sábado, 8 de novembro de 2008

America Processing

America Processing is a company a merchant account provider that offers its customers delivery of service with credit cards.

If you have a business and does not know how to accept the credit cards of their customers, America Processing will help you begin to accept this type of payment in a manner fully profitable and efficient.

America Processing operates in 50 states: Alabama, Alaska, Arizona, Arkansas, California, Colorado, Connecticut, Delaware, Florida, Georgia, Hawaii, Idaho, Illinois, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan , Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, South Carolina, the Dakota South, Tennessee, Texas, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin, Wyoming

Make your subscription now in America Processing and enjoy all the benefits you can receive your payments on credit cards.

quinta-feira, 6 de novembro de 2008

Find Old Versions of Favorite Programs at OldVersion.com

Find Old Versions of Favorite Programs at OldVersion.com

Nov 6, 2008 11:59 am - PCWorld.com

The tagline at OldVersion.com reads as follows: Newer is not always better. That's true of Coke, Star Wars movies, and software. If you recently installed a new version of a beloved program, only to recoil in horror at its "improved" interface, "better" features, and "faster" operation, OldVersion.com is the site for you. It's home to a couple thousand versions of nearly 200 popular programs, from AOL Instant Messenger to Zone Alarm.

Keep in mind that with some programs, older is not necessarily better, either. Even if you're not wild about the latest version of, say, ZoneAlarm, you don't want an outdated and/or unsupported firewall protecting your system--you want the latest and greatest.

That said, sometimes you just want to go back to the old, the familiar, the works-the-way-you-want-it-to. For example, I recently upgraded to version 3 of Copernic Desktop Search, only to discover it was missing a couple key features from version 2 (most notably dynamic searching in the taskbar). Alas, OldVersion doesn't stock Copernic, but there's a forum where you can post requests. Very often other users will come to the rescue with links to older versions.

*** From: http://www.pcworld.com/article/153409/find_old_versions_of_favorite_programs_at_oldversioncom.html

sexta-feira, 8 de agosto de 2008

15 Great, Free Privacy Downloads - Part 2


6 - CCleaner


Here's another great tool--and a longtime favorite of ours--for cleaning up all traces of your Internet activities. CCleaner cleans Internet Explorer and Firefox, of course, but also Adobe Acrobat, Adobe Flash Player, Google Toolbar, and Windows Media Player. It even picks up after major applications such as Microsoft Office, and it includes a Registry cleaner and an uninstaller.

+++ Download CCleaner Price: Free

7 - SendShield

A lesser-known privacy problem may be among the most dangerous: hidden information in Microsoft Office documents that becomes exposed after the documents are made public.

This problem has struck some of the best-know enterprises in the world. In 2006, for example, Google publicly posted a PowerPoint presentation that contained notes disclosing highly sensitive financial projections to the world. Even worse, in 2003, Alistair Campbell, top communications aide to then-Prime Minister Tony Blair of the UK, released a Word document whose hidden information revealed that the British government had used plagiarized documents to justify its involvement in the Iraq war.
Google and Blair found out the hard way that Office documents contain lots of private information that the sender might prefer that the world not see, such as hidden text, names of author documents, revision history, markup, hidden cells, and hidden spreadsheets. When such information hitchhikes along with the visible text of a document, people can find it without much effort.

What to do? Get SendShield, an excellent, well-designed freebie. Whenever you send a Microsoft Office document via Outlook, SendShield looks inside the document for private information--and shows you what it finds. You can then delete all of the information if you wish. The deletion affects only the copy of the document you send; the original file remains intact on your PC.

+++ Download SendShied Price: Free

Rootkit and Malware Killers

Even the best antivirus and antispyware tools can't keep you completely safe. Rootkits often escape detection, and once they lodge on your PC, they give an outsider the power to take control of your system and help themselves to whatever private information they want. These two rootkit and malware killers, though, tip the odds in your favor.

8 - F-Secure Blacklight Rootkit Eliminator

One dangerous type of malware that might infect your system is a rootkit. It hides deep in your system, using tricky techniques to shield itself from many antispyware, antimalware, and antivirus programs. With a rootkit in place, a malicious person can take complete control of your PC without your knowledge. Rootkits spread online in various ways, such as by riding along on another download.

