Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





 
Welcome Guest!
Welcome to the Promo2day Community, where we feature software giveaways, computer discussion, along with a fun, safe atmosphere! If your reading this it means you are not yet registered. You will need to Register before you can make posts, chat or enter the forum giveaways. Be sure to also visit the Help/FAQ page.

  Password Boss Premium: Lifetime Subscription (Unlimited Devices)
Posted by: tarekma7 - 05-02-2018 , 08:45 PM - Forum: Hot Deals & Discounts - No Replies

https://stacksocial.com/sales/password-b...ed-devices

93% off


$34.99 $499.99

Print this item

  Boris FX: Continuum VR Unit
Posted by: ahmed - 05-02-2018 , 03:24 PM - Forum: External Giveaways/Freebies - Replies (1)

[Image: Blt8AyI.jpg]

For the month of May, you can get the Continuum VR Unit for FREE from Boris FX.  That’s right, 5 powerful and speedy filters to help you quickly tackle 360° post and VFX tasks, all for free.

Top 5 Reasons to Get Your Free Continuum VR Unit:

  • The Continuum VR Unit is currently the only 360° plug-in toolkit on the market that provides a single, cross-host license: delivering major time-saving benefits!
  • Tackle often challenging 360° editing and post tasks quickly with GPU-accelerated filters.
  • Fix 360° footage fast with image restoration tools: eliminate flicker, sharpen your footage, reorient the hero view.
  • Easily add titles, graphics, blurs & 2D elements to the spherical 360° workspace.
  • It's FREE until Thursday, May 31, 2018, at midnight EDT. (a $199 value)
Promo(Click the Button "REGISTER HERE")
https://borisfx.com/products/continuum-u...tinuum-vr/
Or
http://go.pardot.com/l/272832/2018-04-24/4bc1f

Print this item

  Dashlane Password Manager: 3-Yr Premium Subscription (50% off)
Posted by: tarekma7 - 05-02-2018 , 02:34 PM - Forum: Hot Deals & Discounts - No Replies

https://deals.ghacks.net/sales/dashlane-...bscription

Print this item

  [Wondershare motherday contest] Join the Vote, Win Leica Instant Camera
Posted by: tarekma7 - 05-02-2018 , 01:43 PM - Forum: External Giveaways/Contests - No Replies

[Image: KGXQgPb.jpg]

Activity Rules:


1. Please join the vote, share this page on Facebook, and enter your email address. (Your email address is only used for winning announcement and notifications of other Wondershare activities)

2. We'll select 1 winner of Leica Instant Camera and 3 winners of WhatsMode gift cards randomly from the ones who meet the requirements.

3. We'll open the vote and big sales until the last minute of May 25th, and announce the winners on May 28th. Also, we'll contact the winner with email.

4. Wondershare preserves all rights to explain the rules and details.

Visit here:
https://photo.wondershare.com/mothersday.html

Print this item

  How to download Windows ISO images (version 1803) April 2018
Posted by: kubik67 - 05-02-2018 , 11:31 AM - Forum: Software Discussion - Replies (1)

You can download a disk image (. ISO file) that you can use to install or reinstall Windows 10, or to create an installation media using a USB flash drive or a DVD.

The project TechBench by WZT allows without tedious search and registration to download official ISO images of Windows by direct links directly from Microsoft servers.
To use this method, follow these steps:
Go to the project website at this link.

Next, set the following values in the form:

- Select type: Windows (Final)
- Select version: Windows 10, Version 1803 - Redstone 4 [Apr 2018] (build 17134.1)
- Choose your edition: Windows 10
- Selected language.
- Selected file. 
- Click To Download.

By URL-link download file you can make sure that the download comes from the official Microsoft server. Links are valid for 24 hours from the time of creation.

Note:the selected files include Pro editions, Home and Home for the same language in the same ISO image, direct selection occurs during installation).

