» Sandbox

Search in site

Search results 50 Articles (Search results 1 - 10) :

Archmodels V0l. 69

Tweak-7 1.0 Build 1115 x86

Tweak-7 1.0 Build 1115 x86
Tweak-7 1.0 Build 1115 x86|35.56 MiB




Java Runtime Environment 1.6.0.22 (x86-x64)

Java Runtime Environment 1.6.0.22 (x86-x64)

Java Runtime Environment 1.6.0.22 (x86-x64) | 30,77 Mb

DVD - Applications in one DVD KB-25-OCT 2010-Marlboro(c)

DVD - Applications in one DVD KB-25-OCT 2010-Marlboro(c)

DVD - Applications in one DVD KB-25-OCT 2010-Marlboro(c) | 4.33 GB


A collection of most used or must have applications in one single DVD pack .ISO - All with updates and necessary sn's to help you , the user , get a fresh installation , quick & running + 100% secured. It does contain all necessary software for a PC to run more than smoothly and safe .All Applications have been pre-cracked or have a special folder near them called 'cure' 'fix' SN (txt) 'crack' 'patch' or "How to" (txt)

WPI: Switchless Application Library [Autumn 2010]

WPI: Switchless Application Library [Autumn 2010]
WPI: Switchless Application Library [Autumn 2010] | 6.22 GB

Custom Freeware Pack Revision 1

Custom Freeware Pack Revision 1

Custom Freeware Pack Revision 1 | 1.39 GB


Rather than have a long list of files here, I have created a Must Have, They are categorized into sections and include tools that I not only recommend, I use them myself.

Most Wanted 100 Softwares(July2010)

Most Wanted 100 Softwares(July2010)

Most Wanted 100 Softwares(July2010) | 1.85GB

Panda Security 2011 All Home Products v4.00.00

Panda Security 2011 All Home Products v4.00.00

Panda Security 2011 All Home Products v4.00.00 | 260 Mb

6 New Useful Softwares

6 New Useful Softwares

6 New Useful Softwares

Avast Internet Security 5.0.545

Avast Internet Security 5.0.545

avast! provides a package of applications that aim to protect your computer from a possible virus infection or other malware threat. If you use it correctly, and in combination with other programs such as data backup utilities, it will significantly reduce the risk of your computer being attacked or infected by a virus, and thus the risk of losing important or private data.


The Avast! Internet Security application comes with an antispam filter and built-in firewall. Once installed, avast! runs silently in the background to protect your computer against all known forms of malware. You dont need to do anything else - just install and forget! Active internet users need greater protection for themselves as they shop and bank on-line. To secure against threats from infected web sites and the growing risk of identity theft, avast internet security provides you with continuous protection from its layers of antivirus, anti-spyware, a
nti-rootkit protection, firewall and antispam.

Real-time shields. The real-time shields are the most important part of the program, as they are working continuously to prevent your computer from becoming infected. They monitor all your computers activity, checking all programs and files in real-time - i.e. at the moment a program is started or whenever a file is opened or closed.

Virus Chest. The virus chest can be thought of as a folder on your hard disk with special properties, that make it a safe, isolated place for storing potentially harmful files. You can work with the files in the virus chest, with some security restrictions.

avast! antispam filter. avast! Internet Security includes a fully integrated antispam filter to detect unwanted email.
Spam delivered to your mailbox can result in your mailbox quickly becoming full, as a result which, legitimate emails may not be received. It can also unnecessarily increase the load on the email server, internet connection, local networks etc.

Firewall. avast! Internet Security includes a fully integrated firewall which can be controlled directly from the avast! user interface.
The firewall monitors all communication between your computer and the outside world and blocks unauthorized communication based on a number of "allow" and "deny" rules. In this way, the firewall can prevent sensitive data from leaving your computer and can also block attempted intrusions by external hackers

Command-line scanner. The ashCmd program uses the same avast! scanning engine to detect potential malware infections so the results are exactly the same as running a scan via the normal program interface. The avast! command-line scanner, ashCmd.exe, is normally installed in the directory Crogram FilesAlwil Softwareavast5.
A scan is run from the command prompt using various switches and parameters. To see a description of the parameters, locate the ashCmd file and double click on it. This will open a new window in which the various parameters are displayed.

: