Processed through Paypal
No account required.
Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:
| BinText v3.3
BinText v3.3 Finds Ascii, Unicode and Resource strings in a file. A small, very fast and powerful text extractor that will be of particular interest to programmers. It can extract text from any kind of file and includes the ability to find plain ASCII text, Unicode (double byte ANSI) text and Resource strings, providing useful information for each item in the optional "advanced" view mode. Its comprehensive filtering helps prevent unwanted text being listed. The gathered list can be searched and saved to a separate file as either a plain text file or in informative tabular format. Click here to visit the author's website.
|1,407||Oct 23, 2019
| Repair Tasks v3.3
Repair Tasks v3.3 This project is a utility that makes repairs to the Windows Task schedule. In particular, it fixes problems where opening the Task Scheduler, or trying to configure Windows Backup, results in the message "The task image is corrupt or has been tampered with" (0x80041321). Searching the web reveals that this message has been seen from time to time, and the (rather laborious) set of steps that can be taken to correct it are fairly well-documented. However, it turns out that reverting to Windows 7 from Windows 10 generates this problem in spades. It can leave more than 40 scheduled tasks in a corrupt state. This is because many task registry keys and the task definitions to which they refer are updated by a Windows 10 upgrade, but only the registry keys are restored on reversion, so Task Scheduler finds that, for these tasks, the task registry keys and task definitions are now inconsistent. The general recommendation in response to this reversion problem seems to be to restore the system from backups. However, I'm never sure about overwriting chunks of my system from backups, and would rather go forwards. So, since the fix is well-known, and the main problem is just repeated execution, I decided to write a utility to automate the set of steps required. And now, I'm sharing my work in case it is of use to fellow sufferers, pending Microsoft getting their act together and fixing reversion. Open source is particularly appropriate for this type of project, as the code necessarily delves into system settings, making complete transparency as to what it does crucial. You are encouraged to download the source, which is actually not huge, and understand what it does. However, I also provide a download of the executable, and a description of how to use the program on ...
|2,315||Jun 20, 2016
| Spybot Identity Monitor v3.3
Spybot Identity Monitor v3.3 You’ve got the right to know! You’ve probably registered on dozens of websites (or more) over the years, giving them your email address, personal data like birth dates and street addresses, and passwords. Spybot Identity Monitor gives you a tool that allows you to check if your information already is in the hand of hackers. It’s your data – your deserve to know! What to do if…? If Spybot Identity Monitortells you that a service has leaked your data, you should: Change your password at that service at once. Change your password on all other services where you might have used the same password. Start using a password manager to make sure all those passwords are stored safely. Start using Two Factor Authentication where possible. Spybot Identity Monitor Main View Once started, the program immediately shows an overview of known sources and breaches for the accounts set up. Spybot Identity Monitor Account Details By viewing account details you can get an overview where the account - in this example it's a dummy email address email@example.com - was leaked. Spybot Identity Monitor Breach Details You can view all details of a breach of your data. In this example you'll see that for firstname.lastname@example.org, even phone numbers and employers were leaked. Supports: Windows 7 to 10 Changes: Version 3.3 April 14th, 2019 Our new version now runs on Linux and Mac as well and brings a few more improvements: Pastes from HIBP will be shown as well. Now supports proxies for network communication. Reduced traffic - accounts will only be re-checked online if more breach data is known than the last time. Remember state - you can now "acknowledge" breaches and Identity Monitor will then distinguish between old and new breaches ...
|1,099||Nov 13, 2019
|Showing rows 1 to 3 of 3||Showing Page 1 of 1||1|
Copyright (c) 2019