Some antivirus tools, such as Avast, claim to detect and kill rootkits. Many do not. But even if you use an antivirus tool that claims to detect them, you'd do well to download, install, and use F-Secure's Blacklight Rootkit Eliminator, too. This freebie is designed exclusively to detect and kill rootkits.

The program inspects your PC's folders, files, and hidden processes for signs that you've been infected with a rootkit. It then tells you whether your system is rootkit-free or may be infected, listing every sign of infection that it found. Double-click on each listed entry, and you'll see more information, such as a description of the item, the company that made it, and its file location. You can then use Blacklight Rootkit Eliminator to quash the threat, which the program accomplishes by renaming the file and giving it a .ren extension so that it can't do any further damage. Before taking that step, though, it's a good idea to search for the file name on Google and make sure that the file is a rootkit and not some legitimate file. If your PC continues to function well after you've renamed the file, you can eventually delete the renamed files.

If you aren't an experienced PC user, you might want to stay away from this program. Renaming and deleting files can wreak havoc on a PC; so if you don't feel comfortable renaming, restoring, and deleting files--and troubleshooting PCs--you may be courting danger with this utility.

+++ Download F-Secure Blacklight Rootkit Eliminator Price: Free

9 - HijackThis

If spyware or a Trojan horse slips past your defenses despite your best efforts, your best bet is to download HijackThis. It can help detect problems that other malware detectors can't find, and then will advise you about what to do.

Unlike most other antimalware software, HijackThis doesn't automatically detect dangerous software. Instead, it looks deeply into your system's Registry and into other nooks and crannies that are likely to be infected, and then saves its results to a log file. You then post the log file to the HijackThis Web site for experts to examine; they take a look, let you know if your system is infected, and then tell you how to fix the problem. There are plenty of similar discussion areas where experts congregate on the Internet; to find them, run a Google search.

+++ Download HijackThis Price: Free

Browsing Privacy and Security

Looking for multipurpose tools for protecting your privacy and security? The following three can help you surf anonymously, avoid trouble at wireless hot spots, and receive alerts about certain sites that may host malware designed to invade your privacy.

10 - Tor

A surprising amount of information about you can be gathered as you surf the Web--including the operating system you use, the sites you've visited recently, your geographic location, and possibly your company (based on your IP address).

To keep these pieces of information private, try Tor, a free program that protects your anonymity as you surf. Tor takes all of your Internet communications, including instant messaging and other Internet applications, and sends them around a large network of "onion" routers that are Tor servers, making it impossible for sites or people to invade your privacy.

The Tor download includes other software that you need for maintaining your privacy--notably Privoxy, a proxy program. The programs work well together; and because the software self-configures, they are simple to use. Tor runs in your system tray. To become anonymous, right-click the icon and choose Start. From that point on, you'll be anonymous. To stop surfing anonymously, right-click again and choose Stop. You can even change your Tor identity for maximum cloaking.

+++ Download Tor Price: Free

(CONTINUE...)

quarta-feira, 6 de agosto de 2008

15 Great, Free Privacy Downloads - Part 01


These free products can save you from malicious software and eavesdroppers. Don't leave your PC exposed and vulnerable.
Preston Gralla


One of the worst privacy invaders the world has ever seen is the Internet. When you surf, Web sites can find out where you've been and can gather other information about you. Trojan horses and spyware can snoop on you. Key loggers can capture your keystrokes as you type. Eavesdroppers can steal your passwords.

It doesn't have to be that way. The 15 downloads presented here can protect you. You'll find firewalls, password protectors, rootkit killers, trace cleaners, anonymity securers, and more. So check them out, and help yourself to a safer online experience. (Note that the 15 downloads we look at here don't include any antivirus and antispyware programs. We figured that we've covered those packages well enough elsewhere. So instead, we focus on tools you might not have heard about.)

