public marks

PUBLIC MARKS from cascamorto with tags freeware & administration

2015

SystemLook Usage Guide

SystemLook will recognize the following commands (also called 'contexts' by the tool): :dir :file :reg :service :process :filefind :folderfind :regfind :env :assoc :contents :comment SystemLook also has built-in functions called Presets, that perform a dedicated function without any options or input. Presets start with a double colon (::). The following Presets are available (more information below): ::csinfo ::safeboot ::env

2011

RMPrepUSB

(via)
Partition and format your USB drive and make it bootable with RMPrepUSB (a Windows utility) RMPrepUSB and RMPartUSB are freeware utilities for private use only - no registration is required, and all versions are unlimited versions and do not contain any adware or viruses. Please do not distribute these utilities without the authors permission as these utilities are not 'copyright free', 'free software', 'Open Source' or 'Open Licence' products, but are products which are made available for private use at zero cost. Commercial use (i.e. selling it or included it in another product) and distribution is forbidden and you need to contact RM for licensing costs if you wish to include or re-distribute it as part of a commercial solution. Email: [email protected] for licence enquiries. Please note: No licence is required for the internal use of RMPrepUSB by technicians/engineers within a company. Portable: RMPrepUSB is portable and does not need to be installed, but it does write some settings to the Registry when you exit the application. These settings are removed from the Registry when you uninstall RMPrepUSB.

Best free data backup software. Hard drive backup and recovery freeware. Hard Disk image freeware.

Core Features Disk and Partition Image Backup entire disk(s), partition(s) or dynamic volume(s) to image. You can back up the entire system and installed applications on the fly without interrupting the work. It ensures the instant recovery of your PC instead of reinstalling Windows and software. Universal Restore - Improved One-click universal restore. Under WinPE recovery environment, you can simplify system migration by the way of restoring system to dissimilar hardware configuration for hardware replacement. File and Folder Backup Make a copy of specified files and folders or by file types to secure your individual data, including documents, pictures, music, emails, applications, videos and financial files, etc. Incremental/Differential Backup - New Capturing the changes, differential backup and incremental backup for disk and files are two complements for full backup owing to saving time and your disk space. Features Backup Management Disaster Recovery By Managing backup tasks and plans, you can change a backup task or plan and execute the changes immediately, delete image files, and even convert a disk image to .VMDK (VMware virtual disk format) or .VHD (for Virtual PC ) and then mount into a virtual machine directly. EaseUS Todo Backup enables you to restore important files from backed up image and perform disaster recovery just by simple clicks. It ensures quick recovery from system crash, a personal error, hardware or software failure, virus attack or hacker's intrusive destruction, etc. Backup Schedule Delete old images - Improved To run backup automatically at a predefined time. By scheduling a backup task, your system and important data can be backed up now, daily, weekly, monthly. Automatically delete/overwrite old images based on versions or days to save hard disk space according to your own settings. Mount and Unmount Disk and Partition Clone - Improved Mount a disk and partition image to a virtual partition (working as ordinary, logical drives) to explore or copy files in it. A drive letter can be assigned to this partition. You can also unmount the virtual partition. Migrate or copy all the data on a hard disk, partition or dynamic volume to another. Clone disk is especially useful to upgrade your hard drive to a new one without reinstalling operating systems and applications. Image Splitting Wipe Data Split an image file into several files of specified size to fit different storage devices. This feature is helpful to burn the backup file to CD/DVD. With this feature, you can erase all the sensitive data on a disk or partition to protect your privacy. Image Compression Check Image Compress a backup image to save disk space. The higher compression level, the smaller image is. Check the integrate of backup image. You can validate whether you will be able to recover from the backup image. Set Priority Explore backup image file Change the priority of a backup process to make it run faster or slower. The performance of other programs will be adversely affected. Explore, copy and restore files and folders directly from a backup image in Windows Explorer. Password Bootable Media Set a password to protect your image file and prevent other persons to access the backed up files. The highest encryption standard (256 bit AES) is available in EaseUS Todo Backup. Run EaseUS Todo Backup from an emergency disk to perform recovery in case of system crash, etc. USB drive, CD or DVD bootable media can be created. Schedule Backup Ongoing Indicator Email Notification Timely notify whether your schedule is ongoing, and allow manually cancel the schedule. Notify administrator with the results of backup operations via email. Support Pre-OS recovery environment Install program without system rebooting

Recover Deleted Files for FREE. Undelete. Recover Files. File Recovery.

