Wednesday, June 29, 2011

winrar

WinRAR provides the full RAR and ZIP file support.



click the link below if you want to download files:
http://www.zumodrive.com/share/dnO1OTQ0MG


other link download software:
http://www.indoglobalsoft.com
  Read More...

Ulead COOL 3D 3.0

The must-have tool for Web and video designers, Ulead COOL 3D 3.0
gives you dynamite 3D titles and animations without the complexity
of traditional 3D programs.

Ulead COOL 3D 3.0 is the perfect tool for Web pages, digital video,
multimedia titles, presentations and more.


 

click the link below if you want to download files:
http://www.zumodrive.com/share/ddteYWJlNG


other link download software:
http://www.indoglobalsoft.com
 
 
  Read More...

SmartBackup 2.13

There is an alternative to just backing up the whole harddisk: an easy way to backup and restore your files. That is SmartBackup.


click the link below if you want to download files:
http://www.zumodrive.com/share/dnNMYWQyYj


other link download software:
http://www.indoglobalsoft.com
 
  Read More...

Rescuedrive

Emergency hard drive recovery for PCs.
allows you to rescue a damaged hard drive
hard drive Because Data Rescue PC


click the link below if you want to download files:
http://www.zumodrive.com/share/dnNGZjkzOT


other link download software:
http://www.indoglobalsoft.com
 
  Read More...

Monday, June 27, 2011

APLIKASI BILLING TV KABEL

   
   
Interface Web Base
Deskripsi Deskripsi:
Aplikasi ini menangani masalah Billing/pembayaran iuran perbulan dari suatu system, permasalahan billing yang dibahas dalam aplikasi ini adalah billing dari system pembayaran TV Kabel yang meliputi Iuran/tagihan, tunggakan, denda, pendapatan, status pelanggan dan lainnya.

Jenis : Web Aplication

Modul Aplikasi:
      1. Master data:
            => Operator/user
            => Pegawai
            => Tarif Iuran
            => Pelangan
      2. Registrasi pelanggan
      3. Instalasi baru
      4. Iuran Loket/Kolektor
      5. Pengaduan pelanggan
      6. Status pelanggan
      7. Mutasi pelanggan
      8. Perbaikan gangguan
      9. Laporan :
            => Iuran/Tagihan
            => Tunggakan/Denda
            => Pendapatan
            => Pengaduan
            => Dan lainnya.
Read More...

Sistem Informasi Akademik

 
   
Interface Web Base
Deskripsi Deskripsi:
Aplikasi ini menangani semua transaksi yang berhubungan dengan proses akademik suatu institusi tertentu. Penanganannya meliputi kegiatan akademik yang berupa pendaftaran mahasiswa baru, KRS, KHS, pemberian nilai dosen secara online, upload/download materi, pembayaran dan lainnya.

Jenis : Web Aplication

Modul Aplikasi:
      1. Master data:
            => Operator/user
            => Mata kuliah
            => Dosen
            => Mahasiswa
            => Kelas
      2. Pendaftaran mahasiswa
      3. KRS (Kartu rencana study)
      4. KHS (Kartu hasil study)
      5. Pembayaran
      6. Jadwal Kuliah
      7. Penilaian dosen
      8. Upload / download Materi
      9. Laporan semua transaksi.
Read More...

Aplikasi Penjualan (POS)






Interface Web Base
Deskripsi Deskripsi :
Aplikasi ini menangani masalah transaksi penjualan, pembelian, stock barang , retur, sampai transaksi hutang/piutang. Aplikasi ini juga akan memberikan laporan dalam bentuk laporan keuangan yang meliputi jurnal umum, buku besar, R/L dan lain lain, yang akan secara otomatis tergenerate dari transaksi yang dilakukan.

Jenis : Web Aplication

Modul Aplikasi :
      1. Master data:
            => Operator/user
            => Items/barang
            => Supplier
            => Customer/pelanggan
      2. Purchasing/pembelian
      3. Sales/penjualan
      4. Retur
      5. Hutang/Piutang
      6. Beban biaya
      7. Laporan transaksi
      8. Laporan keuangan:
            => Jurnal umum
            => Buku besar
            => Neraca
            => Laporan rugi-laba
Read More...

Sunday, June 26, 2011

RecoveryMy Files

Recover My Files data recovery software will recover deleted files emptied from the Windows Recycle Bin, or lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown or software failure.


 

click the link below if you want to download files:
http://www.zumodrive.com/share/dkM0NzU3OT


other link download software:
http://www.indoglobalsoft.com
 
  Read More...

PDF Converter v3.11

What is PDF Converter?                                     

  PDF  Converter is a batch conversion tool for changing text
  files into Pdf files.                                      

  It quickly convert text files to PDF format.               

  It is very powerful and easy-to-use!                       

