Bengkel Auto: November 2007
SEXY GIRLS CARS
HOT GIRLS CARS

Thursday, November 8, 2007

Unikey 4.0 RC1

UniKey l� chuong tr�nh b�n ph�m ti?ng Vi?t mi?n ph�, g?n nh?, d? d�ng v� ch?y trong t?t c? c�c Windows 32 bit.

Kh�ng nh?ng th?, UniKey c�n c� m� ngu?n m? theo The GNU General Public License

Xem screenshot c?a UniKey.

UniKey h? tr?:
  • Nhi?u b?ng ti?ng Vi?t th�ng d?ng:
    • Unicode t? h?p v� d?ng s?n
    • TCVN3 (ABC), BK HCM1, BK HCM2, Vietware-X, Vietware-F
    • VIQR, VNI, VPS, VISCII
    • Unicode encodings: UTF-8, NCR Decimal/Hexadecimal - d�ng cho Web.
    • Windows 1258 code page (chu?n ti?ng Vi?t c?a Microsoft).
  • 3 phuong ph�p g� th�ng d?ng nh?t: TELEX, VNI v� VIQR.
  • Chuy?n d?i gi?a c�c b?ng m� ti?ng Vi?t.
  • T?t c? c�c phi�n b?n Windows 32 bit: Windows 9x/ME, Windows NT/2000/XP.
  • UniKey ch? c� k�ch thu?c nh? v� kh�ng y�u c?u th�m b?t c? thu vi?n n�o kh�c.
  • UniKey c� th? ch?y m� kh�ng c?n c�i d?t.
Homepage: http://www.unikey.org/
License: Open Source


Bkav Home 1324 (7.11.2007)

BkavHome l� phi�n b?n mi?n ph� c?a Bkav, h? tr? nh?ng t�nh nang di?t virus co b?n c?a Bkav (BkavEngine), d?c bi?t l� t�nh nang T? c?nh b�o (Auto Protect) tr�n t?t c? c�c h? di?u h�nh Windows (9X, 2K, XP, Vista).

V?i t�nh nang Auto Protect, khi b?n nh?n email, duy?t web, t?i file t? m?ng Internet hay m?ng n?i b?, dua c�c ? dia m?m, dia CD, USB... v�o m�y, Bkav s? t? d?ng ph�t hi?n v� x? l� virus n?u c�.
BkavHome du?c thi?t k? ph� h?p v?i nh?ng ngu?i s? d?ng c� nh�n kh�ng ti?p x�c thu?ng xuy�n v?i m�i tru?ng Internet.

Image


Homepage : http://www.bkav.com.vn
O/S : Windows All
Version : 1324
Size : 2.46 MB


Download Now

BKAV antivirus 1324

Wednesday, November 7, 2007

ASCII Generator dotNET 0.9.1

The ASCII Generator dotNET (ascgen2) is a 32-bit Windows text editor that will allow anyone to easily convert images into artwork created from text characters. The ascgen2 provides all the image processing you should need for the conversions, allowing anyone to produce great results with a minimum of effort. Numerous innovations have been made to ensure the best possible output.




features :

� A unique system to quickly produce impressive conversions
� Conversions are now optimised for the
specified font
� Create a text banner, created out of text characters
� Doubles as a text editor
� Convert from any: rla, rpf, pic, cel, cut, eps, fax, gif, jpg, jpeg, jpe, jfif, pcd, psp, pdd, psd, pbm, pgm, png, ppm, bw, rgb, rgba, sgi, tif, tiff, icb, tga, vda, vst, win, ico, emf, wmf, bmp, dib, rle, scr, pcc or pcx image
� Save to a TXT, RTF, or as a HTML Web Page created from a template
� Capture the source image directly from any TWAIN device
� Paste and convert an image from the clipboard
� Export the text image as a bitmap
� Crop the input picture
� Modify brightness and contrast
� Modify RGB colour levels
� Solarize the image
� Convert to greyscale using a choice of four different algorithms
� Edit the text by hand with all the usual text editing functions
� Apply various effects to the text
� Use your own character ramp or select from the most common ones
� Extensive options for tweaking the output
� Print the text image directly from the program
� Custom print preview/page layout hybrid
� Compiled as a stand-alone exe - no extra files required

