Welcome, Guest |
You have to register before you can post on our site.
|
|
|
Welcome Guest!
|
Welcome to the Promo2day Community, where we feature software giveaways, computer discussion, along with a fun, safe atmosphere! If your reading this it means you are not yet registered.
You will need to Register before you can make posts, chat or enter the forum giveaways.
Be sure to also visit the Help/FAQ page.
|
CCleaner Attackers Intended To Deploy Keylogger In Third Stage |
Posted by: mrtrout - 03-12-2018 , 11:41 PM - Forum: Security News
- No Replies
|
|
https://threatpost.com/ccleaner-attacker...y%20digest CCleaner Attackers Intended To Deploy Keylogger In Third Stage by Lindsey O'Donnell March 12, 2018 , 12:49 pm
CANCUN, Mexico – As investigations continue into a backdoor that was planted in the CCleaner utility in 2017, Avast said it has found that the threat actors behind the attack were planning to install a third round of ShadowPad malware on compromised computers.
Avast, which acquired the maker of CCleaner Piriform in July, said that it has been continually investigating the malware attack on the popular PC cleaning tool CCleaner (formerly Crap Cleaner) since it was first revealed in September 2017. While the company has not found evidence of a third stage binary on infected computers, it has found evidence of “what the intended third stage might have been,” according to Avast speaking at Kaspersky Lab’s Security Analyst Summit last week.
According to Avast, it has found that the malware in question spread to Piriform’s build server sometime between March and July 4, 2017.
Avast in September brought the issue to light, saying that the 32-bit versions of CCleaner V5.33.6162 and CCleaner Cloud V1.07.3191 – which had been installed on up to 2.27 million computers – had been infected by malware collecting data such as computer names and lists of installed software and running processes. In addition to data collection, Avast said that the malware also had downloader capabilities which were active on 40 PCs. In September, Avast and Kaspersky Lab’s Costin Raiu said that they believed Chinese cyber espionage group Axiom was behind the attack. “Up until now, we have not found any third stage binary on the affected computers,” the company said. “However, we now have found evidence that leads us to the assumption of what the intended third stage might have been.”
While eliminating the threat from the Piriform network, Avast started consolidating and inspecting the Piriform infrastructure and computers, and found the preliminary versions of the stage one and stage two binary on them. Then, on four computers on the Piriform network, the company found evidence of a specialized multi-purpose and modular malware framework called ShadowPad being installed.
“It turned out we found an older version of stage two inside the network itself trying to download a tool called ShadowPad,” Martin Hron, security researcher at Avast, told Threatpost during SAS.
ShadowPad is a cyber attack platform that criminals deploy in networks to gain remote control capabilities, keylogging functionality and data exfiltration.
Hron said that the tool was installed on the four Piriform computers on April 13th, 2017 after Avast found log files of ShadowPad which were encrypted keystrokes from a keylogger installed on the computers.
“The version of the ShadowPad tool is custom-built, leading us to the assumption that it was explicitly built for Piriform,” said the company. “By installing a tool like ShadowPad, the cybercriminals were able to fully control the system remotely and collect all the credentials and insights into the operations on the targeted computer. Besides the keylogger tool, other tools were installed on the four computers, including a password stealer, and tools providing capacities to install further software and plugins on the targeted computer remotely.”
ShadowPad was first discovered in August after researchers at Kaspersky Lab found a backdoor in NetSarang’s server management software package. The researchers said that the modular platform could download and execute arbitrary code, create processes, and maintain a virtual file system in the registry, all of which are encrypted and stored in locations unique to each victim.
“We don’t have a sample of the third stage payload distributed via the CCleaner hack to any of these computers, and it is not clear if it was the attacker’s intention to attack all 40 of them just a few or none. We continue investigating the data dumps from the computers, and will post an update as soon as we learn more,” the company said.
|
|
|
Firefox Gets Privacy Boost By Disabling Proximity and Ambient Light Sensor APIs |
Posted by: mrtrout - 03-12-2018 , 11:38 PM - Forum: Security News
- No Replies
|
|
https://www.bleepingcomputer.com/news/so...nsor-apis/ Firefox Gets Privacy Boost By Disabling Proximity and Ambient Light Sensor APIs
By Catalin Cimpanu
March 12, 2018 09:36 AM Stating with Firefox 60 —expected to be released in May 2018— websites won't be able to use Firefox to access data from sensors that provide proximity distances and ambient light information.
Firefox was allowing websites to access this data via the W3C Proximity and Ambient Light APIs.
But at the start of the month, Mozilla engineers have decided to disable access to these two APIs by default. The APIs won't be removed, but their status is now controlled by two Firefox flags that will ship disabled by default.
This means users will have to manually enable the two flags before any website can use Firefox to extract proximity and ambient light data from the device's underlying sensors.
