Tuesday, September 7, 2010

Windows 7 Firewall Control Portable 3.5.1.131دانلود برنامه ی


Protects your applications from undesirable network incoming and outgoing activity, controls applications internet access.

Windows 7 Firewall Control Portable is a lightweight application that allows you to control personal information leakage via controlling application network traffic. Manages and synchronizes port forwarding provided by external network connection (firewall/router) box with applications requirements and activity.
Here are some key features of "Windows 7 Firewall Control Portable":

· Decreases expenses of mobile/satellite connections
· Zone based network permissions management
· Integration with Window Explorer for direct access permission management
· Instant notifications of blocked activity
· Special editions for portable devices (USB flash/HDD drives, iPod etc)
· Protection from incoming and outgoing threats
· External network connection (firewall/router) box support
· Automatic network connection box detection/management
· External/worldwide access to selected local application
· Port Forwarding management
· Automatic Port Forwarding-to-applications synchronization
· Simplicity of operation
· Per-application security settings
· Group zone and application network access permission management
· IPv6 support


Portable Hash Codes 1.56.270.8500دانلود برنامه ی


Hash your data fast and easy with this tool.

Portable Hash Codes is the portable version of Hash Codes developed to be able to run from a USB flash drive or any other portable device.

This application is designed to hash data from keyboard, file or CD/DVD. It uses Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 or Whirlpool algorithm.
Here are some key features of "Portable Hash Codes":

· Hash data from keyboard, file or CD/DVD
· Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
· Copy hash codes to clipboard or save to disk
· Can compare hash codes.
· Load saved hash code file to comparison.
· The progress bar show the current process.
· Suspend, resume or stop the hash process.
· Save the log information.
· Display the hashing time.
· Multilingual user interface (english, german, polish, slovenian).
· Drag and drop support.
· Can be used as standalone software.


Quick Checksum Verifier 1.1.5دانلود برنامه ی


A file integrity checker which creates and verifies checksums

Quick Checksum Verifier is a simple tool designed to help you check file integrity by using time proven algorithms.

You can easily create checksums of files and verify their integrity in the future. The operation is very easy, just two steps. Load the file and paste the predefined checksum.

This software has been designed to be portable, which means it can be installed and used on an USB-Stick.

Give Quick Checksum Verifier a try to fully assess it's capabilities!

External mirror 1 [EXE]

Portable TrueCrypt 7.0aدانلود برنامه ی


A software designed to protect your important data by encrypting it

TrueCrypt is a software designed to protect your important data by encrypting it. It can also maintain an on-the-fly-encrypted volume (data storage device).

Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on-the-fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume.

Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on-the-fly (right before they are written to the disk) in RAM. Note that this does not mean that the whole file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for TrueCrypt.
Here are some key features of "Portable TrueCrypt":

· Creates a virtual encrypted disk within a file and mounts it as a real disk.
· Encrypts an entire partition or storage device such as USB flash drive or hard drive.
· Encrypts a partition or drive where Windows is installed (pre-boot authentication).
· Encryption is automatic, real-time (on-the-fly) and transparent.
Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:
· 1) Hidden volume (steganography ? more information may be found here).
· 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).
· Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS

Softpedia Mirror (US) [EXE]

KraftigExe 1.3دانلود برنامه ی


Execute commands with parameters from textfile

The KraftigExe application was developed to be a small command-line utility for executing commands with parameters from textfile. For each line in the parameter file, the command is executed.

Syntax:
KraftigExe [options] [command [command options]] parameterfile

command: any executable command or program.
parameterfile: file containing parameters to be added to command.

Options:
/? (help): display help.
/p (pause): press key between each executed command line.
/, (comma): replace commas with space in parameter file
/; (semicolon): replace semicolons with space in parameter file
/l# (line): use only the first # line(s) of parameter file
/c (continue): do not wait for process to finish before running next command
/v (verbose): verbose mode (more output)

Example:
1: KraftigExe delete listoffiles.txt
2: KraftigExe adduser listofusers.txt

Note:
- command is optional, if not included, each line in the parameterfile will be executed in turn. If command is included each line will be added as parameters to command, then the resulting line will be executed in turn.
- the c option allows for multiple threads to run simultanously.
- the comma and semicolon options allows for different formats of the parameterfile


WhosIP 1.06دانلود برنامه ی


You can use this software when you want to retrieve various types of data about an IP

WhosIP is a simple command-line tool that enables you to easily find all available information about an IP address.