Homepage : http://ascgendotnet.jmsoftware.co.uk
O/S:
Windows All
License : Freeware
Version :
0.9.1
Download Size : 121.3 KB

Download Now

ASCII Generator dotNET 0.9.1






aTunes 1.7.4

aTunes is a full-featured audio player and manager, developed in Java programming language, so it can be executed on different platforms: Windows, Linux and Unix-like systems, ... Currently plays mp3, ogg, wma, wav, flac, mp4 and radio streaming, allowing users to easily edit tags, organize music and rip Audio CDs.




Feature :

* Supported formats: mp3, ogg, wma, wav, flac and mp4.
* Online radio supported.
* Player engine: mplayer.
* Volume control, mute function.
* Shuffle and repeat options.
* OSD (On-screen display).
* Reads mp3, ogg, wma tags.
* Writes mp3, ogg, wma tags.
* Reads and shows pictures included in ID3v2 tags.
* Tag editor window.
* Auto tag edition tools: set track number automatically, set genre automatically.
* Some auto tag tools for all repository...

Homepage : http://www.atunes.org/
O/S:
Windows All
License : Freeware
Version : 1.74
Download Size :
14.4 MB

Download nOw

aTunes 1.7.4





Eset Smart Security 3.0.551.0 Final


ESET Smart Security was designed to be complete solution in the field of computer protection against infiltrations and attacks. Eset Smart Security offers more than just a sum of its parts � it is synergy that matters most. If all components are used simultaneously, the effectiveness of the whole program is multiplied. ESET Smart Security unifies all its functions to create a complex security solution.ESET NOD32 Antivirus + Antispyware� This component is in fact an improved version of the award-winning scanning engine of NOD32 Antivirus v2.7. With respect to program's unprecedented scanning speed, the following improvements have been made:� Improved system of cleaning and deleting infiltrations. The antivirus system now intelligently cleans and deletes infiltrations with no need for user interaction.� Computer scan can be run in background in order to use only a part of system resources. Thus scanning will not affect the performance ofyour computer and you will be able to work on it as usual.� The resident protection supports archive scanning.� Update optimization, smaller update package size than in version 2.7, more effective management and protection of update files against damage.� Email protection for users of Outlook Express.
ESET Personal Firewall� Firewall monitors all traffic between a protected computer and other computers in the local network and in the Internet. High quality protection is provided by the following functions:� Scanning of application protocols HTTP and POP3 (used for Internet browsing and for retrieving email from servers) for infiltrations.� Checking low-level network communication which helps to avoid many of various remote attacks.� Ability to recognize the character of network connections established by various types of infiltrations and ability to automatically terminate them.� Filtering of incoming and outgoing communication based on user defined rules.� Monitoring changes in executable files.� Interactive and automatic mode. The former enables you to create your own filtering rules, the latter filters all communication automatically.ESET Anti Spam� ESET Anti Spam serves to filter unsolicited email, which makes your work with email more effective. The key features of the ESET Anti Spam are:� Support for the RCF email format� Supports several scanning techniques including the combination of Bayesian filter, virus signatures and user defined rules.� Supports the creation of Blacklist and Whitelist.� Integration with the Microsoft Outlook messaging and collaboration client.� Ability to control multiple messages simultaneously.Features :� integrated firewall and antispam module� improved graphical user interface� 2 operating modes for common and advanced users� improved and automatised cleaning� true incremental updates� export / import settings
Homepage : http://www.eset.com/O/S: Windows AllLicense : FreewareVersion : 3.0.551.0Download Size : 17.8 MB
?????????? Now
Eset Smart Security 3.0.551.0 Final (32 Bit)
Eset Smart Security 3.0.551.0 Final (64 Bit)

