Ulead Photo Explorer 8.5 Full

Ulead Photo Explorer 8.5 Full | 25MB

An all-in-one organizing solution for photos, music and videos!Spend more time enjoying photos, music and videos and less time finding them. Ulead® Photo Explorer 8.5 is the all-in-one solution for owners of digital cameras, camcorders, scanners or anyone who wants to make it easier to keep track of their media.You can browse and view your media lightning fast, describe, tag, rate, and search for photos instantly, use Calendar View to easily manage your photos, enhance photos and add creative effects, create slideshows with music, transitions & narration, edit video and save it in the most popular formats, and share photos by CD and DVD, print, e-mail, the Web.

• Organize & View
Easily collect and add images, video or music clips into a central album for easier access and photo management. Photo Explorer opens your photos using a fullscreen viewer so that you can see photos in full detail.
• Edit & Enhance
Repair common photo problems automatically using Auto Level, Adjust, Color and Contrast. Trim video clips to remove unwanted segments from videos or commercials from recorded TV shows.
• Share
Print full-sized images, image thumbnails, greeting cards and calendars in various sizes and layouts. Create slideshows that include photos, video, music, narration, captions and transition effects, and share them by CD and DVD, email, the Web and more.

Features:
• The Easy Access Window. Lets beginners easily use the key functions of Photo Explorer. It shows you how to quickly download your media files, how to edit and adjust photos and video, and how to share your media with family and friends.
• The Enhanced Digital Camera Wizard. Provides a simple and instant way to download media from digital cameras or memory cards.
• Scan Internet for Images. Enables you to easily download Web page images at one time and eliminates the tedious process of saving each image separately.
• Album Creation. Lets you easily collect and add images, video or music clips into a central album for easier access and photo managment.
• Album Calendar View. The fastest way to find and view your photos. Click on a selected date in the calendar and see all the pictures or video that you took on that date.
• EXIF 2.2 Support. Lets you view and modify the camera information embedded in your photos including date, time and shutter speed.
• Instant Viewer. Opens your photos using a fullscreen viewer so that you can see your photos in full detail.
• Rate Photos. Allows you to tag your photos with a rating, which makes them easier to search and find.
• Add descriptive text. The description can be used for printing, searching and Web page output.
• Browse, organize and work with Zip files. Zip and unzip files without the need for a separate Zip program.
• Auto-Fix Functions. Help users repair common photo problems automatically using Auto Level, Adjust, Color and Contrast. The auto commands can be applied to a single image or to multiple images at the same time with just one click.
• Lossless JPEG technology. Allows you to rotate and save photos without any loss of quality.
• Remove red eye effects. Give photos a more natural look.
• Apply a variety of special effects. Charcoal, emboss, mosaic, noise, oil paint, pinch, ripple, tile, colored pen, watercolor, whirlpool, or wind for artistic flourishes.
• Batch-enhance functionality. Lets users apply adjustments to a group of selected images at the same time.
• Trim video clips. Remove unwanted segments from videos or even commercials from recorded TV shows. Enhanced in this version is the ability to trim out multiple segments from a video at the same time.
• Print. Full-sized images, image thumbnails, greeting cards and calendars n various sizes and layouts.
• Publish. Thumbnail Web pages.
• Support. Epson PRINT Image Matching II for superior digital prints.
• Create slideshows. Include photos, video, music, voiceover narration, captions and transition effects.
• Burn slideshows. To CD for viewing on PCs or create Video CD's (VCD) for TV viewing.
• Export. Slideshows as Windows screen savers or publish slideshows to Web pages.
• Optimize. Send photos, video clips and self-extracting Web slideshows to e-mail recipients.

What's New:

Get Photos and Media
* The Easy Access Window: Lets beginners easily use the key functions of Photo Explorer. It shows you how to quickly download media files to your computer, how to edit and adjust pictures and video, and how to share their media with family and friends.
* Automatic Camera Detection: Helps you save more time by importing and saving your photos to your computer in one simple step. It can also take you to CD & DVD PictureShow 3 to create dynamic slideshows in the least amount of time.

