Google
 

Selasa, 29 April 2008

Easy-Hide-IP v1.6


Easy-Hide-IP is designed for sensitive browsing. Use it anytime you want to protect your privacy with full confidence.

Easy-Hide-IP will secures and anonymize all your internet connections and allow you to: Surf any Web Sites, Web-based Email services, Instant Messenger and Chat services, Newsgroups, Web Blogs and Forums.Your Identity is Secure, Protected, and Anonymized.

Easy-Hide-IP protects your identity by replacing your real IP address with a different one. You will appear to access the internet from a different location, not your own. Your real location is never revealed.

You can bypass virtually any form of censorship or internet traffic blocking imposed on you by your ISP, by your company, or by some other third parties. All your internet traffic is routed through remote servers. On your ISP's log file, only the IPs of the remote servers will be shown, not the
sites you have visited.

You do not need to worry about your ISP or some other Entities monitoring your internet activities, see what you are doing, which Newsgroups, Blogs or Forums you have visited and which messages you have posted.

· Newsgroups, Blogs and Forums
If you are banned or your access have been restricted by a forum administrator for example all you have to do is clean the cookies and hide your IP using Easy-Hide-IP. In this way you will be able to post new messages. If you are banned again just repeat the procedure (clean cookies and get a new IP using Easy-Hide-IP) and you gain access.

· Vote the same online poll several times
If you want to fill/vote the same online poll several times all you have to do is do is clean the cookies and hide your IP using Easy-Hide-IP and you will be able to vote again. If you want to vote 100 times – all you have to do is to repeat the procedure 100 times. In this way you can influence poll results.

· Internet Radio
If you want to listen to Internet Radio that is restricted for your real geographical location – all you have to do is to use Easy-Hide-IP to get a new IP address that will allow your access.


Requirements:
· 64 MB RAM
· 5 MB hard drive space
· Direct connection to Internet

Senin, 28 April 2008

Ipswitch WS_FTP Server 6.1 (Retail)

Every day, businesses large and small depend on the electronic exchange of ideas and information among employees and with partners and consumers. Often that data is highly sensitive, ranging from sales information, health records, credit card, and other financial data to internal earnings statements and intellectual property. Ipswitch’s WS_FTP Server with SSH (Secure Shell) uses unrivaled security to help businesses protect the confidentiality and integrity of their files and the privacy of their customers.

WS_FTP Server is used by administrators globally to support millions of end users and to transfer billions of files and petabytes of data. It’s designed to integrate smoothly into a company’s existing architecture and support an unlimited number of concurrent user connections, scaling to support businesses of any size and to grow along with the needs of your company. Our solution is easy to use and to implement, quickly enabling network administrators to:

* Achieve the highest levels of security
* Maintain high server availability
* Streamline workflows
* Gain ultimate control and visibility

Minggu, 27 April 2008

Invisible IP Map


This works with rapidshare (use internet explorer)
Invisible IP Map is user-friendly software that masks your real location. Every computer that is connected to the Internet has its own IP address which could easily be located on a map. This program will help you show yourself like you are surfing from another place on the planet.

This is a Mask IP software which is used to change your real Internet address while browsing. The software will deliver you fresh anonymous proxy servers every time you decide to click on Get IP Locations. The main benefit of this software is that you cant be traced when browsing websites. Also if a website is restricted for users from specified country the program can bypass that protection. By hiding your IP you will prevent receiving spam from marketers which know your interests by tracking your IP when browsing websites. You can use web based e-mail to send anonymous e-mail. Post on bulletin boards without displaying your real IP address

Sabtu, 26 April 2008

Easy Hide Ip v1.4


Key Features and Benefits provided by Easy-Hide-IP

» Easy-Hide-IP - Secures and Anonymizes all your internet connections and allows you to: Surf any Web Sites, Instant Messenger and Chat services, Web-based Email services, Newsgroups, Web Blogs and Forums. Your Identity is Secure, Protected, and Anonymized.
» Easy-Hide-IP protects your identity by replacing your real IP address with a different one. You will appear to access the internet from a different location, not your own. Your real location is never revealed.
» You can bypass virtually any form of censorship or internet traffic blocking imposed on you by your ISP, by your company, or by some other third parties. All your internet traffic is routed through remote servers. On your ISP's log file, only the IPs of the remote servers will be shown, not the sites you have visited.
» You do not need to worry about your ISP or some other Entities monitoring your internet activities, see what you are doing, which Newsgroups, Blogs or Forums you have visited and which messages you have posted.

