I will post here softwares or tool or settings etc related to various Tools
Pratik K
(Student)
(3406 Points)
Replied 21 January 2009
100K Zipper
help to Zip
Pratik K
(Student)
(3406 Points)
Replied 21 January 2009
ATF Cleaner
just try it it will clean the ATF
means it cleans the usage data and chache files but do not remove the actual files and data
Pratik K
(Student)
(3406 Points)
Replied 21 January 2009
Berlitz
it is a kind of interpretor menas translate the words sentences in to different but limited languages
Pratik K
(Student)
(3406 Points)
Replied 21 January 2009
Driver Backup
sirf nam hi kafi hain
Pratik K
(Student)
(3406 Points)
Replied 21 January 2009
sugestion/addition/alteration are welcomed
and this is not the end
I will accumulate few more and post here soon
check new listings soon....
Pratik K
(Student)
(3406 Points)
Replied 27 January 2009
dsCrypt v1.10
Copyright (c)2002-2004 Dariusz Stanislawek
dsCrypt is AES/Rijndael file encryption software with simple, multi-file, drag-and-drop operations. It features optimal implementation, performance and safety measures. dsCrypt uses an advanced encryption algorithm and offers unique options for enhanced security.
FEATURES
- extensively tested and widely accepted algorithm
- BruteHalt and exceptional resistance to brute-force password search
- inherent resistance to brute-force key search
- Secure PassPad and immunity to keylogger-infested environments
- disclosed implementation and source code
- secure use of system resources
- verified data and file processing
- efficient user interface and operation
- speedy performance
- really small executable file
- self-contained and dependency-free
- installation-and-pollution-free
- freeware status and unrestricted distribution
USAGE
Click the "Mode" menu item to select encryption or decryption. Drag-and-drop files from Windows Explorer on dsCrypt's window, or use the "Open" command to browse and select files.
CHANGE LOG
v1.10
- progress indicator
- press Esc to abort processing
- function key "F4 - save the active key in hexadecimal format"
- option "Save and check CRC" (active in v1.00)
- option "Overwrite files"
- option "Reset key after inactivity [min]"
- resets key after changing "Key setup iterations"
- improved PRNG
- updated documentation
- saving options only if changed (incl. the window's position)
- option "Key setup constant [0 - 4294967295]"; used [0] in v1.00
The last option combined with the "Key setup iterations" further enhances security particularly in keylogger-infested environments, provided you preset and save them on a secure system.
SECURITY
Use a difficult, alpha-numerical (including space and special characters), case sensitive password with at least 10 and up to 32 characters. Beware of keyloggers! A verified password is indicated by the yellow background and will be used for all consecutive operations without any prompts unless a decryption fails. Passwords become verified after a successful decryption or entering them twice in the password box. To change your most recently used password, click the "Pass" menu item. The algorithm has not been broken and there are no means of data recovery if you forget a password. Note that due to the nature of the IV-CBC mode of operation, the same data and password will always produce different cipherdata.
dsCrypt overwrites original files, does not create any temporary files, and erases the data and password memory allocation after use, so any possible paging/swap file leftovers are nullified. It does not save your password in any form. Apart from the ".dsc" extension (which can be changed) encrypted files do not contain any dsCrypt specific, recognizable characteristics or data identification. Files have to be decrypted entirely with a provided password and the integrity of the file padding as well as CRC are assessed to ensure a correct conclusion.
As for the algorithm, here is nist.gov info: "NIST is pleased to announce the approval of the Federal Information Processing Standard (FIPS) for the Advanced Encryption Standard, FIPS-197. This standard specifies Rijndael as a FIPS-approved symmetric encryption algorithm that may be used by U.S. Government organizations (and others) to protect sensitive information."
BRUTEHALT
A brute-force dsCrypt password search is going to be very slow; it takes 250ms to setup a single key on P3-650MHz plus more time for decryption, and this delay can be increased as much as necessary. The delay is caused by a huge number of processing iterations needed to generate a key from a password. Since the key depends on the number of iterations, this step can not be bypassed and the delay can only be reduced by optimized code and faster hardware. Brute-force search of the 256-bit key itself is not feasible. It is possible to alter the number of key setup iterations with the "Opt" menu to further increase brute-force password search resistance. Greater values increase the resistance and delay, but when you change it, you will not be able to decrypt files encrypted with a different iteration value. The BruteHalt option forces a potential attacker to try out all possible numbers (aeon wait) if you change the 100000 default.
SECURE PASSPAD
Keyloggers are powerless against dsCrypt's Secure PassPad. It employs a mouse operated, graphical keypad, which directly communicates with the application. Hold Shift and click the "Pass" menu item to try it. Use the "Opt" menu to make it permanent. Unlike the standard password entry methods, Secure PassPad will accept the entire range of available characters and exponentially increase security. Furthermore, a password can also be memorized as a pattern on the grid.
