Search

Custom Search

Click Here

Thursday, June 26, 2008

Software Download

Software Downloads

Multimedia
http://www.getnidok idos.com/ category/ software/ multimedia


Cole2k Media Codec Pack Advanced 7.1
http://www.getnidok idos.com/ software/ cole2k-media- codec-pack- advanced- 71/103/

License: FreeRequirements: Windows 2000/XP/2003 Server/VistaLimitations: No limitationsThe Cole2k Media Advanced Codec Pack features a collection of codecs and filters for encoding/decoding a large variety of video/audio formats. Support for formats includes DivX 6.8.2 Pro, DivX Media, XviD, 3ivx, MP4, h.264, x264, AVC, Nero Digital, MPEG-2, AC3, DTS, AAC, APE, FLAC, MPC, OFR, TTA, OGG, Vorbis, WavPack, MP3, and ATRAC3 + many more. Support for container files includes MP4, MKV, OGM. Version 7.1 adds updated DivX, ffdshow, and Haali.

Note: The DivX 6.8.2 Pro encoder has a trial period limited to 15 days, after the trial period the encoder will switch to standard mode (completely optional).

http://www.getnidok idos.com/ software/ multimedia/ xilisoft- video-converter- 31530530b/ 358/

Xilisoft Video Converter is a powerful video conversion tool.
Xilisoft Video Converter can convert video files between various formats including DVD, MPEG-1/2/4, VCD, AVI, SVCD, MOV, RM, WMV, 3GP etc.
In addition, the software provides a power way to convert video formats to all popular audio formats, including MP2, MP3, AC3, RA, M4A, etc. supports multithreading, you can convert some files at the same time, all conversion processes are very easy and fast.
When converting files, you can pause, stop and continue at any moment. You can select the default setup or you yourself select the video and audio codec, setup the parameters of output.
Here are some key features of “Xilisoft

Video Converter”:

· Xilisoft Video Converter supports h264 format encoding/decoding, APE and CUE decoding, audio CD ripping, and a wizard was added etc.· It supports converting to iPod and PSP.· It supports PSP MPEG4 AVC encoding/decoding.· All properties and settings are displayed in the interface. Users can see the file properties and settings without opening another window. All settings can be easily set in the interface or keep them default.· All encoders/codecs are built-in. The software integrates with all video/audio encoders/codecs. Users can convert all supported formats once download the program.· Xilisoft Video Converter supports multi-language, such as English, Chinese, and Japanese. You can choose what language you like when using it.· It supports batch conversion. You can select all files you want to convert and Xilisoft Video Converter will automatically encode them one by one even if these files use different settings.· It Supports preview. Users can choose to preview the input files before conversion.· It can convert any clip or segment. You can convert any clip or segment by setting the start point and duration at will.
Requirements:
· Intel Pentium II 350MHz or above, or any Athlon· 64 MB RAM or above

click on the here to go to download page

Excel Calendar

Excel Calendar Template 1.4


http://www.nidokidos.org/excel-calendar-template-1-4-t17407.html

License:Free # Downloads: 1,030,856 # Requirements: Windows 95/98/Me/NT/2000/XP, Microsoft Excel # Limitations: No limitations This free Excel calendar template allows you to quickly and easily create and print a monthly calendar by simply choosing a year and month. You can also choose a color scheme for your calendar using simple form controls. Use the ready-made 2007, 2008, 2009, and 2010 calendar workbooks for adding events and holidays, planning, printing, and scheduling. Version 1.4 features new and improved calendar format, mini-calendars, and a Monday-first option; includes ready-made 12-month calendar workbooks for 2007, 2008, and 2009.

click on the here to go to download page

http://www.nidokidos.org/excel-calendar-template-1-4-t17407.html

Beware of Ctrl+C

Beware of Ctrl+C

Ctrl+C may be the most important work we do everyday. But it's not a very safe thing to do. Read on to know why. What happens when you press Ctrl+C while you are Online... We do copy various data by Ctrl + C for pasting elsewhere.

This copied data is stored in clipboard and is accessible from the net by a combination of java-scripts and ASP.

Just try this:
1) Copy any text by Ctrl + C
2) Click the Link: http://www.sourceco desworld. com/special/ clipboard. asp
3) You will see the text you copied was accessed by this web page.

Do not keep sensitive data (like passwords, credit card numbers, PIN etc.) in the clipboard while surfing the web. It is extremely easy to extract the text stored in the clipboard to steal your sensitive information.

Friday, June 20, 2008

Thursday, June 12, 2008

Wireless networking

Wireless networking
Wireless networks are based on the IEEE 802.11 standards. A basic wireless network consists of multiple stations communicating with radios that broadcast in either the 2.4GHz or 5GHz band (though this varies according to the locale and is also changing to enable communication in the 2.3Ghz and 4.9Ghz ranges).
802.11 networks are organized in two ways: in a BSS one station acts as a master with all the other stations associating to it; this is termed infrastructure mode and the master station is termed an access point (AP). In BSS mode all communication passes through the AP; even when one station wants to communicate with another wireless station messages must go through the AP. In the second form of network there is no master and stations communicate directly. This form of network is termed an IBSS and is commonly know as an adhoc network.
802.11 networks were first created in the 2.4GHz band using protocols defined by the IEEE 802.11b standard. These specifications include the operating frequencies, MAC layer characteristics including framing and transmission rates (communication can be done at various rates). Later the 802.11a standard defined operation in the 5GHz band, including different signalling mechanisms and higher transmission rates. Still later the 802.11g standard was defined to enable use of 802.11a signalling and transmission mechanisms in the 2.4GHz band in such a way as to be backwards compatible with 802.11b networks.

