Friday, February 17, 2012

NextUp TextAloud v3.0.37 Portable

Convert any text into voice and MP3 for PC or download to MP3 player. TextAloud is the leading text to speech program, available with exciting premium voices (including several languages) from ATT, Cepstral and NeoSpeech for the best in computer speech for your PC. TextAloud uses voice synthesis to convert text into spoken audio. TextAloud reads text from email, web pages, reports and more, aloud on your PC. TextAloud can also save your daily reading to MP3 or Windows Media files ready for playback on your iPod, PocketPC, or even on your TV with Tivo's Home Media Option.
What you can do with TextAloud:

• Sit back and relax while your PC reads to you
• Save text to MP3 for portable audio players
• Proofread your own writing
• Listen to that report while you're on the treadmill
• Find help for someone with a reading disability
• Create messages for your answering machine
• Reduce eye strain from too much reading
• Listen to information while you work on something else
• Take some reading along for your daily walk or run
• Turn your iPod into a tax write-off
• Listen to an eBook during your commute
• Study English as a Second Language
• Help a senior citizen or someone with low vision
• Add some spice to your PowerPoint presentations
• Find a great new tool to study for exams
• Listen to text read in other languages
• Amuse your kids by letting your PC read stories to them
• Create audio files for computer games
• Prepare for a big speech by hearing your words read aloud

Features at a glance:

• Single-Article and Multi-Article Mode for listening to articles one at a time, or building a playlist to listen to later.
• Load articles using the Clipboard, Document Import, Hot Keys and Drag and Drop.
• Support for Word, PDF and HTML documents.
• Support for multiple Text-To-Speech engines, including international voices.
• Support for WAV, MP3 and WMA audio files.
• Proofread tool for listening to documents as you proofread.
• Plugin toolbar for Internet Explorer to listen to web pages.

Home Page -



Thursday, February 16, 2012

Big Book of Apple Hacks: Tips & Tools for Unlocking the Power of Your Apple Devices

Bigger in size, longer in length, broader in scope, and even more useful than our original Mac OS X Hacks, the new Big Book of Apple Hacks offers a grab bag of tips, tricks and hacks to get the most out of Mac OS X Leopard, as well as the new line of iPods, iPhone, and Apple TV.  



Wednesday, February 15, 2012

Speed MP3 Downloader

Speed MP3 Downloader is really a hear-and-get tool, via which you can fast obtain unlimited amount of high quality MP3. It has the largest collection of high quality music, and allows you to search your favorites in tags, such as indie, hip-hop, classical. etc.
You can even search the live, piano, guitar or cover editions of your favorite songs, e.g. the live concert albums of your favorite band. All songs are in the MP3 format and can be played on any computer or on any MP3 Player including iPod, iPhone, cell phone, etc. Moreover, it also recommends the USA AIRPLAY HOT 100 each week and supports all digital players including iPod, cellphone, etc.

Speed MP3 Downloader is a simple and neat utility for indexing and downloading your favorite music from Internet. The application is so user-friendly that anybody can use it; it just takes a few clicks and less than 5 seconds to bring you the search results.

Speed MP3 Downloader brings you music by means of searching the public audio sites. Something you'll definitely love in this program is that it can run many searches in parallel. Users can also pretest the downloading MP3 files; if the files are not what they are looking for, users can stop downloading immediately to avoid wasting time.

OS : Win XP/2000/Vista/Win 7
Language : English

Home Page -



Tuesday, February 14, 2012

Trojan Killer

Trojan Killer is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by some standard antivirus scanners. Trojan Killer scans ALL the files loaded at boot time for Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Trojan Killer works in the field of system security to ensure safety for computer systems. We propose products to help you get rid of annoying adware, malware and other rough tools. It is very important to restore control on your computer as soon as possible and do not allow anyone to use your data.
Additional Tools
- Reset Internet Explorer Home/Start/Search Page Settings
Some Malware programs make changes to the Internet Explorer Home, Start and Search Page settings in order to re-direct the web browser to different websites.

This Utility will reset the Home/Start/Search pages to standard Defaults. You can then manually reset your Home Page to your website of choice (or leave it "blank", the default).

- Reset HOSTS file
The Windows HOSTS file is a text file which stores website addresses. The file can be used to speed up access to websites you visit often - by equating the website name (e.g. with its DNS address, the web browser can find the website more quickly as it does not have to query a DNS Name Server.

Some Malware programs add entries to this file, to either deny access to websites (usually security-related or antivirus company websites), or to re-direct access to websites of their choosing.

- Reset Windows Update Policies
Some Malware programs attempt to prevent Windows Update from running, and inhibit access to resetting Windows Update by blanking out the Windows Update options on the Update configuration screen.

This Utility will check the current Windows Update settings and correct them where necessary.

OS : Windows 2000/XP/Vista/7
Language : English

Home Page -



Thursday, February 9, 2012

Passcape Windows Password Recovery

Welcome to Windows Password Recovery, a network security analyzer and Windows password recovery utility. Windows Password Recovery tool is the only solution that implements the most advanced, patented password recovery technologies developed in Passcape Software, such as Artificial Intelligence or Pass-phrase attack.

