Saturday, September 26, 2009

How To Ghost Mode In Yahaven



How To Ghost Mode In Yahaven

Before you use this mode Yahaven Ghost ... you should have 2 Yahoo Id. If you do not have 2 yahoo id you can start by going here or you can using Yahoo Id maker like:

* Id Maker By Paan
* Id Maker By MrGokuDo
* Y-333 Id Maker By V1p
* Id Creator By Luis
* Id Maker By Terror Ownz
* Tool Id Account
* Yahoo Tools By Mogera
* Archive Id Creator

If you already have 2 yahoo id, you only can activate this mode Ghost.

The Chat Shield blocks all packets (makes you unbootable) and allows you to send chat text only, you wont see anyone else typing in the room or users entering and leaving, so you will need a second ID in the room to see posts, this is what we use Ghost Mode for...

Here's the Ghost Mode Login Window, this will appear when the Chat Shield is enabled (by clicking the Shield Icon on the toolbar, typing '/shield' into the chatroom, or allowing the Automatic Antiboot to activate the Shield upon detection of boot codes).


Enter a username and password and click 'Login', this ID will
then login (Invisible) and enter the current room you are in and start receiving the chat packets: room text, users joining/leaving (After you verify with captcha).

If you want it to automatically login when you enable the Chat Shield, check 'Enable Automatically' before you click login.
Here's the Ghost Mode Icon on the Chatroom Toolbar.


Enter a username and password and click 'Login', this ID will
then login (Invisible) and enter the current room you are in and start receiving the chat packets: room text, users joining/leaving (After you verify with captcha).

If you want it to automatically login when you enable the Chat Shield, check 'Enable Automatically' before you click login.
Here's the Ghost Mode Icon on the Chatroom Toolbar.

Thursday, September 24, 2009

New PRTG Network Monitor

New PRTG Network Monitor

Website: www.paessler.com

Network Monitoring Made Easy
PRTG Network Monitor is the powerful network monitoring solution from Paessler AG. It ensures the availability of network components while also measuring traffic and usage. It saves costs by avoiding outages, optimizing connections, saving time and controlling service level agreements (SLAs).

Optimize Your Network and Avoid System Downtimes
Businesses increasingly rely on their networks to move data, provide communication, and enable basic operations. Performance loss or system outages can seriously impact the bottom line of your business. Continuous network and server monitoring enables you to find problems and resolve them before they become a serious threat to your business:

- Avoid bandwidth and server performance bottlenecks
- Deliver better quality of service to your users by being proactive
- Reduce costs by buying bandwidth and hardware based on actual load
- Increase profits by avoiding losses caused by undetected system failures
- Find peace of mind: As long as you do not hear from PRTG via email, SMS, pager, etc. you know everything is running fine and you have more time to take care of other important business

Your Entire Network at a Glance

PRTG Network Monitor covers all aspects of network monitoring: up-/downtime monitoring, traffic and usage monitoring, SNMP, NetFlow, packet sniffing and many more, combined with concise reporting and analysis features – one clear and simple solution for your entire network.

Bandwidth and Network Usage Monitoring

PRTG Network Monitor runs 24/7 on a Windows-based machine within your network, recording network usage parameters. Recorded data is stored in a database for historic reports.

The easy to use web-based user interface allows to configure the devices and sensors that you want to monitor. You can create usage reports and provide colleagues and customers access to graphs and tables.

All common methods for network usage data acquisition are supported:

SNMP and WMI

WMI (Windows Management Instrumentation) and SNMP (Simple Network Management Protocol) are used to gather bandwidth usage and performance data for all systems within your network, including port-by-port usage data for switches and routers.

Packet Sniffing

With its integrated packet sniffing capability PRTG can inspect all network data packets travelling in your LAN or WLAN to calculate the bandwidth usage.

NetFlow

The NetFlow protocol is supported by most Cisco routers to measure bandwidth usage. It is the most powerful monitoring method, suitable for high traffic networks.

Get PRTG Network Monitor>>>

New ClamWin Free Antivirus 0.95.2



Source: www.clamwin.com

ClamWin is a Free Antivirus program for Microsoft Windows 98/Me/2000/XP/2003 and Vista.

ClamWin Free Antivirus comes with an easy installer and open source code. You may download and use it absolutely free of charge. It features:

- High detection rates for viruses and spyware;
- Scanning Scheduler;
- Automatic downloads of regularly updated Virus Database.
- Standalone virus scanner and right-click menu integration to Microsoft Windows Explorer;
- Addin to Microsoft Outlook to remove virus-infected attachments automatically.

The latest version of Clamwin Free Antivirus is 0.95.2
Please note that ClamWin Free Antivirus does not include an on-access real-time scanner. You need to manually scan a file in order to detect a virus or spyware.

ClamWin Free Antivirus is based on ClamAV engine and uses GNU General Public License by the Free Software Foundation, and is free (as in freedom) software.

Download ClamWin Free Antivirus 0.95.2.

New Zip Password Tool


New Zip Password Tool

Website: http://www.zip-password-cracker.com/

Zip Password Tool is an easy and effective utility, designed to recover lost or forgotten passwords for encrypted ZIP archives created using WinZip, PKZip or any other ZIP-compatible software..