(via)
UNDELETE 360 : restore files accidentally deleted from your Computer, Recycle Bin, digital camera, flash drive. Undelete 360 is one of the best programs to use for restoring accidentally or unintentionally deleted files from your computer, regardless of storage medium. Built on a very fast and efficient algorithm, the program will browse, search, and recover files that have been deleted as a result of an accident, a virus, or software and computer failures. Undelete 360 can recover files deleted from computer hard drives, USB/thumb drives and memory sticks, the memory cards used in cameras, smart phones, and other devices, pen drives, and more. The program supports both file recovery and folder recovery. Best of all, Undelete 360 is 100% freeware: No ads, no beg screens, no time or feature limits. It is completely free for you to use and enjoy.

Free backup software - SyncBack Freeware - free data backup software

SyncBack is our freeware program that helps you easily backup and synchronize your files to: the same drive; a different drive or medium (CDRW, CompactFlash, etc); an FTP server; a Network; or a Zip archive.

2010

Blue screen of death (STOP error) information in dump files.

BlueScreenView scans all your minidump files created during 'blue screen of death' crashes, and displays the information about all crashes in one table. For each crash, BlueScreenView displays the minidump filename, the date/time of the crash, the basic crash information displayed in the blue screen (Bug Check Code and 4 parameters), and the details of the driver or module that possibly caused the crash (filename, product name, file description, and file version). For each crash displayed in the upper pane, you can view the details of the device drivers loaded during the crash in the lower pane. BlueScreenView also mark the drivers that their addresses found in the crash stack, so you can easily locate the suspected drivers that possibly caused the crash.

Depicus Windows Graphical User Interface (GUI)

by 1 other
Windows Graphical User Interface (GUI) Wake on Lan for Windows Graphical User Interface (GUI) For those that don't like the dark old days of dos we have produced a version of Wake on Lan for Windows Updated version - now the port number really does mean the remote port number... You can now also use a FQDN as the IP Address

2009

cmc - computer management console - wmi and vb .net

manage remote workstations and servers CMC is an open source .NET application for managing computers in Windows environments. Using CMC you can monitor and configure all aspects of PCs either in domain or standalone environments. cmc remote administration features: * Operating system information and configuration * Hardware information * Network configuration and management * Services information and management * Processes information and management * Software information * Printer management - add and remove printers (local and network) * Mapped drives information - add and remove users network drives * Send messages to remote users with either netsend or vbscript * Manage startup programs * Get Active Directory user information & reset passwords * Rename computers and accounts - standalone and domain * Join computers to a domain * Easy access to Microsoft mmc snap ins, remote registry editing * Telnet sessions - even when service is disabled (XP sp2) remote control functions * Install VNC on a remote workstation and connect easily * Remote Desktop session, Remote Desktop console session * Enable Remote Desktop * Remote Assistance * ZENWorks remote control function

Remote Process Explorer, Find MAC Address - network monitoring tools by LizardSystems

Remote Process Explorer is a powerful tool for managing, monitoring and analyzing processes on a local or remote computer. You can use Remote Process Explorer to not only get the list of processes running on a remote or local computer, but also run a new process, kill a process or change its priority. In real time, Remote Process Explorer monitors the performance of a remote computer, shows what processes are running on it, how much CPU, memory and other system resources they use. It will show hidden processes, which will allow you to detect spyware and malware. The program has additional tools for shutting down/restarting/logging off a remote computer, sending messages to it, calling standard administrative tools. Remote Process Explorer is an advanced tool for administering remote computers.

2008

JkDefrag Option GUI - Freeware made by Emiel Wieldraaijer

JkDefragGUI is an Graphical User Interface which allows you to easily select all the features JkDefrag, a freeware defragmentation tool made by Jeroen Kessels has to offer. But is can do a lot more. JkDefragGUI can schedule a defragmentation, install JkDefrag or it's screensaver but can also do some small maintenance to your computer. It can be used to schedule a defragmentation of your systemfiles like pagefile and registry files. JkDefragGUI also supports CCleaner which can be used instead of the internal cleaning function. It can also erase any information which is left behind on your harddisk after erasing files.

GLPI - Gestionnaire libre de parc informatique

Solution open-­source de gestion de parc informatique et de helpdesk, GLPI est une application Full Web pour gérer l’ensemble de vos problématiques de gestion de parc informatique : de la gestion de l’inventaire des composantes matérielles ou logicielles d’un parc informatique à la gestion de l’assistance aux utilisateurs.

OCS Inventory NG - Bienvenue sur le site d'OCS Inventory NG !

