Total Commander 8.00 beta 6

Total Commander is a file manager for Windows similar to well-known DOS file manager.
Total Commander can handle archives as if they were subdirectories. It also has an internal ZIP-compatible packer. The search function allows you to search for files inside archives, even for text.
  • Two file windows side by side
  • Multiple language support
  • Enhanced search function
  • Compare files (now with editor) / synchronize directories
  • Quick View panel with bitmap display
  • ZIP, ARJ, LZH, RAR, UC2, TAR, GZ, CAB, ACE archive handling + plugins
  • Built-in FTP client with FXP (server to server) and HTTP proxy support
  • Parallel port link, multi-rename tool
  • Tabbed interface, regular expressions, history+favorites buttons
  • Thumbnails view, custom columns, enhanced search
  • Compare editor, cursor in lister, separate trees, logging, enhanced overwrite dialog, and more
Screenshot 1Screenshot 2Screenshot 3

Click Here For Download

Google Chrome 16.0.912.4 Beta

      One box for everything

Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

One box for everything

Type in the address bar and get suggestions for both search and web pages.

Thumbnails of your top sites

Access your favorite pages instantly with lightning speed from any new tab.

Incognito mode

Don't want pages you visit to show up in your web history? Choose incognito mode for private browsing.

Safe browsing

Google Chrome warns you if you're about to visit a suspected phishing, malware or otherwise unsafe website.

For information about alpha and developer builds, check out the Chrome dev channel here.

Screenshot 1Screenshot 2Screenshot 3

Click Here For Download

Java Runtime Environment 1.7.0.1

Java software allows you to run applications called "applets" that are written in the Java programming language. These applets allow you to have a much richer experience online than simply interacting with static HTML pages.
Java Plug-in technology, included as part of the Java 2 Runtime Environment, Standard Edition (JRE), establishes a connection between popular browsers and the Java platform. Java allows applications to be downloaded over a network and run within a guarded sandbox. Security restrictions are easily imposed on the sandbox.
Many cross platform applications also require Java to operate properly.

Click Here For Download  (32-bit)
Click Here For Download  (64-bit)







Phone hack logs keystrokes from nearby computers

If there is a smartphone resting somewhere close to your laptop straight away, it may well be logging everything you sort into your desktop keyboard and sending that data back to a hacker.

Students at Georgia Tech's college of Computing conducted a proof-of-concept hack to demonstrate how, by tapping into a smartphone's accelerometer, that measures the vibrations of the device, they were able to infer what a target was typing on a keyboard placed close to the phone with up to eighty % accuracy.

The team used an iPhone for his or her experiment, however constant attack is feasible using "any smartphone from the past 2 years with an accelerometer," Michael Terrazas, assistant director of communications for Georgia Tech's faculty of Computing told SecurityNewsDaily.

Watch for computer scan scam: Police ‎

If you receive a decision from somebody informing you that your laptop is not operating properly which a replacement product can improve its performance, decision the police.

The scam is proving profitable for these scammers and police are asking you to be vigilant.

Police in Prince George, BC, say that when a laptop owner permits access to their laptop remotely, "the fraudster states that he's doing a 'scan' and fixing or up grading the pc however he's really putting in 'spy ware' or alternative malicious software which will capture sensitive information like banking info, dates of birth, user names and passwords.

"At the conclusion of the decision, the scammer requests a mastercard variety and will even raise the victim to send payment via a wire transfer company. On checks with the bank a handful hours later, the fraudster had already tried to use for a mastercard with the knowledge he obtained from accessing the victim’s laptop," police said during a statement.

They say that the Canadian Anti-Fraud Centre has received over 350 similar fraud reports since the attacks started occurring in japanese Canada in February 2011, which mastercard transactions or wire transfers are created for up to $500 in every of those cases.

The crimes are exhausting to prevent since wire transfers cannot be traced or recovered by the police. And since the phonephone solicitors are from foreign countries, police say prosecution is unlikely.

3 computers seized in Jane Orie case

An ongoing investigation of alleged document-tampering within the ethics case against state Sen. Jane Orie advanced Friday, when state police seized 3 Senate pc laborious drives in Harrisburg that had been assigned to the politician.

Investigators believe the pcs might contain proof of tampering and data concerning whose computer ID was used to "facilitate the scanning and insertion of signatures, and/or the deletion of pc files," in step with a hunt warrant affidavit.

State police executed the search warrant on the Senate pc Services workplace at 8:45 a.m.

Confiscated were the laborious drives from a desktop pc that had been at the Republican lawmaker's district workplace in McCandless, a desktop pc from her Harrisburg workplace and a Senate-issued laptop.