Print this item

  iMobie AnyTrans & AnyDroid [for free]
Posted by: longin - 05-02-2018 , 10:10 AM - Forum: External Giveaways/Freebies - Replies (6)

AnyTrans iPhone Manager

[Image: 47496pV.png]

Used Google Translator ( German ->English ) :

Presumably you manage your iPhone or iPad via iTunes on a Mac or PC. However, the software from Apple is not the most intuitive and usually only makes the choice between "everything" or "nothing" anyway. Synchronizing photos, videos or other media selectively with the Apple smartphone or tablet is not equally possible for all types of media and if, as with the example of e-books, very cumbersome. There is an alternative such as the file manager AnyTrans. From Mac Life you get now a full version of the software for free download.
As a Mac Life reader, download the free giveaway version of AnyTrans for free. You can download the app for both macOS and the version for Windows .

  • Slide photos, contacts, and messages back and forth
  • Make backups in the Wi-Fi network
  • Songs without iTunes
  • Convert videos, load directly to the device
  • Extract files from iTunes backups
  • Move files from Android to iOS
Note
It is fully functional and not restricted. The only prerequisite: you have to download the app until May 10th
Giveaway FULL Versions : (German Language)
macOS https://ln.sync.com/dl/b2572d540/mczdj65...e-33chsg8w
Windows https://ln.sync.com/dl/69b357a50/wp4ncwe...6-bzen3db4

source:
http://www.maclife.de/jetzt-gratis-datei...02383.html

Quote: Try this method to change the language to english
  1. download the free version Anytransfer from imobile.de

  2. install it

  3. copy the english folder from language folder in the installation folder to you download folder

  4. uninstall it

  5. install the giveaway version

  6. delete the deutch folder from language folder

  7. copy the english folder into it

  8. english version is yours
Some FAQ from imobie to use this application like changing language(imobie.com)
https://www.imobie.com/faq/anytrans-for-....htm#part9

Print this item

  ApowerManager 3.1.8
Posted by: ahmed - 05-02-2018 , 09:02 AM - Forum: Giveaway of the day - Replies (2)

[Image: 8bqcK1A.jpg]

About:
ApowerManager is a professional phone manager for Android & iOS. It allows you to easily manage all the files stored on your phone from the computer, supporting both Windows and Mac systems. With it, you can freely transfer, delete, and edit your phone data, including pictures, videos, music, contacts, messages, apps and more. Besides, you can also make a full backup of your phone to the computer or restore the previous backup files to your phone within clicks. Moreover, it enables you to display phone screen on PC in real time via USB cable or WiFi, take screenshots and even record your phone screen with sound.

Key Features of ApowerManager:
*Connect Android and iOS devices to the computer via USB cable or WiFi
*Transfer all types of files between mobile devices and the computer
*Manage photos, music, videos, contacts, messages, apps and other files
*Backup and restore data with one click
*Display phone screen on the computer in real time
*Take phone screenshots and record phone screen activities with sound
*Simple and clear interface

NB: 1-year license.

Giveaway Page:
https://www.giveawayoftheday.com/apowermanager/
OR
Direct Download:
https://www.upload.ee/files/8393992/Apow...k.zip.html
OR
Download & Key(Separately)

Print this item

  Dataownerclub Data Recovery 1.1
Posted by: ahmed - 05-02-2018 , 09:01 AM - Forum: Giveaway of the day - No Replies

[Image: nM5ttw0.jpg]

About:
This powerful Data Recovery software can help to recover accidentally or permanently deleted files, photos, videos, audios, documents, emails, compressed files etc. from Windows computer, laptops, recycle bin, camcorder, camera, removable hard disk, hard drive(HDD, SSD, USB, etc), storage media, server, recording pen, etc.rd drive(HDD, SSD, USB, etc), storage media, server, recording pen, etc.