Bandwidth Meter Pro 2.4


Top 9 Benefits of Bandwidth Meter Pro:

1. See your bandwidth speed visually

Bandwidth Meter Pro monitors network traffic through your computer and displays graphical and numerical download and upload speeds in real-time. You can use the software to measure the bandwidth speed of your LAN or WAN connections.
2. Get realtime Internet bandwidth usage

If you're using a dial-up connection (e.g. modem, ISDN, DSL, ADSL, cable modem) to connect to Internet, you can get the Internet bandwidth usage in real time and the total bandwidth usage to avoid overshooting your Broadband limitation.
3. Monitor multiple network connections bandwidth speed

It's very useful if your computer has multiple network connections (LAN and WAN) and you want to monitor more than one network connections bandwidth speed at the same time.
4. Daily, weekly and monthly bandwidth usage reports

Bandwidth Meter Pro logs network traffic and provides daily, weekly, monthly and summary bandwidth usage reports.
5. Bandwidth usage notification

If you're using a bandwidth limited Internet connect, you may need to get an notification when you exceed the limitation for the connection. It's available in Bandwidth Meter Pro as well.
6. Test download and upload speeds of your network connections

The built-in speeds stopwatch can help you to test the download and upload speeds of a network connection in a user-specified period.
7. Record traffic rates of a specified connection

Bandwidth Meter Pro provides a useful tool - traffic rates recorder, which records download and upload speeds of one or more connections and export to a text or Microsoft Excel .csv file.
8. No extra drivers needed

The Bandwidth Monitor doesn't install extra drivers to your computer. This will keep your system clean and reliable.
9. Small, simple, accurate and reliable

Size of Bandwidth Meter Pro is less than 1 MB; it has a simple interface, and it displays the accurate bandwidth speed and uses very low resources.


Bandwidth Meter Pro Key Features:

* Network connections bandwidth monitoring
* Internet connections bandwidth monitoring
* Real-time graphical and numerical bandwidth speed displaying
* Monitor multiple network connections at a time
* Speed rates scale
* Works with majority network connections including modem, ISDN, DSL, ADSL, cable modem, wireless network cards, Ethernet cards, VPN, and more
* Scalable to your own modem download capabilities
* Provides daily, weekly, monthly and summary bandwidth usage reports, plus exports to a plain text, HTML, or Microsoft Excel .csv file
* Readout in either KB/sec (kilobytes per second) or >kbps (kilobits per second)
* Bandwidth usage notification (notify user by playing sound, computer beep, sending email, running a program)
* Download and upload speeds stopwatch
* Customize colors and fonts
* Show real-time network traffic graph in system tray
* Show time in traffic graph
* Show traffic graph in line or column style; and column width and space can be customized
* Show average download and upload lines in traffic graph
* Includes complete window configuration and view options
* Requires minimal system resources
* Full compatible with Windows 98, Windows Me, Windows NT 4.0, Windows 2000, Windows XP, Windows 2003, and Windows Vista

Steganos Internet Anonym Pro 7.1.6

Your anonymous SSL tunnel to the Internet - surf, download, share files…
Why do you need Steganos Internet Anonym VPN?

Each visit to the Internet discloses your identity to Web providers – often, without you noticing or wanting this. And also your Internet provider can exactly see which Web sites you visit and what kind of data you upload or download. When you use a WLAN (Wireless Local Area Network) or a hot spot to access the Internet wirelessly, for example at a train station, an airport, or in an Internet café, it won’t be a problem for anyone to spy on you.

It just takes the corresponding software to turn you into a transparent user. All your movements on the Web can then be exactly traced – whether you send private e-mails, carry out online purchases, or enter your personal access data. Even when you dial in to online applications, you are unprotected: Someone could “stow away” and use your access data unnoticed in order to manipulate and even delete important data!
Why surf anonymously? I don’t have anything to hide.

As soon as you go online, you receive a clear Internet protocol address - an IP. The IP acts like a transmitter on the Internet to fix your location and can therefore be traced back to the very door of your house. Every provider of Web pages can recognize precisely what you have done on their Web site: Which products have you viewed but not bought? Which images have you looked at? And even your provider can view a large amount of data such as the movies and songs you have uploaded and downloaded on your legal file sharing platform.

It’s not about whether you have something to hide or not. You have a right to privacy and do not have to justify this. Allow yourself the freedom of surfing the Web anonymously as well as of uploading and downloading data.
How does Steganos Internet Anonym VPN work?

A Virtual Private Network (VPN) establishes a tunnel between your computer and one of the Steganos VPN servers. All your activities on the Internet are then carried out through that tunnel. The tunnel encrypts all information that runs through it by using an SSL connection which protects the information from being eavesdropped – even by your ISP. SSL connections are, for instance, also used for online banking activities. The tunnel leads to one of the Steganos servers which, in turn, forwards the request onto the Web. This way you can act completely anonymously on the Internet. The Web sites you visit will merely see the IP address of the Steganos servers.

All you need to do is install the Steganos Internet Anonym VPN™ service on your machine. A setup wizard assists you in establishing the connection to the server and activating your account. Once your access has been activated, the main window displays the amount of GB you used within the current month, which gives you 100% control of the costs.



Jumat, 25 April 2008

In-building Coverage CDMA and TDMA

Now let's deal with another issue involving CDMA and TDMA. In-building coverage is something that many people talk about, but few people properly understand. Although CDMA has a slight edge in this department, due to a marginally greater tolerance for weak signals, all the technologies fair about the same. This is because the few dB advantage CDMA has is often "used up" when the provider detunes the sites to take advantage of this process gain.

