8948-447245
05-4401-6537-463076




Read more...

Sunday, August 22, 2010

VLC Media Player 1.1.3

 VLC Media Player 1.1.3

VLC (initially VideoLAN Client) is a highly portable multi-platform multimedia player for various audio and Video formats (MPEG-1, MPEG-2, MPEG-4, DivX, mp3, Ogg, OGM, MOV, wma, wmv...) as well as DVDs, VCDs, and various streaming protocols. The VideoLAN project targets multimedia streaming of MPEG-1, MPEG-2, MPEG-4 and DivX files, DVDs, digital satellite channels, digital terrestial television channels and live videos on a high-bandwidth IPv4 or IPv6 network in unicast or multicast under many OSes.

VideoLAN also features a cross-platform multimedia player, VLC, which can be used to read the stream from the network or display video read locally on the computer under all GNU/Linux flavours, all BSD flavours, Windows, Mac OS X, BeOS, Solaris, QNX...

Rewrite of the playlist (tree structure, input preparsing ...)
Preferences improvements


XML parsers
Client-side SSL/TLS support
Massive Matroska improvements
Support for SOCKS proxy
Support for Shoutcast Meta-data
Support for (HE-)AAC raw-audio streams

TiVo demuxer
Samba (Windows shares) access module
Dirac decoder and encoder

PNG decoder/encoder
Support for Apple Lossless Audio Codec
Services discovery modules (brand new SAP module, HAL discovery, DAAP (iTunes shares), shoutcast)
Support for 20/24 bits LPCM
Video snapshot support (png or jpg)
Image file video output (png)
Mosaic (picture-in-picture system)

Pocket PC port
Brand new Internet Explorer ActiveX plugin

Changes in VLC (VideoLAN Client):
Demuxers
* Fix wmv/asf issues that caused audio to drop
* Various fixes for ac3, mp3, dts and stability for wav format
* Fix seek in RTSP in conformity to RFC 2326
* Fix Dailymotion access script
* Fix crashes in xspf files handler
* Fix seeking and timing issues in some flv files on Windows version

Access
* Add extra caching for files on network shares
* Prevent integer underflow in Real pseudo-RTSP module, discovered by tixxDZ, DZCORE Labs, Algeria

Decoders
* Fix seeking in mpeg2 video files
* Improve SSA subtitles rendering
* Update most codecs for the Windows and Mac version

Muxers
* Fix sound recording of .flv files with mp3 audio

Qt Interface
* Possibility to change the opacity level of the Fullscreen controller
* Fix various crashes and VIDEO_TS folders opening

Mac OS X Interface
* Added options to disable support for Apple Remote and Media Keys
* Fixed options for Volume, Last.fm password and Subtitle Encoding
* Fixed redraw issues when autosizing the video window
* Preferences panel now includes help through tool-tips
* More reliable Information and Messages panels
* Fix various crashes

Windows port
* The ZVBI module is now available for Windows, for complete teletext support

Home page - http://www.videolan.org/

VLC Media Player 1.1.3
Read more...

Monday, August 9, 2010

MIcrosoft WIndows XP including sp3, some drivers,tweaks and softwares

MIcrosoft WIndows XP including sp3, some drivers,tweaks and softwares


We all know about MIcrosoft WIndows XP. So MIXOMANIA decided to bring you the massive amount of data in the form of softwares, tweaks, drivers, including service pack 3, latest patches and lots more in this cd. This cd installation is almost unattended.

Here is the list which is already added in this cd....

-Latest updates and patches included
-Windows Media Player 11 and Internet Explorer 8
-Support sata drivers
-No need for activation or serial
-Firefox 3.6.8
-VLC Player 1.1.2
-DoPDF 7.1.342
-ESET Nod32 v4 Antivirus and Antispyware
-CCleaner 2.34.12
-Dotnet Framework 1.1 + 2.0 + 3.0 + 3.5
-Winrar 3.9
-Flash Player (Both for IE and Firefox)
-Tweaking registries
-Sumatra PDF 1.1

and so on.................................


Download MIcrosoft WIndows XP including sp3, some drivers,tweaks and softwares


http://www.4shared.com/file/gC3pz9ar/winxp060810part1.html
http://www.4shared.com/file/BMzUux5V/winxp060810part2.html
http://www.4shared.com/file/G4JiECEc/winxp060810part3.html
http://www.4shared.com/file/iSAyZLIx/winxp060810part4.html

Read more...