View & Organize
* Create Albums: Enables you to collect images, video or music clips into a central album to more easily keep track of files. Customize these albums according to special occasions or show all folders at the same time.
* Album Calendar View: View photos by the date they were taken. Simply click on a selected date in the calendar and see all pictures from that date. The calendar also shows the total amount of photos or video according to the date.

Enhance
* Auto-Fix Functions: Repair common photo problems automatically using Auto Level, Adjust, Color and Contrast. The auto commands can be applied to a single image or to multiple images at the same time with just one click using the Batch command
* Trim Video Clips: Remove unwanted segments from videos or even commercials from recorded TV shows. Enhanced in this version is the ability to trim out multiple segments from a video at the same time.

Share
* Export Slideshows as a Video File: Another choice for sharing your slideshows with family and friends. Besides burning to disc, now you can export your slideshow as a video file. You can then send the video by email or even use the video file as part of a CD & DVD PictureShow 3 slideshow project.

DOWNLOAD LINK :
Download from Hotfile
Download from Uploading
Download from Rapidshare

Read More..

London Symphony Orchestra - Kashmir: Symphonic Led Zeppelin - 1997

MP3 320 Kbps CBR | Classical / Rock / Orchestral |165.77MB

Play List:
1. Dawn At The Great Pyramid
2. Kashmir
3. The Battle Of Evermore
4. Stairway To Heaven
5. When The Levee Breaks
6. Going To California
7. Friends
8. All My Love
9. Kulu Valley (Ambient Remix)

Download (Hotfile)
Hotfile
Download (RapidShare)
RapidShare

Read More..

Call Of Juarez (PC Game)

Call Of Juarez | 1.9 GB | RS & File-rack & Hotfile

Publisher: Ubisoft
Developer: Techland
Category: Action
Release Dates
N Amer - 06/05/2007
Fight your way through the Wild West, birthplace of the term “shooter,” in the only game to give you an authentic look into the Old West and all its glory, through the eyes of the hunter AND the hunted.
Description:
Fight your way through the Wild West, birthplace of the term “shooter,” in the only game to give you an authentic look into the Old West and all its glory, through the eyes of the hunter AND the hunted.
South Texas. 1882. Billy Candle has just turned 19 and he stands accused of murdering his mother and stepfather. Hot on his trail is Reverend Ray McCall, his stepfather’s brother and an infamous gunfighter who believes the Lord has chosen him to be Billy’s judge, jury and executioner. Call of Juarez is an epic western adventure about vengeance, survival and the search for a legendary lost treasure.
Features:
* Serious approach to the Wild West theme and detailed reconstruction of the character and visuals of that times.
* The use of physics and innovative simulation of fire, liquids, dust, smokes and gases to construct emergent gameplay.
* State of the art graphics making use of the top technology graphics cards features on todays cards.
* Playing 2 distinct characters with different abilities and different gameplay.
* Horseback riding and saddle shooting, gunfighter duels.
* Using the whip to fight, move objects and move the player’s character.
* Legendary weapons form the Gold Fever era and full akimbo mode for the hands on approach.
* Exhilarating storyline with full of twists and turns in this exciting Western Genre.

Hardware Requirements:
OS: Windows 2000, XP, XP64 CPU: P4 2.2Ghz / Athlon 2400+ (Celeron 2.4) or Higher Graphic Card : 128M DirectX9.0c compatible (nVidia: GeForce 6600 or higher, ATI: Radeo 9800 or higher) Ram : 512MB (1024MB recommended) Hard Drive : 2 GB free disk space DVD-Rom Drive: 2X Sound Card: Direct X 9 compatible Multiplayer: 56k modem for online play (broadband recommended)

