Welcome, Guest |
You have to register before you can post on our site.
|
|
|
Welcome Guest!
|
Welcome to the Promo2day Community, where we feature software giveaways, computer discussion, along with a fun, safe atmosphere! If your reading this it means you are not yet registered.
You will need to Register before you can make posts, chat or enter the forum giveaways.
Be sure to also visit the Help/FAQ page.
|
Block Webcam and microphone |
Posted by: Sasha - 05-21-2019 , 09:09 AM - Forum: Giveaway of the day
- Replies (3)
|
|
Block Webcam and microphone 2.1.0.2
How to Block WebCam and microphone ?
It is becoming a problem to steal your privacy by illegally hacking your webcam or microphone.
You can use the webcam cover, but you can forget the cover after using WebCam, and there is no alternative way to prevent microphone hacking.
There is another way.
Please try "Block Webcam and microphone". You no longer need to use the webcam cover.
Approved programs (such as Skype, Viber) can use WebCam and Microphone, but unapproved programs can not use WebCam. If some programs access your WebCam or microphone, then you will first see a pop-up window asking you to confirm your approval. You only allow use of WebCam or Microphone for programs you trust.
You can protect your WebCam and microphone from hacking with very simple settings.
Features:
* Prevent malicious programs use of WebCam or Microphone to access information.
* You must specify the applications that can use the WebCam, Microphone.
* We provide a list of widely used applications for user convenience. (Please register the accepted application easily with a single click)
* The application that is installed by default when installing Microsoft Windows can use the WebCam, Microphone.
* If an unregistered application attempts to access to webcam or microphone, ask the user whether to allow the this operation.
* When the main program is terminated, all programs can not access the WebCam or microphone.
System Requirements:
Windows 7/ 8/ 10 ( 32&64 bit); Windows Server 2008 R2 or later; supported languages: English, Spanish, Japanese, Chinese (simplified), German, French, Portuguese, Russian, Dutch, Turkish, Korean, Hindi
Publisher:
xSecuritas
Homepage:
https://www.xsecuritas.com/block-webcam-and-microphone/
File Size:
20.5 MB
GP: https://www.giveawayoftheday.com/block-w...e-2-1-0-2/
|
|
|
Tuneskit DRM Audio Converter |
Posted by: Sasha - 05-20-2019 , 12:08 PM - Forum: Giveaway of the day
- No Replies
|
|
Tuneskit DRM Audio Converter 3.0.3
An all-round mighty DRM removal solution to convert DRM-protected Apple Music, iTunes M4P and audiobooks, Audible AA, AAX, as well as non-DRM audios to common MP3, AAC, M4A, M4B, WAV, FLAC for any device and player.
- One-stop DRM audio tool to remove DRM copy protection from Apple Music, iTunes M4P and Audiobooks;
- Customize audio settings and split large audio into small segments;
- Keep 100% lossless quality for Audible AA, AAX audiobooks;
- Smoothly convert audios at 30X speed with ID tags kept;
- Smoothly convert audios at 30X speed with ID tags kept.
System Requirements:
Windows 10/ 8/ 7/ Vista/ XP; iTunes 12.9 or lower
Publisher:
TunesKit
Homepage:
https://www.tuneskit.com/drm-audio-converter-for-win.html
File Size:
17.8 MB
https://www.giveawayoftheday.com/tuneskit-drm-audio-converter/
|
|
|
GOM Player Plus [50 licenses] |
Posted by: Sasha - 05-20-2019 , 11:52 AM - Forum: External Giveaways/Contests
- Replies (1)
|
|
GOM Player Plus
Quote:Join and win one of the 50 yearly licenses for GOM Player Plus!