So, while a CDMA phone might be able to produce a reasonable call with a signal level of -106 dBm, whereas a GSM phone might need -99 dBm to provide the same level of service, does this mean that CDMA networks will always have a 7 dB advantage? If all things were equal, then yes, but they aren't equal.

As I mentioned earlier, channel pollution is a big issue with CDMA networks and to keep channel pollution to a minimum in urban environments a CDMA provider needs to keep site overlap to a minimum. Subsequently, a CDMA network engineer will use that 7 dB advantage to his advantage by de-tuning the network accordingly. This means that CDMA users will frequently see markedly lower signal levels indoors than a GSM user will, but in the end it all works out about the same.

The most important aspect to in-building coverage is the proximity of the nearest site. When a site is located just outside of a building it can penetrate just about any building material. When a site is much further away however, the signals have a much harder time of getting past the walls of a structure.

When it comes to distance, remember that signals are subject to the "distance squared law". This means that signals decrease by the square of the distance. A site at 0.25 kilometers away will have 4 times the signal strength of a site at 0.50 kilometers away, and 16 times that of a site 1.0 kilometers away. Distance squared however is the rate of signal reduction in free space. Recent studies have shown that terrestrial communications are usually subject to rates as high as "Distance cubed", or even "Distance to the 4th". If the latter is true, then a site 1.0 kilometers away will actually be 256 times weaker than a site 0.25 kilometers away.

In-building penetration is therefore less a technology issue than it is an implementation issue. Service providers who have sites close to the buildings you commonly visit will inevitably look better than those who don't. Never use someone else's in-building experiences unless you expect to go in the same buildings as they do. You cannot make useful generalizations about in-building coverage based upon one person's experience.

CDMA does have one peculiarity concerning in-building penetration that does not affect TDMA. When the number of users on a channel goes up, the general level of signal pollution goes up in tandem. To compensate for this the CDMA system directs each phone to transmit with slightly more power. However, if a phone is already at its limit (such as might be the case inside a building) it cannot do anything to "keep up with the pack". This condition is known as "the shrinking coverage phenomenon" or "site breathing". During slow periods of the day you might find coverage inside a specific building quite good. During rush hour however, you might find it exceedingly poor (or non-existent).

Spectral Efficiency cdma, tdma

Channel capacity in a TDMA system is fixed and indisputable. Each channel carries a finite number of "slots", and you can never accommodate a new caller once each of those slots is filled. Spectral efficiency varies from one technology to another, but computing a precise number is still a contentious issue. For example, GSM provides 8 slots in a channel 200 kHz wide, while iDEN provides 3 slots in a channel only 25 kHz wide. GSM therefore consumes 25 kHz per user, while IS-136 consumes only 8.333 kHz per user. When Direct Connect is used on iDEN, 6 users can be stuffed into a single channel, thus only 4.166 kHz is consumer per user. There is also a new 6:1 interconnect CODEC coming for iDEN which will allow 6 phone users per channel.

One would be sorely tempted to proclaim that iDEN has 3 to 6 times the capacity of GSM. In a one-cell system this is certainly true, but once we start deploying multiple cells and channel reuse the situation becomes more complex. Due to GSM's better error management and frequency hopping the interference of a co-channel site is greatly reduced. This allows frequencies to be reused more frequently without a degradation in the overall quality of the service.

Capacity is measured in "calls per cell per MHz". An GSM system using N=4 reuse (this means you have 4 different sets of frequencies to spread out around town) the figure is 5.0 We get an efficiency value of 6.6 for N=3. Unfortunately I could not find any figures for iDEN systems, but based on similar figures released for the IS-136 system we can expect efficiency values of 6.0 to 10.0.

Computing this figure for CDMA requires that certain assumptions are made. Formulas have been devised, and using very optimistic assumptions CDMA can provide a whopping 45 users per cell per MHz. However, when using more pessimistic (and perhaps more realistic) assumptions, the value is 12. That still gives CDMA an almost 2:1 advantage over GSM, but questionable advantage over a well-implement iDEN system.

TDMA

Let's move away from CDMA now and have a look at TDMA. Before we can go any further though, I should note that there are actually three different flavors of TDMA in the PCS market. Each of these technologies implements TDMA in a slightly different way. The most complex implementation is, without a doubt, GSM. It overlays the basic TDMA principles with many innovations that reduce the potential problems inherent in the system.

To reduce the effects of co-channel interference, multipath, and fading, the GSM network can use something known as Frequency Hopping. This means that your call literally jumps from one channel to another at fairly short intervals. By doing this the likelihood of a given RF problem is randomized, and the effects are far less noticeable to the end user. Frequency Hopping is always available, but not mandated. This means that your GSM provider may or may not use it.

iDEN is a proprietary Motorola technology that no other company seems to participate in. Only Motorola makes iDEN phones, and only Motorola makes iDEN infrastructure equipment. Perhaps the company guards its technology on purpose. iDEN was initially deployed as an alternative to standard packet radio systems commonly used by public safety and business users. However, it also provided phone interconnect services that are extinguishable from phone services offered by the other PCS systems, as well as packet data services for web browsing and hooking up your laptop to the Internet.