OCS Inventory NG en quelques mots : * Connaissez-vous tous les périphériques connectés à votre réseau informatique ? * Savez-vous quel logiciel ou composant matériel est installé sur un ordinateur ? * Etes-vous capable de déployer des logiciels ou des scripts de configuration sur vos ordinateurs ? Non ? Alors, Open Computer and Software Inventory Next Generation, la solution open source d'inventaire automatisé et de télédistribution, est faite pour vous !

2007

Defragmentation utilities to remove file fragmentation | Tweak Performance | Smallvoid.com

The following 3rd party freeware defragmenting tools are available: * SysInternals PageDefrag (Offline defragmentation only) * Execsoft DiskKeeper Lite Download DisKeeper (Has splash screen) * O&O Defrag 2000 Mirror * Kessels JkDefrag * DIRMS & BUZZSAW (Command-line) * UltraDefrag - Ultra Defragmenter (Opensource) * Command line wrappers for dfrg.msc in Windows 2000 (XP has defrag.exe): o AutoDefrag o StartDefrag

Kexi Project - "Microsoft Access for Linux" - Home

by 1 other
kexi est une interface graphique permettant de manipuler les bases de données telle que Mysql. Il permet l'édition des requêtes SQL, la création de formulaire Kexi is a Free/Libre and Open-Source integrated data management application, a long awaited Open Source competitor for products like Microsoft Access. Kexi can be used for creating database schemas, inserting data, performing queries, and processing data. Forms can be created to provide a custom interface to your data. All database objects - tables, queries and forms - are stored in the relational database, making it easy to share data and design.

Administration — NovaForge.org, le guide des logiciels libres

L'open source offre des solutions basiques mais efficaces d'administration. Citons notamment les interfaces d'administration de systèmes Webmin et eBox, le logiciel de provisionnement OpenQRM, la solution d'inventaire OCS Inventory, ou la solution de gestion de parc GPLI. Mentionnons aussi les outils de contrôle distant VNC et FreeNX. Voir aussi les rubriques supervision et exploitation du guide.

Télécharger Unison (gratuit)

Unison est un logiciel de synchronisation de répertoires. Il est capable de travailler de manière bidirectionnelle, c'est à dire que vous pouvez effectuer des modifications dans les deux répertoires, et Unison les synchronisation automatiquement. Quand il ne parvient pas à résoudre les conflits, il vous propose des choix. En mode unidirectionnel, il remplace des outils comme rsync. Il peut fonctionner en ligne de commande ou avec une interface graphique (GTK) et peut synchroniser entre systèmes différents (Windows, Linux, Unix, MacOS X...). Unison peut travailler en local (synchroniser d'un répertoire ou disque à un autre), ou par réseau (ssh, socket...). Il est économe et ne transfère que les parties modifiées des fichiers. Il est fiable: Les accès disque et transfers sont conçus pour être pratiquement atomiques: Il est impossible de perdre des fichiers même en interrompant une synchronisation en plein milieu.

Télécharger WinAudit (gratuit)

WinAudit est un outils permettant de dresser l'inventaire des caractéristiques matérielles et logicielles de l'ordinateur. WinAudit est un logiciel portable, il ne nécessite donc aucune installation pour fonctionner et peut être exécuté depuis n'importe quel support de stockage, y compris à partir d'une clé USB. WinAudit crée un rapport détaillé de la machine sous la forme de page web, avec les informations suivantes : * Logiciels * OS * Matériel * Processeur * Mémoire / RAM * Disque dur * Périphériques * Sécurité * Journaux d'erreur * Réseau Windows/ TCP/IP * Imprimantes * BIOS * etc.

Le blogueur masqué

MyPenDrive 2 est un petit programme extrèment pratique que vous placez sur votre clé USB. Il vous permet de dérminer quels autres programmes doivent être démarrer automatiquement quand vous la branchez à l'ordinateur, Mais vous pouvez également effectuer une sauvegarde automatique de certains dossiers vers votre clé, il suffit d'indiquer les fichiers que vous voulez mettre en sécuritér et, lorsque vous branchez la clé la sauvegarde est réalisé automatiquement.

RemoteShutdown - MATCODE Software

RemoteShutdown allows to remotely (over the network) shutdown and power off, restart or switch to standby mode any Windows NT/2000/XP Workstation or Server. In addition, you can specify a message which will be displayed before the computer will be shutdown and offer the user the option to cancel the shutdown.