A total of five new flags added
The two flags will be available in Firefox's about:config settings page. The screenshot below shows the latest Firefox Nightly version, where the two flags are now disabled, while other sensor APIs are enabled. The Firefox code commit in which these two flags have been added also includes three other flags —to enable or disable all sensors APIs, to enable/disable the Device Orientation Sensor API, and to enable/disable the Motion Sensor API.
These three flags will ship enabled by default, as access to these two APIs is needed by a broad range of a wide range of mobile websites.
Privacy concerns over the Proximity and Ambient Light APIs
The Proximity and Ambient Light sensors are both new and highly controversial. A key factor in the decision to ship these two APIs disabled by default is the work of privacy expert Lukasz Olejnik.
Olejnik published two research reports on the possible ways attackers and advertisers could abuse these two APIs.
For example, Olejnik argued that the W3C Proximity Sensor API could allow websites and advertisers to query the position of nearby objects in relation to a user's smartphone or tablet. Additionally, he also argued that malicious sites could use the W3C Ambient Light Sensor API to steal browser data.
Shipping these two APIs off by default takes care of some of Olejnik's concerns, albeit it does not mitigate the risk altogether.
"More user control is always good," Olejnik said regarding Mozilla's decision.
|
|
|
Pocket Radio Player 180311 Released |
Posted by: mrtrout - 03-12-2018 , 12:59 AM - Forum: Freeware
- No Replies
|
|
http://pocketradio.awardspace.info/prp_changelog.txt Pocket Radio Player - Changelog
----------------------------------------------------------
#180312 (Vulture)
----------------------------------------------------------
! Custom folder for recordings can be set from the options window.
+ added / deleted / replaced radio stations (2257 total / ~3556 servers)
% several GUI adjustments, removed "Credits" item from taskbar.
% updated libogg from version 1.3.1. to 1.3.2.
% Fallback to GCC 6.4 to keep compatibility with older Windows editions.
- updated to mbedtls 2.7.0. -> Applied win32 "vsnprintf" patch.
http://pocketradio.awardspace.info/ When size matters
Pocket Radio Player is a free Shoutcast and IceCast compatible internet radio player for Windows. Unlike the many other players out there, this software concentrates on offering basic functionality in a compact package.
Main features
Multilingual application
Portable & modular design, skinable & highly customizable
Includes: Station recorder, encoder, editor & updater
History of recently played songs & stations
Excellent audio quality & performance via FMOD
Runs "out of the box", i.e. no bloated Framework or other subsidiary software requirements
No ads, no data mining. 100% free! 2008-2017 Stefan Sarbok : http://pocketradio.awardspace.info/downloads.html Download PRP
Below you can download the current version of Pocket Radio Player. Have a look at the change log to identifiy the latest modifications made. By downloading the application you accept the terms of the disclaimer. You need to extract the zip-archive before you can use the player.
In order to enable MP3-recording, please place the "libmp3lame.dll" (x86-Win32, 3.99.5!) into the main PRP folder.
This external library isn't part of the distribution. You can grab it from Rarewares, linked here.
Windows: Mediafire (#180311, ~16 MB)
Official Mirrors: Major Geeks - Softpedia - Older Geeks : 100% Scanned Malware Free & Clean With Sophos Home Premium & (Not Signed)
|
|
|
Screamer Radio 1.0 (2018-03-11) Released |
Posted by: mrtrout - 03-12-2018 , 12:40 AM - Forum: Freeware
- No Replies
|
|
https://www.screamer-radio.com/download/ Manual installation
Important! This type of installation will not update automatically.
Last updated 2018-03-11.
Stable
Download installer
Download portable zip
Last updated 2018-03-11.
Preview
Download installer
Download portable zip
System requirements
Requires.NET Framework 4.5 which is available for Windows Vista SP2 and up. : https://www.virustotal.com/#/file/51a2af.../detection 0 / 67
No engines detected this file
SHA-256 51a2afb9e0451179140ace9a53984c675efc55bb3db5518489a1f044d9d9aa98
File name ScreamerSetup_10_20180311.exe
File size 2.81 MB
Last analysis 2018-03-11 18:37:48 UTC File Names
ScreamerSetup_10_20180311.exe
Screamer_Radio.exe
Packers
F-PROT NSIS : 100% Scanned Malware Free & Clean With Sophos Home Premium ( Not Signed) https://www.virustotal.com/#/file/b7ec8b.../detection 0 / 62
No engines detected this file
SHA-256 b7ec8bbed6238c6327c6392ee633abd82c865c3b8607571afd6e51206915d510
File name Screamer_Radio_10_20180311.zip
File size 2.78 MB
Last analysis 2018-03-11 16:21:22 UTC File Names
Screamer_Radio_10_20180311.zip
Screamer_Radio.zip
|
|
|
Soda Player 1.3.5 Released |
Posted by: mrtrout - 03-12-2018 , 12:09 AM - Forum: Freeware
- No Replies
|
|
https://headwayapp.co/soda-player-changelog/ Soda Player changelog
www.sodaplayer.com
1.3.5
19 hours ago
Fix
[Windows/AirPlay] Fix major regression where some videos wouldn't AirPlay (and nothing would AirPlay when using subtitles).
