« on: May 21, 2018, 04:06 PM »
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
The download is bundled with sponsored offers to cover some of the costs of maintaining our download servers. If you prefer a non-installer version, please click
here("there") to download the software without the installer.
it would be nice to have something still supported.-DougWeller (April 23, 2018, 11:25 AM)
Try my Clipboard Help and Spell-mouser (April 23, 2018, 11:33 AM)
Oh no — pwned!
Pwned on 5 breached sites and found no pastes (subscribe to search sensitive breaches)
A "breach" is an incident where data has been unintentionally exposed to the public.
Breaches you were pwned in
Adobe: In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, encrypted password and a password hint in plain text. The password cryptography was poorly done and many were quickly resolved back to plain text. The unencrypted hints also disclosed much about the passwords adding further to the risk that hundreds of millions of Adobe customers already faced.
Compromised data: Email addresses, Password hints, Passwords, Usernames
Dropbox: In mid-2012, Dropbox suffered a data breach which exposed the stored credentials of tens of millions of their customers. In August 2016, they forced password resets for customers they believed may be at risk. A large volume of data totalling over 68 million records was subsequently traded online and included email addresses and salted hashes of passwords (half of them SHA1, half of them bcrypt).
Compromised data: Email addresses, Passwords
Exploit.In (unverified): In late 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Exploit.In". The list contained 593 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read Password reuse, credential stuffing and another billion records in Have I been pwned.
Compromised data: Email addresses, Passwords
MajorGeeks: In November 2015, almost 270k accounts from the MajorGeeks support forum were breached. The accounts were being actively sold and traded online and included email addresses, salted password hashes and IP addresses.
Compromised data: Email addresses, IP addresses, Passwords, Usernames
Malwarebytes: In November 2014, the Malwarebytes forum was hacked and 111k member records were exposed. The IP.Board forum included email and IP addresses, birth dates and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked.
Compromised data: Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity
Here is a Paschal Candle:-BGM (March 22, 2018, 09:01 AM)
I wonder when v4 is due since their original estimation was 2017, 3rd quarter ... ie. 6 months ago.-4wd (March 13, 2018, 09:46 PM)
Push The Freakin' Button Pro is right up our alley!
PTFB Pro is the perfect tool for automating tasks, reducing keystrokes, and best of all, getting rid of all those nagging automated requests that pop-up at the most inopportune times.
In effect, PTFB Pro is a "don't show this again" option for the many prompts and messages that don't have one of their own. Just tell PTFB Pro what buttons to press and when -- you'll never be bothered again!
And then there's the built-in macro recorder. It can record and playback complex sequences of mouse and keyboard actions, allowing you to quickly cut long repetitive tasks down to size.
PTFB Pro can periodically check to see if a program is currently running on your system. It can launch the target program if it isn't running or restart/close the program if it is.
PTFB Pro can even help keep interruptions at bay when you're not at your computer. Use it to keep attention craving applications from running in your absence, to fill out login fields, or even to keep your Internet connections alive!
Please note folks, the latest version brings the following new features: Visual Triggers, Greatly improved command line control for better integration with Powershell and other script shells, Control the clipboard, Track when a macro was last used and easily archive little-used macros and Instantly test your settings on the “Identifying the Target” page. You can read more
PTFB Pro - Single License v18.104.22.168 ($14.80)
PTFB Pro - 5 License Value Pack v22.214.171.124 ($53.65)-bitsdujour
A Sophisticated Mouse Auto Clicker
PTFB Pro has some handy features not typically found in an auto-clicker (as well as all the features you might expect!)
Powerful Macro Recorder
A Powerful Macro Recorder
A simple, intuitive interface and a whole host of features that power users will love.
Monitor, alert, resolve, log
Monitor, Alert, Resolve, Log
PTFB Pro sits quietly in your system tray monitoring your applications and workflow. When it identifies a situation where it can help it instantly takes action - optionally alerting you and logging the incident.-Technology Lighthouse
Reminder: Don't Miss the MainType Specials!
Just in case you've been out of town or missed it for another reason: only six days to go for the MainType promotion.
This brand new version supports variable fonts, includes new font properties and allows you to import and export font ratings and font tags. It comes with plugins for Adobe InDesign, a brand new icon set, improved support for high-resolution monitors, and is available in both 32-bit and 64-bit versions.
All information about MainType can be found here: http://high-logic.cm...lukkhl-ttjhtuikdr-y/
Order before Wednesday, January 31 and save up to $24 if you get a new license. Existing customers can buy an upgrade starting from $25.
If you switch from some other font editing software (e.g. FontLab, or Fontographer) or font management software (e.g. Suitcase, FontAgent, or FontExpert) please contact our sales department (http://www.high-logi...ort/tickets/open.php) with the name of the product you are currently using for a cross-upgrade offer. Outdated copies of other software usually entitle you to 25% off while recent copies give you a whopping 50% discount!-High-Logic B.V.
This survey was completed by 740 writers who use one or more of our software applications for writers (Atomic Scribbler, SmartEdit and PageFour). Ten questions were asked about their writing life.-Darren, Bad Wolf Software
- Q1. Have you published a novel or short story?
- Q2. Are you working on a novel or short story at the moment?
- Q3. Which genre do you tend to write in?
- Q4. Do you regularly work on your novel on more than one device?
- Q5. Which software do you use for your writing?
- Q6. Did you study creative writing at school or college?
- Q7. Which, if any, writing communities do you frequent online?
- Q8. Are you part of an offline writers group?
- Q9. Plotter or pantser?
- Q10. Male or female?
- 44% of writers regularly work on their novel on more than one device.
- 58% of writers still use Microsoft Word as a regular part of their writing toolkit.
- 34% of writers say they write Science Fiction or Fantasy.
- 6% of writers say they write Literary fiction.
- 20% or writers are part of an offline writers group.
- Private Facebook groups dominate online writing communities.
- Romance is the second most popular genre for writers.
Folder Size 126.96.36.199
This new release of Folder Size provides a lot of new features and improvements. Some requested by YOU – our valuable customers some designed to make things easier and clearer.
Longest Paths And File Names Report
As the name suggests this report sorts all files in a folder and all its sub-folders by path length. This makes it easy to identify long paths that may cause problems during data migration and backup processes. Long paths may cause issues also with the system and certain applications. Though the recommended path size in Windows should not exceed 260 characters there are certain cases where creating such paths is possible. Of course such paths cause issues at a later stage when accessed. The new report makes it easy to identify and fix those long paths.-MindGems
What Christ really means by Meek - Dr. Jordan Peterson --YouTube
normally $200, today only $20:
Lifetime License for WinAntiRansom PLUS, WinPatrol PLUS, WinPrivacy PLUS