OPTIONS
dsCrypt offers a "Passfile" as an option for defeating keyloggers as well as using the 256-bit key to its fullest capacity. With a Hex editor, create a 32-byte, random binary file with any of the 256 values and encrypt it with a "light", typical password. Start dsCrypt with the Passfile on the command-line or drag-and-drop it on "dscrypt.exe" or its shortcut, and enter the "light" password. Alternatively, hold Ctrl, click the "Pass" menu item and open a Passfile, or again hold Ctrl and drag-and-drop a Passfile on dsCrypt's window. From now on the contents of your Passfile will be used as an ultra-secure password. To break your encrypted files one would need the Passfile and its password. Keyloggers can get only a password, but a Passfile can reside on a floppy, CD, or be hidden within ordinary files.
dsCrypt can automatically use a Passfile attached to the end of other files. You could append it with eg. copy/b to host files like EXE, JPG, WAV, etc. and they will still work as usual.
dsCrypt can generate a random key for a Passfile if you press F6. You should modify it in a Hex editor to randomize it even more, then encrypt and save in a safe place or hide in another file. Note that the encryption step is not an option and dsCrypt will not accept an un-encrypted Passfile.
dsCrypt appends the ".dsc" extension to encrypted files and removes it after decryption. However, you can rename encrypted files to anything you like and the decryption will still function.
Keyboard shortcuts:
Mode - Alt+M or Space
Pass - Alt+P or Enter
Open - Alt+O or Tab
Info - Alt+I or F1
Exit - Alt+F4 or Esc
Function keys:
F1 - help
F2 - check the active key (in hexadecimal format)
F3 - save the active key in binary format
F4 - save the active key in hexadecimal format
F6 - generate a random, binary key
F12 - website
IMPLEMENTATION
Cipher: AES (Rijndael)
Mode: CBC
Key: 256 bit
IV: 16 byte randomized time and system events derivative
Passphrase: max 32 characters
Max File Size: 2GB (theoretically)
Cipher File Structure:
[cipherdata] + [padding <= 16 bytes] + [IV = 4 CRC* + 12 random bytes]
(* - optional)
VERIFICATION
A command-line version of dsCrypt and its source code are available from the website. The version is much faster in processing of large files.
Get updates directly from:
https://www.ozemail.com.au/~nulifetv/freezip/freeware/
...otherwise try:
https://www.ploty.com/freezip/freeware/
https://edxor.tripod.com/fw.htm
https://www.geocities.com/edxor/fw.htm
Some of other products available on this website:
WildCrypt - AES/Rijndael file encryption software. Its crypto-security is enhanced by the exclusion of any means of key or data verification, which could aid a potential attacker. WildCrypt offers many ways of crypto-key definition, camouflage and management. It is really small, fast and pollution-free.
PassPack - secure, streamlined and incredibly compact manager of passwords and confidential information. It features exceptional resistance to brute-force password search attacks. PassPack offers both import and export of unencrypted data.
SureCrypt - ultra small encryption program designed for fast processing of extremely large files. It can encrypt or decrypt files as fast as Windows Explorer can copy them. SureCrypt presents a flexible user interface with detailed record of all operations.
ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
°º º
°°º dsCrypt is Freeware. Free for private or business use. Free º
°°º for distribution and publication, but in unmodified package. º
°°º It can be freely bundled with any product or application. º
°°º Individual permissions are not required and will not be given. º
°°º º
°°ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°
DISCLAIMER:
THIS SOFTWARE IS SUPPLIED AS IS. THE AUTHOR DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THE WARRANTIES OF MERCHANTABILITY AND OF FITNESS FOR ANY PURPOSE. THE AUTHOR ASSUMES NO LIABILITY FOR DAMAGES, DIRECT OR CONSEQUENTIAL, WHICH MAY RESULT FROM THE USE OF THIS SOFTWARE.
Pratik K
(Student)
(3406 Points)
Replied 27 January 2009
File Shredder
absolute shield file shrader
(see in help menu for details)
Pratik K
(Student)
(3406 Points)
Replied 27 January 2009
Free Calender
Free-Cal is for those times when you, just need a calendar. It's small, fast, and is perfect for the quick-launch toolbar. Comments are welcome, but remember, it's just a calendar.
Pratik K
(Student)
(3406 Points)
Replied 27 January 2009
Iridium Global Time Convertor
as the name suggests
Pratik K
(Student)
(3406 Points)
Replied 27 January 2009
Magnifying Glass
sirf nam hi kafi hain
Pratik K
(Student)
(3406 Points)
Replied 27 January 2009
Screen Keyboard
install it and use it
by the ay in normal cases XP also has the same under accessibility option given under the accessories followed by the start/programme
Pratik K
(Student)
(3406 Points)
Replied 27 January 2009
Show Desktop
Pratik K
(Student)
(3406 Points)
Replied 27 January 2009
Pocket KillBox
be the killer by killing the processes unwanted
but beware of the law....
Pratik K
(Student)
(3406 Points)
Replied 27 January 2009
MemPad
as name suggest
just try it