Separate from the underlying transmission techniques 802.11 networks have a variety of security mechanisms. The original 802.11 specifications defined a simple security protocol called WEP. This protocol uses a fixed pre-shared key and the RC4 cryptographic cipher to encode data transmitted on a network. Stations must all agree on the identity of the fixed key in order to communmicate. This scheme was shown to be easily broken and is now rarely used except to discourage transient users from joining networks. Current security practice is given by the IEEE 802.11i specification which defines new cryptographic ciphers and an additional protocol to authenticate stations to an access point and exchange keys for doing data communication. Further, cryptographic keys are periodically refreshed and there are mechanisms for detecting intrusion attempts (and for countering intrusion attempts). Another security protocol specification commonly used in wireless networks is termed WPA. This was a precursor to 802.11i defined by an industry group as an interim measure while waiting for 802.11i to be ratified. WPA specifies a subset of the requirements found in 802.11i and is designed for implementation on legacy hardware. Specifically WPA defines the TKIP protocol that is derived from the original WEP protocol. 802.11i permits use of TKIP but most stations will instead use the AES cipher for encrypting data; a cipher that is too computationally costly to be implemented on legacy hardware.
Other than the above protocol standards the other important standard to be aware of is 802.11e. This defines protocols for deploying multi-media applications such as streaming video and voice over IP (VoIP) in an 802.11 network. Like 802.11i, 802.11e also has a precursor specification termed WME (and now WMM) that has been defined by an industry group as a subset of 802.11e that can be implemented now to enable multi-media applications while waiting for the final ratification of 802.11e. The most important thing to understand about 802.11e and WME/WMM is that it enables prioritized traffic use of a wireless network through Quality of Service (QoS) protocols and enhanced media access protocols. Proper implementation of these protocols enable high speed bursting of data and prioritized traffic flow.
FreeBSD 6.0 supports networks that operate using 802.11a, 80.211b, and 802.11g. The WPA and 802.11i security protocols are likewise supported (in conjunction with any of 11a, 11b, and 11g) and QoS and traffic prioritization required by the WME/WMM protocols are supported for a limited set of wireless devices.
Basic setup
To use wireless networking you need a wireless networking card and to configure the kernel with the appropriate wireless networking support. The latter is separated into multiple modules so that you need only configure the software you are actually going to use.
The first thing you need is a wireless device. The most commonly used devices are those that use parts made by Atheros. These devices are supported by the ath driver and require the following modules:
device ath # Atheros IEEE 802.11 wireless network driver
device ath_hal # Atheros Hardware Access Layer
device ath_rate_sample # John Bicket's SampleRate control algorithm.
The Atheros driver is split up into three separate pieces: the driver proper (ath), the hardware support layer that handles chip-specific functions (ath_hal), and an algorithm for selecting which of several possible rates for transmitting frames (ath_rate_sample here). If instead of an Atheros device you had another device you would select the module for that device; e.g.
device wi

for devices based on the Intersil Prism parts.
With a device driver configured you need to also bring in the 802.11 networking support required by the driver. For the ath driver this is at least the wlan module:
device wlan # 802.11 support (Required)
Past this you will need the modules that implement cryptographic suport for the security protocols you intend to use. These are intended to be dynanmically loaded on demand by the wlan module but for now they must be statically configured. The following modules are available:
device wlan_wep # WEP crypto support for 802.11 devices
device wlan_ccmp # AES-CCMP crypto support for 802.11 devices
device wlan_tkip # TKIP and Michael crypto support for 802.11 devices
wlan_ccmp and wlan_tkip are only needed if you intend to use the WPA and/or 802.11i security protocols. If your network is to run totally open (i.e. with no encryption) then you don't even need the wlan_wep support.
Aside from the above modules there are two other modules that are needed only if you intend to operate an access point (AP) and plan to enable WPA/802.11i/802.1x. The wlan_xauth module is used to construct an authenticator based on the hostapd program; it delegates authentication requests for stations associating to an access point to an external agent (hostapd in this case). The wlan_acl module implements an access control mechanism whereby an AP can restrict the stations that associate based on their MAC address. Like WEP this is provided to discourage casual users from joining a network; in practice it provides little true security to a wireless network. In summary you might add one or both of the following to your configuration if you plan to build an access point:
device wlan_xauth # External authenticator support for 802.11 devices
device wlan_acl # MAC-based ACL support for 802.11 devices
With this information in the kernel configuration file, recompile the kernel and reboot your FreeBSD box (or load the modules using kldload in which case there is no need to reboot).

Bluetooth Technology

Bluetooth Technology

"Automatic communication between various devices within a small area in a house or an office makes it possible to provide unique and innovative services to a professional worker or a small group of workers using portable devices. Bluetooth technology has this potential and is coming along fast and quick. It will replace clumsy wires, make information transfer automatic without synchronization cradles and introduce many new applications. Technology visionaries hope that it will do what infra red could not do over the past six years." - Editor


In an attempt to standardize data transfer and synchronization between disparate mobile devices in the short-distance range, Intel and Microsoft established in 1998 a major industry consortium that included IBM, Toshiba, Ericsson, Nokia, and Puma Technology. Code-named Blue Tooth for the 10th century Danish king who unified Denmark, the companies have created a single synchronization protocol to address end-user problems arising from the proliferation of various mobile devices -- including smart phones, smart pagers, PDAs, handheld PCs, copiers, printers, notebooks, and many future digital appliances at home -- that need to keep data consistent from one device to another. The proposed Bluetooth solutions (hardware and software-based) would automatically synchronize mobile devices when end-users enter their offices or home. Intel and others are designing the sending and receiving radio frequency chip sets. Price point for hardware is in $5-20 range eventually.
Since the start of this initiative in 1998, interest in Bluetooth has grown tremendously - signified by 1800 members of Bluetooth consortium by mid 2000.
While Bluetooth consortium demonstrated prototype products in the 1999-2000, there are no production-quality enduser products using blue tooth technology as of now, as far as we know. Component products (radios and chips) that can be integrated into finished products have started becoming available from Ericsson and others. However, here is an opportunity for more start-up companies. irDA is a competing technology and has been implemented in many products for over 6-7 years now but BlueTooth has a few distinct advantages - with Ericsson/Microsoft/Intel team behind it. In our opinion, there are relative benefits with several competing technologies - there is some overlap too. Let competitive products thrive so that we the users get the best solutions.