Hotfile mirror (Free Download for All Countries)
http://hotfile.com/dl/7198288/073e871/CoJ_Softarchive.net.part01.rar.html
http://hotfile.com/dl/7196884/51bb86d/CoJ_Softarchive.net.part02.rar.html
http://hotfile.com/dl/7196902/1a1578a/CoJ_Softarchive.net.part03.rar.html
http://hotfile.com/dl/7196922/0d73875/CoJ_Softarchive.net.part04.rar.html
http://hotfile.com/dl/7196942/f754a67/CoJ_Softarchive.net.part05.rar.html
http://hotfile.com/dl/7196991/8d35f78/CoJ_Softarchive.net.part06.rar.html
http://hotfile.com/dl/7197021/e1f27cf/CoJ_Softarchive.net.part07.rar.html
http://hotfile.com/dl/7196876/725aa02/CoJ_Softarchive.net.part08.rar.html
http://hotfile.com/dl/7196901/9b7770b/CoJ_Softarchive.net.part09.rar.html
http://hotfile.com/dl/7196925/0975770/CoJ_Softarchive.net.part10.rar.html
http://hotfile.com/dl/7196944/223fb40/CoJ_Softarchive.net.part11.rar.html
http://hotfile.com/dl/7196984/36e403f/CoJ_Softarchive.net.part12.rar.html
http://hotfile.com/dl/7197013/1377932/CoJ_Softarchive.net.part13.rar.html
http://hotfile.com/dl/7197029/6eba8ac/CoJ_Softarchive.net.part14.rar.html
http://hotfile.com/dl/7196885/62c2632/CoJ_Softarchive.net.part15.rar.html
http://hotfile.com/dl/7196900/32e9de3/CoJ_Softarchive.net.part16.rar.html
http://hotfile.com/dl/7196914/628fd39/CoJ_Softarchive.net.part17.rar.html
http://hotfile.com/dl/7196940/a30640c/CoJ_Softarchive.net.part18.rar.html
http://hotfile.com/dl/7196968/2a09a16/CoJ_Softarchive.net.part19.rar.html
http://hotfile.com/dl/7197000/a95193e/CoJ_Softarchive.net.part20.rar.html
http://hotfile.com/dl/7197012/0ac2d82/CoJ_Softarchive.net.part21.rar.html

Read More..

K-Lite Mega Codec Pack 4.9.0

Windows Sofware | K-Lite Mega Codec Pack | 19.3 MB

The K-Lite Codec Pack is a collection of DirectShow filters, VFW/ACM codecs, and tools. Codecs and DirectShow filters are needed for encoding and decoding audio and video formats. The K-Lite Codec Pack is designed as a user-friendly solution for playing all your audio and movie files. With the K-Lite Codec Pack you should be able to play all the popular audio and video formats and even several less common formats.


Changelog 4.8.5 to 4.9.0 ~ 2009-06-11:
- Updated ffdshow to revision 2996
- Updated Cyberlink MPEG-2 decoder to version 8.4.0.330
- Updated Xvid to version 1.2.2
- Updated AC3Filter to version 1.61b
- Updated AC3File to version 0.6b
- Updated Gabest Matroska splitter to version 1.2.1160.0
- Updated Gabest MP4 splitter to version 1.2.1160.0
- Updated Gabest MPEG splitter to version 1.2.1160.0
- Updated Gabest Ogg splitter to version 1.2.1160.0
- Added DivX 3.11 codec. This is needed by WMP to be able to play certain old files. Other players do not need it.
- Updated MediaInfo Lite to version 0.7.16
- Added the ability to easily change the preferred splitter for TS/M2TS files
- Minor changes
Download (Uploading):
Uploading
Mirror (RapidShare)
RapidShare

Download (DepositFiles):
DepositFiles
Download (HotFile):
HotFile

Read More..

Card Mix

Card Mix 18.06.09
36 EPS files + JPEG Preview | 32,8 MB

download Link

Read More..

