Saturday, August 11, 2007

Build A Remote-Controlled Robot by David R. Shircliff


Build A Remote Rebot

David R. Shircliff, "Build A Remote-Controlled Robot"
McGraw-Hill/TAB Electronics | 112 pages | March 25, 2002 | 0071385436 | PDF | 1.22 Mb


Review
Library Journal : First published in 1987 under the title How to Build a Robot for Less Than $300, this edition retains the original premise: building a robot on the cheap. The project outlined here by an experienced teacher is a whimsical remote-controlled robot butler named Questor, which readers can build with little prior knowledge of electronics.

Book Description
TAB Electronics is the premier name in amateur robotics. Since the 1987 release of Gordon McComb's blockbuster Robot Builder's Bonanza hobbyists have looked to TAB as the source for cutting-edge, how-to robotics titles.

These groundbreaking, heavily illustrated books explain how to create everythinbg from basic, simple robots to ones that walk, see, feel, talk, listen and fight! Written by "professors of robotics" such as Gordon McComb and John Iovine, they're great for beginners as well as experienced robot builders.

Authoritative, innovative, fun, and always far ahead of anyone else, TAB continues the tradition with Build Your Own Remote-Controlled Robot.

Download here
http://www.protecturl.com/?fgemxi0ypg

Read More......

The Complete Book of Greed: The Strange and Amazing History of Human Excess by M. Hirsh Goldberg



The Complete Book of Greed: The Strange and Amazing History of Human Excess by M. Hirsh Goldberg (Author) & Ray Driver (Illustrator)
William Morrow & Co | 1994 | 228 pp | ISBN 0688106145 | PDF Webbook | 2 MB

Goldberg reveals the quirks and characters of famous misers, gamblers, investors, spendthrifts, spenders, gold diggers, and billionaires while he talks about the reality of greed. He also philosophizes that greed is unrelenting because it's really a search for spiritual fulfillment and cannot be satisfied through the accumulation of material possessions. His anecdotal format results in an entertaining book, while his scary stories of the effect of greed almost make the reader glad not to be rich.

Download here
http://rapidshare.com/files/47858192/Goldberg-TheCompleteBookOfGreed.pdf.rar

Read More......

Learn Encryption Techniques with BASIC and C++


Learn Encryption Techniques with BASIC and C++

Learn Encryption Techniques with BASIC and C++ by Gilbert Held
Publisher: Wordware Publishing; (October 1998) | Language: English | ISBN: 1556225989 | 401 pages | .html | 267KB

If you want to learn how programs like PKZIP and LHarc work, this book is for you. The compression techniques used in these programs are described in detail, accompanied by working code. After reading this book, even the novice C programmer will be able to write a complete compression/archiving program that can be ported to virtually any operating system or hardware platform.

If you want to include data compression in other programs you write, this book will become an invaluable tool. It contains dozens of working programs with C code that can easily be added to your applications. In-depth discussions of various compression methods will help you make intelligent decisions when creating programs that use data compression.

If you want to learn why lossy compression of graphics is the key factor in enabling the multimedia revolution, you need this book. DCT-based compression like that used by the JPEG algorithm is described in detail. The cutting edge technology of fractal compression is explained in useful terms, instead of the purly theoretical. Working programs let you experiment with these fascinating new technologies.

The Data Compression Book provides you with a comprehensive reference to this important field. No other book available has the detailed description of compression algorithms or working C implementations for those algorithms. If you are planning to work in this field, The Data Compression Book is indispensable.

Download here

http://rapidshare.com/files/48159831/Wordware_Publishing_-_Learn_Encryption_Tecnique_with_basic_and_c.zip

Read More......

Linux CBT PAM Edition



Linux CBT PAM Edition | 305 MB

LinuxCBT PAM Edition encompasses: 1. Pluggable Authentication Modules (PAM) Security. LinuxCBT PAM Edition entails 6-hours, or ~1-day of classroom training. LinuxCBT PAM Edition prepares you or your organization for successfully securing GNU/Linux & Open Source-based solutions.

Let LinuxCBT PAM Edition cost-effectively sharpen your PAM Security skills!


PAM Security - Module 1

- Introduction - Topology - Features
- PAM Rules Files & Syntax
- Common PAMs - Identify & Discuss Commonly Implemented PAMs
- Account Policies with PAM
- PAM Tally
- PAM Password Quality Check
- PAM Time - Time-based Access Control
- PAM Nologin
- PAM Limits - System Resource Limits Controlled by PAM
- PAM Authentication with Apache


http://www.filefactory.com/file/99e63c/

http://www.filefactory.com/file/90025d/

http://www.filefactory.com/file/0cf81b/

http://www.filefactory.com/file/3af3bf/

Read More......