What is Bluetooth?

"Think of a connected world of electronic devices and appliances around you! You click on an icon for a device and you are linked to it, automatically and transparently"
Bluetooth technology eliminates the need for numerous and inconvenient cable attachments for connecting fixed computers, mobile phones, mobile computers, handheld devices, digital cameras and even new breed of digital appliances. It will enable users to connect a wide range of computing and telecommunications devices easily and simply, without the need to buy, carry, or connect cables - quite often proprietary to a specific device. It delivers opportunities for rapid ad hoc connections, and the possibility of automatic, unconscious, connections between devices. It creates the possibility of using mobile data in a variety of applications.
Bluetooth makes wireless communication and networking between devices in a small localized area of a room or a small office as easy as switching on the light. In Bluetooth all the connections between devices are instantaneous and invisible and the devices can talk even if they are not in line of sight because Bluetooth utilizes a radio-based link. Your laptop could send information to a printer in the next room, or your microwave could send a message to your mobile phone telling you that your meal is ready.
Bluetooth is actually a standard for wireless communications between devices in a personal area network (PAN) using radio frequency for a short range (around 10 meters). So any two devices that follow the standard can communicate and exchange data between each other without the need of any connection to be made between them. A group of Bluetooth devices like a mobile phone, a digital camera, a hand held device etc. can instantly form a network with each other as soon as they are switched on. You could have a mobile phone in your pocket and you could be sending e-mails using your laptop without making any connection between your laptop and the mobile. Your refrigerator could be placing an order with the supermarket if your milk supply has been exhausted using your mobile phone.
Briefly, Bluetooth technology

uses radio waves in 2.4 GHz band - therefore, no line of sight is required
supports multipoint, not just point to point
works in a small confined area - 10 to 15 meters apart
is able to support speeds of 1-2 Mbps today but will offer higher speeds in future
chip sets are relatively inexpensive (though more expensive than IrDA)- $10 to $20 today in large quantities - will go down in future
has significant industry support with over 1800 members in the industry consortium

How Bluetooth Technology Works

"Connective convenience"

Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment together with little or no work by the user. Unlike infra-red, Bluetooth does not require line-of-sight positioning of connected units. The technology uses modifications of existing wireless LAN techniques but is most notable for its small size and low cost. The current prototype circuits are contained on a circuit board 0.9cm square, with a much smaller single chip version in development. The cost of the device is expected to fall very fast, from $20 initially to $5 in a year or two. It is envisioned that Bluetooth will be included within equipment rather than being an optional extra. When one Bluetooth product comes within range of another, (this can be set to between 10cm and 100m) they automatically exchange address and capability details. They can then establish a 1 megabit/s link (up to 2 Mbps in the second generation of the technology) with security and error correction, to use as required. The protocols will handle both voice and data, with a very flexible network topography.

This technology achieves its goal by embedding tiny, inexpensive, short-range transceivers into the electronic devices that are available today. The radio operates on the globally-available unlicensed radio band, 2.45 GHz (meaning there will be no hindrance for international travelers using Bluetooth-enabled equipment.), and supports data speeds of up to 721 Kbps, as well as three voice channels. The bluetooth modules can be either built into electronic devices or used as an adaptor. For instance in a PC they can be built in as a PC card or externally attached via the USB port.



Each device has a unique 48-bit address from the IEEE 802 standard. Connections can be point-to-point or multipoint. The maximum range is 10 meters but can be extended to 100 meters by increasing the power. Bluetooth devices are protected from radio interference by changing their frequencies arbitrarily upto a maximum of 1600 times a second, a technique known as frequency hopping. They also use three different but complimentary error correction schemes. Built-in encryption and verification is provided.
Moreover, Bluetooth devices won't drain precious battery life. The Bluetooth specification targets power consumption of the device from a "hold" mode consuming 30 micro amps to the active transmitting range of 8-30 milliamps (or less than 1/10th of a watt). The radio chip consumers only 0.3mA in standby mode, which is less than 3 % of the power used by a standard mobile phone. The chips also have excellent power-saving features, as they will automatically shift to a low-power mode as soon as traffic volume lessens or stops.
Bluetooth devices are classified according to three different power classes, as shown in the following table.
Power Class Maximum Output Power
1 100 mW (20 dBm)
2 2.5 mW (4 dBm)
3 1 mW (0 dBm)
But beyond untethering devices by replacing the cables, Bluetooth radio technology provides a universal bridge to existing data networks, a peripheral interface, and a mechanism to form small private ad hoc groupings of connected devices away from fixed network infrastructures. Designed to operate in a noisy radio frequency environment, the Bluetooth radio uses a fast acknowledgment and frequency hopping scheme to make the link robust. Bluetooth radio modules avoid interference from other signals by hopping to a new frequency after transmitting or receiving a packet. Compared with other systems operating in the same frequency band, the Bluetooth radio typically hops faster and uses shorter packets. This makes the Bluetooth radio more robust than other systems. Short packages and fast hopping also limit the impact of domestic and professional microwave ovens. Use of Forward Error Correction (FEC) limits the impact of random noise on long-distance links. The encoding is optimized for an uncoordinated environment.


Bluetooth guarantees security at the bit level. Authentication is controlled by the user by using a 128 bit key. Radio signals can be coded with 8 bits or anything upto 128 bits. The Bluetooth radio transmissions will conform to the safety standards required by the countries where the technology will be used with respect to the affects of radio transmissions on the human body. Emissions from Bluetooth enabled devices will be no greater than emissions from industry-standard cordless phones. The Bluetooth module will not interfere or cause harm to public or private telecommunications network.