[Acestream/Chromecast] Pass-thru video instead of re-encoding (keep original video quality and decrease CPU usage).
[Mac/Acestream] Fix the need to restart the operating system after opening an acestream link (tentative fix).
[Chromecast] Fix bug when trying to cast video with a DTS audio track.
[Chromecast] .ts videos should cast again. : https://www.sodaplayer.com/
Introducing the most feature-packed video player ever made.
Stream BitTorrent videos instantlyIntegrated blazing fast SOCKS5 proxyWatch on your Chromecast and Apple TVAutomatically get matching subtitles in your languageNative support for AceStream linksSupport for all formats and codecs
DOWNLOAD 1.3.5 FOR WINDOWS
Also available for Mac
Play BitTorrent videos instantly
Open and play magnet links and torrent files instantly.
Supports DHT, PEX, UDP trackers and all other key BitTorrent technologies to give you maximum speed.
Protect your privacy, punch through network blocks and bypass ISP throttling with its integrated blazing fast SOCKS5 proxy.
Integrated blazing fast SOCKS5 proxy
Protect your privacy by hiding your IP from other peers and agents on the BitTorrent network.
Bypass throttling from your Internet provider and get maximum speed for BitTorrent traffic.
Punch through network blocks that forbid BitTorrent traffic (universities, hotels, workplaces, ...).
Blazing fast SOCKS5 proxy servers that are optimized for BitTorrent traffic.
No setup required, the app comes with the SOCKS5 proxy client already integrated and working.
Watch on your Chromecast and Apple TV
Support all Apple TVs, all Chromecast and all devices with Chromecast built-in (Android TV, modern TVs, etc.).
The smart TV engine will pass-through the video and/or audio tracks without transcoding when the codec is supported by your device.
Hardware encoding on both Windows and Mac (used only when trancoding is absolutely required).
Support for 5.1 and 7.1 surround sound.
Support for 1080p and up to 4K videos with compatible devices (Chromecast Ultra, NVIDIA SHIELD, etc.).
Support for subtitles (most subtitles will not require transcoding the video).
Automatically get matching subtitles in your language
Advanced matching algorithm that automatically get subtitles in your language from OpenSubtitles.org, the largest subtitles database in the world.
Support for subtitles embedded inside MKV files, subtitles inside BitTorrent files and subtitles in the same folder or subfolders for local files.
Support for all the common subtitles formats.
Support for all formats and codecs
Support for all the common formats and video/audio codecs, including HEVC/H.265, AC-3, DTS, WebM, etc.
Hardware decoding for H.264 and HEVC/H.265.
...and more!
Support for multiple audio tracks.
Playlist support for both local and BitTorrent video files.
Mini-Player mode (smaller player that stays on top of other windows, in the corner of your screen). Coming soon!
Is the app free?
Yes!
The integrated SOCKS5 proxy for BitTorrent will have a very small subscription fee in a few months (for those interested, it will be cheaper than your average VPN), but for now while we iron out the bugs it's included for free : https://www.sodaplayer.com/ [Mac users] If Soda Player is stuck at "Extracting additional dependencies...", please redownload and reinstall the latest version from this website, it will fix the problem. : 100% Scanned Malware Free & Clean With Sophos Home Premium ( & Not Signed This Version)
|
|
|
Shining Blu-ray Player 6.6.6 |
Posted by: ahmed - 03-11-2018 , 04:40 PM - Forum: External Giveaways/Freebies
- No Replies
|
|
About:
All-in-one Blu-ray Player, DVD Player, HD Video Player, 4K UHD Player, 3D Video Player, SD Video Player and All Music Player software.
DVD: DVD-Video, DVD-VR, DVD+VR, DVD disc, IFO file, DVD ISO File
SD/HD Videos: TS, MTS, M2TS, MXF, TRP, TP, MP4, M4V, QT, MOV, MPG, MPEG, MPEG2, MPEG4, MJPG, MJPEG, AVI, 3GP, 3G2, FLV, MOD, TOD, RM, RMVB, WMV, ASF, MKV, SWF, F4V, VOB, DAT, DV, DIF, OGM, WTV, DVR-MS, Bink video and WebM.
Music Files: FLAC, WAV, WMA, AAC, ALAC, AC3, AIFF, AMR, AU, MP3, MP2, M4A, MKA and OGG.
Giveaway Page:
https://giveaway.download.hr/windows/shi...ray-player
OR
:arrow:
Download & License:
**To get your serial key please share this offer on social network or wait 300 seconds.
|
|
|
WinRAR 5.60 Beta 1 |
Posted by: ANkM - 03-11-2018 , 03:14 PM - Forum: Paid
- Replies (5)
|
|
WinRAR is a powerful archive manager. It can backup your data and reduce the size of email attachments, decompress RAR, ZIP and other files downloaded from Internet and create new archives in RAR and ZIP file format.