Sunless - Stars Falling (2009)

Play List:
01. Leama And Moor - Waiting (Gift Silent Storm Mix)
02. Solar Stone - Jabberwock (Chillout mix)
03. Accadia - Blind Visions
04. Liquid State - Falling (Solarstone After Hours Mix)
05. Leama - Requiem For A Dream (Leama Ambient Mix)
06. Enigma - Sleep (Solarstones Afterhours Mix)
07. Lio - Rapture (Soulside Mix)
08. Sunless - Autumn Life
09. Armin Van Buuren - Burned With Desire
10. Chicane - Offshore (Ambient mix)
11. Libra - Calling Your Name (Solar Stone Chillout Ver)

Download (Hotfile)
Hotfile
Download (RapidShare)
RapidShare

Read More..

Coming to terms with cyber warfare

Tallinn, ESTONIA — Given the number of times that the terms "cyber war" and "cyber warfare" show up in the media, one would think that policymakers have settled on a working definition.

Yet, defining cyber warfare is a hard problem, military and computer-security experts told attendees at the Cooperative Cyber Defence Center of Excellence (CCD COE) Conference on Cyber Warfare. Under one lexicon, current attacks affecting the Internet are either reflection attacks, so named because the conflict mirrors a conflict in the real world, or espionage, said Mikko Hyppönen, chief research officer for antivirus firm F-Secure. True cyber warfare is rare, he said.

"The vast amount of practical work being done in data security is not fighting cyber warfare, but fighting cybercrime," Hyppönen said. "When we go to cyber warfare, the definition of what we are talking about gets really muddled."

Even after the attacks on networks of former Soviet states of Estonia and Georgia in 2007 and 2008, respectively, policymakers and technologists still disagree over the degree to which such incidents constitute cyber warfare. Earlier this year, one security researcher labeled the incidents little more than Internet censorship.

Yet, the Estonian government feels differently. Paraphrasing Prussian military philosopher Carl von Clausewitz, Johannes Kert, an advisor to the Minister of Defence for Estonia, said that the political motivations are what matter.

"It's the continuation of 'politics by other means,'" Kert said. "The traditional mindset is that only hooligans and criminals are using Internet attacks. But we see the last couple of years, especially in Eastern Europe, massive cyber attacks whose motivation is political."

Still, another expert stressed that true cyber warfare should not be defined by the means — that the attack took place in cyberspace — but the ends. Amit Sharma, deputy director and scientist at the Ministry of Defence in India, argued that cyber warfare needs to have a doctrine similar to nuclear deterrence.

"More people are putting the emphasis on the means," said Sharma, who is currently pursuing research at the United Kingdom's Defence Academy. "But (the question is) do they have the means to create a strategic paralytic effect (as the end result)?"

It's no wonder, then, that the CCD COE intends to create a lexicon of definitions as quickly as possible, according to Kenneth Geers, a scientist with the group and the conference organizer.

"These definition and concepts are amazingly challenging in cyberspace," Geers said. "And they are going to require very focused attention."

Read More..

MSFT, Adobe and Apple patch together

Three major software companies issued updates this week, with Microsoft fixing 31 vulnerabilities in its operating system and applications, Adobe patching more than a dozen issues in its document reader software, and Apple closing over 50 serious security holes in its Safari browser.

With ten patches, Microsoft fixed more than two dozen flaws, including ten vulnerabilities voided by a trio of patches. The flaws are rated Critical by Microsoft only for Office 2000 and rated Important for other versions of the productivity program. Perhaps the most serious vulnerabilities fixed by the software giant are seven security issues in the company's flagship browser, Internet Explorer 8, said Andrew Storms, director of security operations for network protection firm nCircle.

"Topping this month's moderately large release cycle from Microsoft is the critical IE update that affects even Microsoft's latest and most secure browser, IE 8," Storms said in a statement sent to SecurityFocus. "Client side, browser based vulnerabilities continue to top the charts for threats, so every user should put this patch at the top of their 'install immediately' list."

In its first quarterly patch, Adobe shuttered 13 security holes in Adobe Acrobat and Reader. The quarterly patch, which Adobe announced last month, is scheduled to fall on the same day as Microsoft's Patch Tuesday. Some of the flaws could allow an attacker to run code on the vulnerable system, while others appear to only be denial-of-service issues.

Adobe still needs to work out the kinks in its quarterly patch process, Storms said.