AudioShell 1.3.5

AudioShell is a freeware MS Windows Explorer shell extension plug-in which allows you to view and edit music tags directly in Windows Explorer. It is support all files and tags standards supported by Tag&Rename. AudioShell adds ID3 tag editor and viewer tabs to the music files properties menu (you can edit ID3 tags file by file or in groups), detailed music files hints with tag and file information, and additional columns in the Explorer files list. Full Unicode support.
Supported files and tags formats: * mp3 (all ID3 tag versions) * wma, asf and wmv (including DRM protected files) * Apple iTunes and iPod aac (m4a, m4b, m4v and m4p) and mp4 files * ogg, flac (vorbis comment tags) * mpc, mp+ (APE/APEv2 tags) * monkey's audio (APE/APEv2 tags) * wav pack (APE/APEv2 tags) * optim frog (APE/APEv2 tags) * wav (ID3v2 tag in 'tag ' RIFF chunk)
Homepage : www.softpointer.com?
S: Windows 2K/XP/????
License : ????????
Version : 1.3.?
Download Size : 1.1 MB
?????????? nOw
AudioShell 1.3

Tuesday, November 6, 2007

BitDefender


BitDefender offers you the possibility to download everything from product evaluation versions , white papers, to free virus removal tools, and more?


download now

AVG Anti-Virus Free Edition


AVG Free is the most popular free solution available at no cost to home users and provides the high level of detection capability that millions of users around the world trust to protect their computers.
Easy to use, low system resources
Automatic update functionality
Real-time protection as files are opened and programs are run
AVG�s Virus Vault for the safe handling of infected
AVG 7.5 Free for Windows

Avira has over 30 million users worldwide � and what can we do for you?


From free of charge PC basis protection to complete internet protection � at Avira you can find products which perfectly meet your requirements:



ACDSee Pro 2.0.219 - Final


Discover ACDSee Pro 2 Photo Manager, the most powerful software platform for viewing, processing, editing, organizing and publishing your photos?ACDSee Pro is a single platform where professional photographers view, process, edit, organize, catalog, publish and archive their growing digital photo collections? Key features include advanced workflow functionality, support for Digital Negative Specification (DNG) and the latest RAW formats, RAW processing capability, batch IPTC editing, powerful color management functionality and professional publishing options.ACDSee Pro 2 streamlines your workflow and increases productivity. It empowers you to view, process, edit, organize, catalog, publish, and archive your photo collections with precision and control. View your RAW images with lightning-fast image previews and support for most RAW formats from DSLR cameras. Get support for IPTC core fields with XMP. Shift time stamps on multiple images at once. Compare up to four images side by side.Known as the best workflow manager for today�s photographers, ACDSee Pro has grown to become a valuable tool for quickly processing the ever-expanding variety of RAW formats from digital camera manufacturers, especially for the new generation of DSLRs. With a distinguished pedigree as the Internet�s first and fastest image browser, ACDSee has helped photographers view, edit and share images quickly and easily for more than 13 years.
Download:
http://rapidshare.com/files/55052203/ACDSeePro2.0.219Final.rar

Internet Download Manager 5.11Build 8 Reg Your Name








Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads? Unlike other download accelerators and managers that segment files before downloading starts, Internet Download Manager segments downloaded files dynamically during download process. Internet Download Manager reuses available connections without additional connect and login stages to achieve better acceleration performance.Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, directories with authorization, MP3 audio and MPEG video content processing, and a large number of directory listing formats. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.




Other features include multilingual support, zip preview, download categories, built-in download accelerator, scheduler pro, sounds on events, HTTPS support, queue processor, pipelining of ftp commands, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc?), command line parameters, and many others.