  It allows you to customize page size,page color,font,font
  style,font size,font color,etc in the PDF files.

  It is a native converter, so you don't need to pass
  documents through PostScript.                                

  It can be run independently.does not need Adobe Acrobat.

click the link below if you want to download files:
http://www.zumodrive.com/share/dkLTNjE2Zj


other link download software:
http://www.indoglobalsoft.com/index.php?r=download&id=34
 
  Read More...

On Track Easy Recovery

Recover lost or inaccessible data quickly and easily.

Not all types of data loss require the assistance of an engineer.
EasyRecovery™ v5.12 software provides you with a fast and easy,
do-it-yourself software solution to recover your valuable data.


Have you lost critical data due to:
- Accidental file deletion
- Computer viruses
- Damage due to a power failure or power surge
- Software program failures
- Corrupt or missing critical file system structures
- Partitioning or boot-up problems
- Drives that have been fdisked or formatted

Recover your data quickly and easily with EasyRecovery software.
EasyRecovery is based on our 16 years of experience performing over 125,000
data recoveries. It combines cutting-edge data recovery technology and
proprietary data recovery tools to provide you with a 'do-it-yourself'
software solution to recover your valuable data.

click the link below if you want to download files:
http://www.zumodrive.com/share/dkLMYTc1Mz


other link download software:
http://www.indoglobalsoft.com/index.php?r=download&id=34
 
 
  Read More...

MySQL-Front

MySQL-Front is a front-end interface for the popular MySQL database. It allows you to manage and administer your databases from an easy to use Windows interface, rather than via the command line. It supports many functions, including create/drop databases create/drop tables, edit/add/delete fields, edit/insert/delete records, edit BLOBs and MEMOs with Bitmap/GIF/JPEG-Support, view and kill other user-processes execute (large) SQL- scripts, view advanced table-properties, replication, copy tables to new table-names, manage users, flush Host/ Logs/Privileges/Tables and much more. You can also use mySQL-Front to write SQL-queries with syntax- highlighting and export and import data from ODBC-datasources.

click the link below if you want to download files:
http://www.zumodrive.com/share/dkLuM2UxZm 

other link download software:
http://www.indoglobalsoft.com/index.php?r=download&id=34
 
  Read More...

Iolo Search and Recover 2.0

provides the necessary tools to recover deleted pictures (GIF, BMP, JPG, JPEG, TIF, TIFF, PhotoShop PSD, WMF, EMF, AI, EPS, and Icon ICO), videos (Movies MOV, AVI, MPEG, MPG, MP2, Music files MP3, WAV, Windows Media ASF, WMA, WMV, WM, and RealAudio RAM, emails (Microsoft Outlook, Outlook Express, Netscape Mail, and Qualcomm Eudora), programs (.EXE, .BAT, .COM and .PIF), documents (Microsoft Word DOC, DOT, DOCHTML, DOTHTML, WordPerfect WP, WPD, and Write WRI), spreadsheets, vital Windows components, and anything else, right from your PC, digital camera, MP3 player, Compact Flash, SmartMedia, Memory Stick, and other digital devices connected to your computer.


Extensive search features, along with the ability to preview deleted files before restoring them, help you find exactly what you’re looking for, quickly and easily. Additional features include Emergency Disk Imaging for mission-critical emergency situations, as well as informa-tion security tools to help keep your personal and confidential information out of the wrong hands. Search and Recover's unmatched feature list and highly advanced technology blows away the competition.The Emergency Disk Image tool gives you a powerful way to protect critical files, manage partitions and safely recover deleted files. Emergency Disk Image let you: - Create a byte-for-byte clone of an existing drive or partition — including all deleted files — for storage elsewhere. - Create a virtual drive that can be formatted, mounted, compressed and stored, and can contain folders or files that appear as they would on your hard drive.

click the link below if you want to download files:
http://www.zumodrive.com/share/dkLsNzdlOG 

other link download software:
http://www.indoglobalsoft.com/index.php?r=download&id=34
 
  Read More...

Thursday, June 23, 2011

GetDataBack for NTFS 2.31

GetDataBack will recover your data if the hard drive's partition table, boot record, MTF or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted... Recover even when Windows doesn't recognize the drive - GetDataBack can even recover your data when the drive is no longer recognized by Windows.

click the link below if you want to download files:
http://www.zumodrive.com/share/di1WOWVjMW


other link download software:
http://www.indoglobalsoft.com/index.php?r=download&id=34
 
 
 



Read More...

GetDataBack for FAT 2.31

GetDataBack will recover your data if the hard drive’s partition table, boot record, FAT/MFT or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted


click the link below if you want to download files:
http://www.zumodrive.com/share/di1NYzgwOT


other link download software:
http://www.indoglobalsoft.com/index.php?r=download&id=34
 
 
 


Read More...