Beauty Pilot 1.10 | 2.7 MB

Beauty Pilot allows you to bring out the beauty in women's portraits taken with a digital camera. Our sophisticated software is so easy to use that it needs no explanation regarding its user interface. Only a gentle touch is required to erase a skin imperfection on a photo: moles, warts, pimples, heat-spots, etc..


Download here
http://rapidshare.com/files/48143680/Beauty_Pilot_1.10.rar

Read More......

Makeup Pilot 1.20 Full




Makeup Pilot 1.20 Full | 2 mb

MakeUp Pilot is a portrait software that allows you to apply makeup directly onto your photos. Don't be upset if your skin doesn't look perfect on a photo. If you have the MakeUp Pilot program, it means you have a cosmetic kit built into your computer. Use it to retouch any spots on the skin (moles, warts, pimples, heat-spots, etc.). The program will make any photo into a perfect portrait to send to friends or save in the family album. With this makeup software you'll be able to make your pictures look even better than they do!

Download here


http://www.icefile.com/index.php?page=main&id=4aa802135&name=MakeUp.Pilot_V1.20.rar

Read More......

About Face 3: The Essentials of Interaction Design, 3rd revised edition



Alan Cooper, Robert Reimann, David Cronin, "About Face 3: The Essentials of Interaction Design"
Wiley | ISBN 0470084111 | May 7, 2007 | 648 Pages | PDF | 5.3MB

This completely updated volume presents the effective and practical tools you need to design great desktop applications, Web 2.0 sites, and mobile devices. You’ll learn the principles of good product behavior and gain an understanding of Cooper’s Goal-Directed Design method, which involves everything from conducting user research to defining your product using personas and scenarios. Ultimately, you’ll acquire the knowledge to design the best possible digital products and services.

Download here
http://rapidshare.com/files/48153121/Wiley.About.Face.3.The.Essentials.of.Interaction.Design.May.2007.eBook-BBL.rar

Read More......

Computer Graphics for Java Programmers, 2nd edition



Leen Ammeraal, Kang Zhang, "Computer Graphics for Java Programmers, 2nd edition"
Wiley | ISBN 0470031603 | March 9, 2007 | 386 Pages | PDF | 13 MB

A great many varied and interesting visual effects can be achieved with computer graphics, for which a fundamental understanding of the underlying mathematical concepts – and a knowledge of how they can be implemented in a particular programming language – is essential. Computer Graphics for Java Programmers, 2nd edition covers elementary concepts in creating and manipulating 2D and 3D graphical objects, covering topics from classic graphics algorithms to perspective drawings and hidden-line elimination. Completely revised and updated throughout, the second edition of this highly popular textbook contains a host of ready-to-run-programs and worked examples, illuminating general principles and geometric techniques. Ideal for classroom use or self-study, it provides a perfect foundation for programming computer graphics using Java.


Download here
http://rapidshare.com/files/48164318/Wiley.Computer.Graphics.for.Java.Programmers.2nd.Edition.Mar.2007.eBook-BBL.rar

Read More......

AVIEN Malware Defense Guide for the Enterprise


 AVIEN Malware Defense Guide for the Enterprise

AVIEN Malware Defense Guide for the Enterprise
Syngress | Number Of Pages: 656 | 2007-08-05 | ISBN: 1597491640 | 5.6 MB | PDF

Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you.

AVIENs sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about malicious code and anti-malware technology, and the top security administrators of AVIEN who use those technologies in real life. This new book uniquely combines the knowledge of these two groups of experts. Anyone who is responsible for the security of business information systems should be aware of this major addition to security literature.

* Customer Power takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It then considers the roles of the independent researcher, the vendor-employed specialist, and the corporate security specialist.

* Stalkers on Your Desktop considers the thorny issue of malware nomenclature and then takes a brief historical look at how we got here, before expanding on some of the malware-related problems we face today.

* A Tangled Web discusses threats and countermeasures in the context of the World Wide Web.

* Big Bad Bots tackles bots and botnets, arguably Public Cyber-Enemy Number One.

* Crème de la CyberCrime takes readers into the underworld of old-school virus writing, criminal business models, and predicting future malware hotspots.

* Defense in Depth takes a broad look at DiD in the enterprise, and looks at some specific tools and technologies.