Main Features:




* All popular browsers and applications are supported! Internet Download Manager supports all versions of popular browsers, and can be integrated into any 3rd party Internet applications?


* Download with one click? When you click on a download link in a browser, IDM will take over the download and accelerate it. IDM supports HTTP, FTP and HTTPS protocols.


* Download Speed? Internet Download Manager can accelerate downloads by up to 5 times due to its intelligent dynamic file segmentation technology.


* Download Resume? Internet Download Manager will resume unfinished download from the place where they left off?


* Simple installation wizard. Quick and easy installation program will make necessary settings for you, and check your connection at the end to ensure trouble free installation of Internet Download Manager


* Automatic Antivirus checking. Antivirus checking makes your downloads free from viruses and trojans.


* Advanced Browser Integration. When enabled, the feature can be used to catch any download from any application. None of download managers have this feature.


* Built-in Scheduler? Internet Download Manager can connect to the Internet at a set time, download the files you want, disconnect, or shut down your computer when it's done.


* IDM supports many types of proxy servers. For example, IDM works with Microsoft ISA, and FTP proxy servers.


* IDM supports main authentication protocols: Basic, Negotiate, NTLM, and Keberos? Thus IDM can access many Internet and proxy servers using login name and password.


* Download All feature? IDM can add all downloads linked to the current page. It's easy to download multiple files with this feature.


* Customizable Interface. You may choose the order, and what buttons and columns appear on the main IDM window.


* Download Categories. Internet Download Manager can be used to organize downloads automatically using defined download categories.




* Quick Update Feature. Quick update may check for new versions of IDM and update IDM once per week.




* Download limits? Progressive downloading with quotas feature. The feature is useful for connections that use some kind of fair access policy (or FAP) like Direcway, Direct PC, Hughes, etc.


* Drag and Drop? You may simply drag and drop links to IDM, and drag and drop complete files out of Internet Download Manager.


* IDM is multilingual? IDM is translated to Arabic, Bosnian, Bulgarian, Chinese, Croatian, Czech, Danish, Dutch, French, German, Hungarian, Italian, Japanese, Lithuanian, Macedonian, Polish, Portuguese, Romanian, Russian, Slovenian, Spanish, Thai languages.




What's new in version 5?11 :


- Completely redeveloped IDM scheduler? Added periodic synchronization of files and the possibility to create new queues for downloading or synchronization. Added new features on starting and stopping queue processing.


- Improved user interface? Added processing of context menu key, fixed tabbing order on all dialogs, added mnemonic keys to the main menu and the menu of IDM Grabber.


- Version 5.11 includes latest bug fixes

File size: 2.49 MB
Download






















Update soft and driver for computer

Wouldn�t it be nice to be able to figure out which of the software & driver on your computer need to be updated, without a lot of fuss? Here are 2 softs for you. Having the latest updates for your software applications protects your system from security holes and optimizes performance.
Update Checker
Filehippo, one of the best sites where you can download high-quality software, launched Update Checker, a small utility that scans your computer for installed software and displays a list of updates. While the software doesn�t require installation, it doesn�t check for updates periodically and must be manually launched. Another inconvenient is that you have to manually download and install the updates. Update Checker requires .NET 2.0.



RadarSync 2007
RadarSync 2007 is an automatic computer driver and software update tool. It prevents common computer problems and optimizes performance by tracking, downloading, and installing both hardware device driver updates and software patches, fixes, and upgrades for your system. RadarSync is supposedly going to act as a Vista driver depository that makes it easy to find the drivers you want