GOM Player Plus is ad-free to enhance user experience and faster speed. It is much faster and more stable than GOM Player and it can play 360 degrees VR video! With full support for 360 degrees video, you can view the 360-degree world by just using the keyboard or mouse. This includes Multi-angle side viewer: front, back, left, and right as well as screen transition. It also has search and play functions for 360 YouTube videos. Another great feature set is the comprehensive file support. GOM Player Plus can play all the most popular video formats by default: AVI, MP4, MKV, FLV, WMV, MOV, and more! With an update UI that is sleek and focused on the video viewing experience. Coupled with simplified shortcuts for the most used features, you can see why GOM Player Plus is a step above other media players.
https://www.giveawayoftheday.com/gom-player-plus-2/
|
|
|
USB Safe Guard |
Posted by: Sasha - 05-20-2019 , 08:23 AM - Forum: External Giveaways/Freebies
- Replies (1)
|
|
USB Safe Guard v2.1.0.2
The ‘USB Safe Guard’ product converts regular USB to secure USB. This secure USB can have an expiration date and expiration count policy. Secure USB can be opened with read-only or read/write privileges. In addition, administrators can remotely control the use of secure USB. You can also receive USB usage logs by email.
How to protect USB from the outside safely? Do you want to protect your USB data from being lost or stolen?
With the “USB Safe Guard” product, you can easily change your regular USB to a secure USB. Secure USB can be opened as read/write or read only mode, you can also specify the expiration date and expiration count if you pass secure USB to others. Secure USB usage logs sent to you can be received by your email in real time. The logs include PC information using secure USB and when and where secure USB was used. Of course, you can remotely disable or discard secure USB, so you can prevent data leakage even if you lose your secure USB.
Features
* You can change the general USB Hard Disk or USB Flash Disk to an encrypted secure USB.
* A secure USB is 5MB less than the normal USB size
* You can specify an expiration date and an expiration count when creating a secure USB.
* The documents are hidden in a secure USB, which can be retrieved only by entering the password.
* A secure USB can be read / write or read-only.
* You can change the policy for this secure USB even after creating a secure USB.
* You can view logs for a secure USB in real time.
* The log can be received by e-mail, and you can check the time, country, and local information using Secure USB in the e-mail.
* You can immediately disable secure USB in your mail.
Terms and Conditions
- This is a 5-Secure-USB-Conversions lifetime license, for commercial or noncommercial use
- You get free updates for the same major version
- You free tech support
- You must redeem your license key before this offer has ended
- May not be resold
Technical Details
- Developed by xSecuritas
- Version is v2.1.0.2
- Download size is 16.7 MB
- Supports Windows 7, 8/8.1, and 10 (32-bit and 64-bit)
https://sharewareonsale.com/s/free-usb-s...0-discount
|
|
|
Huawei has immediately lost access to Android and Google |
Posted by: Ultimo - 05-20-2019 , 12:13 AM - Forum: Phones & Tablets News
- Replies (1)
|
|
Quote:Google has suspended business operations with Huawei effectively immediately, a forced move that will have a dramatic impact on Huawei devices across the globe.
According to Reuters, citing a source close to the matter, Google was forced into suspending business with Huawei that “requires the transfer of hardware and software products.”
“Huawei Technologies Co Ltd will immediately lose access to updates to the Android operating system, and the next version of its smartphones outside of China will also lose access to popular applications and services including the Google Play Store and Gmail app,” Reuters noted.
This effectively means no further Android security updates for devices new and old, including the recent P30 and P30 Pro, Mate 20 Pro, and many more.
Read the news here
|
|
|
Incognito mode is not as private as you think |
Posted by: tarekma7 - 05-19-2019 , 09:11 PM - Forum: Software Discussion
- Replies (3)
|
|
Quote:Many people use their browsers’ private or incognito modes to browse the web privately. However, private browser modes don’t actually make people as private as they think. Before completely trusting your browser, find out what it can and can’t do.
What incognito mode does
Incognito/private mode helps you browse the web without storing browsing data on your browser so that it can’t be retrieved later. This means that your searches, visited pages, login details and cookies will not be saved on the device after you close your private windows. However, any files you download or bookmarks you create will be kept. Google Chrome, Mozilla Firefox, Apple Safari, Microsoft Edge and Internet Explorer all offer similar private modes.
What it does:
Deletes cookies when you close the window;
Keeps your browsing history empty.
What it doesn’t do:
Hide your traffic from third parties like your ISP, the government, or your network admin at your office or university;
Secure your traffic from hackers or other attacks and vulnerabilities.