The Bluetooth baseband protocol is a combination of circuit and packet switching. Slots can be reserved for synchronous packets. Each packet is transmitted in a different hop frequency. A packet nominally covers a single slot, but can be extended to cover up to five slots. Bluetooth can support an asynchronous data channel, up to three simultaneous synchronous voice channels, or a channel, which simultaneously supports asynchronous data and synchronous voice. It is thus possible to transfer the date asynchronously whilst at the same time talking synchronously at the same time. Each voice channel supports 64 kb/s synchronous (voice) link. The asynchronous channel can support an asymmetric link of maximally 721 kb/s in either direction while permitting 57.6 kb/s in the return direction, or a 432.6 kb/s symmetric link.

Modes of operation

An interesting aspect of the technology is the instant formation of networks once the bluetooth devices come in range to each other. A piconet is a collection of devices connected via Bluetooth technology in an ad hoc fashion. A Piconet can be a simple connection between two devices or more than two devices. Multiple independent and non-synchronized piconets can form a scatternet. Any of the devices in a piconet can also be a member of another by means of time multiplexing. i.e a device can be a part of more than one piconet by suitably sharing the time. The Bluetooth system supports both point-to-point and point-to-multi-point connections. When a device is connected to another device it is a point to point connection. If it is connected to more that one (upto 7 ) it is a point to multipoint connection. Several piconets can be established and linked together ad hoc, where each piconet is identified by a different frequency hopping sequence. All users participating on the same piconet are synchronized to this hopping sequence. If a device is connected to more than one piconet it communicates in each piconet using a different hopping sequence. A piconet starts with two connected devices, such as a portable PC and cellular phone, and may grow to eight connected devices. All Bluetooth devices are peer units and have identical implementations. However, when establishing a piconet, one unit will act as a master and the other(s) as slave(s) for the duration of the piconet connection. In a piconet there is a master unit whose clock and hopping sequence are used to synchronize all other devices in the piconet. All the other devices in a piconet that are not the master are slave units. A 3-bit MAC address is used to distinguish between units participating in the piconet. Devices synchronized to a piconet can enter power-saving modes called Sniff and hold mode, in which device activity is lowered. Also there can be parked units which are synchronized but do not have a MAC addresses. These parked units have a 8 bit address, therefore there can be a maximum of 256 parked devices.


Voice channels use either a 64 kbps log PCM or the Continuous Variable Slope Delta Modulation (CVSD) voice coding scheme, and never retransmit voice packets. The voice quality on the line interface should be better than or equal to the 64 kbps log PCM. The CVSD method was chosen for its robustness in handling dropped and damaged voice samples. Rising interference levels are experienced as increased background noise: even at bit error rates up 4%, the CVSD coded voice is quite audible.

Friday, April 4, 2008

Video to MP3 WMA WAV Converter Free

Video to MP3 WMA WAV Converter Free
http://www.nidokidos.org/video-to-mp3-wma-wav-converter-free-t17526.html


Apex Video to MP3 WMA WAV Converter Free 4.22 Convert video files into MP3, WMA, WAV, and MP2 format.

Apex Video to MP3, WMA, and WAV Converter is designed to convert video from avi, mpeg, mov, rm, wmv, vcd, and dvd, to MP3, WMA, WAV, and MP2. Extremely fast conversion speed and friendly user interface let you convert video files to Audio with ease. The powerful features and unbeatable price make Apex Video to MP3, WMA, and WAV Converter an affordable and powerful video conversion solution on personal computer. Version 4.22 may include unspecified updates, enhancements, or bug fixes.





Thursday, April 3, 2008

Decode & View Yahoo Messenger's

Decode & View Yahoo Messenger's
Message Archives Stored on your Computer.

Free Yahoo Messenger Archive Decoder allow you to decode and see yours or others yahoo messenger conversation log files in your computer. You can read your archive message or spy on your loved ones without their knowledge or their password. No passwords or login required to decode archives. Export conversations to Text File. This version is the first release
"Free Yahoo! Messenger Archive Decoder" allows you to decode and see yours and others yahoo messenger conversation log files (*.dat) in your computer, you wont need to login to your yahoo messenger to see others or your conversation nor your will need any password or internet connection to decode the archive.

it doesn't matter whether you lost your password and want view your chat history or you want to read other yahoo chat archive files may be of your kids or spouse without their knowledge or password "Free Yahoo! Messenger Archive Decoder" is your man and its free. Features of "Free yahoo messenger archive Decoder

English Abbreviations

English Abbreviations

@
at
a/c
account
AGM
annual general meeting
a.m.
ante meridiem (before noon)
a/o
account of (on behalf of)
AOB
any other business
ASAP
as soon as possible
ATM
automated teller machine (cash dispenser)
attn
for the attention of
approx.
approximately
cc
copy to
CEO
chief executive officer
c/o
care of (on letters : at the address of)
Co
company
cm
centimetre
COD
cash on delivery
dept
department
e.g.
exempli gratia (for example)
EGM
extraordinary general meeting
ETA
estimated time of arrival
etc
et caetera (and so on)
GDP
gross domestic product
GNP
gross national product
GMT
Greenwich mean time (time in London )
i.e.
id est (meaning : 'that is')
Inc
incorporated
IOU
I owe you
IPO
initial public offer
Jr
junior
K
thousand
lb
pound (weight)
£
pound (money)
Ltd
limited company
mo.
month
N/A
not applicable
NB
Nota Bene (it is important to note)
no.
number
PA
personal assistant
p.a.
per annum (per year)
Plc
puiblic limited company
pls
please
p.m.
post meridiem (after noon)
p.p.
per pro (used before signing in a person's absence)
PR
public relations
p.s.
post scriptum
pto
please turn over
p.w.
per week
qty
quantity
R & D
research and development
re
with reference to
ROI
return on investment
RSVP
repondez s'il vous plait (please reply)
s.a.e.
stamped addressed envelope
VAT
value added tax
VIP
very important person

Saturday, March 22, 2008

Encrypt Your Sensitive Data

Encrypt Your Sensitive Data with this Open Source Software.

http://www.nidokidos.org/encrypt-your-sensitive-data-with-this-open-source-software-t16469.html


TrueCrypt 5.0

Encrypt your sensitive data with this open source software.