Get Data Back v3.30

GetDataBack is highly advanced data-recovery software that will help you to get your data back when your drive's partition table, boot record, Master File Table, or root directory is corrupted or lost, when a virus hits the drive, when files have been deleted, when the drive has been formatted, or when the drive has been struck by a power failure. GetDataBack can even recover your data when the drive is no longer recognized by the operating system or not only the root directory but all directory information is lost. Advanced algorithms will make sure all directories and subdirectories are put together as they were, and that long filenames are reconstructed correctly. GetDataBack is safe because it's read-only, which means the program will never attempt to write to the drive you're about to recover.


click the link below if you want to download files:
http://www.zumodrive.com/share/di1DYjkwOT

 

other link download software:
http://www.indoglobalsoft.com/index.php?r=download&id=34
 
 


Read More...

C Cleaner

CCleaner (Crap Cleaner) is a freeware system optimisation tool.

CCleaner removes unused and temporary files from your system - allowing it to run faster, more efficiently and giving you more HDD space.

The best part is that it's fast (normally taking less that a second to run) and Free.



click the link below if you want to download files:
http://www.zumodrive.com/share/di1nMTdlYj



other link download software:
http://www.indoglobalsoft.com/index.php?r=download&id=34
 
 




Read More...

Monday, June 20, 2011

Shell Programming in 24 Hours

1: Shell Basics
  • What Is a Command?
  • What Is the Shell?
  • Summary
  • Questions
  • Terms
2: Script Basics
  • The UNIX System
  • Shell Initialization
  • Getting Help
  • Summary
  • Questions
  • Terms
3: Working with Files
  • Listing Files
  • Viewing the Content of a File
  • Manipulating Files
  • Summary
  • Questions
  • Terms

4: Working With Directoriesl The Directory Tree
  • Switching Directories
  • Listing Files and Directories
  • Manipulating Directories
  • Summary
  • Questions
5: Manipulating File Attributes
  • File Types
  • Owners, Groups, and Permissions
  • Summary
  • Questions
6: Processes
  • Starting a Process
  • Listing Running Processes
  • Killing a Process (kill Command)
  • Parent and Child Processes
  • Summary
  • Questions
  • Terms

Part II Shell Programming
7: Variables
  • Defining Variables
  • Unsetting Variables
  • Environment Variables
  • Summary
  • Questions
  • Terms

and more...


Click link below to download file:
http://www.zumodrive.com/share/ddTPNWEwMm


Copyright © 1999 by Sams Publishing


Read More...

PHP How −To

This document tells you howto develop PHP programs and also to migrate all the Windows 95 GUI applications to powerful PHP + HTML + DHTML + XML + Java applets + Javascript. The information in this document applies to all the operating sytems where PHP is ported that is − Linux, Windows 95/NT, OS/2, all flavors of Unix like Solaris, HPUX, AIX, SCO, Sinix, BSD, etc..

1.Introduction
2.PHP Download
   2.1 PHP Installation
3.PHP Tutorial
4.IDE tools for PHP
5.ctags for PHP ! Surprise!!!
6.Debugging PHP
7.Limitations of PHP
and more..


Click link below if you want to download file:
http://www.zumodrive.com/share/ddTrNmMwYT


Source from Al Dev (Alavoor Vasudevan) alavoor@yahoo.com


Read More...

PHP Manual

1. Introduction
  • What is PHP?
  • What can PHP do?
  • A brief history of PHP
2. Installation
3. Configuration
4. Security
5. Basic syntax
6. Types
7. Variables
8. Constants
9. Expressions
10. Operators
11. Control Structures
12. Functions
13. Classesand Objects


Click link below if you want to download:
http://www.zumodrive.com/share/ddT4OWIxMj


copyright by Stig SætherBakken, Alexander Aulbach, Egon Schmid, Jim Winstead, Lars Torben Wilson, Rasmus Lerdorf,and Zeev Suraski

Read More...

Object Oriented Programming With PHP

Class
  • Properti / Variable
  • Method / Function
Object
  • Instansiasi Class
Constructor & Destructor
Visibilitas Member (Member Visibility)
  • Public, Private dan Protected
  • Function Setter dan Getter
Pewarisan (Inheritance)

click the link below if you want to download files:
http://www.zumodrive.com/share/ddSdMDliZT




Copyrigt by Andri Heryandi, S.T. (IF-UNIKOM)

  Read More...

Inner, Outer, Full? Oracle 9i Join Sintax

  • Know how to use new inner join semantic
  • Become familiar with separation of join criteria from other row selection criteria
  • Know the difference between left, right and full outer join.
  • Inner join
  • Cross join, Natural join
  • Outer Join
  • Left, Right and full outer join.