Monday, November 5, 2007

Top Ten Server Virtualization Technology Considerations

Filed under: White Papers & Books
SWsoft, a provider of both operating system and hardware virtualization products, has an interesting whitepaper titled "Top Ten Considerations for Choosing a Server Virtualization Technology".
This top ten list provides key guidelines for honing in on the differences between hardware virtualization, para-virtualization and operating system virtualization, and it attempts to help you understand the basic options and limitations of each virtualization approach.
While reading the whitepaper, keep in mind that it was written by SWsoft, so it will obviously tend to favor its own solution. However, it does give a good overview of these various techniques and does provide a lot of useful information, especially if you are just starting out and trying to make a decision for your own environment.
It writes:
The playing field for server virtualization has become much more crowded over the last few years. Competition is always good for a market as more choices always push vendors into providing better products at more competitive prices. It can be very time consuming to digest each vendor's marketing materials to come to the right solution for your organization. This checklist provides a list of the main considerations and basic differences between the technologies to provide a starting point for technology evaluation. The three main technologies discussed in this analysis are: hardware virtualization, para-virtualization and OS virtualization.
And the ten considerations include: management tools, virtualization level, performance, density, platform support, migration, resource management, isolation and security, intended virtualization deployment and a capabilities and performance comparison.
Register and download the whitepaper,
here.

Sunday, November 4, 2007

GM-backed college students win US military's robot car race

VICTORVILLE, United States (AFP) � A robotic car built by private university students backed by General Motors was crowned champion on Sunday of a race sponsored by US military officials intent on putting the technology to work on battlefields by 2015.
Engineering students from Carnegie Mellon University in the US state of Pennsylvania won a two-million-dollar prize for being rated the top finisher in a Defense Advanced Research Projects Agency "Urban Challenge" held Saturday.
In a race worthy of a science fiction film, Carnegie Mellon's "Tartan Racing Team" backed by automotive giant GM stuffed sensors, radar and other electronics into a Chevrolet Tahoe sport utility vehicle nicknamed "Boss."
"This competition has significantly advanced our understanding of what is needed to make driverless vehicles a reality," said GM vice president of research and development Larry Burns.
"Imagine being virtually chauffeured safely in your car while doing your e-mail, eating breakfast and watching the news. The technology in "Boss" is a stepping stone toward delivering this type of convenience."
Boss and five other driverless vehicles maneuvered themselves 100 km along mock city streets on a closed Southern California military base to a finish line within a mandated six-hour time limit.
In the only contest of its kind in the world, robotic entries were driven to the starting line by team members who then abandoned the vehicles, which set out on their own.
Competitors had to park, circle, and properly react to traffic while completing "missions" that DARPA said simulate tasks vehicles might perform on battlefields.
The only traffic accident during the event was a minor fender-bender between entries from Cornell University and the Massachusetts Institute of Technology.
Eleven robotic cars and trucks began the race, and an additional 40 cars driven by people joined them to simulate city traffic.
Boss crossed the finish line in second place behind "Junior," a Volkswagen Passat modified by a team from Stanford University in California.
Speed was just one of the criteria used to determine the overall winner. DARPA judges took into account how precisely vehicles negotiated the route and obeyed traffic regulations.
The two previous annual DARPA challenges held since the event was launched in 2004 were across open desert in the Western United States. No entries completed the race in 2004. A team from Stanford won the race last year.
This was the first time vehicles maneuvering completely by their own devices had to deal with city-style driving.
"The urban setting added considerable complexity to the conditions faced by the vehicles, and was significantly more difficult than the fixed desert courses," said Urban Challenge program manager Norman Whitaker.
Stanford's entry was awarded a second-place prize of one million dollars. Third place and a prize of 500,000 dollars went to a team from Virginia Tech, the scene of an April shooting spree that killed 33 people.
Vehicles that competed in the final event are designed to operate without anyone at the steering wheel or controlling them remotely.
The US military hopes to be the real winner at the Challenge by fostering technology enabling it to make a third of its vehicles robotic by 2015. The US Congress has sanctioned the goal.
The US Department of Defense believes using robotic vehicles devoid of people will save soldiers from being killed by roadside bombs or other attacks in urban battlefields.
Roadside bombs have killed hundreds of soldiers in Iraq since the US invaded that country in 2003.
GM stands to benefit by showing the US military its vehicles can be modified to meet the Pentagon's interests. GM produces Humvee trucks used by US soldiers.
Tartan Team sponsors include technology giants Google, Intel, and Hewlett Packard.