Features:

- Accept Zip-archives created using WinZip, PKZip, WinRAR or any other ZIP-compatible software
- Self-extracting Zip-archives (SFX) are also accepted
- Supported Zip archives encryped using following methods: (Standard Zip 2.0 encryption, 128-, 196- and 256-bit AES encryption)
- Supported following password search methods: (Brute-force attack, Dictionary based attack)
- Custom charset support for Brute-force attack (special characters and national symbols are also supported)
- Additional case changes for dictionary passwords
- Assignment of Min and Max password length
- Password recovery progress bar
- Convenient user interface
- Full install/uninstall support

Get Trial Zip Password Tool >>>

New NTFS Data Recovery Software

New NTFS Data Recovery Software

Website: http://www.smart-accountant.com/

NTFS Data Recovery Software is the wide ranging data retrieval utility which recovers all accidentally deleted, erased or missing files and folders from NTFS or NTFS5 file system based hard disk drive. Best file revival software revives previously existing files from reformatted or corrupted NTFS disk partition volume and even restores lost data due to virus attack, system fault, corrupt boot directory entries or other windows data loss reasons.

Easiest data restoration tool shows recovered files in tree structure format by scanning the entire hard disk drive with standard or advanced search and allows you to restore entire or selected recovered data in its original form. Disk partition recovery tool gets back your lost data from all type of disk drives such as ATA, SATA, IDE, EIDE and SCSI devices in all major data storage capacities. Recovery software utility provides user friendly interface and does not require any special skill to operate.

NTFS Data Recovery Software works when data lost due to the following reasons:

- Accidental deletion
- Disk drive failure
- Improper usage
- System malfunctioning
- Computer virus
- Corrupted boot directory entries
- Formatted or corrupted disk
- Power failure and so on

Software Characteristics

- Restore lost data after the hard disk failure.
- Rescue missing files due to virus attack, corrupt MBR, formatted disk, malicious software and other data loss reasons.
- Quickly recover previously existing data after reformatted disk.
- Full support for localized and long file names.
- Support NTFS and NTFS5 file system.
- Optimize disk scanning performance by Standard Search or Advance Search.
- Support all type of hard disk drives such as ATA, SATA, IDE and SCSI etc.
- Facilitate with systematic user guide.
- Cost effective and user friendly interface.

System Requirements
NTFS Data Recovery Software requires minimum system requirements for proper software functioning.

Operating System:
- Windows 98, Windows 2000, Windows Server 2003, Windows Vista
- Windows NT Server, Windows NT Workstation
- Windows XP (Professional Edition, Home Edition, Tablet PC Edition, Media Center Edition)

Processor:
- Pentium or equivalent processor( Memory Space: 128 MB RAM recommended,20 MB free hard disk space)

Get Trial NTFS Data Recovery Software >>>

Gili Privacy Protector 3.2

Gili Privacy Protector 3.2

Website: http://www.gilisoft.com/

Gili Privacy Protector is a powerful and reliable privacy protection software designed for individual users. It effectively prevents most illegal operations performed by hackers or malicious software such as viruses, trojans and spyware, that may damage or steal the data from your computer. The smart Gili Privacy Protector can safely clean up all traces of your computer activity. It will let you completely remove sensitive data from your hard drive by overwriting it several times.

Gili Privacy Protector allows users to use six ways to protect personal privacy.

- Hide Data : Gili Privacy Protector can hide your private files folders and drives, to make them completely invisible to users and programs.
- Lock Data : The locked files/folders/drives are protected from accessing, users can not open, read, modify, move, delete, copy, rename the protected files/folders without password. Files and sub-folders in a locked folder are also protected.
- Private Disk : Private Disk gives you a secure space for all your work.
- Safe Delete : Gili Privacy Protector allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.No one can recover deleted data from your disk if you secure delete it.
- Erase History : Gili Privacy Protector can safely clean up all traces of your computer activity.
- Password Protected: Gili Privacy Protector is a password-locked software,that is to say,there’s no other way to run or unstall it if you have not the password.

Get Trial Gili Privacy Protector 3.2 >>>

KeePass Password Safe 2.09

KeePass Password Safe 2.09

Website: http://keepass.info/

Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your homepage’s ftp password, online passwords, etc. etc. etc. The list is endless. Also, you should use different passwords for each account. Because if you use only one password everywhere and someone gets this password you have a problem… A serious problem. The thief would have access to your e-mail account, homepage, etc. Unimaginable.

KeePass is a free/open-source password safe or manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key-disk. So you only have to remember one single master password or insert the key-disk to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish). For more information, see the features page.

Some of the key-features of KeePass:

-Highly encrypted databases
-Support of master passwords and key-disks
-Runs on all Windows operating systems and doesn’t need to be installed
-Export password list to TXT, HTML, XML or CSV files
-Import from CSV, CodeWallet(Pro) TXT and Password Safe v2 TXT files
-Easy database transfer
-Support of password groups
-Time fields support
-Auto-Type, global auto-type hot-key and drag-n-drop support
-Fast copy fields to the Windows clipboard
-Searching and sorting
-Multi-language translation support
-Strong random password generator
-Low memory requirement

System requirements: Windows 95 / 98 / 98SE / ME / NT / 2000 / XP / 2003.