Firewalls

A firewall is one of the most basic pieces of software you can get for protecting your privacy. Any decent firewall shields you from inbound snoopers, and the better ones also prevent sneaky software from sitting invisibly on your PC and making outbound connections to tell others about your activities.
1 - Comodo Firewall Pro

If you have Windows XP or Windows Vista, you have a firewall on your PC courtesy of Microsoft, so you may figure that you're perfectly safe. Wrong--the firewalls built into both of those operating systems have problems. The Windows XP firewall, for example, lacks outbound protection. And the Windows Vista firewall is exceedingly difficult to customize.

A great bet for a truly flameproof firewall is the free Comodo Firewall. It offers great protection against both inbound and outbound threats, along with some very nice extras. Its Defense + feature, for example, locks down particularly vulnerable files and folders so that nothing can alter them.

If you use this firewall, you will have to spend a bit of time training it. Whenever an application tries to access the Internet from your PC, you'll get a pop-up that asks you whether you want to allow the application to proceed. If you'd like to cut down on the training time and the number of interruptions, use the program's Clean PC mode. In this mode, Comodo scans your PC for applications and registers them as safe. Afterward, you won't see as many alerts.

Among Comodo's other nice extras is an install mode that shuts off the firewall for 15 minutes, so you can install a new application without getting inundated with alerts.

+++ Download Comodo Firewall Pro Price: Free

2 - Vista Firewall Control

Windows Vista's firewall is better than the one built into Windows XP because it includes outbound protection as well as inbound protection. Outbound protection is vital, because Trojan horses and spyware often use silent outbound connections to do their damage. In addition, some surreptitious software uses invisible outbound connection from your PC to send out spam or malware without your knowling it.

The Windows Vista firewall has one big problem, though: The outbound firewall is almost impossible to configure. The free Vista Firewall Control utility gives you the control that Vista should have. With it, whenever a program attempts to make an outbound connection, an alert appears, identifying the application's path and file name, the publisher's name, and the application's name. Based on what you see, you can then choose to enable or disable the connection permanently or one time only.

+++ Download Vista Firewall Control Price: Free

Password Protection

Password theft is one of the greatest privacy dangers that an Internet user faces online. With the following downloads, you'll be able to keep your passwords private and yet still keep track of them.

3 - KeePass Password Safe

Most people have dozens of passwords that they use for Web sites, Web-based mail, ATMs, and more. They have become a fact of automated life. But it doesn't matter how much antivirus software and antimalware you use; if your password is stolen, you're in trouble.

KeePass Password Safe offers a simple way to keep track of all your passwords while keeping them safe. It lets you store all of your passwords in a lightweight, simple-to-use database, and it encrypts the database so that only you have access to it. You can lock it with a master password or with a file key.

The program stores all of your passwords in groups, so you can quickly find the one you want. And the program lets you easily drag and drop your passwords, copy them to the clipboard, and paste them into a Web page or an application using a hot-key. You can also search for passwords, and print and export them in various formats, including CSV, HTML, TXT, and XML files. You can import them, too.

The application can generate hard-to-crack passwords for you, as well--a nice extra for people who want to make their passwords extra secure.

+++ Download KeePass Password Safe Price: Free

4 - KeyScrambler Personal

One of the biggest dangers you face online is theft of your user name and passwords for logging into commercial Web sites (such as banking and financial sites) and Web-based e-mail accounts. A criminal who steals that information could empty your bank account and use your e-mail address to pose as you.

This add-in to Internet Explorer and Firefox promises a simple way to keep you safe. As you type your password, KeyScrambler Personal scrambles it so that the information sent out over the Internet doesn't match what you type. That way, a lurking crook won't be able to steal your private information.

A small icon sits at the bottom of your screen, telling you that KeyScramber Personal is going about its work. As you type, you'll also see the scrambled text that the program is sending.

+++ Download KeyScrambler Personal Price: Free

Cleaning Your Traces

As you surf, your web browser leaves traces of your travels on your PC. Web sites can look into some of those traces. And if other people use your PC, they can easily look at those traces as well. Luckily, there are tools that can get rid of the tracks you leave behind.

Another privacy problem relates to Microsoft Office documents containing private information (unbeknownst to the sender) that get sent out via e-mail. A download helps here, too, removing information that you don't want made public from the Office documents where it appears.

5 - Free Internet Window Washer

Worried that Web sites may snoop on your Internet activities, or that someone else who uses your PC can see where you've been and what you've done? If so, you need an Internet washer--a tool that will delete your Internet Explorer browsing history, recently typed URLs, browsing history, and so on.