Contemporary, easily customizable graphical user interface.
Imports hashes from 8 other programs.
Imports directly from SAM or ntds.dit; even if the files are locked by the system, the program still reads them.
Imports hashes from remote computers.
Import hashes from system shadow copies, restore points, backup and repair folders.
Can backup\save local registry files and Active Directory database.
Imports password history hashes.
Recovers some account passwords instantly (when importing locally).
Supports Active Directory (domain accounts).
Supports importing from 64-bit systems.
Exports hashes to the PWDUMP file.
The software has 14 types of different attacks. Some of them are unique, implemented upon patented technologies.
The program supports multithreading, fully leveraging the power of modern computers.
Dictionary attack supports text dictionaries in the ASCII, UNICODE,UTF8, PCD, RAR and ZIP formats.
Broad choice of online dictionaries for dictionary attacks (about 2 GB). Not enough? Take a look at our ultimate and unique 6Gb wordlist collection.
Some of the program's functions - e.g., word mutation - are unique. For example, the total number of mutation rules exceeds a hundred and fifty. Not any other similar application features that!
Supports unlimited number of inspected hashes.
Artificcial Intelligent analysis of found passwords.
High search speed on modern computers - over 100 million of passwords per second (without utilizing the power of GPU).
Includes auxiliary tools: hash generator, password strength check, rainbow tables generators, SAM/NTDS.DIT backup tool, asterisk password revealer, resetting user password directly in SAM or NTDS.DIT files, SAM and NTDS.DIT explorers, DPAPI offline decoder, etc.
Useful wordlist utilities
Advanced password reports
And much more......



Wednesday, February 8, 2012

Big Book of Windows Hacks

Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to.
Whether you want to tweak Vista's Aero interface, build customized sidebar gadgets and run them from a USB key, or hack the "unhackable" screensavers, you'll find quick and ingenious ways to bend these recalcitrant operating systems to your will.

The Big Book of Windows Hacks focuses on Vista, the new bad boy on Microsoft's block, with hacks and workarounds that also work for Windows XP. You can read each hack in just a few minutes, saving countless hours of searching for the right answer. The step-by-step instructions let you apply the solutions in no time. This book takes you beyond the operating system with hacks for applications like Internet Explorer 7 and Office 2007, and hardware such as the Zune, your wireless router, and the PC itself.



Monday, February 6, 2012

Programming Android



Tutsplus : 30 Days to Learn jQuery 2012

Hi, my name is Jeffrey Way. So here's the thing: you know you need to learn jQuery! When IT's far and away the Most popular javascript Library in the World, and is Easily the Most Often Requested Technical skill by Employers, IT Clearly Makes perfect sense to DIG in, and learn the Library. If you Promise to Give Me fifteen minutes a Day , for an entire month, then I promise that you'll come out the other side as a jQuery pro.



Java How to Program (early objects) (9th Edition)

The Deitels’ groundbreaking How to Program series offers unparalleled breadth and depth of object-oriented programming concepts and intermediate-level topics for further study. Their Live Code Approach features thousands of lines of code in hundreds of complete working programs. This enables readers to confirm that programs run as expected. Java How to Program (Early Objects) 9e contains an optional extensive OOD/UML 2 case study on developing and implementing the software for an automated teller machine.This edition covers both Java SE7 and SE6.



Thursday, February 2, 2012

Social Pro 2.0.3

If you have multiple Facebook, Twitter, Google+ and Gmail accounts and you're looking to manage all your favorite services at one single application - Social is the solution for you.
Social is designed to bring back the fun and simplicity of online social networking. While it is important to keep track of those special to us through our social networks and services, having to constantly log and re-log onto separate sites on different windows can become a painful and tedious task.

But now you can easily stay in touch with the social networks and services that matter to you all through accessing a single application with social!

Social makes it easier than ever to stay updated with your family and friends by alerting you of all recent posts from your social services. With a quick glance and you can see all your messages and updates from Facebook, Google+, Twitter and emails from Gmail instead of having to log onto separate sites for their services.

Social is also compatible with your instant messengers on Facebook and gTalk buddies. You can receive notifications of new messages and incoming chat requests from the menu bar. Previews of messages are available in multicolored notification bubbles designed to differentiate the services for better readability.

Main features:
Support of Facebook, Twitter, GMail, GTalk and Google+
Multiple accounts login
Desktop and Mobile View
Notification for new tweets
Sound notification
Ability to disable notification for each services
Resizable windows

Home Page:



Computer Forensics: Investigating Network Intrusions and Cyber Crime

The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. In full, this and the other four books provide preparation to identify evidence in computer related crime and abuse cases as well as track the intrusive hacker's path through a client system. The series and accompanying labs help prepare the security student or professional to profile an intruder's footprint and gather all necessary information and evidence to support prosecution in a court of law. Network Intrusions and Cybercrime includes a discussion of tools used in investigations as well as information on investigating network traffic, web attacks, DOS attacks, Corporate Espionage and much more!