Finally there is the old IS-136 technology, but this is now an officially dead technology. All of the North American providers who used it (Rogers, Cingular, and AT&T) are abandoning it in favor of GSM. The same is happening in other parts of the world where IS-136 was used. I therefore will not spend much time talking about this variation of TDMA.

Each of these TDMA technologies uses a different CODEC. GSM sports a CODEC called EFR (short for Enhanced Full Rate). This CODEC is arguable the best sounding one available in the PCS world. IS-136 used to sound horrible, but in the fall of 1997 they replaced their old CODEC with a new one. This new CODEC sounds much better than the old, but it doesn't quite match the GSM and CDMA entries.

TDMA systems still rely on the switch to determine when to perform a handoff. Unlike the old analog system however, the switch does not do this in a vacuum. The TDMA handset constantly monitors the signals coming from other sites, and it reports this information to the switch without the caller being aware of it. The switch then uses this information to make better handoff choices at more appropriate times.

Perhaps the most annoying aspect of TDMA system to some people is the obviousness of handoffs. Some people don't tend to hear them, and I can only envy those individuals. Those of us who are sensitive to the slight interruptions caused by handoffs will probably find GSM the most frustrating. It's handoffs are by far the most messy. When handoffs occur infrequently (such as when we are stationary or in areas with few sites), they really don't present a problem at all. However, when they occur very frequently (while travelling in an area with a huge number of sites) they can become annoying.

CDMA

Now that we have a rudimentary understanding of the two technologies, let's try and examine what advantages they provide. We'll begin with CDMA, since this newer technology has created the greatest "buzz" in the mobile communications industry.

One of the terms you'll hear in conjunction with CDMA is "Soft Handoff". A handoff occurs in any cellular system when your call switches from one cell site to another as you travel. In all other technologies this handoff occurs when the network informs your phone of the new channel to which it must switch. The phone then stops receiving and transmitting on the old channel, and it commences transmitting and receiving on the new channel. It goes without saying that this is known as a "Hard Handoff".

In CDMA however, every site are on the SAME frequency. In order to begin listening to a new site the phone only needs to change the pseudo-random sequence it uses to decode the desired data from the jumble of bits sent for everyone else. While a call is in progress the network chooses two or more alternate sites that it feels are handoff candidates. It simultaneously broadcasts a copy of your call on each of these sites. Your phone can then pick and choose between the different sources for your call, and move between them whenever it feels like it. It can even combine the data received from two or more different sites to ease the transition from one to the other.

This arrangement therefore puts the phone in almost complete control of the handoff process. Such an arrangement should ensure that there is always a new site primed and ready to take over the call at a moment's notice. In theory, this should put an end to dropped calls and audio interruptions during the handoff process. In practice it works quite well, but dropped calls are still a fact of life in a mobile environment. However, CDMA rarely drops a call due to a failed handoff.

A big problem facing CDMA systems is channel pollution. This occurs when signals from too many base stations are present at the subscriber's phone, but none are dominant. When this situation occurs the audio quality degrades rapidly, even when the signal seem otherwise very strong. Pollution occurs frequently in densely populated urban environments where service providers must build many sites in close proximity. Channel pollution can also result from massive multipath problems caused by many tall buildings. Taming pollution is a tuning and system design issue. It is up to the service provider to reduce this phenomenon as much as possible.

In defense of CDMA however, I should point out that the new EVRC CODEC is far more robust than either of the earlier CODECs. Because of its increased robustness it provides much more consistent audio in the face of high frame error rates. EVRC is an 8 kilobit CODEC that provides audio quality that is almost as good to the older 13 kilobit CODEC. Since CDMA consumes only as much of the "ether" as a user talks, switching everyone to an 8 kilobit CODEC was an inevitable move.

Don't confuse EVRC with the old (and unlamented) 8 kilobit CODEC implemented in the early days of CDMA deployment. That CODEC was simply awful, and very few good things could be said about it. EVRC is a far more advanced compression algorithm that cleans up many of the stability problems inherent in the two older CODECs. The sound reproduction is slightly muddier than the 13 kilobit CODEC, but the improvement in stability makes up for this.

Supporters often cite capacity as one CDMA's biggest assets. Virtually no one disagrees that CDMA has a very high "spectral efficiency". It can accommodate more users per MHz of bandwidth than any other technology. What experts do not agree upon is by how much. Unlike other technologies, in which the capacity is fixed and easily computed, CDMA has what is known as "Soft Capacity". You can always add just one more caller to a CDMA channel, but once you get past a certain point you begin to pollute the channel such that it becomes difficult to retrieve an error-free data stream for any of the participants.

The ultimate capacity of a system is therefore dependent upon where you draw the line. How much degradation is a carrier willing to subject their subscribers to before they admit that they have run out of useable capacity? Even if someone does set a standard error rate at which these calculations are made, it does not mean that you personally will find the service particularly acceptable at that error rate.