Giveaway Page:
https://www.giveawayoftheday.com/dataown...overy-1-1/#
OR
Direct Download:
https://www.upload.ee/files/8393974/Data...k.zip.html
OR

Download & Key(Separately)

Print this item

  Power-user for PowerPoint and Excel v 1.6.203[Pc]
Posted by: ahmed - 05-02-2018 , 08:03 AM - Forum: BitsDuJour Giveaways - No Replies

[Image: 6746509Power_User.jpg]

GP:
http://www.bitsdujour.com/software/power...00-percent
OR
BitsDujour Exclusive Download:
http://download.bitsdujour.com/bdj/downl...il2018.exe

License:

Note:
You must install/register the software within 1 month, and cannot do so afterwards. Upgrades to future versions of the software will be free for current subscriptions

Print this item

  Firefox 59.0.3 Released
Posted by: mrtrout - 05-02-2018 , 12:30 AM - Forum: Freeware - No Replies

https://www.mozilla.org/en-US/firefox/59...easenotes/         See what’s new in Firefox!
Release Notes tell you what’s new in Firefox. As always, we welcome your feedback. You can also file a bug in Bugzilla or see the system requirements of this release.

Download Firefox
Firefox Privacy Notice
DESKTOP ANDROID IOS OTHER RELEASES
59.0.3
Firefox Release
April 30, 2018

Version 59.0.3, first offered to Release channel users on April 30, 2018
fixed
Fix for compatibility with Windows 10 April 2018 update (Bug 1452619)       100% Scanned Malware Free & Clean With Comodo Internet Security Premium  & Digital Signature: ( Mozilla Corporation)   (On Comodo Trusted Vendors List)

Print this item

  DDoS attacks in Q1 2018
Posted by: tarekma7 - 05-02-2018 , 12:19 AM - Forum: Security News - No Replies

[Image: 180426-ddos-report-q1-2018-en-1.png]

Quote:News overview
In early January, it was reported that an amateur hacker had come close to pulling off a botnet attack using “improvised” materials. Armed with information gleaned from hacker forums, the DIYer created a Trojan using a zero-day exploit in Huawei routers and released it online. The attack was soon nipped in the bud, but the wannabe cybercriminal could not be traced.

Other slightly weightier news: first, experts reported growth in the Reaper (or IoTroop) botnet (not to be confused with North Korean hacker group The Reaper), first discovered last quarter; second, IT security resources hinted at the emergence of new “strains” of Mirai and Satori (the latter, known as Okiru, is intended for ARC processors), but so far without details. Moreover, in early February a platform selling JenX botnet services was detected and neutralized. JenX was found to be using a fan server for the video game GTA: San Andreas as its C&C. In terms of power, JenX was nothing to write home about, but the originality of its creators deserves a mention. On the topic of original botnets, another worth noting is DoubleDoor: the first known piece of “wild” malware to bundle two IoT vulnerabilities together.

As for new methods and vulnerabilities, besides the multiget hole in Memcached, last quarter news broke of a vulnerability in WordPress that makes it easy to down a web server. Fortunately, no in-the-wild attacks were observed.

The attack targets for this new weaponry remained largely the same. Profit is still the main motive behind DDoS attacks (the number of attacks on business in Russia alone doubled in 2017), although high-profile “commercial” attacks in the last three months were not so numerous. Within the space of three days in early February, players of Final Fantasy encountered problems signing into certain services. At roughly the same time, BusinessWire experienced similar difficulties lasting more than a week, during which period neither editors nor readers could access the news portal. There was no reported ransom demand, so the motive behind the attack can be assumed to be competition-related.

It would be amiss not to mention a series of attacks that hit GitHub and an unknown service provider in early March, which produced record volumes of garbage traffic — over 1 TB/s. This capacity was achieved by leveraging Memcached, a popular caching service for Linux servers. Interestingly, in some of these attacks the garbage traffic itself contained ransom demands in Monero.

Political motives are less common, but often more visible due to their topicality. The most headlining incident of late was, of course, the threat to sabotage the opening ceremony of the Winter Olympics in early February, most likely through a DDoS offensive. Even before that, in late January, the US Department of Defense repelled an influx of spam, and in late March their Russian counterparts had to survive a DDOS attack. In addition, experts reported that North Korean group The Reaper was extending its reach. Despite not showing any DDoS activity, it could soon start moving in that direction.

Another hard-hitting DDoS attack on major financial institutions in the Netherlands was initially thought to be political, but on closer inspection turned out to be pure hooliganism: Dutch police arrested a teen suspect for causing week-long mayhem at several banks simply to prove that it was possible.