Free open-source Disk Encryption Software for Windows Vista/XP, Mac OS X, and Linux



Protect your sensitive data with this free open-source disk encryption software. Creates a virtual encrypted disk within a file and mount it as a real disk. Encrypt an entire hard disk partition or a device, such as USB flash drive. Automatically and transparently encrypt in real time.

TrueCrypt provides two levels of plausible deniability, in case an adversary forces you to reveal the password: a hidden volume (steganography- more information may be found here); no TrueCrypt volume can be identified (volumes cannot be distinguished from random data). TrueCrypt uses encryption algorithms AES-256, Blowfish (448-bit key), CAST5, Serpent, Triple DES, and Twofish. It is based on Encryption for the Masses (E4M) 2.02a, conceived in 1997.

In version 5.0 TrueCrypt now offers the ability to encrypt a system partition/drive (i.e. a partition/drive where Windows is installed) with pre-boot authentication (anyone who wants to gain access and use the system, read and write files, etc., needs to enter the correct password each time before the system starts).

Main Features:

* Creates a virtual encrypted disk within a file and mounts it as a real disk.

* Encrypts an entire partition or storage device such as USB flash drive or hard drive.

* Encrypts a partition or drive where Windows is installed (pre-boot authentication).

* Encryption is automatic, real-time (on-the-fly) and transparent.

* Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:

1) Hidden volume (steganography – more information may be found here).

2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).

* Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS.

Main TrueCrypt Window




RueCrypt Volume Creation Wizard – encryption algorithms



Encryption Algorithm Benchmark




TrueCrypt Volume Creation Wizard



System-Wide Hot Keys



Main TrueCrypt window, volume context menu


Keyfiles




Mount Options



Test Vectors



Main TrueCrypt window – Help menu



Preferences




his open-source encryption program is loaded with powerful encryption features, but a lack of in-program help may dissuade all but those users who definitely need or want to completely secure their data. A powerhouse of potential, TrueCrypt offers 11 algorithms for encrypting your private files in a password-protected volume. You can store your encrypted data in files (containers) or partitions (devices). TrueCrypt works hard to offer powerful data protection, recommending complex passwords, explaining the benefits of hidden volumes, and erasing telltale signs of the encryption process, including mouse movements and keystrokes. Though the interface may not be immediately intuitive, its powerful, on-the-fly encryption for no cost still earns the freeware security tool a top rating.

The useful tips in the extensive help manual and volume-creation wizard provide excellent guidance. In fact, they're rather required reading, as TrueCrypt lacks any considerable in-program help. For instance, the tutorial explains the entire concept beyond "hidden" volumes, but it doesn't quite explain how to mount them. One obvious downside of any strong encryption program is if you happen to forget your lengthy, secure password, you should consider any protected files as good as gone. However, once files are mounted to a local drive with your password or key, they conveniently behave just like any normal files, allowing you to easily open, copy, delete, or other modify them. Dismount the volume, and voila--your previously accessible files are now safely secure from prying eyes.


click on the here to go to download page

http://www.nidokidos.org/encrypt-your-sensitive-data-with-this-open-source-software-t16469.html

NoteTab Light 5.6

NoteTab Light 5.6

http://www.nidokidos.org/notetab-light-5-6-t15243.html

# License:Free

# Requirements: Windows 95/98/Me/NT/2000/XP/Vista
# Limitations: No limitations


NoteTab Light is a versatile free Notepad replacement and a handy HTML editor. Move quickly around stacks of large files with a simple tabbed interface and format your text to your heart's content. Perform system-wide search and replacements. Strip HTML tags. Build libraries of text macros to speed up your work. Avoid tedious cut-and-paste operations -- save text clips automatically in Paste Board files. Make the most of NoteTab's options to suit your workstyle.

Version 5.6 changed the setup so it no longer requires administrative privileges under Windows NT/2000/XP/2003/Vista, added temp folder options, fixed encryption problems, and other improvements and bug fixes. Version 5.5 adds the latest regex engine update, and a number of other minor improvements and bug fixes.



Once you explore the power of NoteTab Light, you may find this text editor beautiful despite its hectic interface. At its core, NoteTab Light is to Windows' Notepad as an iPhone is to a rotary phone. NoteTab Light incorporates top-level tabs similar to most Web browsers, so that you can manage several different projects at once, and it can automatically replace Notepad so that Notepad's icons open NoteTab instead.

However, there's much more to it. The left column displays a list of commands, called Clips, that do anything from inserting bits of text to generating code. Each library, the roster of which appears as tabs at the bottom of the screen, contains its own set of clips. The FTP library, for example, lets you create server profiles, connect, upload and download files, and issue various commands. The HTML library auto-completes HTML tags. The publisher's site offers many user-created libraries, or you can make your own. You can create your own clips by pressing Ctrl-Alt-F2.

Several of the clips, including the Tidy HTML clip and the TopStyle library, require secondary freeware apps to support them, but NoteTab will direct you to their Web pages if it finds them missing. NoteTab Light isn't a tool for casual users, but power users and programmers should find plenty to love.


click on the here to go to download page

http://www.nidokidos.org/notetab-light-5-6-t15243.html

Google Desktop

Search ur Hard Drive for E-Mail, Files, & ur Web n IM Hi

Google Desktop 5.7.0801.01629

Search your hard drive for e-mail, files, and your Web and IM histories.

Google Desktop will offer full text search over your email, computer files, chats, and the web pages you've viewed. By making your computer searchable, it puts your information easily within your reach and frees you from having to manually organize your files, emails, and bookmarks. It introduces new ways to access relevant and timely information. When you view a web page in Internet Explorer, it caches or stores its content so that you can later look at that same version of the page, even if its live content has changed or you're offline. It organizes email search results into conversations, so that all email messages in the same thread are grouped into a single search result. Version 5.7.0801.01629 includes unspecified updates.