Download file:
http://www.zumodrive.com/share/ddS3OTQ0Ym



source from : http://www.kingtraining.com
Read More...

Sunday, June 19, 2011

How to Enrol Blog to Site Alexa

Under these steps:
  1. Open or visit the website Alexa
  2. Then click on the Edit menu Site. Later you will be brought to user login page from Alexa, if you do not already have an account please register first.
  3. Next look at your email and open your membership confirmation email from Alexa.
  4. After confirmation, re-click the Edit menu site. Enter the data your website or blog here.
  5. Next do the verification of your blog. This verification can be done by 3 ways, choose one only:
  • First, with the Meta tags. Copy and paste the meta tag between the tags in your blog template.
  • Secondly, with uploads in the root of your blog. Create a file format. Txt with notepad, copy and paste meta tag into the file and make a name corresponding instructions from Alexa. Then upload the file in root in hosting your blog you use.
  • Third, by way of confirmation via email.
       6. Once you choose and do one of the verification of the above, then click the verification.
       7. Now that your blog has been verified by Alexa. This is a proof that you are
           owner of the website.

Hopefully this post helps!
Read More...

How to Add Google Translate Button on Your Blog

I know there are lots of widgets or plug-ins available for you to install whether it is Blogger  platform. But mostly what I’ve seen on many blogs or websites is a missing translation plug-ins for their readers. I might say that it was really necessary if you’re advocacy is to spread your knowledge. Although English is the common-language worldwide, some peoples that might read your articles are not literate enough to understand the content.
 
Anyways, here are the few easy steps on how to add Google Translate plug-ins on your blog:
  1. First go to http://translate.google.com/translate_tools.
  2. Then, Select the language of your webpage by clicking the drop down button.
  3. You may want to further customize the language the translator can translate by selecting few languages, but I prefer “All Languages”.
  4. Copy the code snippet provided and place it on the section of your website you want it to appear.
  5. Then you may try it by clicking the Google Translate button and select a language you want it to be translated and it should automatically reload for translation. A nav-bar will appear at top part of your site showing the percentage translated together with the cancel button and when it’s done the show original button will appear. Simply click the “Show Original” button to get it back to original language.

If your using Blogger platform, follow this step:
  1. Log on to your Blogger account.
  2. Go to Layout–>Page Elements then Add a Gadget–>HTML/JavaScript Add.
  3. Copy and Paste the code obtained at step 4 above when you are customizing the Google translate page.
  4. Click Save.
  5. Then view your blog, give it a try by following previous step 5 above.
Hope this works for you

Reference from http://www.bloggergeeze.com

Read More...

Saturday, June 18, 2011

WEB 2.0 for Profil Backlink List

Profile Backlink is a technique to improve the link popularity of a blog with a very easy and effective.
a few form of web 2.0 is like LiveJournal, Facebook, My space, Etc..., But not all web 2.0 use the "Dofollow", the example is like facebook is using tag rel = "nofollow"

Here's a list of Web 2.0 for Backlink List


PR9
http://wordpress.com

PR8
http://squidoo.com ( Manual Link use HTML code)
http://weebly.com
http://livejournal.com
http://bravenet.com

PR7
http://blogger.com
http://blogsome.com
http://www.wetpaint.com
http://www.wikispaces.com
http://www.xanga.com
http://www.tripod.lycos.com
http://tumblr.com
http://quizilla.teennick.com
http://viviti.com
http://webs.com
http://knol.google.com
http://friendster.com

PR 6
http://bigadda.com
http://blog.co.uk
http://blog.com
http://www.zimbio.com
http://gather.com
http://diaryland.com
http://edublogs.org
http://opendiary.com
http://sosblog.com

PR5
http://20six.co.uk
http://blog.ca
http://hubpages.com
http://blurty.com
http://upsaid.com
http://tabulas.com
http://tblog.com
http://terapad.com
http://shoutpost.com
http://thoughts.com
http://blogskinny.com
http://free-conversant.com
http://freeflux.net

PR4
http://blogeasy.com
http://blogstream.com
http://blogstudio.com
http://blogtext.org
http://insanejournal.com
http://journalfen.net
http://journalhub.com
http://bloxster.net
http://bloghi.com
http://mynewblog.com
http://netcipia.com
http://wikyblog.com
http://blogigo.com
http://freeblogit.com





Read More...