Sunday, August 8, 2010

ExtraLabs.Skype.Recorder.v2.4.0.148.Incl.Keymaker

ExtraLabs.Skype.Recorder.v2.4.0.148.Incl.Keymaker

Skype Recorder is a surprisingly easy-to-use tool for recording Skype audio conversations.

It is really simple to create a new recording. All you need is to run Skype Recorder.

The software will start the recording by itself as soon as you start talking on Skype. The conversation over, Skype Recorder will encode the recording to the specified format and will save the ready file on your hard drive. Due to the built-in audio player, you will be able to listen to the recording in no time and do whatever you like – delete it, move or upload to the site.

Skype Recorder has a range of efficient and advanced capabilities:

* Manually start/stop/pause, or automatically record Skype calls

* Convert your calls to MP3/OGG/WMA/WAV format

* Built-in audio player, built-in FTP client

* Spy' mode

* Free to try

Read more...

Saturday, August 7, 2010

10 things users do that can mess up their computers

Users find plenty of ways to run into trouble, from gunking up their system with shareware to leaving it exposed to attackers to forgetting about using surge protectors. Share this list with your own users so they can sidestep preventable problems like these.

We all do dumb things now and then, and computer users are no exception. Inadvertently pressing the wrong key combination or innocently clicking OK in the wrong dialog box can change important settings that alter a computer's behavior or even crash the system.

Nervous newbies are often fearful that one wrong move might break the computer forever. Luckily, short of taking a sledge hammer to the box, the consequences aren't usually quite that dire. Even so, users often do create problems for their computers and for your network. Here's a description of common missteps you can share with your users to help them steer clear of preventable problems.

#1: Plug into the wall without surge protection

Here's one that actually can physically destroy your computer equipment, as well as the data it holds. You may think your systems are in danger only during an electrical storm, but anything that interrupts the electrical circuit and then starts the current back again can fry your components. Something as simple as someone turning on an appliance that's plugged into the same circuit (especially a high voltage one such as a hair dryer, electric heater, or air conditioner) can cause a surge, or a surge may be caused by a tree limb touching a power line. If you have a power outage, you may experience a surge when the electricity comes back on.

You can protect your systems against damage from power surges by always using a surge protector, but it's important to be aware that most cheap surge protectors will survive only a single surge and need to be replaced afterward. An Uninterruptible Power Supply (UPS) is better than a surge protector; it has a battery that keeps power flowing smoothly even when there's an outage, to give you time to gracefully shut down.

#2: Surf the Internet without a firewall

Many home users plug their computers right into their spiffy new cable or DSL modems and hop onto the Internet without realizing that they're putting themselves at risk from viruses and attackers. Every Internet-connected computer should be protected by a firewall; this can be a firewall built into the broadband modem or router, a separate firewall appliance that sits between the modem/router and the computer, a server at the network's edge running firewall software, or personal firewall software installed on the computer (such as ICF/Windows Firewall built into Windows XP or a third-party firewall program like Kerio or ZoneAlarm).

One advantage of personal firewalls on laptop computers is that they're still with you when you take the computer on the road and plug into a hotel's DSL or cable port or connect to a wireless hotspot. Just having a firewall isn't enough, though. You must also be sure it's turned on and configured properly to protect you.

#3: Neglect to run or update antivirus and anti-spyware programs

Let's face it: Antivirus programs can be a royal pain. They're always blocking some application you want to use, you often have to disable them to install new software, and they have to be updated on a regular basis to do any good. Seems like the subscription is always expiring and prompting you to renew it--for a fee, in many cases. But in today's environment, you can't afford to go without virus protection. The malicious programs that AV software detects--viruses, Trojans, worms, etc.--can not only wreak havoc on your system but can spread via your computer to the rest of the network. In extreme cases, they can bring down the whole network.

Spyware is another growing threat; these are programs that install themselves on your computer (usually without your knowledge) and collect information from your system that is then sent back to the spyware program's author or vendor. Antivirus programs often don't address spyware so it's important to run a dedicated spyware detection and removal program.

#4: Install and uninstall lots of programs, especially betas

You like to be on the cutting edge, so you often install and try out new software. Beta programs are usually free and give you a chance to sample neat new features before most people. There are also many freeware and shareware programs made available as Internet downloads by their authors. We know you'd never do it, but some users even install pirated software or "warez."

The more programs you install, the more likely you are to run across ones that either include malicious code or that are poorly written and cause your system to behave improperly or crash. The risk is greater with pirated programs.