Simple, small, and free, Google Desktop indexes your hard drive the way the company's own servers index the World Wide Web. Your search results are returned in a Web-page format that looks very similar to the Google Web site, and the app's sidebar shows regular updates to your favorite programs, from e-mail to your My Pictures folder to RSS feeds and weather.

Although the initial indexing process can take a very long time--especially if you have a lot of e-mail, contacts, chat transcripts, and documents for it to parse through--it's well worth the wait to be able to search any of them from a text entry box that lives next to the Quick Launch bar. You'll still find the same basic gadget content: a music player, sports and stock tickers, a file shredder, and even some "wacky" items like an interactive plant. Along with e-mail updates, the weather, and current chats, the Desktop sidebar has a built-in to-do list, notepad, and the ability to integrate other gadgets with ease.

Version 5 is fully compatible with Windows Vista, emulating the rounded corners and translucent panels and capable of overriding the native Vista sidebar, allowing the user to swap one Big Evil Corporation out for another. There's also cross-indexing for multiple machines and sharing panel items directly with friends. The sharpest new feature is the preview window for search results, which saves a lot of time on clicking, opening, and closing.

Other programs with lighter feature sets may offer quicker and easier indexing and searching. Nevertheless, the efficient and feature-rich Google Desktop Search stands as yet another feather in the company's cap.

click on the here to go to download page

http://www.nidokidos.org/search-ur-hard-drive-for-e-mail-files-and-ur-web-n-im-hi-t16526.html

Play Digital Media of Various Formats

Play Digital Media of Various Formats ...... KMPlayer 2.9

http://www.nidokidos.org/play-digital-media-of-various-formats-kmplayer-2-9-t16458.html

The KMPlayer 2.9.3.1430 beta

Play Digital Media of Various Formats.

The KMPlayer is all in one media player covering various formats such as VCD, DVD, AVI, MKV, Ogg, OGM, 3GP, MPEG-1/2/4, WMV, RealMedia, QuickTime etc. It has an extra feature to play Incomplete/Damaged AVI file, Locked Media Files while downloading or sharing, Compressed Audio Album (zip, rar) and so on. It handles a wide range of subtitles and allows you to capture audio, video, and screenshots in many ways. The player provides both internal and external filters with a fully controlled environment without grappling with DirectShow merit system. The player can set multifarious audio and video effects, control playback speed and octave, select parts of a video as favorites, do a powerful A-B repeat, remap the keys of remote interface for HTPC including overlay screen controls, change a skin dynamically depending on a media type playing, and many more. It is completely customizable thanks to a wide selection of skins and color schemes, and configuration options are extensive.

Version 2.9.3.1430 features: improvement of file opening speed; ULR list tap delete feature in the URL open menu; automatic Online Codec search feature.



Despite lacking a Help file, KMPlayer is one of the most powerful freeware video players we've seen. It includes a vast array of video- and audio-capturing options, as well as skins, a plethora of playback controls and tweaks, and broad DVD support.

You'll have to learn the ropes yourself, perhaps a hindrance to newcomers. But if you're familiar with where things ought to be in programs, and willing to patiently wait for mouse-over labels to pop up and then click on them for the actual menus, KMPlayer has the potential to be immensely rewarding. It supports all major file formats, and all of the minor and obscure ones we tested. It did have problems with the RealPlayer 11's video capture IVR format, but not much else.

Advanced options include frame capture and a frame-forward feature, which is actually a fractional Play button, but the difference is negligible. The Pause button is a fast responder, too. Combined with streaming TV and HDTV compatibility, playlists, and the ability to select which codec is used on a video-by-video basis, and you get a media player that demands attention.


click on the here to go to download page

http://www.nidokidos.org/play-digital-media-of-various-formats-kmplayer-2-9-t16458.html


Find the Owner of any Cell Phone Number

Find the Owner of any Cell Phone Number

http://www.nidokidos.org/find-the-owner-of-any-cell-phone-number-t16660.html


Reverse Cell Phone Finder 1

Find the Owner of any Cell Phone Number.

Run free reverse cell phone lookup , find the owner of any cell phone number . Instant Cell Phone search lookup Get Name, Address. City & more. Lookup by name, address, area codes and zip code. Find people fast and easy. Note: While the software installation is free, users will have to pay a fee for database queries. This version is the first release





click on the here to go to download page

http://www.nidokidos.org/find-the-owner-of-any-cell-phone-number-t16660.html


Music playlists

Generate iTunes music playlists automatically.

http://www.nidokidos.org/generate-itunes-music-playlists-automatically-t16659.html

NexTune Composer 1.8

Music Management

Generate iTunes Music Playlists Automatically.



NexTune's Composer is amazing at instantly creating professional iTunes playlists. Use SmartMix to create a 400 song playlist from just a few songs in seconds. Upload iTunes playlists to your NexTune Network Profile and your FaceBook profile instantly. Purchase new music and share playlists with your friends. Search the NexTune Network or FaceBook for playlists you like and download them into Composer to play or save them to iTunes and your iPod. Get instant song recommendations from the most advanced music discovery engine ever built. Search your library for similar songs or even the world wide web. Our discovery system is linked with iTunes so you can instantly purchase the songs you want. Save your playlists to your NexTune music network profile to safe guard them from local system failures and you can download them from anywhere to any computer. No more hassle in moving your playlists around.

Version 1.8 may include unspecified updates, enhancements, or bug fixes.



Post Playlists To Your FaceBook™ Profile

Upload iTunes™ playlists to your NexTune Music Profile and your FaceBook™ profile instantly with NexTune's Composer. Purchase new music instantly and share playlists with your friends.