Changes in Version 5.60 beta 1
1. We updated WinRAR graphics.
We are grateful to http://weirdsgn.com and http://icondesignlab.com
designers participated in this endeavor and proud to announce that
WinRAR uses the new icon set prepared by Aditya Nugraha Putra
from http://weirdsgn.com.
Previous WinRAR icons are available as interface theme here:
https://rarlab.com/themes/WinRAR_Classic....theme.rar
2. "Repair" command efficiency is improved for recovery record protected
RAR5 archives. Now it can detect deletions and insertions of unlimited
size also as shuffled data including data taken from several recovery
record protected archives and merged into a single file in arbitrary
order.
3. "Turn PC off when done" archiving option is changed to "When done"
drop down list, so you can turn off, hibernate or sleep your PC
after completing archiving.
4. Use -ioff or -ioff1 command line switch to turn PC off,
-ioff2 to hibernate and -ioff3 to sleep your PC after completing
an operation.
5. If encoding of comment file specified in -z<file> switch is not
defined with -sc switch, RAR attempts to detect UTF-8, UTF-16LE
and UTF-16BE encodings based on the byte order mask and data
validity tests.
6. WinRAR attempts to detect ANSI, OEM and UTF-8 encodings of
ZIP archive comments automatically.
7. "Internal viewer/Use DOS encoding" option in "Settings/Viewer"
is replaced with "Internal viewer/Autodetect encoding".
If "Autodetect encoding" is enabled, the internal viewer attempts
to detect ANSI (Windows), OEM (DOS), UTF-8 and UTF-16 encodings.
8. Normally Windows Explorer context menu contains only extraction
commands if single archive has been right clicked. You can override
this by specifying one or more space separated masks in "Always display
archiving items for" option in Settings/Integration/Context menu items",
so archiving commands are always displayed for these file types
even if file was recognized as archive. If you wish both archiving
and extraction commands present for all archives, place "*" here.
9. SFX module "SetupCode" command accepts an optional integer parameter
allowing to control mapping of setup program and SFX own error codes.
It is also accessible as "Exit code adjustment" option
in "Advanced SFX options/Setup" dialog.
10. New "Show more information" WinRAR command line -im switch.
It can be used with "t" command to issue a message also in case of
successful archive test result. Without this switch "t" command
completes silently if no errors are found.
This switch is applicable only to WinRAR.exe and ignored by console
RAR.exe.
11. If a wrong password is entered when unpacking an encrypted file
in ZIP archive, WinRAR proposes to enter a valid password
for same file again instead of aborting extraction.
12. If a wrong password is entered when opening or unpacking RAR archive
with encrypted file names, WinRAR proposes to enter a valid password
again instead of aborting the operation. Previous versions already
did so for RAR archives with encrypted file data, but aborted
for archives with file name encryption.
13. WinRAR recognizes GZIP files with arbitrary data preceding
an actual GZIP archive, such as .scexe firmware files.
14. @filelist parameter can be specified in "Files to add" field of
archiving dialog. In this case WinRAR will attempt the list of archiving
files from 'filelist' file, which should be the plain text, one file
name per line.
15. Info dialog:
a) compression ratio graph is updated;
b) "Names and data" is displayed in "Encryption" field for
archives with encrypted file names.
16. Full archive name is displayed if mouse pointer is placed over
an archive name in the operation progress window. It can be useful
if archive name is lengthy and does not fit to available window space.
17. If -ts1 switch is used with -u or -f, file time comparison is performed
with 1 second precision. Previosuly in such case we could wrongly treat
an adding file as newer than archived just because we compared the high
precision adding file time against the low precision archived file time.
18. "Update" and "Fresh" commands ('u' and 'f' in the command line mode)
quit immediately if no files are to be updated. Previously they created
a temporary archive before quitting when updating archives with recovery
record or quick open information.
19. Prompt is issued after creating 500 volumes from WinRAR GUI shell,
so user can continue or quit further archiving. It is done to prevent
creating many thousands of volumes in case of wrongly entered
volume size.
20. WinRAR uses megabytes instead of bytes as default units for volume size
field in the archiving dialog.
21. "Repair" command issues "Recovery record is corrupt" message
after repairing RAR5 archive containing a broken recovery record.
Previously such message was issued only by "Test" command
and "Repair" handled most of recovery record damages silently.