* Perilous Outsorcery offers sound advice on how to avoid the perils and pitfalls of outsourcing, incorporating a few horrible examples of how not to do it.

* Education in Education offers some insights into user education from an educationalists perspective, and looks at various aspects of security in schools and other educational establishments.

* DIY Malware Analysis is a hands-on, hands-dirty approach to security management, considering malware analysis and forensics techniques and tools.

* Antivirus Evaluation & Testing continues the D-I-Y theme, discussing at length some of the thorny issues around the evaluation and testing of antimalware software.

* AVIEN & AVIEWS: the Future looks at future developments in AVIEN and AVIEWS.

Download here
http://mihd.net/zp5mod

Read More......

Thursday, August 9, 2007

Soft Add-Remove Master v6.0



Soft Add-Remove Master v6.0 | 3.17 MB

Add-Remove Master is an easy & powerful Utility to help you to uninstall unneeded programs and remove it's unused files from your computer, it also can help you to install a new programs, organize installed programs and many other features... Add-Remove Master is an easy & powerful Utility to help you to uninstall unneeded programs and remove it's unused files from your computer, it also can help you to install a new programs, organize installed programs and many other features. Add-Remove Master provides a basic use mode for beginners and also provides a lot of features for advanced users, Like Editing programs uninstall information.


Standard Features:
- Friendly and easy to use GUI.
- Support 3 use modes (Basic, Standard and Advanced)
- Display the installed programs with a suitable icons.
- Show Hidden programs.
- Show/Hide Windows Updates.
- Displaying programs in 4 different views (Tiles, Icons, List and Details).
- Arrange icons in Groups.
- Uninstall programs and remove it's unused files and it's registry key from your computer.
- Displaying programs details and export it to file or print it.
- Searching for programs by it's name or it's publisher name.
- Export any program uninstall information to Reg file.
- Backup and restore programs Uninstall information.
- Check programs wizard can find & remove empty folders and invalid shortcuts that programs left.
- Generate a list for the installed programs and export it to a text file or html file (Web Page).
- Create a full report for the installed programs and save the report to a text file or html file (Web Page).
- Quickly open programs Install folder, Company site or support site.
- Create shortcut for programs Install folder, Company site or support site.
- Add or read programs comments.
- Change programs icons (icon in the addRemove list).
- History dialog can give you information about all installed or uninstalled programs by Add-Remove master.


Advanced Features:
- Add new entries to programs list (manually).
- Support Microsoft Installer Commands (Change & repair)
- Easily rename programs (Like Windows)
- Complete editor to edit programs uninstall information in registry.
- Manually delete programs uninstall information in registry.
- Control IE Browser helper objects & IE Toolbars.

Dowload here


http://rapidshare.com/files/47678564/Add-Remove.Master.v6.0.rar

Read More......

Dynamic Notes v3.25



Dynamic Notes v3.25 | 1.60 MB

Dynamic Notes is a simple desktop notes reminder and manager allowing you to create electronic desktop notes (stickers) and display them when the time is due. The program is very easy to use and has low system requirements.

With reminder Dynamic Notes you can
- create electronic sticky notes (stickers)
- edit stickers in the quick and advanced modes
- specify the date and time of reminder
- customize the default parameters of sticky notes (their size, text, background and title color, - position on the desktop, transparency; shortcuts)

With reminder Dynamic Notes you can in addition
- print the text of stickers
- save the text of a note to a file
- use various skins
- scheduling turning off the computer

System requirements of the notes reminder
Windows 9x/ME/NT/2000/XP/2003/Vista, 64 MB RAM, 2 MB Hard Disk

Interface languages of the reminder
English, German, Spanish, French, Italian, Dutch, Maltese, Russian, Polish, Ukrainian, Chinese, Greek, Portuguese, Korean, Romanian, Danish, Serbian, Finnish, Czech, Slovenian, Bulgarian, Hebrew, Indonesian, Turkish, Croatian

Download here

http://rapidshare.com/files/47679989/Dynamic.Notes.v3.25.rar

Read More......

Save Flash v4.0



Save Flash v4.0 | 4.36 Mb

Save any video movies like YouTube .flv from web. Save Flash allows to store likable flash-animations: flash games, flash cards, flash banners and cartoons. Save Flash shows: the size of the flash-file, the URL, the name of the file. Saves it to the chosen directory, allows to browse enlarged picture in a preview window. Having tried it you won't dispense with its services.

Pop-up button appears in flash left upper corner if point mouse cursor to this flash animation.
When Save Flash finds a Flash animation on the web page you browse, the Save Flash icon changes color from white to blue.