DDoS is also becoming more popular as a means of personal revenge. California, for instance, witnessed the case of David Goodyear, who was found guilty of trying to launch a DDoS attack against an amateur astronomy forum when it blacklisted him for using bad language. True, he can’t be accused of not trying other methods before turning his hand to cybercrime: Goodyear repeatedly registered on the forum under different chat names, but each time earned himself a ban for boorish behavior.

Read full article HERE

Print this item

  How to Download Windows 10 April 2018 Update from Windows Update Right Now
Posted by: tarekma7 - 05-02-2018 , 12:15 AM - Forum: Software Discussion - No Replies

[Image: how-to-download-windows-10-april-2018-up...0920-3.jpg]

Quote:New version only offered on manual update checks

Microsoft has finally published the Windows 10 April 2018 Update as a manual download, allowing users who don’t want to wait any longer to get the new tidbits right away.

The automatic rollout is projected to begin on May 8, the same day when Microsoft also kicks off this month’s Patch Tuesday cycle, at which point Windows 10 April 2018 Update will start showing up in Windows Update for the first waves of systems flagged as compatible.

Just like in the past, Microsoft will use a global rollout in waves, which means that systems across the world will gradually receive the OS update as the company addresses software and hardware compatibility issues. With the Windows 10 Fall Creators Update, Microsoft introduced a machine learning (ML) system to select devices that were supposed to upgrade flawlessly, and based on the initial results, this update mechanism would be further expanded to the April 2018 Update as well.

“For the April 2018 Update rollout, we will expand our use of ML to identify the devices ready to update, incorporating things like additional compatibility data. This will allow us to deliver updates to devices as fast as possible while providing even better customer experiences,” Microsoft explains.

“With the April 2018 Update, we have also further shortened the amount of time your device is offline during updates up to 63% compared to the Windows 10 Creators Update. The April 2018 Update will follow the same phased rollout approach of proactively monitoring all available feedback and update experience data and making the appropriate product updates during the rollout.”

How to get April 2018 Update from Windows Update

But as compared to the Fall Creators Update, Microsoft has also made it easier for users to manually download and install the new OS build.

If for version 1709 users had to turn to the Media Creation Tool or the Windows 10 Update Assistant to do this manually, the April 2018 Update introduces a manual download option via Windows Update.

In other words, the update is there in Windows Update, but the download process isn’t triggered until you manually check for updates. To do this, all you have to do is to go to the following path:

Settings > Update & security > Windows Update > Check for updates

Once you press the Check for updates button, Windows Update should scan for new OS updates and begin the process of downloading the Feature update to Windows 10, version 1803. An automatic check won’t be performed until May 8, the day when Microsoft ships Patch Tuesday security fixes, so checking for updates manually is the only way to get it until now.

Needless to say, it takes some time to download the Windows 10 April 2018 Update, and it all depends on a series of factors, like your computer’s configuration and the Internet connection speed. On the other hand, once the download process comes to an end, your system should spend less time in offline stage, as Microsoft has tweaked this process to perform more tasks before the machine needs to be restarted.

Microsoft says that in some cases installing the Windows 10 April 2018 Update could take only 30 minutes, though on systems here at Softpedia the average time spent for installing this new OS version is somewhere around 40 minutes, with slower machines requiring an extra 10 minutes.

No upgrade issue was experienced whatsoever, and judging from early reports, the process appears to be a lot smoother than it was in the case of previous Windows 10 versions. We’ll continue to monitor forums and social networks and let you know should any bugs be discovered.

SOURCE

Print this item

  Features Removed and Discontinued in Windows 10 April 2018 Update
Posted by: tarekma7 - 05-02-2018 , 12:13 AM - Forum: Software Discussion - No Replies

Quote:Microsoft publishes list of features going away

Just like it happens when a new Windows 10 update gets the green light, the debut of April 2018 Update marks the end of several OS features, as they are replaced with better options or no longer make sense given the new functionality.

Microsoft has published the list of features going away beginning with the April 2018 Update, including removed and deprecated (projected to be removed in a future release) options.