3G is the third generation

3G is the third generation of mobile phone standards and technology, superseding 2G. It is based on the International Telecommunication Union (ITU) family of standards under the International Mobile Telecommunications programme, IMT-2000.

3G technologies enable network operators to offer users a wider range of more advanced services while achieving greater network capacity through improved spectral efficiency. Services include wide-area wireless voice telephony, video calls, and broadband wireless data, all in a mobile environment. Additional features also include HSPA data transmission capabilities able to deliver speeds up to 14.4Mbit/s on the downlink and 5.8Mbit/s on the uplink.

Unlike IEEE 802.11 networks, 3G networks are wide area cellular telephone networks which evolved to incorporate high-speed internet access and video telephony. IEEE 802.11 (common names Wi-Fi or WLAN) networks are short range, high-bandwidth networks primarily developed for data.

Short Message Service (SMS)

Short Message Service (SMS) is a communications protocol allowing the interchange of short text messages between mobile telephone devices. The SMS technology has facilitated the development and growth of text messaging. The connection between the phenomenon of text messaging and the underlying technology is so great that in parts of the world the term "SMS" is used colloquially as a synonym for a text message from another person or the act of sending a text message (even when, as with MMS, a different underlying protocol is being used).

SMS as used on modern handsets was originally defined as part of the GSM series of standards in 1985 as a means of sending messages of up to 160 characters, to and from GSM mobile handsets. Since then, support for the service has expanded to include alternative mobile standards such as ANSI CDMA networks and Digital AMPS, as well as satellite and landline networks. Most SMS messages are mobile-to-mobile text messages, though the standard supports other types of broadcast messaging as well.

GSM security

GSM was designed with a moderate level of security. The system was designed to authenticate the subscriber using a pre-shared key and challenge-response. Communications between the subscriber and the base station can be encrypted. The development of UMTS introduces an optional USIM, that uses a longer authentication key to give greater security, as well as mutually authenticating the network and the user - whereas GSM only authenticated the user to the network (and not vice versa). The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-repudiation.

GSM uses several cryptographic algorithms for security. The A5/1 and A5/2 stream ciphers are used for ensuring over-the-air voice privacy. A5/1 was developed first and is a stronger algorithm used within Europe and the United States; A5/2 is weaker and used in other countries. Serious weaknesses have been found in both algorithms: it is possible to break A5/2 in real-time with a ciphertext-only attack, and in February 2008, Pico Consulting, Inc revealed its ability and plans to commercialize FPGAs that allow A5/1 to be broken with. The system supports multiple algorithms so operators may replace that cipher with a stronger one.

Kamis, 24 April 2008

IP Address Searcher v2.1.2

P Address Searcher is a powerful IP Address Search tool that helps you to search IP address, list all IP Address on your network, ping a host, trace IP, get MAC information, search a ip geographic location. IP Address Searcher 2.12 supports different languages (including English). It works with Windows 98/XP/Vista.

Minggu, 20 April 2008

Universal Service

Each Party shall administer any universal service obligation that it maintains or
adopts in a transparent, non-discriminatory, and competitively neutral manner and shall
ensure that its universal service obligation is not more burdensome than necessary for the
kind of universal service that it has defined

Independent Telecommunications Regulatory Bodies

1. Each Party shall ensure that its telecommunications regulatory body is separate from,
and not accountable to, any supplier of public telecommunications services. To this end,
each Party shall ensure that its telecommunications regulatory body does not hold a financial
interest or maintain an operating role in any such supplier.
2. Each Party shall ensure that the decisions and procedures of its telecommunications
regulatory body are impartial with respect to all interested persons. To this end, each Party
shall ensure that any financial interest that it holds in a supplier of public
telecommunications services does not influence the decisions and procedures of its
telecommunications regulatory body.

Conditions for Supplying Information Services

1. Neither Party may require an enterprise in its territory that it classifies as a supplier
of information services (which supplies such services over facilities that it does not own) to:
(a) supply those services to the public generally;
(b) cost-justify its rates for such services;
(c) file a tariff for such services;
(d) interconnect its networks with any particular customer for the supply of such
services; or
(e) conform with any particular standard or technical regulation for
interconnection for the supply of such services other than for interconnection
to a public telecommunications network.
2. Notwithstanding paragraph 1, a Party may take appropriate action, including any of
the actions described in paragraph 1, to remedy a practice of an information services supplier
that the Party has found in a particular case to be anti-competitive under its law or
regulation(s), or to otherwise promote competition or safeguard the interests of consumers.

Submarine Cable Systems

1. Each Party shall ensure that enterprises in its territory that operate submarine cable
systems accord non-discriminatory treatment for access to submarine cable systems.
2. Whether to apply paragraph 1 may be based on classification by a Party of such
submarine cable system within its territory as a public telecommunications service supplier.