How to activate incognito mode
To start browsing in incognito mode, open your browser, select “File” and then choose “New Private Window” or “New Incognito Window” (the name may vary from browser to browser).
Incognito mode: not as private as you think
Your private browsing mode only blocks your own device from recording your traffic. You can still be tracked with your IP address. Your browsing data can still be collected by your ISP, your employer, and any other third party that can track your IP address.
READ MORE INFORMATION HERE
|
|
|
What do you know about MAC Address? |
Posted by: tarekma7 - 05-19-2019 , 09:05 PM - Forum: Software Discussion
- No Replies
|
|
Quote:IP addresses identify you online, but there’s another layer of identification that most people don’t know about. There’s a label assigned to every device that can be exploited to track its location, and it’s called a MAC address.
How MAC addresses work
It all starts with a little piece of hardware called the Network Interface Card, or NIC. This is the piece of circuitry that allows your device to connect to a network. The NIC manufacturer provides each one with a unique MAC address. This is why MAC addresses are also sometimes called burned-in or hardware addresses.
The MAC address is an essential part of how network devices interact with one another. When you connect to a WiFi router or directly to your building’s ethernet, your device will send its MAC address through to form a connection with the next device along the chain. The next device will then send its own MAC address further along the chain, thereby building your connection to the internet, link by link.
MAC addresses also look different from IP addresses, and you’ll never get the two confused once you learn how to tell them apart
Does your MAC address make you vulnerable?
Your MAC address is generally fairly secure, but it can be turned against you to monitor your location, disrupt your internet access, or even perform a man-in-the-middle attack. However, all of these approaches are fairly difficult to implement, and there are easy ways to counter them.
How to protect your MAC address?
It’s difficult to effectively use your MAC address to attack you. Your devices’ MAC addresses are difficult to tie to your identity, they almost never travel beyond the very first network device they connect to, and it’s rare to find yourself in a situation where a hacker could use it to attack you.
However, in the wrong situation, it can become a vulnerability. In addition, some local networks, like the one at your job or school, can use MAC address filtering to block certain online content.
Completely blocking your MAC address isn’t really a good idea, since without it, you won’t be able to connect to any other network devices and go online. However, there are a few different techniques you may want to use with your MAC address to stay secure or private.
READ MORE INFO HERE
|
|
|
Batch Text File Editor Professional |
Posted by: longin - 05-19-2019 , 09:03 AM - Forum: Giveaway of the day
- Replies (1)
|
|
Batch Text File Editor Professional 5.0.19
Replace, insert, delete, copy, and move text in multiple files in bulk!
The program features RegEx support with colored syntax highlighting and RegEx match substitutions. Multi-line replace lets you search for and replace text spanning multiple lines. Wildcards, case sensitivity, and match counting options can refine your search!
Insert new text at specified line number, character position. Delete, copy, and move specified text blocks. Includes complete Unicode and RegEx support. RegEx pattern builder will help you design and test regular expressions right within the program. Specialized RegEx tools like HTML/XML tag selector, line selector, or number selector make it easier to create RegEx patterns. Perform multiple replacements easily by entering search-replace pairs into the grid or import them from a file.
The program has complete Unicode support. Process 1000s of files using multiple CPU cores in manual, automatic/continuous, triggered/scheduled, or console modes, or directly from Windows Explorer right-click menu. Save files to output directory specified using either absolute or relative path, with the original or new name defined by a mask. Select files for processing based on their name, dates, size, and contents using advanced file search supporting RegEx and advanced wildcards. Optionally merge together, split all, or zip processed files. Perform different operations on different files with conditional processing and process branching. Detailed processing logs are available in both user interface and log files. Run multiple program instances simultaneously.
Professional Edition has the following restrictions:
Max File Size is 100MB;
Maximum number of files per batch is 1000;
Scheduling and command line operation is not supported;
Conditional processing is not supported.
Please note: the license is provided for 3 years.
https://www.giveawayoftheday.com/batch-t...tor-5-0-9/
download:
https://www.giveawayoftheday.com/downloa...88b1d64845
|
|
|
|