Friday, June 17, 2011

Installing Windows using FlashDisk

Step by Step to make Boot Flash Disk installer
  1. Prepare at least 1 GB Flash Disk, backup all data in Flash Disk
  2. Download PeToUSB here: http://www.zumodrive.com/share/d9RzZmY4Mj extract it to C: \ USB
  3. Plug in a USB flash disk into one USB port. Remember the position of the drive. Is the F:, G:, H:, and so on.
  4. When you are in the normal (desktop), insert the Windows XP installation CD into the optical drive. If the computer running the installation process automatically, cancel it and close all applications being run.
  5. Download and extract the application that the author gave. Advice author, extract the entire contents to a folder, such as C: \ USB.
  6. Next, open the folder where you extract the application installation module makers, this time we take the example C: \ USB.
  7. Run the file named "usb_prep8.bat" then the screen will appear to the Command Prompt window contains various commands. If it appears the words "Press any key to continue," press any key to confirm.
  8. In the display window will appear asking you to format PEtoUSB USB flash disk. No need to change any settings, right-click Start to begin the formatting process. Answer the confirmation for your needs.
  9. If completed, close the window PEtoUSB (do not close the Command Prompt window that was open when you run usb_prep8.bat), then the screen will display the options from 0 to 7.
  10. Use option 3 to select the source installation files will be copied to the flash disk. Here, specify the drive where you saved the installation of Windows XP. Choose only the optical drive where the existing Windows XP CD in it, or select a folder of your choice if you have copied the Windows XP installation files to a specified folder.
  11. Select option 5 to determine where you are striking a flash disk. If your flash disk in drive F:, then type F and press ENTER. If the drive G: then type G and press ENTER, and so on apply to another drive.
  12. Then select option 4 to start the installation process modules will be copied to the flash disk automatically. Answer any confirmation that comes with the Y, or YES or OK or other form of agreement.


Done! Now your flash disk has been prepared for installation of Windows XP! Please set up the BIOS of your notebook, and select the Removeable Disk (or whatever other name) as the first medium that is executed when booting.
Read More...

SQL SERVER – Simple Example of WHILE Loop With CONTINUE and BREAK Keywords

This is question is one of those question which is very simple and most of the users get it correct, however few users find it confusing for first time. I have tried to explain the usage of simple WHILE loop in first example. BREAK keyword will exit the stop the while loop and control is moved to next statement after the while loop. CONTINUE keyword skips all the statement after its execution and control is sent to first statement of while loop. Run following examples in Query Editor and see the result. This is very easy to understand example.


1) Example of WHILE Loop
DECLARE @intFlag INT
SET
@intFlag = 1
WHILE (@intFlag <=5)
BEGIN
PRINT
@intFlag
SET @intFlag = @intFlag + 1
END
GO

ResultSet:
1
2
3
4
5
2) Example of WHILE Loop with BREAK keyword
DECLARE @intFlag INT
SET
@intFlag = 1
WHILE (@intFlag <=5)
BEGIN
PRINT
@intFlag
SET @intFlag = @intFlag + 1
IF @intFlag = 4
BREAK;
END
GO

ResultSet:
1
2
3
3) Example of WHILE Loop with CONTINUE and BREAK keywords
DECLARE @intFlag INT
SET
@intFlag = 1
WHILE (@intFlag <=5)
BEGIN
PRINT
@intFlag
SET @intFlag = @intFlag + 1
CONTINUE;
IF @intFlag = 4 -- This will never executed
BREAK;
END
GO

ResultSet:
1
2
3
4
5
Reference : Pinal Dave (http://blog.SQLAuthority.com)


Read More...

Thursday, June 16, 2011

Query Your Database for a List of Functions

The following SQL can be used to query your database system tables for a list of functions. With the exception of Oracle, each query returns the function name with the appropriate schema\owner name appended to it. Oracle simply returns the name of the function.

Sybase ASE


SELECT b.name + '.' + a.name
  FROM sysobjects a, sysusers b
 WHERE a.type = 'SF'
   AND a.uid = b.uid
 ORDER BY a.name

Oracle

SELECT OBJECT_NAME
  FROM all_objects
 WHERE owner = :sOwner
   AND object_type = 'FUNCTION'

SQL Server

IF OBJECT_ID('sys.schemas') IS NULL
    SELECT B.name + '.' + A.name
      FROM sysobjects A, sysusers B
     WHERE A.type IN ('FN', 'TF')
        AND B.uid = OBJECTPROPERTY ( A.id , 'ownerid' )
     ORDER BY A.name
ELSE     SELECT B.name + '.' + A.name
      FROM sysobjects A, sys.schemas B
     WHERE A.type IN ('FN', 'TF')
       AND B.schema_id = A.uid
     ORDER BY B.name + '.' + A.name

SQL Anywhere

SELECT b.name + '.' + a.proc_name
  FROM SYSPROCEDURE a, sysusers b
 WHERE a.creator = b.uid
   AND substr(left(proc_defn,8), 8, 1) = 'f'
 ORDER BY b.name, a.proc_name


source from : http://www.werysoft.com/SQLReferences/GetFunctionList.aspx

Read More...