10 Great things NOT to do with Google AdSense

There is no question that you can make some good money with Google AdSense, but you�re setting yourself up for disaster if you make any of these Top 10 mistakes!
1. Do not use fake information when opening your Google AdSense account.
Google says that�s a no-no and they will cut your account off and keep all the money you may have earned. Besides, trying to hide your true identity can cause serious problems with the I.R.S. or whoever your tax authority is.
2. Do not hack or modify Google AdSense code other than to change the parameters that Google authorizes you to change.
Any attempt to bypass Google�s built-in algorithms not only poses a danger to the integrity of the network, but it threatens the financial modle that Google operates under. You�re not dealing with some Mom-and-Pop company here, and Google has the legal muscle and deep enough pockets to drag you through every court in the land if you damage their business with your hacking antics.
3. Keep AdSense ads off of your registration, confirmation, and all �thank you� pages.
Don�t ask me why you can�t put your ads there. It makes sense to me that those would be wonderful locations. Google thinks otherwise, however, and doing so is a hanging offense according to their Terms of Service.
4. Do not display AdSense ads and a competitor�s ads (like Overture�s) on the same page at the same time.
That just makes plain good sense. Google doesn�t demand 100% SITE loyalty from you, but they do insist that their own ads not be cluttered up by offerings from their competitors.
5. Don�t �beg for clicks� or provide any incentive for clicking on your Google AdSense ads.
This is a biggie and you see this rule violated all the time. Any of the �get paid to do stuff� sites that put Google ads in the member�s control panels are walking the plank and they don�t even realize it. Even those sites with the polite little messages asking you to �help keep my site running by clicking on our sponsor�s ads� are asking to be cut off if those happen to be Google ads.
6. Never click on the ads running on your own site, even if you are genuinely interested in the product or service and are thinking of buying it!
Nothing screams FRAUD louder than a webmaster running up his or her own click counts by happily clicking on ads fromtheir own site. The Google Gods can track this activity and it won�t be long until you find yourself getting a goodbye note from their fraud team.
7. No misleading labeling
Google is very specific about what text can be placed around their ads. Their Terms of Service state: �Publishers may not label the ads with text other than �sponsored links� or �advertisements.� This includes any text directly above our ads that could be confused with, or attempt to be associated with Google ads.�
This is to keep visitors from becoming confused and barking up Google�s tree when they clicked on an ad that led to a porn site instead of the recipe site they were expecting to visit.
8. Avoid keyword spamming and other divisive tricks
You may be tempted to buy one of those �generates thousands of key-word rich pages in seconds� programs that are so popular these days but I�ll tell you this: Their days are numbered. Google is wise to such shenanigans and they will be hot on your trail. Other prohibited gimmicks include:
� �Sneaky� page redirects that send a visitor off to a different site then they were expecting to visit.
� Multiple sites, domains, pages, etc. which have substantially duplicate content.
� Hidden text or links of any type.
� Excessive outbound links on any page. Google recommends no more than 100. I�d keep it way below that.
� And here is a nugget of wisdom straight from Google�s mouth: �Do not participate in link schemes designed to increase your site�s ranking or PageRank. In particular, avoid links to web spammers or �bad neighborhoods� on the web as your website may be affected adversely by those links.
9. Don�t advertise anything on Google�s prohibited items list.
It�s a lot shorter lists than PayPal�s or eBay�s, but it includes a lot of the same stuff like hacking/cracking content, porn, illegal drugs, gambling sites, beer or hard alcohol (I guess wine is OK), weapons, and the other usual stuff.
10. And the 10th dumbest thing NOT to do with Google AdSense is to let the other nine things stop you from running an honest site that�s designed to make the most out of this very profitable opportunity that Google offers!