The owner of the IP address, the country/state name, IP addresses range, contact information (address, phone, fax, and email), and more.
Requirements:

· Internet Connection

External Mirror 1 [ZIP]

IPaddress 2.0.7دانلود برنامه ی


Finds your IP and lets you view/copy/email it

Want a quick view at your IP Address? Then get IPaddress! IPaddress is a tiny utility that you can use to determine your IP address and lets you copy it to the computer's Clipboard. You can then paste it from there into whatever application or document that requires it.

You can also send your IP address with the build-in e-mail engine to fellow gamers or to friends or to colleagues at the office so that they can find your computer for remote access. Both WAN and LAN are supported.
Here are some key features of "IPaddress":

· Finds both your WAN and LAN IP addresses
· Allows you to save them or copy them to the clipboard
· Keeps a history log of your IP addresses
· Send the IP address to your friends with build-in e-mail (supports Exchange Server)

Requirements:

· Local Area Network or Internet Connection


IP Locator 1.0دانلود برنامه ی


A small utility which will locates IP with some more information.

IP Locator is a simple application that can locate the desired IP with some more information, such as City, Organization etc.
Requirements:

· NET Framework

Softpedia Secure Download (US) [ZIP]

TCP Profiles Manager 1.7دانلود برنامه ی


A utility to easily change local IP address, subnet mask, network, gateway, DNS ... all without rebooting.

TCP Profiles Manager is small and easy to use application that allows you to quickly change your local IP address, subnet mask, network, gateway, DNS without rebooting your PC. You can store multiple profiles per network interface (ex : MyHome, MyOffice...). Useful when you connect to multiple networks, it supports DHCP and is very easy to configure.

Softpedia Secure Download (US) [EXE]

IPNetInfo 1.25دانلود برنامه ی


Allows you to get information about IP addresses

IPNetInfo is a little tool which will allow you to easily find all available information about an IP address: The owner of the IP address, the country/state name, IP addresses range, contact information (address, phone, fax, and email), and more.

This utility can be very useful for finding the origin of unsolicited mail. You can simply copy the message headers from your email software and paste them into IPNetInfo utility.

IPNetInfo automatically extracts all IP addresses from the message headers, and displays the information about these IP addresses.

The IP address information is retrieved by sending a request to the whois server of ARIN. If ARIN doesn't maintain the information about the requested IP address, a second request is sent to the whois server of RIPE, APNIC or LACNIC.

After the IP address information is retrieved, IPNetInfo analyzes the Whois record and displays it in a table. Quickly find out various IP informations using this simple utility.

Notice: From time to time, the WHOIS server of ARIN is down and doesn't respond to WHOIS requests from IPNetInfo, and thus IPNetinfo fails to retrieve the IP address. When such a thing occurs, simply try again later.
Requirements:

· Internet connection.

Softpedia Secure Download (US) [ZIP]

I2P 0.8دانلود برنامه ی


An application that allows reliable streaming communication

I2P is an anonymous network, exposing a simple layer that applications can use to anonymously and securely send messages to each other.

The network itself is strictly message based (ala IP), but there is a library available to allow reliable streaming communication on top of it (ala TCP). I2P is an application that allows users to compunicate via IP address.

All communication is end to end encrypted (in total there are four layers of encryption used when sending a message), and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys).

To anonymize the messages sent, each client application has their I2P "router" build a few inbound and outbound "tunnels" - a sequence of peers that pass messages in one direction (to and from the client, respectively).

In turn, when a client wants to send a message to another client, the client passes that message out one of their outbound tunnels targeting one of the other client's inbound tunnels, eventually reaching the destination.

Every participant in the network chooses the length of these tunnels, and in doing so, makes a tradeoff between anonymity, latency, and throughput according to their own needs.

The result is that the number of peers relaying each end to end message is the absolute minimum necessary to meet both the sender's and the receiver's threat model.
Requirements:

· Java 1.4 or higher


GetMyIpAddress 0.1دانلود برنامه ی


Check out your IP with this tool.