"While the scheduled release cycle for Adobe updates is a big improvement in helping enterprise security teams effectively manage resources, today's security bulletins are still missing information," Storms said in a statement. "Security managers need Adobe to step up and provide mitigation steps and more detail on both the bugs and the patches."

Apple rounded out the patch parade with an update, released on Monday, that fixed more than 50 flaws in its latest browser, Safari 4.

Read More..

Data shows Grumblar still threatens

The drive-by-download threat, Grumblar, continues to cause widespread infection, through the number of Web sites compromised with the malicious code appears to have declined since late May, according to Web security firm Websense.

The multi-stage threat, which first compromises Web sites to install malicious code that is then used to infect visitors' PCs, rocketed eight-fold in mid-May, according to an update posted to Websense's research blog on Friday. Attackers use stolen FTP credentials to embed the first stage of the attack on legitimate Web sites.

Gary Warner, a professor of digital forensics at the University of Alabama, document an investigation he and his students performed on a compromised Facebook group. The group, which boasted 40,000 members, contained a link to a malicious site that attempted to infect visitors with Grumblar.

"Their (site's transfer) logs indicated that the malicious content was uploaded to their server by a visitor from the Ukraine, who had logged in using their webmaster's correct userid and password," wrote Warner. "It wasn't a poorly chosen password, and it wasn't brute forced. They logged in successfully on the first try, indicating that their webmaster probably had a keylogger running on his home computer. In other words, the webmaster's FTP password was known to the criminals."

The attacks, dubbed "Grumblar" for the name of the site in China to which visitors were originally redirected, was first detected in March, spiked in mid-May, and has since declined.

A malicious PDF file uploaded to victim's systems by Grumblar contains the phrase, "Boris likes horilka," according to Warner's blog. Horilka is the Ukrainian word for vodka. The software steals FTP credentials, sends spam, installs fake antivirus software, hijacks Google search queries, and disables security software.

Read More..

Tips Menghentikan Proses Dari DOS Prompt

Untuk menghentikan proses (aplikasi dan service) yang sedang berjalan pada Windows saya yakin Anda sering melakukannya dari Windows Task Manager.

Selain cara tersebut, ada cara lain yang dapat Anda lakukan yaitu dengan melalui DOS Prompt. Caranya adalah sebagai berikut:

  1. Masuk ke dos prompt dengan mengetikkan cmd dari menu Start - Run.
  2. Tulis tasklist dan tekan enter, maka akan tampil daftar proses yang sedang berjalan seperti gambar di bawah ini:
  3. Cari nama proses yang ingin Anda stop, lalu cari nomer PID-nya.
  4. Misalnya Anda ingin menghentikan program Firefox, maka tulis: tskill 1844, lalu tekan enter.
  5. Selesai

Read More..

Backup dan Restore Driver Dengan Double Driver

Double Driver adalah software gratis yang dapat Anda gunakan untuk backup dan restore driver pada komputer Anda. Backup driver sangat berguna jika suatu saat Anda perlu menginstall ulang Windows dan mungkin Anda tidak mempunyai CD drivernya.

Untuk menggunakan Double Driver caranya cukup mudah. Setelah Anda menjalankan Double Driver, klik tombol Scan. Pada proses ini Double Driver akan membuat daftar driver apa saja yang terinstall pada komputer Anda. Setelah proses scan selesai Anda bisa melakukan backup dengan mengklik tombol Backup.

Pada jendela Backup Driver ada beberapa pilihan:

  • Destination, folder tempat Anda akan menyimpan file backup
  • Drivers, pilihan untuk membackup semua driver atau hanya membackup driver yang dipilih aja.
  • Output, file backup dalam bentuk folder, folder yang di-compress atau dalam bentuk file self extract

Download Double Driver

Read More..

Mengendalikan Proses Rakus CPU di Linux

Kalau kita memakai laptop yang memiliki CPU multi core, lalu ada proses yang menghabiskan CPU, ada cara agar suhu CPU kita tidak melejit: memaksa CPU bekerja pada clock yang lebih rendah. Tapi bagaimana agar proses lain yang kadang perlu CPU bekerja secepat mungkin tidak ikut direm? Kita bisa gunakan kombinasi schedtool dan cpufrequtils.