While you can check out the entire table in the pictures included in this article, of particular highlight is the removal of HomeGroup, which is finally going away with the April update. While HomeGroup is being ditched, Microsoft is still offering options to share printers, files, and folders with share tools that are available across the OS.

XPS Viewer is no longer included in the installation image and needs to be installed manually from Settings > Apps and Features > Features on Demand.

Bye bye, Phone Companion
When it comes to features that are no longer being developed, the Windows Help Viewer is one of the apps already on the table to be pulled in a future update.

“All Windows help information is available online. The Windows Help Viewer is no longer supported in Windows 10. If for any reason you see an error message about ‘help not supported,’ possibly when using a non-Microsoft application, read this support article for additional information and any next steps,” Microsoft explains.

Additionally, Phone Companion is deprecated as well in April 2018 Update, as the entire functionality has been moved to the Phone page in the Settings app, so it no longer makes sense being offered separately.

The next stable release for Windows 10 is Redstone 5, projected to land in the fall of this year. The update should be finalized in September and then pushed to devices across the world in October.

SOURCE

Print this item

  FacexWorm Spreads via Facebook Messenger, Malicious Chrome Extension
Posted by: tarekma7 - 05-02-2018 , 12:06 AM - Forum: Security News - No Replies

[Image: FacexWorm.png]


Quote:Facebook, Chrome, and cryptocurrency users should be on the lookout for a new malware strain named FacexWorm that infects victims for the purpose of stealing passwords, stealing cryptocurrency funds, running cryptojacking scripts, and spamming Facebook users.

This new strain was spotted in late April by Trend Micro researchers and appears to be related to two other Facebook Messenger spam campaigns, one that took place last August, and another one from December 2017, the latter spreading the Digmine malware.

Researchers say FacexWorm's modus operandi is similar to the previous two campaigns, but with the addition of new techniques aimed at cryptocurrency users.

How FacexWorm spreads and infects users
The infection chain has remained the same and usually starts with users receiving link spam via Facebook Messenger.

Clicking the link leads users to a web page mimicking YouTube, which tries to trick the user into installing a YouTube-themed Chrome extension.

Trend Micro says it analyzed this extension and found numerous malicious functions. For starters, the rogue extension adds code to users' Chrome browsers to steal login credentials from login forms.

This behavior isn't active on all sites, but only when users are accessing Google, Coinhive, or MyMonero web accounts. Collected credentials are sent to the FacexWorm gang's servers.

FacexWorm redirects users to scam pages

Second, the rogue FacexWorm extension automatically redirects users to a web page pushing a cryptocurrency scam, asking users to send over a small Ether sum to verify their account.

The redirection takes place only when users try to access cryptocurrency-related sites. The extension comes with a list of 52 websites on which the redirection becomes active. In addition, it will also show up on sites whose URLs also include terms such as "eth," "ethereum," or "blockchain."

Third, the extension also inserts a cryptojacking mining script, loading an instance of the Coinhive in-browser miner, which mines Monero for the FacexWorm gang.

FacexWorm can also steal cryptocurrency

Fourth, the rogue extension also switches recipient information for cryptocurrency transactions on trading platforms such as Poloniex, HitBTC, Bitfinex, Ethfinex, and Binance, and Blockchain.info.

Trend Micro says FacexWorm can replace details for Bitcoin (BTC), Bitcoin Gold (BTG), Bitcoin Cash (BCH), Dash (DASH), ETH, Ethereum Classic (ETC), Ripple (XRP), Litecoin (LTC), Zcash (ZEC), and Monero (XMR) transactions, switching the recipient's address with one owned by the FacexWorm malware creators.

According to Trend Micro, crooks didn't manage to make a profit out of this scheme, as researchers caught and reported the extension early on, and the cryptocurrency addresses associated with this campaign only recorded one transaction worth a meager $2.49.

Crooks also tried to make money via referral URLs

Last but not least, when users try to access certain sites, the FacexWorm rogue extension also redirects users to referral URLs, which is another way in which the malware authors are earning money via their infected hosts.