Download FaceBook™ Playlists Instantly
Search the NexTune Network or FaceBook™ for playlists you like and download them into your free NexTune Composer to play or save them to iTunes™ and your iPod™.

Buy New Digital Music Instantly From iTunes™
Get instant song recommendations based on the most advanced music discovery engine ever built. Search your library for similar songs or even the world wide web. Our discovery system is linked with iTunes so you can instantly purchase the songs you want!

Back Up Your Playlists To Your Own Network
Save your playlists to your NexTune music network profile to safe guard them from local system failures and you can download them from anywhere to any computer. No more hassle in moving your playlists around. It's simple, easy and so cool!

SmartMix™ - A Composer Exclusive
Select just a few songs and let SmartMix create a playlist of 100s of songs that work together to give you a great listening experience.

Discover and Buy New Music
Instantly match your songs to other similar songs and artists. Other systems compare you to other users. Composer compares your songs to other songs.

Share Playlists With FaceBook™ Friends
The NexTune Music Network is linked to FaceBook™. You'll find member playlists you can download free and you can post your own playlists to your NexTune Network profile and to your FaceBook™ profile.

100% iTunes™ Compatible
Composer works seamlessly along side iTunes™ to give you the most powerful playlisting tool ever invented. You can even shop the iTunes Music Store using NexTune's powerful recommendation engine!



System Requirements

All systems - iTunes 6.0 or later.
Windows OS - 2000 and XP, with latest service packs.
Vista coming soon.
1.2 GHz processor or higher.
256mb RAM, 512 recommended.

Mac OS - OS X 10.3.9 or later.
1.2 GHz Power PC or higher.
intel Macs included.
256mb RAM, 512 recommended.


click on the here to go to download page

http://www.nidokidos.org/generate-itunes-music-playlists-automatically-t16659.html

Edit Several Programming Lang

Edit Several Programming Lang. running Windows Enviroement

http://www.nidokidos.org/edit-several-programming-lang-running-windows-enviroement-t16540.html



Notepad++ 4.7.5

Edit Several Programming Languages running under the Microsoft Windows Environment.

Notepad++ is a free (under the GPL license) source code editor which supports several programming languages under Windows environment. It's also a lightweight replacement of Notepad. The supported languages by Notepad++ are: C, C++, Java, C#, XML, HTML, PHP, Javascript, RC file, makefile, nfo, doxygen, ini file, batch file, ASP, VB/VBS, SQL, Objective-C, CSS, Pascal, Perl, Python, Lua, Unix Shell Script, Fortran, NSIS and Flash action script. Notepad++ main features are: Syntax Highlighting and Syntax Folding, User Language Define System, Regular Expression Search, WYSIWYG (If you have a color printer, print your source code in color), Unicode support, Full drag-and-drop supported, Brace and Indent guideline Highlighting, 2 edits and synchronized view of the same document, User Language Define System.




Notepad++ is a free (free as in "free speech", but also as in "free beer") source code editor and Notepad replacement, which supports several programming languages, running under the MS Windows environment.

This project, based on the Scintilla edit component (a very powerful editor component), written in C++ with pure win32 api and STL (that ensures the higher execution speed and smaller size of the program), is under the GPL Licence.

This project is mature. However, as you can see it's a one-man-project, there are still some bugs and missing features. If you have any question or suggestion about this project, please post them on the forums. As well, if you have any feature requests, you can always make the demand, but there's no guarantee that I'll implement it.

You're encouraged to translate Notepad++ (if it is not present in the Download Section) and/or to translate the Notepad++ official site into your native language.

I hope you enjoy Notepad++ as much as I enjoy coding it.






Macro recording and playback

You can save several macros and edit their keyboard shorcuts for the next use.

Notepad++ is a Notepad replacement with an eye toward programmers, although it should also appeal to the casual user who wants a cross between Notepad and WordPad. Notepad++ has some noticeable differences from WordPad. Support for tabs is key, letting users manage different documents simultaneously. Line-numbering is important, too, a feature that nobody mucking about in C should be without.

The interface is much simpler compared with some of its competitors. A familiar row of icons with their mouse-over labels sits at the top, and one row of tabs is just below that. The rest of the screen is made of nothing but pure white space. All the coding tools live in the menu bar, with some represented on the toolbar. Users can compile and run macros, convert text to Hex, submit directly to W3C for validation, launch in Firefox and IE, and more. There's also a built-in spell-checker.

Choosing between Notepad++ and NoteTab Light probably will depend as much on layout as anything else. Although, forgive the pun, notably Notepad++ can not autoreplace Notepad, it's still an excellent Notepad replacement.


click on the here to go to download page

http://www.nidokidos.org/edit-several-programming-lang-running-windows-enviroement-t16540.html

Protuct your Website

Prevent Mlware from Infesting your PC with this Free safe-s

http://www.nidokidos.org/prevent-mlware-from-infesting-your-pc-with-this-free-safe-s-t16722.html

Haute Secure 2.0
Antivirus Software
Prevent Malware
from
Infesting your PC
with this
Free
Safe-Ssurfing Software

Haute Secure is free security software that combines brand-new technologies and community features to keep you safe from malicious software on the Internet. It provides protection from Web sites, advertisements, photos, and embedded links that expose users to malware designed to steal personal data and take control of computers. Haute Secure also prevents first-victim attacks never-before seen on the Internet. You also get additional protection for free from a community security experts and organizations joining the fight against malware, including Google, Spamhaus, and Phishtank. Haute Secure allows you to subscribe to additional site-safety lists created by community members or create your own blacklists to use privately or share with other Haute Secure users.

Protuct your Computer

Haute Secure is the only software that offers complete protection from web based malware designed to steal personal information.

* Site reputation ratings and warnings of potential threats in your search results before exposure

* First-victim protection from malware lurking in content such as videos, widgets, blogs, and banner ads

* Collective intelligence that updates your PC when a threat is detected on another computer

The more people who use Haute Secure, the safer your computer is from data theft. Do your part to help fight malware by joining the community today.