# proses dipaksa hanya berjalan di CPU1, -a 0x1 untuk memaksa ke CPU0
$ sudo schedtool -a 0x2 PID_proses_rakus
# atur governor clock CPU1 ke userspace
$ sudo cpufreq-set -c 1 -g userspace
# paksa clock CPU1 maks 1.2GHz
$ sudo cpufreq-set -c 1 -u 1.2g

sumber : andika-lives-here.blogspot.com

Read More..

Continuing Broken rsync

$ ls -lah|grep nanggar
-rwxrwxrwx 1 root root 675M 2009-05-04 02:20 nanggar-alternate-i386.iso
-rwxrwxrwx 1 root root 675M 2009-05-04 03:26 nanggar-cdlive-i386.iso
-rwxrwxrwx 1 root root 334M 2009-05-20 18:22 .nanggar-cdlive-i386.iso.ThN6oe

$ dd if=nanggar-cdlive-i386.iso of=2nd-part bs=1M skip=334
$ mv nanggar-cdlive-i386.iso nanggar-cdlive-i386.iso.prev
$ mv .nanggar-cdlive-i386.iso.ThN6oe nanggar-cdlive-i386.iso
$ cat 2nd-part >> nanggar-cdlive-i386.iso
$ rsync -avP cdimage.blankonlinux.or.id::cdimage/livecd-harian/current/nanggar-cdlive-i386.iso .
Why does it matter? Because we still need old, same parts from previous iso to prevent rsync redownload them again. But how to force rsync to know that old part was already downloaded? By putting them into the same iso of course.

Old iso consists of two parts: O1 and O2. New iso consists of two parts: N1 and N2. N1 has been downloaded into dotfile, while N2 is to be checked against O2, and we only need N2 vs O2 difference. So we need to create temporary iso, which consists of N1 (=dotfile) and O2, to enable rsync delta algorithm.

source: andika-lives-here.blogspot.com

Read More..

Ternyata Kadang Masih Perlu Image Floppy

Untuk membuat berkas image floppy berukuran 1.44MB:

$ mkfs.msdos -C floppy0.img 1440
Lalu agar bisa diisi, di-mount loopback saja:
sudo mount -o loop,uid=1000 floppy0.img /mnt/floppy
Baru salin-salin berkas:
$ cp /path/to/source/file /mnt/floppy
Jangan lupa dilepas kaitnya sebelum dipakai:
$ sudo umount /mnt/floppy
Daftarkan di VirtualBox:
$ VBoxManage openmedium floppy floppy0.img

Sumber:
Create mount and copy floppy disks images under linux

Read More..

Cogniview PDF2XL Enterprise 4.4.24.185


Cogniview PDF2XL Enterprise is designed to handle the conversion of data from PDF to Excel, from scanned PDFs to Excel or from any other application, screen or report to Excel. Whether your data is found in a native PDF, scanned PDF or in any enterprise application, PDF2XL Enterprise will instantly extract your data to Excel. PDF2XL Enterprise is designed for Excel users and is very easy to operate. If you know how to define a table in Excel you can get the data from your PDF documents, reports and screens into neatly formatted Excel sheets. PDF2XL combines the strengths of the IRIS professional OCR technology with PDF2XL's data conversion capabilities.


PDF2XL Enterprise will convert data from any application, screen or report into Excel. If you work with applications that do not easily lend its data to excel, just print the report or screen and PDF2XL Enterprise will extract your data into Excel.

PDF to XLS conversion feature summary:
• Opens and displays PDF file
• Allows to define the PDF to XLS conversion layout
• Shows a preview of the PDF to XLS conversion
• Allows to convert PDF to XLS file
• Allows to convert PDF to Excel application
• Allows to determine format of exported data
• Allows multiple page conversions of PDF to XLS
download here

Read More..