The referral URL redirection has been spotted for sites such as Binance, DigitalOcean, FreeBitco.in, FreeDoge.co.in, and HashFlare.

Trend Micro said it had an integral role in shutting down this campaign as soon as it got started, reporting it to both Google and Facebook. The Chrome Web Store staff intervened by removing the extension, while Facebook banned domains associated with the spam messages.

SOURCE

Print this item

  Starting Today, Google Chrome Will Show Warnings for Non-Logged SSL Certificates
Posted by: tarekma7 - 05-02-2018 , 12:02 AM - Forum: Security News - No Replies

Quote:Starting today, the Google Chrome browser will show a full-page warning whenever users are accessing an HTTPS website that's using an SSL certificate that has not been logged in a public Certificate Transparency (CT) log.

By doing so, Chrome becomes the first browser to implement support for the Certificate Transparency Log Policy. Other browser makers have also agreed to support this mechanism in the future, albeit they have not provided more details.

This new policy was first proposed by Google engineers in 2016, and was scheduled to enter into effect in October 2017, but was later delayed for 2018.

CAs must log all newly issued SSL certificates
The CT logging policy dictates that Certificate Authorities (CAs) —the organizations that issue SSL certificates for supporting HTTPS connections— must publish logs with all the SSL certificates they have issued each day.

These logs must be public, so browser makers, fellow CAs, or independent researchers can freely investigate instances of misissued certificates at any time.

CAs have always kept logs of the certificates they issued, but these were private and only made available to browser makers when they were investigating instances of certificate misissuance.

Most CAs are publishing CT logs already
With a market share of over 60 percent, most CAs saw the writing on the wall and began publishing public CT logs starting last year when it became evident that Google was set to implement this new policy in Chrome.

"Chrome will require that all TLS server certificates issued after 30 April, 2018 be compliant with the Chromium CT Policy," Google engineer Devon O'Brien wrote in a Google Groups discussion earlier this year when he announced the new deadline.

"After this date, when Chrome connects to a site serving a publicly-trusted certificate that is not compliant with the Chromium CT Policy, users will begin seeing a full page interstitial indicating their connection is not CT-compliant," O'Brien added. "Sub-resources served over HTTPS connections that are not CT-compliant will fail to load and will show an error in Chrome DevTools."

These changes have rolled out to Chrome desktop platforms first, which include Chrome for ChromeOS, Linux, macOS, and Windows.

Google engineers have also added a Chrome policy flag that allows sysadmins to disable the CT log-checking behavior in instances Chrome is deployed inside an intranet.

New CT policy is not retroactive
The new CT policy is not retroactive. This means that older certs issued before today that have not been recorded in a CT log will continue to work.

But if a CA has issued a new SSL cert starting today and has not recorded it in a public CT log, Chrome will show an error.

The good news is that many CAs have started logging certificates in public logs and sharing data with each other. Merkle Town (operated by CloudFlare) and Crt.sh (operated by Comodo) are two websites that aggregate CT logs.

Such tools have been instrumental earlier this year when a user noticed that the South Korean government-controlled CA had misissued an SSL certificate for the entire *.go.kr top-level domain, allowing its operator to intercept traffic for all websites using that TLD. That discovery was made by an independent security researcher, and with public CT logs now becoming a de-facto standard, expect more cases like this to surface in the future.

SOURCE

Print this item

  Amazon Follows Google in Banning "Domain Fronting"
Posted by: tarekma7 - 05-02-2018 , 12:00 AM - Forum: Security News - No Replies

[Image: APT29-domain-fronting.png]

Quote:Two of today's biggest cloud service providers are now blocking a technique called "domain fronting" that has been used by websites and applications to avoid government-based censorship, but also by malware to secretly siphon stolen data to covert servers.

The first one to drop support for domain fronting was Google, at the start of April. Tor developers were the first ones to notice that Google App Engine had stopped working with domain-fronted services on April 13.

A Google spokesperson told the media at the time that Google never officially supported domain fronting in the first place, and that recent changes in its infrastructure had resulted in the feature ceasing to work.

Amazon follows Google and bans domain fronting as well
But last week, Amazon, too, announced that it would drop support for the same feature.