22. Bugs fixed:
a) fixed potential security issues when processing corrupt
RAR archives;
b) non-English characters in TAR files with PAX extended headers
were not displayed correctly;
c) "rar x arcname.rar .." command unpacked files to current folder
instead of its parent;
d) pasting files from Windows Explorer to archive opened in WinRAR
blocked further copy and paste operations in Explorer until
archiving was finished;
e) SFX module issued "The specified password is incorrect" message
infinitely not prompting for correct password once a wrong password
was entered;
f) folders time was always set when extracting ZIP archives even if
"File time" options in the extraction dialog were turned off;
g) if "Delete mode: Always" was selected when extracting
and user pressed "Cancel" in the file overwrite or password prompt,
an archive could be deleted even after cancelling extraction
for .zip and .7z formats.
Download:
https://www.rarlab.com
|
|
|
Able2Extract Professional 12 with OCR: PDF Creation & Conversion at your Fingertips! |
Posted by: tarekma7 - 03-11-2018 , 02:35 PM - Forum: Written Reviews
- Replies (2)
|
|
Introduction:
Portable Document Format (PDF) files is the most popular among most both home and business in view of its lightweight, support of most operating system and browsers. It offers you many advantages when dealing with any of your documents with increased productivity and better workflows. Being the best choice that help you in electronic document archives, PDF is the main part in achieving the concept of “paperless office”. IT is your first choice when archiving eBooks, spreadsheets, scanned files and many more. The only problem with PDF is that it is difficult to be edited. You need PDF Editor and converter to help you convert PDF files into other popular formats and edit it according to your needs
Able2Extract Professional 12 is the industry leading pdf converter that is tucked inside a friendly interface. There is no alternative to PDF conversion software when it comes to working with PDF files. It is a must-have tool in every business environment, because it simplifies and speeds up the process of manipulating data locked down in the most popular format for sharing and archiving documents.
Able2Extract Professional 12 allows users to convert PDF to all popular formats, including Excel, Word, CSV and AutoCAD. Edit PDF content, text, and paragraphs effortlessly in real time. Additionally, you can easily fill out PDF forms, edit and create fillable PDF forms. You can also insert bates numbering, add a blank page to PDF and extract PDF tables to Excel spreadsheets more accurately. Able2Extract is simply a PDF powerhouse at your fingertips. Converting, analyzing and reversioning PDFs has never been easier!
Homepage:
https://www.investintech.com/
System Requirements:
The program supports many platforms. here is the minimum system requirements for each system
Download:
https://www.investintech.com/prod_downloadsa2e.htm
Installation:
This is very easy and doesn’t need any skills. Simply double click on the installer and follow simple on screen steps till installation is complete. System restart will be needed to complete installation. You have 7 Day free trial to test all the features and functions of the program. The only limitation of the free trial is being able to convert up to three pages of a document. After the free trial is over, you need to purchase full licenses or subscription plans to continue using Able2Extract Professional
See the Video HERE:
User Interface:
User interface is very friendly, easy to use and straightforward It allows both professional and amateur users to easily navigate its File menu and Command Toolbar options and perform all conversions and edit options. Multiple PDF documents can be opened, each in a separate tab
Toolbar:
Menus:
File:
Edit:
Document:
View:
Help:
Purchase:
Able2Extract Pro 12 offers a lifetime license for $149.95. Although it is expensive but the price is more reasonable than some other subscription-based apps. All subscription options are available here:
http://www.investintech.com/order_a2e.htm
Features:
PDF CREATION & CONVERSION AT YOUR FINGERTIPS!
Able2Extract Professional 12 is an advanced PDF solution that gives you the most conversion options and content control over your PDF documents. Here’s more on what it can do:
PDF conversion: The PDF conversion algorithm can convert the most complex PDF content to Excel, Word, PowerPoint, AutoCAD, HTML, CSV and more. It is the only PDF converter that lets you selectively convert only the content you need.
PDF to EXCEL: Able2Extract Professional 12 is known for its PDF to Excel conversion technology. Its Custom PDF to Excel conversion allows you to manually designate the column and row structure of your data. Preview your results first and get perfectly formatted Excel spreadsheets just the way you need them for analysis and calculations.
PDF TO WORD: critical PDF content can be converted into complete Word documents you can edit
PDF to POWERPOINT: you can transfer visual content and business presentations in the PDF format into editable PowerPoint slides with the option to edit and polish off your keynote content to have impressive presentation
PDF to PUBLISHER: Able2Extract Professional 12 lets you unlock graphics and archived print material for easy content generation. You can reclaim, edit and interact with PDF content right within Microsoft Publisher.
PDF to CSV with configurable delimiters: you can directly export PDF to CSV (Comma Separated Values) and TSV (Tab Separated Values) formats. This eliminate the need to convert PDF to Excel as an intermediary step in data processing workflows. This is useful for IT professionals and data analysts.
PDF to AUTOCAD - recover cad drawings; for professionals in the architectural, engineering, construction, and manufacturing industries. Convert PDF to DWG and DXF, while retaining vector graphics and text.
PDF to IMAGES - make pdf images useable: Useful for graphic designers. Supported formats include JPG, BMP, PNG, TIFF and GIF. You can apply image specific settings (for example; DPI, resolution, GIF animation speed, and more).