That's what Free Internet Window Washer does--for free. Click Wash Settings, then click Browsers, and then select what you want the program to clean. Back on the main screen, click Wash Now and the program will remove everything you've asked it to. If you prefer, click Test Now to see a preview of what the program will do.

Besides cleaning Internet Explorer, Free Internet Window Washer also cleans traces from instant messengers, including AIM, ICQ, MSN Messenger, Skype, and Yahoo Messenger. It also cleans traces from a wide array of other programs, including Microsoft Office and Adobe Acrobat.

+++ Free Internet Window Washer Price: Free

(CONTINUE...)


terça-feira, 29 de julho de 2008

Save Your Data With One of These Top Backup Programs - Part 03


Paragon Drive Backup 9.0 Personal


Paragon's disk-imaging application, Drive Backup 9.0 Personal (price $40, as of 7/15/2008), may still be a feature or two shy of competitor Acronis True Image Home 11, but you probably don't need whatever is be missing. DB9's newfound ability to back up and restore individual files and folders, in addition to imaging whole drives and partitions, makes the two programs nearly equal. If the restore implementation were a little simpler, you could throw out the "nearly"; still, Drive Backup 9's friendlier, configurable GUI and its $10 price advantage make it a difficult choice between the two.

While Paragon makes selecting individual files and folders for backup easy, selecting them for restore is harder. When you browse, instead of seeing a separate window with the files listed, you have to navigate a tree in the same browser you used to select the archive. If you're restoring from a long-path network location, this approach becomes unwieldy. The other, more serious problem is that you can restore a file only to its original location. This is a pain when you want to recover an older version of a file without overwriting the newer one.

The other major new feature in this version is the rescue media builder's ability to write its recovery image to a thumb drive as well as to CD. Flash USB drives boot much faster (on newer PCs whose BIOS supports booting from a USB device), and they're easier to carry around. Also, as always, if you own the company's Partition Manager the abilities of that program are added automatically to the recovery media. That makes for a very nice all-around emergency toolkit/boot disc.

The other changes to Drive Backup 9.0 Personal are minor: bug fixes, more drivers, and better support for various operating systems, including Apple's dual-boot Boot Camp for both Mac and PC support. In the end, for straight disk imaging, DB9 is as good as it gets. But the company needs to make restoring individual files and folders easier; and in light of NovaBackup 10, which has imaging as well as a host of other backup features, Paragon should also lower the price.

Download Paragon Drive Backup 9.0 Personal (Price: $40; 30-day free trial)

Titan Backup

Having reviewed literally dozens of backup programs, I'm not easy to impress. But I was impressed with Titan Backup (price $40 as of 7/15/2008). Though it lacks the ability to back up open files and has no imaging capability, it has just about everything else you could wish for in a backup program. The interface is also one of the best I've seen--an intuitive combination of tabbed dialog and step-by-step wizard that I have only minor quibbles with.

Titan Backup's performance and abilities were pretty much on a par with other second-tier backup programs. You can opt for plain file backup, backup to a zip file, or backup to an executable zip (with a 4GB size limit--a zip limitation). Options include 256-bit AES encryption, the ability to run other programs before and after the backup, and user-name or password entry for backing up to protected network locations. The password didn't work with my Synology DS508 NAS box when the destination was a password-protected folder, but I'm inclined to blame this on the NAS box, which has a somewhat odd security implementation. There were no problems backing up to public folders, hard drives, a flash drive, CD/DVD, or via FTP.

Other features include e-mail notifications (with account settings), syncing of folders, a comprehensive scheduler, command-line execution, and some very nicely written help files. There's no support for tape, but on the consumer level, this is a not an issue these days.

As to those GUI quibbles, they were as petty as wishing the company had put the "Edit Task" button on the upper toolbar with "Delete" and "Import Task" configuration buttons instead of with the primary operational "Start" and "Restore" buttons on the side panel.

Download Titan Backup (Price: $40; 15-day free trial)


*** From: http://www.pcworld.com/article/148765-3/save_your_data_with_one_of_these_top_backup_programs.html