"Domain fronting" is a technique that app and website developers have used in the past to fool censorship tools. The technique relies on using an intermediary cloud server as a proxy for the real website. Connections are initiated for the proxy server, but the user is redirected to the actual website in a subsequent step.

But despite its simple scheme, domain fronting has allowed websites and apps to evade ISP-level censorship and traffic inspection tools for more than a decade.

Domain fronting has been used by apps like Signal, Tor-to-Web proxies, the GreatFire service to bypass China's Great Firewall, and lots of VPN providers to hide their servers' real locations.

Domain fronting became popular with malware operations
But despite the technique's use with legitimate apps trying to skirt government-based bans, the domain fronting had also slowly started to become quite popular on the malware scene, where cybercriminals had been using it to disguise the locations of command-and-control (C&C) servers and provide an extra layer of resiliency during law-enforcement takedown efforts.

The most famous use of domain fronting for a malware operation was by APT29, a cyber-espionage group suspected to be a branch of the FSB, one of Russia's intelligence agencies, according to cyber-security firm CrowdStrike.

READ FULL ARTICLE HERE

Print this item

  School pays $10,000 Ransom in Bitcoin after cyberattack | Reaction to the News Report
Posted by: tarekma7 - 05-01-2018 , 11:12 PM - Forum: Video Reviews - No Replies

Print this item

  [Xbox One] Battlefield 1 They Shall Not Pass DLC - Free
Posted by: djeans465 - 05-01-2018 , 07:58 PM - Forum: Gaming News - No Replies

[Image: image?url=8Oaj9Ryq1G1_p3lLnXlsaZgGzAie6M...format=jpg]

[Xbox One] Battlefield 1 They Shall Not Pass DLC - Free
 

Battlefield™ 1 They Shall Not Pass* is the first expansion pack for Battlefield 1, available standalone or as part of Battlefield 1 Premium Pass.

Play as one of the most ferocious armies in WW1 – the French. Engage in the savage fighting around the furnace of Verdun, and descend into the bowels of Fort de Vaux where barbarous battles rage in the gas-filled corridors. Take advantage of the mechanical monsters and unique arsenal by the Aisne riverbanks in the largest tank assault of the war. The French adopted a new battle cry during the war: They shall not pass!

Link:  https://www.microsoft.com/en-gb/store/p/...0690990)()

Print this item

  PDF Password Recover
Posted by: Sasha - 05-01-2018 , 09:52 AM - Forum: External Giveaways/Freebies - Replies (5)

[Image: 68cccd1047d3.png]
PDF Password Recover

PDF Password Recover is a tool for recovering or resetting a password for a PDF document. It not only allows you to restore the user password required to open the PDF file, but also the password of the owner of the PDF document, if you need the necessary permissions. To speed up the recovery process, it is recommended to set several input parameters.

It is important to specify the initial length of the source password. If the program does not find such a password, it will automatically increase or decrease the length by one character and repeat the same operation. At the same time, you can choose which types of characters to discard (for example, spaces, lowercase letters, symbols, etc.).

GP: http://www.sw.centrum.cz/computer/pdf-pa...r-computer

Print this item

  DoYourData File Eraser (Win & Mac)
Posted by: ahmed - 05-01-2018 , 09:04 AM - Forum: External Giveaways/Freebies - Replies (8)

[Image: xJg8qtZ.jpg]

About:
The deleted, formatted or lost data can be recovered by data recovery software. To avoid data recovery, you need file eraser. DoYourData File Eraser can help you securely and permanently erase targeted files/folders, no chance for data recovery.
You can permanently erase data from:
- PC/Laptop
- SSD/HDD
- USB Drive
- Memory Card
- Digital Camera
- Other Storage Media

Giveaway Page:
https://www.giveawayoftheday.com/doyourd...raser-2-0/#
Or
Download & Key(Separately)


Terms:
You have to install and activate it before the Giveaway offer for the software is over.Please note that the software you download and install during the Giveaway period comes with the following important limitations:
1) No free technical support
2) No free upgrades to future versions
3) Strictly non-commercial usage

Print this item