Unbundling of Network Elements

(a) Each Party shall provide its competent body the authority to require that
major suppliers in its territory provide suppliers of public telecommunications
services of the other Party access to network elements on an unbundled basis
for the supply of those services on terms and conditions and at cost-oriented
rates that are reasonable and non-discriminatory.
(b) Which network elements will be required to be made available in its territory,
and which suppliers may obtain such elements, will be determined in
accordance with national law and regulation(s).
(c) In determining the network elements to be made available, each Party’s
competent body shall consider, at a minimum, in accordance with national
law and regulation:
(i) whether access to such network elements as are proprietary in nature
is necessary, and whether the failure to provide access to such
network elements would impair the ability of suppliers of public
telecommunications services of the other Party to provide the services
they seek to offer; or
(ii) other factors as established in national law or regulation,
as that body construes these factors.
Co-Location
4. (a) Each Party shall ensure that major suppliers in its territory provide to
suppliers of public telecommunications services of the other Party physical
co-location of equipment necessary for interconnection or access to
unbundled network elements on terms, conditions, and at cost-oriented rates
that are reasonable and non-discriminatory.
(b) Where physical co-location is not practical for technical reasons or because of
space limitations, each Party shall ensure that major suppliers in its territory
provide:
(i) alternative solutions; or
(ii) facilitate virtual co-location,
on terms, conditions, and at cost-oriented rates that are reasonable and non-discriminatory.
(c) Each Party may determine which premises shall be subject to subparagraphs
(a) and (b).
Resale
5. Each Party shall ensure that major suppliers in its territory:
(a) offer for resale, at reasonable rates,3 to suppliers of public
telecommunications services of the other Party, public telecommunications
services that such major supplier provides at retail to end users that are not
suppliers of public telecommunications services; and
(b) subject to Annex 13.4(5)(b), do not impose unreasonable or discriminatory
conditions or limitations on the resale of such services.
Number Portability
6. Each Party shall ensure that major suppliers in its territory provide number
portability to the extent technically feasible, on a timely basis, and on reasonable terms and
conditions.
Dialing Parity
7. Each Party shall ensure that major suppliers in its territory provide dialing parity to
suppliers of public telecommunications services of the other Party and afford suppliers of
public telecommunications services of the other Party non-discriminatory access to
telephone numbers and related services with no unreasonable dialing delays.
Interconnection
8. (a) General Terms and Conditions
Each Party shall ensure that major suppliers in its territory provide
interconnection for the facilities and equipment of suppliers of public
telecommunications services of the other Party:
(i) at any technically feasible point in the major supplier’s network;
(ii) under non-discriminatory terms, conditions (including technical
standards and specifications), and rates;
(iii) of a quality no less favorable than that provided by such major
supplier for its own like services, or for like services of non-affiliated
service suppliers or for like services of its subsidiaries or other
affiliates;
(iv) in a timely fashion, on terms, conditions (including technical
standards and specifications), and cost-oriented rates that are
transparent, reasonable, having regard to economic feasibility, and
sufficiently unbundled so that the supplier need not pay for network
components or facilities that it does not require for the service to be
provided; and
(v) on request, at points in addition to the network termination points
offered to the majority of users, subject to charges that reflect the cost
of construction of necessary additional facilities.
(b) Options for Interconnecting with Major Suppliers
Each Party shall ensure that suppliers of public telecommunications services
of the other Party may interconnect their facilities and equipment with those
of major suppliers in its territory pursuant to at least one of the following
options:
(i) a reference interconnection offer or other standard interconnection
offer containing the rates, terms, and conditions that the major
supplier offers generally to suppliers of public telecommunications
services; or
(ii) the terms and conditions of an existing interconnection agreement or
through negotiation of a new interconnection agreement.
(c) Public Availability of Interconnection Offers
Each Party shall require each major supplier in its territory to make publicly
available a reference interconnection offer or other standard interconnection
offer containing the rates, terms, and conditions that the major supplier offers
generally to suppliers of public telecommunications services.
(d) Public Availability of the Procedures for Interconnection
Each Party shall make publicly available the applicable procedures for
interconnection negotiations with major suppliers in its territory.
(e) Public Availability of Interconnection Agreements with Major Suppliers
Each Party shall:
(i) require major suppliers in its territory to file all interconnection
agreements to which they are party with its telecommunications
regulatory body, and
(ii) make publicly available interconnection agreements in force between
major suppliers in its territory and other suppliers of public
telecommunications services in such territory.
Leased Circuits Services4
9. (a) Each Party shall ensure that major suppliers in its territory provide enterprises
of the other Party leased circuits services that are public telecommunications
services, on terms, conditions, and at rates that are reasonable and
non-discriminatory.
(b) In carrying out subparagraph (a), each Party shall provide its
telecommunications regulatory body the authority to require major suppliers
in its territory to offer leased circuits that are part of the public
telecommunications services to enterprises of the other Party at flat-rate
prices that are cost-oriented.