Even if you install only licensed, final-release commercial software, too many installations and uninstallations can gunk up the registry. Not all uninstall routines completely remove program remnants and at the least, this practice can cause your system to slow down over time.

You should install only the programs that you really need, stick with legitimate software, and try to minimize the number you install and uninstall.

#5: Keep disks full and fragmented

One of the results of installing and uninstalling lots of programs (or adding and deleting data of any kind) is that it fragments your disk. Disk fragmentation occurs because of the way information is stored on the disk: On a new, clean disk, when you save a file it's stored in contiguous sections called clusters. If you delete a file that takes up, for example, five clusters, and then save a new file that takes eight clusters, the first five clusters' worth of data will be saved in the empty space left by the deletion and the remaining three will be saved in the next empty spaces. That makes the file fragmented, or divided. To access that file, then, the disk's read heads won't find all the parts of the file together but must go to different locations on the disk to retrieve it all. That makes it slower to access. If the file is part of a program, the program will run more slowly. A badly fragmented disk will slow down to a crawl.

You can use the disk defragmenter built into Windows (Programs | Accessories | System Tools) or a third-party defrag program to rearrange these pieces of files so that they're placed contiguously on the disk.

Another common cause of performance problems and application misbehavior is a disk that's too full. Many programs create temporary files and need extra free space on the disk to operate. You can use Windows XP's Disk Cleanup Tool or a third-party program to find and delete rarely used files, or you can manually delete files to clear space on your disk.

#6: Open all attachments

Some folks just can't help themselves: Getting an e-mail message with an attachment is like getting an unexpected gift. You just have to peek inside to see what it is. But just as that package left on your doorstep could contain a bomb, that file attached to your mail message could contain code that will delete your documents or system folder or send viruses to everyone in your address book.

The most blatantly dangerous attachments are executable files--those that run code--with extensions like .exe, .cmd, and many others (see


http://antivirus.about.com/od/securitytips/a/fileextview.htm



for a list of file extensions for different types of executables). Files that aren't themselves executables, such as Word .doc files and Excel .xls files, can contain embedded macros. Scripts (Visual Basic, JavaScript, Flash, etc.) aren't directly executed by the computer but are run by other programs.

It used to be that you could assume plain text (.txt) or graphics (.gif, .jpg, .bmp) files were safe, but not anymore. File extensions can be spoofed; attackers take advantage of the Windows default setting that doesn't display common file extensions to name executables something like greatfile.jpg.exe. With the real extension hidden, it shows up as greatfile.jpg. So the recipient thinks it's a graphic, but it's actually a malicious program.

You should open attachments only when they're from trusted sources and only when you're expecting them. Even if the mail with the attachment appears to come from someone you trust, it's possible that someone spoofed their address or that their computer is infected with a virus that sent the attachment to you without their knowledge.

#7: Click on everything

Opening attachments isn't the only type of mouse click that can get you in trouble. Clicking on hyperlinks in e-mail messages or on Web pages can take you to Web sites that have embedded ActiveX controls or scripts that can perform all sorts of malicious activities, from wiping your hard disk to installing a backdoor program on your computer that a hacker can use to get in and take control of it.

Clicking the wrong link can also take you to inappropriate Web sites that feature pornography, pirated music or software, or other content that can get you in trouble if you're using a computer on the job or even get you in trouble with the law.

Don't give in to "click mania." Think before you click a link. Links can also be disguised in phishing messages or on Web sites to appear to take you to a different site from the ones they really point to. For example, the link might say www.safesite.com, but it actually takes you to www.gotcha.com. You can often find out the real URL by hovering over the link without clicking it.

#8: Share and share alike

Your mother taught you that it's nice to share, but when you're on a network, sharing can expose you to dangers. If you have file and printer sharing enabled, others can remotely connect to your computer and access your data. Even if you haven't created any shared folders, by default Windows systems have hidden "administrative" shares for the root of each drive. A savvy hacker may be able to use these shares to get in. One way to prevent that is to turn off file and printer sharing--if you don't need to make any of the files on your computer accessible across the network. This is especially a good idea if you're connecting your laptop to a public wireless hotspot. You can find instructions on how to do so at

http://www.pcmag.com/article2/0,1895,1277222,00.asp
If you do need to make shared folders accessible, it's important that they be protected by both share-level permissions and file-level (NTFS) permissions. Also ensure that your account and the local administrative account have strong passwords.