GetMyIpAddress is a simple, tiny dialog based software designed to use the automation feature of  whatismyip.com site to display the external IP (the IP assigned to the router or proxy) and also the internal IP (the IP used by the PC).

Softpedia Secure Download (US) [ZIP]

Extended Ping 1.0دانلود برنامه ی


Test servers and network components just being 'alive'

Extended Ping, Eping for short, was developed to be a simple IP-based utility that can be used for testing servers and network components just being 'alive'. It periodically tests all the ip-addresses and/or hostnames in the grid and alerts if one or more cannot be pinged for a number of times. Being a networkmanager I needed such a tool in a fairly small network-environment, where SNMP or Openview are too much, too expensive or too complex.

How does it work? After starting Eping, it represents itself as a grid with five buttons at the right; Settings Clear Find About Exit The only thing you have to do to start testing, is filling in the column 'Address' and clicking the Eping-icon at the right (above the five buttons);

Of course it is advisable to add related information as 'Location', 'Description' and 'Comment'.  In case Eping cannot reach a specific ip-address after a number of tries, a popup-window appears with date, time and message;

This history is automatically saved when you exit Eping and loaded at startup. You can also edit the text. When Eping succeeds in reaching an ip-address, it fills in the responsetime in the first column on the left '[ms]'.

 Softpedia Secure Download (US) [ZIP]

WinPing 1.0bدانلود برنامه ی


Monitor (ping) computers on a network for availability

The WinPing application was developed to be a small tool that will allow you to monitor (ping) computers on a network for availability. It's an automated, graphical utility with an audible alarm. Computer icons are color coded green (normal) or red (error). Ping errors are also written to a log file.
What's New in This Release:
· Ping interval is now selectable 1-60 minutes
· Vastly improved code that detects when all asynchronous pings are completed
· fixed problem that incremented the red counter when the window was resized
· added large/small icons button
· store alarm setting in registry
· Added EMAIL & PAGER support (MAPI/Outlook)

Softpedia Secure Download (US) [ZIP]

Monday, September 6, 2010

VLC Media Player (formerly VideoLAN Client) 1.1.4دانلود برنامه ی

A multi-platform multimedia player that can read DVDs, VCDs, MPEG, and DivX files

VLC - the cross-platform media player and streaming server

VLC media player is a highly portable multimedia player that supports various audio and video formats (MPEG-4, MPEG-2, MPEG-1, DivX, mp3, ogg, ...) as well as DVDs, VCDs, and various streaming protocols. It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on a high-bandwidth network.

The stream can be MPEG 2 TS in UDP or HTTP packets unicasted or multicasted on an IPv4 or IPv6 network.

Here are some key features of "VLC Media Player (formerly VideoLAN Client)":

· Input
· Input media
· UDP/RTP Unicast
· UDP/RTP Multicast
· HTTP / FTP
· MMS
· File
· DVD 1
· VCD
· SVCD 2
· Audio CD (without DTS)
· DVB (Satellite, Digital TV, Cable TV)
· MPEG encoder 3
· Video acquisition Direct Show
· Input formats
· MPEG (ES,PS,TS,PVA,MP3)
· ID3 tags
· AVI
· ASF / WMV / WMA
· MP4 / MOV / 3GP
· OGG / OGM / Annodex
· Matroska (MKV)
· Real
· WAV (incuding DTS)
· Raw Audio: DTS, AAC, AC3/A52
· Raw DV
· FLAC
· FLV (Flash)
· Video
· Decoders
· MPEG-1/2
· DIVX (1/2/3)
· MPEG-4, DivX 5, XviD, 3ivX D4
· H.264
· Sorenson 1/3 (Quicktime)
· DV
· Cinepak
· Theora (alpha 3)
· H.263 / H.263i
· MJPEG (A/B)
· WMV 1/2
· WMV 3 / WMV-9 / VC-1 4, 5
· Indeo Video v3 (IV32)
· Subtitles
· DVD 6
· SVCD / CVD
· DVB
· OGM
· Matroska
· Text files (MicroDVD, SubRIP, SubViewer, SSA1-5, SAMI, VPlayer)
· Vobsub
· Filters
· Deinterlace
· Cropping
· Image wall
· Image adjust
· Rotate/Mirror
· Logo overlay
· Magnification
· Image distortion
· Bluescreen
· RSS/Atom feeds
· Outputs
· Native DirectX, GDI
· SDL
· ASCII Art
· Audio
· Decoders
· MPEG Layer 1/2
· MP3
· AC3 - A/52
· DTS
· LPCM
· AAC
· Vorbis
· WMA 1/2
· WMA 3 7
· ADPCM
· DV Audio
· FLAC
· QDM2/QDMC (QuickTime)
· MACE
· Real Audio 8
· Speex
· Filters
· Visualization effects
· Equalizer
· Outputs
· Native DirectX WaveOut
· S/PDIF DirectX WaveOut
· Multi-channel DirectX WaveOut
· SDL
· Streaming
· Interfaces and control
· Default WxWidgets
· Qt 4
· Skins
· Web
· Telnet
· Command line
· Miscellaneous
· SAP/SDP announces
· Bonjour protocol
· Mozilla/Firefox plugin
· ActiveX plugin
· SVCD Menus
· Localization
· CD-Text 10
· CDDB CD info 11
· IPv6
· IGMPv3 Win XP
· CPU acceleration 13