Additional Obligations Relating to Conduct of Major Suppliers of Public

Treatment by Major Suppliers
1. Subject to Annex 13.4(1), each Party shall ensure that major suppliers in its territory
accord suppliers of public telecommunications services of the other Party non-discriminatory
treatment regarding:
(a) the availability, provisioning, rates, or quality of like public
telecommunications services; and
(b) the availability of technical interfaces necessary for interconnection.
Competitive Safeguards
2. (a) Each Party shall maintain appropriate measures for the purpose of preventing
suppliers who, alone or together, are a major supplier in its territory from
engaging in or continuing anti-competitive practices.
(b) For purposes of subparagraph (a), examples of anti-competitive practices
include:
(i) engaging in anti-competitive cross-subsidization;
(ii) using information obtained from competitors with anti-competitive
results; and
(iii) not making available, on a timely basis, to suppliers of public
telecommunications services, technical information about essential
facilities and commercially relevant information which are necessary
for them to provide public telecommunications services.

Obligations Relating to Interconnection with Suppliers of Public

1. Each Party shall ensure that suppliers of public telecommunications services in its
territory provide, directly or indirectly, interconnection with the suppliers of public
telecommunications services of the other Party.
2. In carrying out paragraph 1, each Party shall ensure, in accordance with its domestic
law and regulations, that suppliers of public telecommunications services in its territory take
reasonable steps to protect the confidentiality of commercially sensitive information of, or
relating to, suppliers and end-users of public telecommunications services and only use such
information for the purpose of providing those services.

Access to and Use of Public Telecommunications Networks and Services1

1. Each Party shall ensure that enterprises of the other Party have access to and use of
any public telecommunications service, including leased circuits, offered in its territory or
across its borders, on reasonable and non-discriminatory terms and conditions, including as
set out in paragraphs 2 through 6.
2. Each Party shall ensure that such enterprises are permitted to:
(a) purchase or lease, and attach terminal or other equipment that interfaces with
the public telecommunications network;
(b) provide services to individual or multiple end-users over any leased or owned
circuit(s);
(c) connect owned or leased circuits with public telecommunications networks
and services in the territory, or across the borders, of that Party or with
circuits leased or owned by another person;
(d) perform switching, signaling, processing, and conversion functions; and
(e) use operating protocols of their choice.
3. Each Party shall ensure that enterprises of the other Party may use public
telecommunications services for the movement of information in its territory or across its
borders and for access to information contained in databases or otherwise stored in
machine-readable form in the territory of either Party.
4. Further to Article 23.1 (General Exceptions) and notwithstanding paragraph 3, a
Party may take such measures as are necessary to:
(a) ensure the security and confidentiality of messages; or
(b) protect the privacy of non-public personal data of subscribers to public
telecommunications services,
subject to the requirement that such measures are not applied in a manner that would
constitute a means of arbitrary or unjustifiable discrimination or disguised restriction on
trade in services.
5. Each Party shall ensure that no condition is imposed on access to and use of public
telecommunications networks or services, other than that necessary to:
(a) safeguard the public service responsibilities of providers of public
telecommunications networks or services, in particular their ability to make
their networks or services available to the public generally; or
(b) protect the technical integrity of public telecommunications networks or
services.
6. Provided that conditions for access to and use of public telecommunications
networks or services satisfy the criteria set out in paragraph 5, such conditions may include:
(a) a requirement to use specified technical interfaces, including interface
protocols, for interconnection with such networks or services; and
(b) a licensing, permit, registration, or notification procedure which, if adopted or
maintained, is transparent and applications filed thereunder are processed
expeditiously.

Rabu, 16 April 2008

Ipswitch WS FTP Pro 2007

WS_FTP Professional gives you lightning-fast transfer speeds, along with industry-leading security with 256-bit AES over SSL / FTPS & SSH / SFTP connections, fully-integrated PGP mode, and file verification mechanisms, and time-saving automation features like, scheduling, backup, synchronization, search, compression, scripting and email notifications.

Senin, 07 April 2008

Phone Calls Filter v1.0.2.0

Are you bothered with unwanted phone calls ? not anymore ! Block phone call by setting filters for incoming phone calls. use specific answering modes - such as: hanging up, personalized greetings etc... so that all your unwanted phone calls will go unnoticed. Once you turn off your telephone ring you will be able to listen the rings of only chosen phone calls - from your computer. Undesired callers will be blocked or keep ringing unanswered. You will not be interrupted anymore...

* Blocks unwanted phone call.
* Play specific greeting for each caller.
* Support UNKNOWN, OUTOFAREA etc.. calls formats.
* Calls log.
* Adding remarks, flags and priority for each call.
* Display of voice and speech, while a call is incoming, and when it ends.
* Caller ID- Tapi or Comm based.
* Presents the call on display, including caller name, caller number, and picture.
* A personalized unique answering mode, activating different options, for each contact.
* Filter list - a personalized answering mode, and a different alert sign for each contact.
* Create greetings with Speaker or TTS 5.1.
* Dialer - makes the outgoing phone call, directly from your PC.
* Powerfull search.
* Advanced and user-friendly graphic interface.
* Registration log for all calls and events.
* Runs as a service.
* And much more...

Jumat, 04 April 2008

NCH Switch Plus v1.24

Switch audio file conversion software is a sound file format converter for Windows or Mac. It can convert audio files from many different file formats into mp3, wav or wma files including wav to mp3, mp3 to wav, wma to mp3 and much more (see the supported formats list below).
Switch audio file converter is very easy to use. Just add the files you want to convert to the list, select the format you want to use, and then click the convert button.