#9: Pick the wrong passwords

That brings us to another common mistake that can expose you to attacks: picking the wrong password. Even if you don't belong to a network where the administrator forces you to select strong passwords and change them regularly, you should do so. Don't pick passwords that are easy to guess, such as your birthdate, loved one's name, social security number, etc. Longer passwords are harder to crack, so make your password at least eight characters long; 14 is even better. Popular password-cracking methods use "dictionary" attacks, so don't use words that are in the dictionary. Passwords should contain a combination of alpha, numeric, and symbol characters for best security.

A long string of nonsense characters may create a password that's tough to crack, but if you can't remember it, you'll defeat the purpose by writing it down (where an intruder may be able to find it). Instead, create a phrase you can remember easily and use the first letters of each word, along with logical numbers and symbols. For example: "My cat ate a mouse on the 5th day of June" becomes "Mc8amot5doJ."

#10: Ignore the need for a backup and recovery plan

Even if you follow all these suggestions, an attacker may crash your system or your data may be corrupted or get wiped out by a hardware problem. That's why it's essential that you always back up your important information and have a plan for recovering from a system failure.

Most computer users know they should back up, but many never get around to it. Or they make an initial backup but don't update it regularly. Use the built-in Windows backup program (Ntbackup.exe in Windows NT, 2000, and XP) or a third-party backup program and schedule backups to occur automatically. Store backed up data on a network server or removable drive in a location away from the computer itself, in case of a natural disaster like flood, fire, or tornado.

Remember that the data is the most important thing on your computer. The operating system can be reinstalled and so can applications, but it may be difficult or impossible to recreate your original data. (See "10 ways to protect your data" for additional suggestions.)

Nonetheless, you can save time and frustration by backing up your system information too. You can create mirror images of your disks using popular ghost or clone programs. This will allow you to restore the system quickly instead of going through the tedious installation process.
Read more...

PrettyMay Call Recorder BIZ 3.6.0.10 Incl Patch & Serial

PrettyMay Call Recorder BIZ 3.6.0.10 Incl Patch & Serial

PrettyMay Call Recorder for Skype (PMCRS) is a powerful Skype add on, which allows you to record skype calls on Windows easily.




Read more...

Tuesday, August 3, 2010

7-Zip v4.65 [FREEWARE]

7-Zip v4.65 [FREEWARE]



7-Zip is open source software. Most of the source code is under the GNU LGPL license. The unRAR code is under a mixed license: GNU LGPL + unRAR restrictions.


You can use 7-Zip on any computer, including a computer in a commercial organization. You don't need to register or pay for 7-Zip.
The main features of 7-Zip

* High compression ratio in new 7z format with LZMA compression
* Supported formats:
o Packing / unpacking: 7z, ZIP, GZIP, BZIP2 and TAR
o Unpacking only: ARJ, CAB, CHM, CPIO, DEB, DMG, HFS, ISO, LZH, LZMA, MSI, NSIS, RAR, RPM, UDF, WIM, XAR and Z.
* For ZIP and GZIP formats, 7-Zip provides a compression ratio that is 2-10 % better than the ratio provided by PKZip and WinZip
* Strong AES-256 encryption in 7z and ZIP formats
* Self-extracting capability for 7z format
* Integration with Windows Shell
* Powerful File Manager
* Powerful command line version
* Plugin for FAR Manager
* Localizations for 74 languages


7-Zip v4.65 [FREEWARE] Read more...

Replay Media Catcher v4.0.5 (x86/x64) incl. keygen

Replay Media Catcher v4.0.5 (x86/x64) incl. keygen


Replay Media Catcher is a software that lets you capture streaming Flash Video and MP3 Audio from the streams that used to be unrecordable.Just click Start Recording, then laugh heartily as tons of great media fills your hard drive as you play it.

Replay Media Catcher is the best streaming video and audio/MP3 downloader on the planet. Here's why:
• It's Easy: Just click "Start Recording", then play your media, and an exact digital copy is downloaded to your hard disk.
• It's Powerful: Replay Media Catcher supports more streaming protocols than any other stream downloading software.
• It's Convenient: Replay Media Catcher automatically names and tags your video and MP3 files. No more cryptic file names.

For capturing online video, you can download videos from millions of popular places, including:
• YouTube™
• MySpace™
• Daily Motion
• iFilm™
• Metacafe™
• TV Show sites.
• Movie sites.
• And millions more!

Download Replay Media Catcher v4.0.5 (x86/x64) incl. keygen Read more...