When Save Flash finds a Flash animation on the web page you browse, the Save Flash icon changes color from white to yellow.

If you want to save not all, but some of flash animation found on the web page, select those you like most of all, mark them in a check box and click Save As. The selected files will be saved.

Download here

http://rapidshare.com/files/47826560/Save_Flash_v4.0.rar

Read More......

Reasonable NoClone 2007 Enterprise Edition v4.1.11



Reasonable NoClone 2007 Enterprise Edition v4.1.11 | 2.04 MB

You may not realize how many duplicate files you have after downloaded many files from the Internet or duplicate files scattered over your home or corporate network. Duplicate files are usually redundant and unnecessary, so keeping them is merely a waste of valuable hard disk space. Your hard drives may be full of documents, mp3, photos and video and many of them are redundant. NoClone finds and removes duplicate files regardless of file name. Time-saving Smart marker filters duplicates for removal or archival. ZDNet recommended her - Stop repeating yourself: Duplicate file finders. Customers include Boeing, California State Government, University of Memphis, WWF, and Disneyland Resort etc.


Features:
• True Byte-by-byte comparison , not by CRC / MD5, totally accurate. Why most accurate?
• Search duplicate files contents and similar files regardless of file name
• Search duplicate pictures (jpg, gif), video (avi, mpg), songs(mp3) , DLLs, Office documents(xls, doc, ppt, pub), pdf and any file types
• Search duplicate Outlook emails (new 2007, v4.1)
• Search files with same contents, same name.
• Powerful fuzzy match to uncover similar files (new 2007, v4.1)
• Smart marker of duplicate files by date, version, size, folder and file name pattern
• Replace by NTFS hard link / shortcut (new v4.0)
• Preview files, show file versions and properties
• Save search session / Export result to CSV, XLS, XML format
• Search local hard drives and over network - edition comparison

Benefits:
• Сlean up hard disks, identify and recover wasted disk space
• Reduce backup time and media used for backups,
• Reduce file searching time, minimize time used to unneeded virus scanning
• Obtain more free space on "limited" resources, like notebooks
• Remove duplicate files to eliminate synchronization problem
• Organize files neat and manage files better
• Cheaper than buying a new hard drive, so don't buy new hard drive, buy NoClone.

Sample applications: file management, storage management, document management, digital forensics and plagiary detection.

Download Links here

http://bravoshare.net/down.php?query=2313900000000090

Read More......

PDF Password Remover 3.0



PDF Password Remover 3.0 | 2.2 MB

PDF Password Remover can be used to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat (including 7.x, which features 128-bit encryption) are supported.

The standard security provided by PDF consists of two different methods and two different passwords, 'user password' and 'owner password'. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).

PDF Password Remover features

.:. Easy to use;
.:. Support drag and drop PDF files;
.:. Do NOT need Adobe Acrobat software;
.:. Support Windows 98, ME, NT, 2000, XP, 2003, Vista systems;
.:. Support both 32bit and 64bit systems;
.:. Remove the security settings from your encrypted PDF file is instant;
.:. Support command line operation (for manual use or inclusion in scripts);
.:. Support PDF1.7 format (formerly only supported by Acrobat 8.0 application);
.:. Support PDF1.7 (Acrobat 8.x) files, including 40-bit RC4 decryption, 128-bit RC4 decryption, AES decryption, compressed files and unencrypted metadata;
.:. Batch operation on many files from command line;
.:. Support Adobe Standard 40-bit Encryption, Adobe Advanced 128-bit Encryption and AES Encryption;
.:. Decrypt protected Adobe Acrobat PDF files, removing restrictions on printing, editing, copying;

Download here
http://rapidshare.com/files/47755661/PDF.Password.Remover.v3.0.rar

Read More......

ADG Panorama Tools Pro v5.2.0.32



ADG Panorama Tools Pro v5.2.0.32 | 3.6 MB

ADG Panorama Tools is a panorama stitching software for Internet publishing, printing and interactive viewing. It automatically combines a series of individual photos so seamlessly that they together form impressive 360-degree panorama composition. Just watching the Auto Stitching process is a lot of fun. The program shows in live action how it connects the images by tilting and sliding them a little. This digital panorama is displayed in a web browser and allows the viewer to scroll through the image. No additional plug-ins required.

No need to learn digital editing or HTML coding! Just use your digital camera, take several pictures around you, load them to ADG Panorama and let it do the rest. ADG Panorama in seconds automatically aligns, stitches these images together to form the panorama and even creates the web page for you.