Softpedia Secure Download (US) [EXE]

Hamachi 2.0.2.85دانلود برنامه ی


A networking technology enabling any two computers on the Internet to talk directly to each other

Hamachi will allow you to establish secure direct connections to PCs that are not accessible otherwise due to the restrictions in network setup.

For example, if your home computer is connected to the Internet via Connection Sharing or Broadband Router, you will not generally be able to access it, say, from your office.

By installing Hamachi on both computers and clicking a couple of buttons you can connect them instantly and securely. Now you can browse file shares, run remote desktop or even host a multiplayer game on one computer and join in from another. Just as if they were connected with a physical wire.

Hamachi is a networking technology enabling any two computers on the Internet to talk directly to each other regardless of the presence of firewalls or address translation devices on the route between them.

Most interestingly, Hamachi enables peer-to-peer communications between two computers residing behind two different connection sharing devices. In geek language - it allows for bidirectional NAT traversal.

Peer to peer connectivity becomes possible with the help of Hamachi servers that mediate the establishment of an initial contact between peers.

Once peers connect the traffic starts to flow directly between them. This not only ensures that data travels the best route possible, but it also minimizes latency (ping time) and maximizes transfer speeds.

Hamachi is secure. All Hamachi communications are encrypted and authenticated using industry-standard algorithms and protocols. Nobody will be able to see what two Hamachi peers are talking about.

However what is more important - Hamachi security architecture is completely open meaning that its detailed description is available for review to anyone interested.

NOTE: Free for non-commercial use only. Commercial use is subject to an annual subscription fee, which allows you to network up to 256 computers, and offers fast relay.
Here are some key features of "Hamachi":

Network Limits:
· Network Capacity: Create or join up to 256 Hamachi networks.
· User Capacity: Each Hamachi network can have up to 50 concurrent users.

Chat:
· Peer to Peer Chat: Exchange chat messages with both on and off-line Hamachi peers.
· Group Chat: Chat with all online network members at once in a single chat window.

Network Protection:
· Password Protection: Require anyone attempting to join your network to present a valid network password.
· Network Lock: Lock your Hamachi networks to prevent any new members from joining. This preserves all other access control settings.
· Membership Approval: Prevent new members from having full access to your network until manually approved by you or an administrator.

Network Administration:
· Member Eviction: Evict an existing member from your Hamachi network. This revokes their membership, but does not prevent them from re-joining the network.
· Member Ban: Create a list of Hamachi clients (Hamachi IP addresses) that cannot join your networks under any condition.
· Create Administrators: Assign one or more network members to be network administrators, and designate their specific capabilities.
· Network Messages: Set a welcome or announcement messages for each network you own.

Extended Connectivity:
· Low-Bandwidth Relays: Use relays to connect Hamachi clients that cannot, for any reason, establish a direct communication channel. We believe the chances of requiring a relay when using Hamachi is about 5%.

