64bit and x64 - Start64!
The DialOut/EZ Redirector lets your applications use modems provided by modem servers on your network. This redirector does this by creating one or more virtual COM ports that make these networked modems appear to be connected to the local computer, even though they are physically located on servers.
NoVirusThanks MD5 Checksum Tool is a free and easy to use application designed to allow users to generate the file checksum (MD5/SHA1 hash) of a file or string. It can be very useful to check if an executable file is legit, in other words, if it is the official release from the offical author. The hashing algorithms supported are: MD5, SHA1, SHA256, SHA384 and SHA512.
Cerberus FTP Server provides a secure and reliable file transfer solution with enterprise-level features for the demanding IT professional and the ease-of-use that the casual file sharer has come to expect. Designed to use very few system resources, Cerberus features a user-friendly interface that can be easily hidden or accessed from the system tray.
Apple published a new blog post on Friday on its developer website reminding all devs that it will no longer accept 32-bit apps in the Mac App Store starting January 1, 2018.
BrowsingHistoryView is a utility that reads the history data of 4 different Web browsers (Internet Explorer, Mozilla Firefox, Google Chrome, and Safari) and displays the browsing history of all these Web browsers in one table. The browsing history table includes the following information: Visited URL, Title, Visit Time, Visit Count, Web browser and User Profile.
When you delete files from your computer, the operating system does not erase the contents of these files from the disk - only the 'references' to these files are removed from filesystem tables. Sensitive data that you intended to erase remains intact on your hard drive and could easily be restored with a widely available undelete tool.
OpenSaveFilesView is a simple tool that displays the list of files that you previously opened with the standard open/save dialog-box of Windows. For every file in the list, the following information is displayed: Filename, Extension, Order (The order that the files were opened for every file extension), Open Time (Available only for the last opened file of every file type), File Modified/Created Time, File Size, and File Attributes.
The Arch Linux devs announced today that they are officially terminating support for 32-bit architectures, removing all i686 packages from the repositories by the end of the month.
AlternateStreamView is a small utility that allows you to scan your NTFS drive, and find all hidden alternate streams stored in the file system. After scanning and finding the alternate streams, you can extract these streams into the specified folder, delete unwanted streams, or save the streams list into text/html/csv/xml file.
With Tweak-7 you have access to a tool packed with system tweaking, customization, optimization and cleanup features for Windows 7. Tweak-7 includes hundreds of options to customize and optimize Windows 7 plus several additional tools to maintain the whole system.
Listary is an excellent find-as-you-type search utility that makes searching items in large unmanageable lists of Windows applications a breeze. Items in Windows Explorer, Task Manager, Registry Editor, Windows Desktop, file Open/Save dialogs and numerous other components and third-party applications can be found instantaneously with this free utility that allows you to type any part of the item name to be searched.
BestCrypt Traveller software allows the user quickly accessing encrypted container files created by BestCrypt software. BestCrypt Traveller starts working without installation of the software. The user runs a single executable file (BCTraveller.exe), standard BestCrypt icon appears in Windows system tray where from the user can run commands to mount or dismount container file and create new encrypted container.
Windows 7 runs on more than 45 percent of the desktop computers worldwide, and many of these systems are part of companies where upgrading to Windows 10 is a costly process that could involve more than the simple migration to a new operating system.
Page 20 of 140