Download here

http://rapidshare.com/files/47720966/ADG.Panorama.v5.2.0.32.RGL.rar

http://www.icefile.com/index.php?page=main&id=0e566147&name=ADG.Panorama.v5.2.0.32.RGL.rar

Read More......

Alchemy Lab Remote Control Pro v3.1.0


pro

Alchemy Lab Remote Control Pro v3.1.0 | 2 MB

Remote Control PRO is a network management tool that allows the Network Administrator to view and control network computers without having to leave their own workplace. The Administrator connects to a remote computer over the network and, having the remote desktop on the screen of his own PC, launches programs, changes computer settings, and initiates remote shutdown by using the keyboard and mouse of their own.

Advantages of Remote Control PRO
:: High Performance and Low CPU Load
The killing kernel mode driver technology used allows the program to make thousands screen updates per second. It also keeps the controlled computer CPU load as low as 5-10%.
:: Easy Remote Deploy To install the client software on multiple computers in your network, please specify the computers you need to control, and the program will remotely deploy the client software to the selected computers in minutes.
:: Encrypted Protocol
Remote Control PRO uses 128-bit RC4 protocol encryption that makes the program usage absolutely safe even in Wide Area Networks.
:: Reliable Security
You can configure the program to allow only selected users control the selected computer by specifying logins and passwords, or use Windows users and groups instead.


Additional Features
:: Built-in File Manager
Remote Control PRO has a built-in file manager which allows you to copy files to and from the remote computer with ease.
:: Built-in Messaging and Chat
Network Administrator can not only send a text message to the remote end (e.g. "Please do not touch the keyboard, I am installing software updates"), but even chat with the user to clarify details before helping him/her fix the problem.
:: Remote Clipboard Operations
With Remote Control PRO you can operate local and remote clipboard data with ease, e.g. copy text from remote computer and paste it in a text editor opened on the local PC.
:: Remote Task Manager
With built-in remote task manager you can control applications/processes/etc. running on the remote computer exactly as you do this on the local PC with the help of the Windows Task Manager application.
:: Full Screen Mode
The Full Screen Mode gives you the complete feeling that you are sitting in front of the computer you are controlling now!
:: Multiple Client Connections.
IT staff members can jointly manage and repair problem computers since the program allows multiple connections to a remote PC.

Download here

http://rapidshare.com/files/47836306/ALRCPro.v3.1.0.rar

Read More......

ESoftware Studio Easy Login v1.1.5


easy_boy

ESoftware Studio Easy Login v1.1.5 | English |OS:Win2000/XP/2003 |1.2 MB

Manage your piracy data and login to websites or applications automatically. Provide high security protection to prevent theft of Trojan or spyware. At present, people use accounts and passwords are increasingly frequent, but Trojan or spyware programs also has become more rampant. Easy Login is to help ease your memory suffering for these key confidential data, and to eliminate your security concerns during the online login. Easy Login is your trusted security assistant in your network life.

Key features:
Auto Login Website
Broadly support websites such as Portals, Mail, Forums, Online Banking, Intranet etc.

Auto Login Application
Broadly support desktop applications such as Games, Instant Messaging, Enterprise Client etc.

Login Protection
Auto impose security protection to login process, to prevent theft of Trojan or spyware programs.

Data Encryption
Data auto-encryption with industrial strength (RSA) to ensure security of all your private data.

Hardware Binding
Runtime hardware binding and master password protection to enhance your security to the utmost. You can choose to bind with computer, or with portable USB device for unaccompanied trip.

Account Pad
Securely manage any type of account information in your life, to ease your memory suffering.

Memo Pad
Securely record any valuable things in your life, greatly expanding the data scope for safety management.

Contact Pad
Securely record contact information of your family and friends.

Lock Protection
Multiple auto-lock protection measures to ensure your programs and data not used by others.

Data Maintenance
Integrity data backup and restore with compression, data import and export with encryption.

Quick Start Login
One key to popup login list of all your websites or applications to facilitate quick start login.

Personalized Customization
Rich customizations on login options, login rules, shortcut keys and menus, to meet your individual demands.

Resist Fraud
Automatic identify frauds against your login websites and applications, to resist unfamiliar fraudulent websites or Trojan programs camouflage.

Type rest of the post here

mirror: DEPOSITFILES

http://depositfiles.com/files/1437799

http://rapidshare.com/files/47837596/ESSSL.v1.1.5.rar

Read More......