Advanced Features:
· Routed tunneling: In addition to handling traffic between Hamachi clients, Hamachi can be set up to allow remote access to LAN computers that do not or cannot run the Hamachi client.
· Built-in Web Proxy: Peers in your Hamachi networks may configure their Web browsers to access the Internet via your computer and therefore protect their Web traffic. This feature is typically used for securing Web surfing from untrusted locations including cybercafes, coffee houses, hotels, etc.
· Run as a Windows System Service: Run the Hamachi client as a system service. This is typically needed when running Hamachi on servers or in setups involving Windows domain authentication.

Limitations:

· Limited to 16 computers per network

Softpedia Mirror (US) [MSI]

Sony Ericsson Themes Creator 4.16دانلود برنامه ی


You can make your phone look completely different from the rest

The "Themes Creator" is now official and supports all Sony Ericsson phones that support themes (except P900, of course).

Sony Ericsson Themes Creator is a software that helps you to personalize your mobile phone.

With a bit of work and creativity, you can make your phone look completely different from the rest, since you can change almost everything you see on the screen (except font face, some icons).

By the way, there's still no way to remove the operator logo.

Requirements:

· Mobile Phone Monitor is necessary for this program.
· 10 MB hard disk
· 128 MB system RAM
· 300 MHz CPU

Softpedia Mirror (US) [ZIP]

Rapidshare Auto Downloader 4.1دانلود برنامه ی


A software for automatic download of rapidshare.com links for free users

Rapidshare Auto Downloader is a handy automatic downloader for rapidshare.com users.
Here are some key features of "Rapidshare Auto Downloader":

· Download a group of links from rapidshare (one by one).
· Download incomplete downloads until all links are downloaded.
· Autoshutdown feature
· Load and save the download list.
· Check for new versions automatically.
· Support of 3 Languages : English , Farsi , French

Requirements:

· NET Framework

Softpedia Secure Download (US) [RAR]

K-Lite Codec Pack Full 6.3.5Build 20100820 / 6.3.0 / 3.8.0 - x64دانلود برنامه ی


A codec pack that will give you the ability to play 99% of all the movies that you download from the internet

K-Lite Codec Pack is a collection of codecs and related tools. Codec is short for Compressor-decompressor. Codecs are needed for encoding and decoding (playing) audio and video.

The K-Lite Codec Pack is designed as a user-friendly solution for playing all your movie files. With the K-Lite Codec Pack you should be able to play 99% of all the movies found on your computer.

The K-Lite Codec Pack has a couple of major advantages compared to other codec packs:
* Media Player Classic
* DivX Pro [Decoding]
* DivX Pro [Encoding]
* XviD [Decoding]
* XviD [Encoding]
* 3ivX Pro [Decoding]
* 3ivX Pro [Encoding]
* Windows Media 9 VCM
* Windows Media
* On2 VP3
* On2 VP6 [Decoding]
* On2 VP6 [Encoding]
* Ligos Indeo XP
* Intel Indeo
* Intel Indeo
* Intel I.263
* huffyuv
* MS MPEG-4
* DivX MPEG-4 Low and Fast motion
* Cyberlink DVD decoder
* Elecard MPEG-2 demuxer
* MainConcept MPEG-2 demuxer
* Ligos MPEG-2 decoder
* Cyberlink MPEG-2 decoder
* MainConcept MPEG-2 decoder
* Fraunhofer MP3 DirectShow decoder
* WMA DirectShow decoder
* AC3 DirectShow decoder
* AC3 ACM decoder
* Ogg Vorbis DirectShow decoder (CoreVorbis)
* AAC DirectShow decoder (CoreAAC)
* 3ivX Pro [Decoding]
* 3ivX Pro [Decoding]
* Nero Digital MPEG-1/2 decoder
* MusePack DirectShow decoder
* Voxware DirectShow decoder
* Monkey's Audio DirectShow decoder
* DivX Audio
* LAME MP3 Encoder

* Ogg DirectShow splitter and Vorbis DLLs
* Matroska DirectShow splitter
* Matroska DirectShow muxer
* DirectVobSub (vsfilter)
* Matrix Mixer
* SHOUTcast Source
* Morgan Multimedia Stream Switcher
* DivX Anti-Freeze

* GSpot Codec Information Appliance
* FourCC Changer
* Bitrate Calculator
What's New in This Release:
· Updated ffdshow to revision 3535
· Updated madFLAC to version 1.9
· Updated Haali Media Splitter to version 1.10.262.12
· Updated x264VFW to revision 1698