PDF TO OPEN SOURCE FORMATS ; for clients using an Open Source suite instead of Microsoft Office. For example; Open Office and Libre Office: Writer (ODT), Calc (ODS), and Impress (ODP).
Convert non-PDF data into Excel for analysis or get accurate table data extractions with the custom PDF to Excel feature. You can easily convert tables in MS Word, PowerPoint, XPS and more into Excel spreadsheets. This helps you to quickly retrieve data from external business document sources other than the PDF.
Scanned image pdf conversion (OCR):
The built-in OCR technology lets you easily convert both native and scanned PDF to editable formats. The program has an accurate data capturing technology and can correct any errors in the text with professional refined output version used for business intelligence analysis.
PDF Editing:
Able2extract professional 12 offers powerful PDF manipulation features that make it easy to modify PDF documents. Many operations can be easily done; for example, splitting or merging PDF documents, insert bates numbering, advanced editing features, customize your text by font, color and size, and many more. You can switch the view of your document to edit or convert using file menu option or toolbar edit button
PDF Creation:
Able2Extract provides you with the ability to create PDF documents from any application using the virtual printer technology.
PDF Creation options:
General:
Security:
Compression options:
View:
Fill in pdf forms:
Able2Extract lets you interact with fillable PDF forms and fill out PDF forms directly on your computer. Simply click on the PDF form fields to start entering information into text fields. You can save forms that are partially filled in or safely submit your data to the server.
Create and edit pdf forms:
Able2Extract makes it easy for you to modify and create fillable forms that can be used by anyone. The built-in PDF Editor provides you with tools to add form fields for customizing and creating your own fillable PDF forms in a user-friendly interface.
Now let’s discuss the main uses and features of the program in details:
Easy PDF Creation:
You can easily create PDFs using one of three ways; via the File menu, Command Toolbar, or via any virtual print drive, without opening the software application.
Secure PDFs:
You can secure any PDF file using password-protection and different file permissions according to your needs. This will limit the recipients’ options when dealing with your files and documents. For example; if you want to secure sharing files with third parties; you can choose to set up permissions for printing, copying, modifying, adding comments, allowing only low-quality printing, etc. This feature is located in PDF Editing mode under the Edit menu
Editing Features:
The program allows you to do any changes to your PDF’s Document, for example you can edit file information, viewing Preferences, pages, and text. The process is very easy. Simply click on the Edit command and start doing any changes you need
Edit the document information: such as the title, author, subject and keywords. This feature is located in the File menu
Viewing Preferences:
This feature lets you change the display mode according to your preference. For example, you can view the file as a single page, two-page document, full screen, zoom at 100%, etc
Page Editing:
Many page editing options are available for users. For example; insert and extract PDF pages, deleting, moving, resizing, scaling and rotating pages. Additionally, you can split and merge PDF files easily, undo or redo the last page editing.
Text Editing:
PDF text editing options are available in the from the side editing panel. Many operations can be easily done. For example; add or delete text, specify the font style and size and change the text color. When editing blocks of text, users can also adjust the alignment and line spacing. You can also personalize your PDF document for publication through adding bitmap images (JPG, BMP, PNG, TIFF, GIF) from the computer. In addition the program offers you 9 customizable vector shapes to visually boost content. Enhanced graphical text and vector shape editing tasks are also available for advanced users as logo designers
Search Function:
You can find any text or word using search function located under edit menu.
Annotations:
This feature is activated through the view menu. It allows users to create and insert annotations on their PDF. This makes it easy to interact, review and post replies to existing comments and annotations. For example, Sticky Notes, Links, Stamps, Highlights and many more
Redaction:
This built-in feature allows users to permanently delete sensitive information from PDF document. You can redact individual sections, lines and entire page content.
Insert Bates Numbering and Blank Pages:
Using Able2extract 12 Professional you can easily create and insert customized bates numbering for PDF index reference. Additionally, you can insert blank pages and specify its location and number
Enhanced PDF Editing
With Able2Extract Professional, users can perform detailed graphical text and vector shape editing tasks right within the application. They can choose from a variety of properties to refine the appearance of PDF page content objects such as logos, drop caps and page borders.
Filling, Editing, Creating PDF Forms
Thanks to the built-in PDF form filler and advanced PDF Form Editor, the program supports PDF forms. You can complete digital PDF forms with no need to print. Editing and creating PDF forms is very easy with the help of side panel options.
PDF Conversion Options:
Many formats are supported for conversion by the program. You will be able to convert PDF files into MS Excel, Word, PowerPoint, Publisher, OpenOffice (Calc, Write and Impress), HTML, AutoCAD (DWG and DXF), CSV and Image formats (JPG, GIF, PNG, BMP, TIFF). Some Conversions offer you a chance to customize files prior to conversion; for example PDF to Excel or PDF to Publisher
All conversions are smooth and accurate even the most difficult ones as scanned documents and EXCEL files.
