Spyware Doctor Remove spyware, adware, Trojan horses, and keyloggers with this popular and fast utility. OS: Windows 98/Me/2000/XP/2003 Server More Downloads Most popular New this week Downloads for Mac Downloads for Handhelds
| | | | | | | | | | | · Trialware: Sunbelt Messaging Ninja offers next-generation antispam/antivirus for Exchange Download your FREE, 30-day evaluation copy of Messaging Ninja, compliments of Sunbelt Software, to see this all-in-one security solution for Microsoft Exchange in action. · How effective is your antivirus? Get the quick-and-dirty on CounterSpy Enterprise and how it can help protect your network against spyware threats. This short paper from Sunbelt Software explains why you need a dedicated anti-spyware solution rather than relying on an antivirus product that offers only marginal spyware protection. · Webcast: How to combine endpoint protection with endpoint compliance Ensuring that your endpoints comply with your security policies is an ongoing task that begs for a comprehensive, automated solution. Listen to this TechRepublic Webcast, now available on demand, to learn about a multi-layered, standards-based solution that ensures endpoint compliance and integrates with your existing infrastructure. (Sponsored by Symantec) · Legal risks of uncontrolled e-mail and Web content If you're not adequately controlling your employees' use of e-mail and the Internet, your company may be liable for damages related to harassment, child pornography, defamation, copyright infringement, and more. Download this paper from MessageLabs to learn more about the risks you face if you don't have a consistently enforced Acceptable Usage Policy. More white papers: Most popular papers Recently added papers Most popular papers by industry | | | | | | | | | | | | | | | | | | | | | Webroot Spy Sweeper Get protection from harmful spyware that invades your privacy and can lead to identity theft. OS: Windows 2000/XP LimeWire - Freeware Search for and download files located in P2P networks and share your files. OS: Windows 95/98/Me/NT/2000/XP ICQ - Freeware Communicate instantly using the latest version of this popular chat client. OS: Windows 98SE/Me/2000/XP Morpheus - Freeware Search multiple P2P networks including BitTorrent to download MP3s, videos, and games. OS: Windows 2000/XP Spybot - Search & Destroy - Freeware Search your hard disk and Registry for threats to your security and privacy. OS: Windows 98/Me/NT/2000/XP WinZip 11 Quickly and easily compress and decompress files, folders, and entire folder trees. OS: Windows 98/Me/2000/XP Lexa Organizer Effective task manager that helps you organize your work and personal life in a few simple clicks. OS: Windows 95/98/Me/2000/XP RealPlayer 10 - Freeware Get the latest free version of this media player and jukebox from RealNetworks. OS: Windows 98/Me/NT/2000/XP CleanCenter Free up hard disk space and speed up your computer by erasing useless junk and unwanted files. OS: Windows 98/Me/2000/XP/2003 Server NoClone Home Edition Save valuable hard drive space by finding and removing true duplicate files. OS: Windows 98/Me/NT/2000/XP | |
Use these four Registry tweaks to accelerate Windows XP Plenty of third-party programs claim to optimize Windows, but they're simply making registry edits. Here are four manual tweaks to improve the speed of Windows XP. Tune Windows XP to speed up boot and shutdown times This hack from Windows XP Hacks, 2nd Edition shows how to tweak a PC's BIOS, the registry, and other WinXP settings to streamline boot and shutdown times. Hard drive failure troubleshooting checklist This checklist steps through a troubleshooting process covering items like physical connections, BIOS settings, viruses, partitions, and physical and logical errors. Detect hard disk failures before they happen When a hard disk goes bad, users can lose critical data. This chapter from PC Hacks shows how to use S.M.A.R.T. technology to be alerted to an impending failure. SolutionBase: Find a lost Windows product key To install or reinstall Windows, you must have a product key for that version of the OS. See how to reveal a lost product key for a currently installed version of Windows. | | 10 things you can do when Windows XP won't boot When a Windows XP operating system won't boot properly, you have some troubleshooting ahead of you. Here's a look at the likely culprits and what you can do to fix the problem. 10 handy Windows XP efficiency tricks From speeding up Defrag to instantly creating a Restore Point to customizing the most frequently used programs on the Start menu, these tips will help you gain more control over how WinXP operates. Create sophisticated professional diagrams with Microsoft Word tools For small diagramming tasks, Word may actually be a better choice than Visio. This download introduces Word's basic diagramming tools and offers an illustrative example. Microsoft Word 2003 Keyboard Shortcuts This handy list offers 80 keyboard shortcuts for at-a-glance help when you need to format text, work with tables, print and preview documents, apply styles, and more. 10+ things you should know when deploying Windows desktops from images This list of tips will help you create a reliable Windows system image and successfully deploy it across your organization. | | | | | |
10 Tips for Creating Your Web Site When looking for ways to build your web site, even minor steps can make a huge difference. The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealing. Antivirus Software and Disk Defragmentation Want to speed up your antivirus scans? Download this white paper and see how much faster your antivirus software should be running. ITIL: What It Is and Why You Should Care ITIL is becoming the next big thing in Information Technology. This paper outlines the origin of ITIL, who controls its contents, who are the biggest users, and why you should care. The Bottom Line on Dual-Core Processors Dual-core processors have many advantages. Learn the benefits of dual-core technology to determine if it makes sense for your organization. What you need to know before deploying VoIP After crunching the numbers and weighing the benefits and risks, you've decided to swap out your old PBX for a VoIP system. Now comes the hard part: designing and deploying a solution that will deliver the fastest ROI for your enterprise. | | Spyware: Determine your threat level with Webroot Enterprise Spy Audit Determining the threat level and costs that enterprises face from spyware can be a daunting challenge. Download this free Enterprise Spy Audit tool to help your enterprise assess the existing threat to your organization. A Project Management Primer or "A Guide on How to Make Projects Work" This straightforward guide covers key principles and successfully planning and implementing a project. It includes the purpose of the project plan, the fine art of scheduling, risk management, and staying on track. TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox Discover how to use common operating-system tools to troubleshoot various problems that could exist in your network. Project Management Best Practices Learn what makes an effective project plan, how it is used, what are the deliverables of effective project management, how plans are best structured for reuse, and what are the critical success factors for effective project management. What E-Mail Hackers Know that You Don't This document outlines how hackers are exploiting vulnerabilities in e-mail systems, and describes the widely available hacking tools they use. | | | | | |
No hay comentarios.:
Publicar un comentario