Kamis, 03 April 2008

Motorola Phone Tools 4.5 Xp/Vista

Buy Motorola Phone Tools 4.0 to download and back-up your contacts, edit pictures and create ringtones. Personalize your wireless communications.
Motorola Phone Tools 4 is the ultimate in personalization and protection application. Download Phone Tools 4 and immediately start taking advantage of a wide range of cool capabilities.

Synchronize
Phone Tools 4 ensures you'll never lose your data if you lose your phone. Transfer and store all your phone numbers on your computer. With just one click synchronize all your phone contacts, calendar and tasks with major applications including Microsoft Outlook, Outlook Express, Lotus Notes or the in-built Motorola Phone Tools phone book and calendar client. An intuitive synchronization wizard guides you through the process.

Personalize*
Use Phone Tools 4 to personalize your phone by creating your own ring tones and adding personal pictures or videos. Phone Tools 4 software lets you transfer and store pictures taken with your cell phone camera to your computer, so you never have to worry about filling up your cell phone memory again!

Text Message*
With Motorola Phone Tools 4, you can choose to send text messages from your computer keyboard for greater speed and simplicity, minimizing dependence on the smaller phone keypad for typing SMS.

Go Online*
Phone Tools 4 lets you use your cell phone as a modem to connect your laptop to the Internet virtually anytime, anywhere... even at the airport, in a car, bus or other vehicle.

Connect with Bluetooth®**
Motorola Phone Tools 4 software is already Bluetooth® compatible. If your phone has Bluetooth® wireless technology, Phone Tools 4 allows you to connect your phone to your PC using Bluetooth® technology, provided your PC is also Bluetooth® compatible. If it is not, combine Motorola Phone Tools with Motorola's Bluetooth® PC Adapter and make your computer Bluetooth® ready (PC Adapter PC850 product sold separately.)

Upgrade
Included in the purchase price of the downloadable Motorola Phone Tools 4 are upgrades to newer versions of the Phone Tools software.

Mobile Phone Tools 4.0 System Requirements

* Windows® 2000, XP, Vista Operating Systems
* Pentium 466MHz or higher CPU
* 64MB RAM
* 120MB Free Hard Drive Disk Space
* 256 Color VGA or SVGA monitor
* MPC2 compatible CD ROM drive
* One available USB port
* Mouse or other pointing device

Connection Options

* Bluetooth®
* Cable (Mini USB or CE Bus)

What you get:
* Quick Start Guide (mailed separately)

Free Call

Flash Capture is the right tool you are looking for. This Internet Explorer add-on tool enables you to save, snapshot, email, and categorize Flash files (.swf) in just one click. Right click on the Flash you want to save Select Save Flash As... command


Point to the Flash you want to save, a floating toolbar will appear over the corner of that Flash, if you want to specify the file name and location.
Select the folder name under Save Flash To command, if you want to save it to the selected folder silently, with its default

Wireless Hacking Live-CD (FBI version)

Wireless Hacking Live-CD (FBI version){Must Have}

Hack a WLAN / Wireless Access Point
AND MORE, IT GOT EVERY PROGRAM THAT THE FBI WOULD USE!


Live Cd For Wireless Hacking, Also Used By The Fbi
This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
- Live CD with all the tools you need to hack a WLAN / wireless Access point -
Linux Live-CD - OS runs from CD - 635 mb - .iso
- also used by the FBI …

WEP Hacking - The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104. The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, “It doesn’t matter if you use 128 bit WEP keys, you are vulnerable!”
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.
WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.
A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104.
The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, cracking WEP keys has been a slow and boring process.
An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.
After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.
This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.
Basic Directions:

1)Boot from cd
2)get the wep key
3)write it down
4)reboot into windows
5)connect using wep key.

Proxy Switcher Pro vv3.9.0 4059 portable

Different internet connections do often require completely different proxy server settings and

it's a real pain to change them manually. Proxy Switcher offers full featured connection management

solution.

This includes flexible proxy server list management, proxy server tester and anonymous surfing

capabilities.


Proxy Switcher Features

Change proxy settings on the fly
Automatic proxy server switching for anonymous surfing
Works with Internet Explorer, Firefox, Opera and others.
Flexible proxy list management
Proxy server availability testing
Anonymous proxy server list download

1st Network Admin v2.21

1st Network Admin offers a comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to almost every corner of Windows for all PC workstations you have in your network, apply executable patches to them remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. 1st Network Admin is very useful for Internet cafes, public-access terminals, libraries, large corporations, schools and for other applications where you have to deal with lots of stand-alone PC workstations to be secured and constantly maintained. Once you install and configure the remote client service application on all your remote computers, you do not need to physically attend those computers anymore. You just change security settings and apply executable patches form only your administrator's computer from almost everywhere where your corporate network is accessible by TCP/IP protocol. In total, 1st Network Admin supports over 600 different security restrictions, options and tweaks that allow you to completely secure your workstations