Convert Almost Any Format to Excel:
This is a very useful feature that allow non PDF conversion of many formats into EXCEL sheets. This is a part of the extraction process supported by the program. You will be able to easily transfer text and content from Word, PowerPoint and more into spreadsheets they can be analyzed. This feature is of great help to many users. In addition; custom PDF to Excel conversion option are also available for example; page range, columns, rows, tables. There are many conversion settings that can be accessed using the gear icon in the conversion dialog. These will further tweak the conversion process
OCR Technology:
This is done in the same as any native PDF conversion process. The process is very easy. Just add a scanned PDF file, the application will automatically detect it then you can convert it to the desired output format. The current update includes an advanced OCR technology with improved functionality. This helps convert even poorly scanned documents. You can also convert image-only PDF documents into a Searchable PDF.
Batch Conversion:
This useful tool allows users to add many PDF files in the Batch conversion dialogue box then convert all files at the same time. This saves time and effort. The option is available through the file menu or command toolbar, only for native documents. All you have to do is to specify the location and output format. That’s all!
Watermark:
You can watermark to your document to keep your authorship or privacy. The process is very easy. Simply Go to View then click PDF Annotations Panel and select watermark
Conclusion:
Able2Extract Professional 12 has all it takes to create and convert PDFs smoothly, and the latest version offers upgrades and improvements that make this product an ultimate solution to any business professional’s PDF conversion needs.
Connect with Investintech.com on social networks:
Facebook:
http://www.facebook.com/Able2Extract
Twitter:
http://www.twitter.com/able2extract
LinkedIn:
http://www.linkedin.com/company/investintech
YouTube:
http://www.youtube.com/able2extract
Google+:
https://plus.google.com/u/0/+Investintech/
Pinterest:
http://pinterest.com/Able2Extract/
Follow Investintech’s PDF blog for tips, tricks, document management and productivity hacks:
https://www.investintech.com/resources/blog/
|
|
|
Tenorshare WhatsApp Recovery 3.5.0 |
Posted by: ahmed - 03-11-2018 , 09:01 AM - Forum: Giveaway of the day
- No Replies
|
|
About:
Tenorshare WhatsApp Recovery is able to quickly recover all your WhatsApp chats and contacts for iOS 11.2/11/10/9 and other devices as well as iTunes/iCloud backups. Moreover, most popular Android devices are also supported.
Key Features: - Quickly Get Back Deleted, Formatted, Inaccessible WhatsApp messages, videos, photos and contacts.
- 3 WhatsApp Recovery Modes Supported: You are allowed to recover WhatsApp messages and contacts from your iDevices, iTunes backups and iCloud backups.
- Easily Export and Transfer WhatsApp Texts, Photos, Videos and Contacts to Computer.
- Preview all lost WhatsApp chats before recovery.
- Deeply Repair iOS System to Fix iPhone stuck at recovery mode, black screen, Apple logo and other problems.
Giveaway Page:
https://www.giveawayoftheday.com/tenorsh...ry-3-5-0/#
Registration:
https://www.tenorshare.com/cooperation/g...overy.html
OR
:arrow:
Direct Download:
https://www.upload.ee/files/8165786/Teno...l.zip.html
|
|
|
Pornhub users warned over 'cyber attack' that could infect devices with malware |
Posted by: mrtrout - 03-11-2018 , 02:18 AM - Forum: Security News
- No Replies
|
|
https://www.leicestermercury.co.uk/news/...ack-691910 Pornhub users warned over 'cyber attack' that could infect devices with malware
It's affected millions of users apparently
ByJames RodgerSam DimmerDigital Development Editor
14:30, 10 MAR 2018UPDATED14:55, 10 MAR 2018 Potentially millions of visitors to adult website Pornhub could have been infected with malware, experts say.
Cyber security firm Proofpoint say a major attack has been uncovered where fake adverts for web browser updates were sent out.
They say the attack has been going on for more than a year with victims in many places, including the UK
It's since been shut down by Pornhub, the Coventry Telegraph reports .
The hack was carried out by a group known as KovCoreG, Proofpoint said, who hoped to infect users with an ad fraud malware known as Kovter.
This type of malicious software is traditionally used as a form of online advertising fraud to generate money through clicks on fake adverts.
In some cases a "clickbot" is installed which then requests and interacts with random adverts online.
In the case of Pornhub, Proofpoint said users were shown fake adverts urging them to click to download a new version or Flash update to their web browser - but would instead infect their computers.
Millions of users may have a malware problem
Pornhub has not commented on the incident.
Proofpoint warned that this technique of tricking users into clicking on fake adverts and infecting themselves was effective, and had the potential to reach "millions of web surfers" if used elsewhere.
"While the payload in this case is ad fraud malware, it could just as easily have been ransomware, an information stealer, or any other malware," the company said.