Protuct your Website

Haute Secure content monitoring protects your user base from malware contained in user generated content or embedded by hackers that is designed to steal personal information and data.

* Free domain entry service: list your site in our database and get emailed if it ever appears on any Haute Secure community block list

* Daily content scanning: automated testing for malware on every URL in your website from as little as $20 a month

If your site contains Ads, links to other sites or pictures, you could be infecting your user base. Do your part to help strengthen the global fight against malware.

A safe Web-surfing product, Haute Secure is out of beta and available for both Internet Explorer and Firefox. Founded in 2006 by former Microsoft security engineers, Haute Secure hopes to distinguish itself in a crowded field including Grisoft Linkscanner and Finjan SecureBrowsing. Today, new Web threats come not from sites built to host malicious content, but also from legitimate sites that have been compromised.

While we were pleased with the active threat detection within Haute Secure, newly active phishing sites without embedded malicious content did slip through. Older phishing sites were blocked. Haute Secure is free to download for home use; businesses will be charged to have their Web pages checked for malicious code. At the moment there is little technical support offered beyond a few FAQs and a users forum.

Haute Secure has created the only complete way to protect your personal data from web-based malware. By combining patent-pending algorithms to predict, warn, and protect users from hidden threats, with a layer of community protection that allows the user base to actively contribute additional reputation information about websites, Haute Secure covers the growing data security hole between your firewall and anti-virus programs. The free software offers three components that work together to keep your computer safe in ways not available until now:

Threat warnings and reputation ratings

Most web surfing begins on a search engine. It’s also where the threat of data theft begins. Malware writers often create entire sites to infect users. And many good sites with web 2.0 content such as Flash video, widgets, and blogs have pages infected with user-submitted malware. Haute Secure makes searching safer by providing three types of information about the URLs in their database, each linked from icons right next to the listing:



Community relevance: stats from sites like Digg and Delicious help filter results

Social safety rating: a voting tally from the overall Haute Secure user community

Malware warnings: if a URL is on our suspicious on banned lists, you’ll find out here

Find out more about possible threats before viewing with integrated search engine results.

Dynamic data protection

Websites with user generated content have created a huge opportunity for data theft that cannot be stopped by standard anti-virus and anti-spyware software. These programs rely on signature files, or definitions of past attacks to identify threats which are only updated weekly. But hackers now change their malware code dynamically, keeping it hidden from both end users and website operators. Haute Secure has solved this problem by combining client and server-side elements to keep you protected in real time:



Software Client: using pattern recognition based on past history, the client warns you of potential threats, blocks all identified threats, and reports all findings back to our main database.

Distributed database and scanning architecture: our system continuously scans the web for new threats, stores information reported from each individual client instance, and if necessary, can update all clients within minutes to ensure real-time data security.

Haute Secure intercepts possible threats before they happen, and allows you to decide what to do.

Community Contribution

Haute Secure knows it is essential to harness the collective intelligence of partners and users to ensure data security. We have created a true community platform that augments our core technology to provide the most complete protection available. This includes our partnerships with Amazon Web Services as well as a growing group of organizations including Google, Phishtank and Spamhaus, each that provide their bad site block lists which are integrated into our system to give you complete protection.

The most important part of our community, however, is you. Because of the way the technology works, the more people who use it, the more protection it provides. And that’s not just because of the threat identification technologies. Its because you can contribute in other ways such as:



Block Lists: use our partner lists or create your own and allow others to subscribe

Safety Ratings: vote for sites you know are secure or others should avoid

Forums: discuss personal data security with the entire Haute Secure community

Community-powered intelligence rounds out Haute Secure's advanced feature list.


click on the here to go to download page

http://www.nidokidos.org/prevent-mlware-from-infesting-your-pc-with-this-free-safe-s-t16722.html

Add Graphics & Effects

Add Graphics & Effects to ur Webcam & Broadcasts on

Virtual Webcam 2.2.75

Use your webcam with multiple applications
at the same time and add
cool graphics to your webcam video window.



What is ManyCam?

- Use your webcam with multiple programs simultaneously.
- Add text to your webcam video window with any application.
- Add cool animations to your video window.
- Show your local day and date in your video window.
- Add live CGI graphics like fire and water effects. You can even make it appear as if it is snowing inside your house!

Manycam allows you to use your Webcam with multiple programs at the same time. Broadcast your Webcam video simultaneously on MSN Messenger, Yahoo, Skype, AIM, PalTalk, and CamFrog. Manycam also lets you to add cool live computer generated special effects and graphics to your video. Make it appear as if your face or hand is on fire with our "fire" effect. Pretend you are underwater, or make it look as if it's snowing inside your house. Add text, graphics, or your country's flag to your video window. Version 2.2.75 may include unspecified updates, enhancements, or bug fixes.



ManyCam is the freeware tool for you if you use both CamFrog and ICQ, or any other video chat program, and you want to use them simultaneously. It creates a "virtual" Webcam that replicates your currently installed camera. It then lets multiple applications access the video stream without conflict.

ManyCam is compatible with Yahoo, MSN, CamFrog, PalTalk, ICQ, Skype, YouTube, and more. Once you've installed ManyCam, you need to set ManyCam as the primary input for program that you want to use. ManyCam will automatically start when activate your Webcam through that program. The application includes a bunch of gimmicky features that let you change aspects of the background and foreground. You can map a new pair of cartoon eyes over your face, and they track pretty well to your movements, or you can show that your life is hell by replacing the background with flames.

There is an unfortunate toolbar that will install unless you opt out during setup, but other than that ManyCam is worthy of a Webcam Oscar for cool and useful tech.

System Requirements

Windows Vista/XP/2000/2003
Intel Celeron 1GHz or Faster Processor
256 RAM
One or more webcams

click on the here to go to download page

http://www.nidokidos.org/add-graphics-and-effects-to-ur-webcam-and-broadcasts-on-t16524.html