Lyrics Plugin for windows media player

Lyrics Plugin is a piece of software tailored for music fans. To put it simply - it is an add-on to view lyrics in Windows Media Player. No more searching for lyrics. Just start listening to your favourite songs and lyrics will be displayed automatically. Oh, and if lyrics is not found, you can add it yourself.

click the link below if you want to download files:
 http://www.zumodrive.com/share/d8K7OWM3Zj

other link download software:
http://www.indoglobalsoft.com/index.php?r=download&id=34
 
  Read More...

Lyrics Plugin for winamp

The best way to get more out of your music is the learn the lyrics. Lyrics Plugin for Winamp helps you do this by automatically recalling the lyrics to the songs you are playing. There are a few such programs around and the usual problem is that they often don't display the right lyrics. What I like about this particular program is that it allows you to put lyrics into the database if the song you are listening to doesn't display any or show the right ones. Because this is a new program, the database is still being built so the lyrics are very hit and miss but it works pretty well.

click the link below if you want to download files:
 http://www.zumodrive.com/share/d8JXNDJhZm

other link download software:
http://www.indoglobalsoft.com/index.php?r=download&id=34
 
  Read More...

Cpu-z 154

cpuz.exe is a application that gathers information on some of the main devices of your system. Software Details: http://www.cpuid.com/softwares/cpu-z.html

click the link below if you want to download files:
 http://www.zumodrive.com/share/d8JCYWQyM2

other link download software:
http://www.indoglobalsoft.com/index.php?r=download&id=34
 
  Read More...

MP3 Cutter

MP3 Cutter Plus is a free MP3 cutter that allows you to cut MP3 music free. It is a very easy to use MP3 software. A MP3 clip made by this software has same sound quality as of original MP3 so you can enjoy it at its best in your favorite MP3 player. It can really be very helpful for making MP3 ringtone from your MP3 download.

To cut MP3s you need to follow simple steps

  • Click open - do a MP3 search - choose the MP3 song.
  • Move the slider to appropriate position and click Mark Start.
  • Again move the slider to choose end point and click Mark End.
  • You may now preview selected part by clicking on Play Selected.
  • Finally, simply save it by clicking on Save
click the link below if you want to download files:
 http://www.zumodrive.com/share/d8JxMzg2OG

other link download software:
http://www.indoglobalsoft.com/index.php?r=download&id=34
 
 
 
    Read More...

    Wednesday, June 15, 2011

    PostgreSQL ODBC Driver

    psqlODBC is the official PostgreSQL ODBC Driver.

    The source code for this driver was originally adopted from version 0.20 of PostODBC. The authors at that time were Christian Czezatke and Dan McGuirk. Later it was maintained by Julie Ann Case.

    As part of a commercial research project, the developers at Insight Distributions System overhauled the driver. Their goal was to make the driver commercially viable. In keeping with the spirit with which the original source was acquired, Insight published their work at this location. Some time later and after some discussion with members of the PostgreSQL organization, psqlODBC was adapted as the part of the PostgreSQL source distribution. The driver continued to be maintained by Byron Nikolaidis, the developer at Insight who overhauled the driver for some time.

    The driver is currently maintained by a number of contributors to the PostgreSQL project. It is developed and supported through the pgsql-odbc@postgresql.org mailing list.

    psqlODBC is released under the Library General Public Licence, or LGPL.

    click the link below if you want to download files:
    http://www.zumodrive.com/share/d7JoZDcwOD
    .

    other link download software:
    http://www.indoglobalsoft.com/index.php?r=download&id=34
     
      Read More...

    PuTTY

    PuTTY is an SSH and telnet client, developed originally by Simon Tatham for the Windows platform. PuTTY is open source software that is available with source code and is developed and supported by a group of volunteers.

    click the link below if you want to download files:
     http://www.zumodrive.com/share/d7GJYzYwMm


    other link download software:
    http://www.indoglobalsoft.com/index.php?r=download&id=34
     
      Read More...

    Ulead GIF Animator 4.0

    Ulead GIF Animator 4.0 is the fastest and easiest-to-use GIF animation tool. It is also the most powerful. The industry standard, GIF Animator delivers best-of-its-class features for animation composition, editing, special effects, optimization and delivery in a single package

    click the link below if you want to download files:
    http://www.zumodrive.com/share/d7GGOTIzYT 


    other link download software:
    http://www.indoglobalsoft.com/index.php?r=download&id=34
     
      Read More...

    Process Explorer

    Ever wondered which program has a particular file or directory open? Now you can find out. Process Explorer shows you information about which handles and DLLs processes have opened or loaded.

    The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you'll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded.

    The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the way Windows and applications work.

    click the link below if you want to download files:
    http://www.zumodrive.com/share/d7GvMWMwOT 


    other link download software:
    http://www.indoglobalsoft.com/index.php?r=download&id=34
     
     
      Read More...

