Log in ....Tribune


Dot.ComLatest in ITLearning ComputersFree DownloadsOn hardware

Monday, October 30, 2000
Downloads of the week

Biz letters

Writing business letters is a tough task for a majority of us, as it involves good writing skills. Some persons have to employ secretaries for writing their letters. With the help of computers and specialised software like Biz letters, writing great and impressive letters, has become easy. By using this, one can develop an impressive style that conveys the message in a manner that is concise and grammatically correct. This software is user-friendly and helpful for business personnel on the go. It has over 600 pre-written letter templates covering a majority of topics and has letters pertaining to finance, law, distribution, administration, marketing and personnel. The template library in this software utility is well organised into several user-friendly categories that are of immense help in choosing any topic. For common letters, simply change the name and address in the pre-written format and if you do not find a template that matches your requirement, create one of your own. Biz letters has an inbuilt word processor, which can be used for writing and editing letters. This can be downloaded from http://www.fwmedia.com

Second chance

Well! Life may not always give you the second chance to correct your mistakes committed in real life. But computer does if it has software "Second chance." This software gives you a chance to rectify a mistake, which may affect the computer’s functioning. This software quickly restores the systems to past settings in the event of any mistakes or unintentional deletion of critical data. It’s thus a valuable defence system against human error. This software works by creating "checkpoints" at various user-defined intervals. A checkpoint is a virtual snapshot that captures registry settings, system settings and files. Thus, if a fatal problem occurs in a computer, it automatically restores the system to the settings of the latest checkpoint. It stays in your computer’s system trey and monitors all hard disk activity and changes made since the last checkpoint. Thus, if files are being modified, they are saved to the checkpoint. In the event of a problem, you can simply click on Second chance icon and restore the system to the previous checkpoint. This software can be downloaded from http://www.powerquest.com.

 

Internet phone

It is very common to see persons using Internet as a medium of voice/video communication. There are thousands of software related to Internet telephony available on the Net, both shareware and free download. But only a few of these can be called complete Internet telephony software. This program is a complete Internet telephony software as it allows to conduct real-time video conferencing with anyone in the world, though you can also do voice communication. For video conferencing you need a Web or a PC camera, along with full duplex sound card and speakers. Using this software, you can get connected to anyone for a PC-to-PC call or even a video conferencing. Even if the user does not have a Web camera, he can see the image of the other end, if the person at the other end has one. All you need to initiate a call is to know the IP address of the person to be contacted. This software also allows PC to phone calls, but for this you need to subscribe to the paid services of the company. You can also use this software for general chatting as it has a community browser. A shareware version of this software can be downloaded from http://www.eurocall.com.

System administrator

If you ever wished to restrict access to some critical functions of your computer to yourself, then probably this software may prove useful. Using this software, one can impose a variety of access restrictions to protect one’s privacy and stop others from tampering with desktop. Thus, access to each individual component of several control panel applets can be denied. You can also disable your boot keys, DOS Windows, Registry editing, and network access. Further, if you do not want anyone to see your desktop, you can hide the desktop icons, individual drives and start menu items. You can also apply password protection to Windows and restrict user to run specific application only. There are lot of other features of this program, which lets you protect PC from others. You can try this software by downloading it from http://www.softheap.com/secagent.html

SnadBoy’s revelation v1.1

To forget is human. However, at times you may have to pay huge price for forgetfulness. With software utility like SnadBoy’s revelation v1.1, you can afford to forget critical information, like password. Normally, while working in a computer, one needs to remember a number of passwords like the ISP’s password, e-mail password, system password and so on. The worst part is that one can see password in asterisks form, but cannot recall, what it actually was. In all such cases, this software may help as it allows seeing the actual meaning of asterisks in order to reclaim password. This utility can be downloaded from http://www.snadboy.com/Revelation.shtml

Screen lock

A personal computer is so personal that at times you want to keep the data on your computer just limited to yourself. Moreover, if you are in office or home, you may not want anyone to fiddle with the computer in your absence. Thus, if you wish to protect your computer from fiddling by others, then you can download the software utility called Screen lock from http://www.screenlock.com. Using this software, you can protect your computer from intrusion by others. You can also prevent DOS and Windows access or quickly lock the PC any time you need to leave it unattended. This program logs in any unauthorised attempt done to break into the PC, and also notifies of the attempted intrusion when you return to your computer. This software also has a screensaver feature.

Postman personal edition

Postman personal edition is an ultimate mail program for the Internet users who have more than one e-mail address. Using this software, you can manage multiple e-mail accounts to send, receive, compose, and everything else you can do with an e-mail client. Thus you can receive e-mails from one account or multiple accounts easily and automatically, without the need to change account information. Moreover this software is password protected, so only you can access your e-mail messages. Thus it is fully secured. It can be downloaded from http://www.netsoftdesigns.com/postman.

Home Top