"Regardless, threat actors are following the money and looking to more effective combinations of social engineering, targeting, and pre-filtering to infect new victims at scale."
This story was first published in October 2017
|
|
|
Goversoft Privazer 3.0.42.0 |
Posted by: ANkM - 03-11-2018 , 01:49 AM - Forum: Freeware
- No Replies
|
|
PrivaZer is a program that is designed to ensure the protection of personal data. It scans your hard disk for which data were on it after conventional treatment optimizers. You can then view the data and found to remove them completely, permanently.
Secure cleanup with one click
Irreversible cleanups by overwriting techniques
In-depth cleanup of your PC and storage devices
Smart overwriting : PrivaZer automatically recognizes your storage device type and adapts its overwriting algorithms to the storage medium (magnetic disk, SSD, etc)
Privacy protection
PrivaZer prevents recovery of your activities.
10 Innovative solutions in data security
1- Detection of residual traces in free space
Visualization of residual traces of old files remaining in free space
2- Smart cleanup of free space
Cleanup of residual traces in free space areas needing a reset to zero
We assure no useless cleanups.
Areas already reset to zero are not cleaned which can speed up cleanup by 2x to 100x.
Cleanup runs faster after each run.
3- File table cleanup
Cleanup of residual traces in file tables, not only in MFT but in FAT as well
Additional cleanup of INDEX attributes in MFT
4- Smart overwriting
Recognition of type of storage medium of your storage device : magnetic disk, SSD, etc
Adaptation of overwriting algorithms to storage medium
5- Smart cleanup of Jumplists
Cleanup of your Jumplists without deleting your pinned items/ websites which are preserved
6- Smart cleanup of Prefetch
Removing of invalid Prefetch entries. Old valid entries are preserved.
7- Deletion of USB history
Deletion of remaining traces of disconnected device (name, date, etc)
8- Scan and cleanup of Pagefile.sys / Hiberfil.sys content
Visualization of Pagefile.sys / Hiberfil.sys content
Pagefile.sys cleanup options : at each PC shutdown, or at next shutdown only
Control of Hiberfil.sys cleanup : PrivaZer controls that the system has reset to zero Hiberfil.sys. If not, PrivaZer overwrites Hiberfil.sys sectors with zeros.
9- Scan of thumbnails
Full scan of the drive to retrieve remaining thumbs.db files and show their content
Visualization of ThumbCache files content
10- Scan of residual traces in Indexing service
Scan of remaining traces of deleted files still indexed by Windows™ Indexing Service
Changes in 3.0.42:
Improved UI
Improved cleanup of Supercookies
Firefox supercookies
Waterfox supercookies
Cyberfox supercookies
Icedragon supercookies
Pale Moon supercookies
Download:
http://privazer.com/
|
|
|
Microsoft Reportedly Forcing Upgrade to Windows 10 Version 1709 on Some PCs |
Posted by: mrtrout - 03-11-2018 , 01:44 AM - Forum: Software Discussion
- No Replies
|
|
http://news.softpedia.com/news/microsoft...0143.shtml Microsoft Reportedly Forcing Upgrade to Windows 10 Version 1709 on Some PCs
Report indicates this happens even with Windows Update turned off, without users being asked for authorization
Mar 9, 2018 06:42 GMT · By Bogdan Popa · Share:
Back in 2015 when it rolled out Windows 10, Microsoft turned to a rather aggressive strategy to boost adoption of the operating system, including what were described as forced upgrades that deployed the new software on a number of PCs without users giving their consent.
This reportedly happens once again, only that systems running older versions of Windows 10 are upgraded to version 1709 (Fall Creators Update), in some cases even if Windows Update is turned off.
A story from CW citing a number of user reports indicates that the upgrade is started with “no advanced warning,” adding that the alleged forced upgrade took place on computers running Windows 10 Anniversary Update (version 1607) and Windows 10 Creators Update (version 1703).
If Windows Update is turned off, which means that updates are automatically blocked on a specific computer, the upgrade is said to be performed with the Update Assistant.
Upgrade notifications
Oddly enough, Microsoft has published an advisory on March 5 which indicates that computers running Windows 10 versions older than Creators Update might see a notification stating that the latest security updates are not installed.
While an upgrade to Fall Creators Update shouldn’t be linked to security updates, Microsoft does state that “Windows Update will then try to update the device,” but guarantees that when you receive the update notification, nothing starts until the user clicks the “Update now” button to update the device.
Windows 10 Anniversary Update and Creators Update are still supported, which means that Microsoft is still shipping security updates to systems running any of these two versions. The original version of the OS and version 1511, however, have already reached end of service, and Microsoft emphasizes that it’s critical for these computers to upgrade to the latest Windows 10 release.
Upgrading these systems without users’ consent, however, is a strategy that has already backfired for Microsoft, as the company has been sued in the past by customers whose computers installed Windows 10 without authorization.
|
|
|
|