    Unstoppable Copier Software

    Roadkil's Unstoppable Copier is a software that is widely used to solve the problem of copy and paste the troubled process, either because the cd scuffed or scratched, because the CD is scratched it will be difficult to do the copy process, either from a CD to a hard drive or other media.


    Besides easy to use software is also easier for us to copy the CD that much exposed to scratches and other advantages are softaware also includes software that small because it has a capacity of less than 1 MB file, either a stand alone (Portable) as well as the Installer.

    Here's a link to download the file Roadkil's Unstoppable Copier :

    http://www.zumodrive.com/share/d7GpNDUyNz
    .
    other link download software:
    http://www.indoglobalsoft.com/index.php?r=download&id=34
     
      Read More...

    Monday, June 13, 2011

    Tips Menghadapi Hoax Dan Spam

    Ada dua hal yang sangat mengganggu saat kita menerima email: Hoax dan Spam. Hoax adalah email
    peringatan atau nasehat palsu yang biasanya diakhiri dengan himbauan agar menyebarkannya
    seluas-luasnya. Sedangkan spam adalah suatu pesan yang tidak dikehendaki oleh pembacanya, dan
    seringkali berupa iklan suatu produk. Tips dan Trik ini berusaha membahas secara singkat mengenai
    ciri-ciri dan apa yang harus dilakukan jika kita menerima hoax atau spam.
    HOAX
    Definisi
    Dewasa ini kita seringkali menerima email yang memperingatkan akan adanya ancaman dari suatu
    virus komputer, atau warning sejenis lainnya. Namun demikian, seringkali warning ini tidaklah
    benar adanya, melainkan sekedar ingin membuat orang menjadi cemas dan panik. Warning semacam
    ini diistilah sebagai "HOAX". Hoax didefinisikan sebagai berita palsu yang memanfaatkan iktikad
    baik pembaca, sehingga berita tersebut disebarluaskan sehingga lalu lintas peredaran data di internet
    menjadi makin padat.
    Ciri-ciri

    1. Didistribusikan via email, dan seringkali memanfaatkan media mailing list karena efeknya lebih
    terasa
    2. Isinya berisi pesan yang membuat cemas, panik para pembacanya
    3. Diakhiri dengan himbauan agar si pembaca segera memforwardkan warning tsb. ke forum yang
    lebih luas. Hoax ini memanfaatkan iktikad baik si pembaca, sehingga pembaca email ini tanpa
    meneliti lebih dahulu kebenaran beritanya, langsung segera menyebarkannya ke forum yang
    lebih luas. Akibatnya lalu lintas peredaran data di internet makin padat dengan berita yang tidak
    benar
    4. Biasanya pengirim awal hoax ini tidak diketahui identitasnya.
    Apa yang harus kita lakukan bila menerima Hoax ?
    1. Sekiranya anda menerima email berisi warning akan ancaman virus disertai himbauan agar
    menyebarkannya seluas-luasnya, maka lebih baik warning tsb. jangan disebarkan dulu sebelum
    yakin akan kebenaran isinya.
    2. Periksalah terlebih dahulu, apakah warning itu termasuk kategori Hoax atau bukan, lewat search
    engine (google.com, altavista.com dsb.) atau langsung mengakses situs-situs yang didedikasikan
    untuk menghadapi Hoax, seperti misalnya:
    http://www.symantec.com/avcenter/hoax.html
    http://www.europe.f-secure.com/news/hoax.htm
    3. Selalu mengupdate Virus List pada Software Anti Virus kita (Norton, McAfee, dsb). Tersedia
    juga Anti Virus Software yang gratis, dapat didownload dari http://www.grisoft.com
    Contoh Hoax
    Dibawah ini dilampirkan beberapa contoh Hoax, yang diambil dari situs Symantec:
    http://www.symantec.com/avcenter/hoax.html Terlihat dengan jelas pada posting-posting
    dibawah, kesamaan ciri-cirinya: berisi warning palsu, dan himbauan agar menyebarkannya
    seluas-luasnya.
    Contoh 1 : Happy New Year Virus Hoax
    Warning on December 31, 1999 you may receive an email called, Happy New Year...do not open it,
    it contains a deadly virus...it will erase windows from your computer along with many other program
    files.Pass this on as soon as you can to get the WORD out!!!This is not a hoax....this was reported on
    CNN on Tuesday the 2nd November 1999!
    Contoh 2: Life is beautiful Hoax
    This information arrived this morning, from Microsoft and Norton. Please send it to everybody you
    know who accesses the Internet. You may receive an apparently harmless email with a PowerPoint
    presentation called "Life is beautiful.pps." If you receive it DO NOT OPEN THE FILE UNDER
    ANY CIRCUMSTANCES, and delete it immediately. If you open this file, a message will appear on
    your screen saying: "It is too late now, your life is no longer beautiful", subsequently you will LOSE
    EVERYTHING IN YOUR PC and the person who sent it to you will gain access to your name,
    email and password. This is a new virus which started to circulate on Saturday afternoon. WE NEED
    TO DO EVERYTHING POSSIBLE TO STOP THIS VIRUS. UOL has already confirmed its
    dangerousness, and the antivirus Softs are not capable of destroying it. The virus has been created by
    a hacker who calls himself "life owner", and who aims to destroying domestic PCs and who also
    fights Microsoft in court! That's why it comes disguised with extension pps. He fights in court for
    the Windows-XP patent.
    MAKE A COPY OF THIS EMAIL TO ALL YOUR FRIENDS.
    SPAM
    Definisi
    Sering kita memperoleh email mengenai promosi suatu produk, suatu propaganda mengenai faham,
    yang sebenarnya kita tidak mengharapkan untuk menerimanya. Email semacam ini dikategorikan
    sebagai "spam". Ada beberapa definisi mengenai spam. Diantaranya adalah definisi yang
    dicantumkan di http://tuxedo.org/jargon/jargon.html#spam
    1. Membuat crash suatu program dengan memakai buffer yang menggunakan input data terlalu
    besar.
    2. Mengirimkan suatu pesan ke newsgroup menyebabkan forum tersebut penuh dengan pesan yang
    tidak relevan.
    3. Mempostingkan artikel ke banyak newsgroup atau mailing list. Hal ini disebut juga ECP
    (Excessive Cross-Posting).
    4. Memborbardir suatu newsgroup/mailing list dengan kopi-an suatu artikel yang sama. Hal ini
    diistilahkan EMP( Excessive Multi-Posting).
    5. Mengirimkan banyak email serupa yang tidak diharapkan oleh pembacanya, terutama yang
    berkaitan dengan iklan suatu produk.
    6. Output yang besar dan menjengkelkan. Misalnya terjadi pada seorang pengguna IRC yang
    beranjak sebentar dari monitor, kemudian saat kembali seringkali merasa jengkel melihat
    kalimat yang mungkin terdiri dari beratus-ratus baris. Ini dikategorikan juga sebagai spam.
    Spam ini sangat mengganggu, terutama bagi user yang bandwith koneksi internetnya kecil, tidak
    memiliki waktu luang untuk mengakses internet, atau kuota emailnya dibatasi.
    Apakah yang harus dihindari agar anda tidak memperoleh spam ?
    Beberapa petunjuk untuk menghindari spamming-mail dapat dilihat di
    http://help.yahoo.com/help/us/mail/spam/spam-03.html
    Antara lain:
    1. Jangan sekali-kali merespon spamming mail.
    2. Jangan sekali-kali meresply spamming mail dengan kata "remove". Hal ini akan mengakibatkan
    email anda dicatat sebagai email yang aktif, dan akibatnya alamat anda akan dicantumkan pada
    list yang lain. Akibatnya anda akan menerima lagi spamming-mail.
    3. Jangan mengakses website yang direkomendasikan dalam spamming mail tersebut. Akses ini
    akan dimonitor, dan berfungsi sebagai alat validitas alamat email anda. Selanjutnya anda tidak
    akan bebas dari spamming-mail.
    4. Jangan sekali-kali men-sign-up suatu site yang menjanjikan bahwa alamat anda akan dihapus
    dari suatu list spamming-mail. Dengan menuliskan alamat anda, berarti anda memberikan
    informasi alamat email anda pada pengelola situs tsb., dan kebanyakan mereka berperan sebagai
    kolektor alamat email.
    Apa yang harus dilakukan bila anda terlanjur menerima spamming-mail ?
    1. Janganlah mengirimkan complain anda ke pengirim spamming-mail
    2. Janganlah sekali-kali mematuhi "petunjuk" agar didrop dari mailing list mereka sebagaimana
    diberikan di bagian akhir spamming-mail tersebut. Akan tetapi kirimkan complain anda pada
    ISP (Internet Service Provider).
    3. Cara memblock spamming email, bila domain alamat anda @yahoo.com, silakan merefer ke
    http://help.yahoo.com/help/us/mail/read/read-22.html
    4. Bila spamming email tersebut diterima dari seseorang yang beralamatkan @yahoo.com atau
    @yahoo.co.jp, anda tinggal memforwardkan spamming-mail tersebu lengkap dengan header-nya
    ke abuse@yahoo.com
    Petunjuk mengenai hal ini dapat dilihat di:
    http://help.yahoo.com/help/us/mail/spam/spam-04.html


    Untuk mendownload file klik link dibawah ini:
    http://www.zumodrive.com/share/d5qtNzlkYz

    source didapat dari ilmukomputer.com penulis Anto Satriyo Nugroho
    Read More...