DiamondCS security software - freeware and shareware

DiamondCS Freeware : OpenPorts NEW! DiamondCS OpenPorts is a CLI (command line interface) console tool that allows you to see all open TCP and UDP ports on your system, including the owner process. Using technology developed for Port Explorer, OpenPorts is powerful, accurate, and reliable, and results can be displayed in five different styles, allowing for easy interpretation by both scripts and human eyes. CmdLine NEW! CmdLine is a unique process listing tool for Windows NT4/2K/XP that uses an undocumented technique to reveal the full commandlines (with all parameters!). DelLater NEW! DelLater is a tiny program that allows you to specify files to be deleted when Windows next boots, making it ideal for those situations when you can't delete a file because it's in use. Source code included. Autostart Viewer NEW! DiamondCS Autostart Viewer allows you to see, modify, and control every autostarting program on your system, making it a powerful anti-trojan utility. Advanced Process Manipulation NEW! DiamondCS APM is an advanced process/module viewer and manipulation utility that allows unique control over target processes by becoming a part of them. Advanced Process Termination NEW! DiamondCS APT offers seven different methods of process termination - the only thing we know of that can stop all 7 methods is Process Guard! RegistryProt RegistryProt is a 100% free, standalone, compact, low-level realtime registry monitor and protector, that adds another dimension to Windows security and intrusion detection. Just 94kb - download your free copy today! IRClean IRClean is a 100% free, standalone, compact (30kb total download), and easy-to-use yet very powerful anti-worm system designed to specifically combat worms that target or use IRC chat networks to propagate. It has been released into the public domain for free to help stem the growing tide of IRC-propagating worms. TaskMan+ TaskMan+ is a free tiny utility that launches Windows Task Manager in a special way as to boost the security privileges of Task Manager, which in turn gives it a real unconditional license to terminate ANY process. Requires Administrator privileges Console Tools Add more power to your command prompt with our free console tools! Freeware tools include CRC32/MD5/SHA-160 secure hashes, Password Reveal, Uptime, ICMP TraceRoute, ICMP Ping, IP list, Send Mail, HTTP Get, Resolve, XWhois and more!

Stratégie logiciel libre ENAC-IT

by 1 other
En environnement académique, cela devrait être la règle que d'opter (à fonctionnalités/performances identiques) en faveur de solutions logicielles ouvertes (open-source) plutôt que d'utiliser des technologies fermées (commerciales et souvent monopolistiques), afin de conserver notre indépendance, notre capacité de création et d'innovation, préserver une situation de diversité (et la richesse qui en découle), et garantir la meilleure pérennité possible à nos données et développements. Sommaire 1. Avant-propos 2. Introduction 3. Avantages du modèle du logiciel libre 4. Le projet GNU et Linux 5. Logiciels libres principaux actuellement en usage en ENAC 6. Solutions d'interopérabilité entre les mondes Windows et Linux 7. Liens utiles 8. Remarques finales

Pandora FMS - the Free Monitoring System - Main

by 2 others
# Pandora watches your systems and applications, and allows you to know the status of any element of those systems. Pandora could detect a network interface down, a defacement in your website, a memory leak in one of your server app, or the movement of any value of the NASDAQ new technology market. If you want, Pandora could send out SMS message when your systems fails... or when Google's value drop below US$ 33. # Pandora will adjust, like an octopus, to your systems and requirements, because has been designed to be open, modular, multiplattform and easy to customize and use, all integrated into a scalable and distributed architecture. # Pandora can also monitor any kind of TCP/IP service, without the need to install agents, and monitor network systems such as load balancers, routers, switches, operating systems, applications, or simply printers if you need. Pandora also supports SNMP for collecting data and for receiving traps. # A few examples of common resources monitored by Pandora could be processor load, disk and memory usage, running processes, log files, environmental factors such as temperature, or application values like strings contained in web pages or any possible way to collect data in an automatic way. Pandora FMS Features * Lightweigth agents. No need to install adicional software. * Also could use network to collect data on remote systems. * High availability for each component. * Escalable architecture: no liminitation on number of servers you can setup for the same enviroment. * Internal detection on Network Servers in case of failure, automatic takeover of secondary servers. * Stores all data for many weeks or months * Support for implementing redundant and distributed monitoring servers. * Data is stored in a relational database (MySQL). * Automatic database optimization for size, using interpolation and compression algorithms. * Integrated alert systems: send mails, execute scripts, send SMS, or simply write to syslog are a few examples. * Integrated graphical reporting system for any kind of collected data. * SNMP Trap reception with Realtime Console. * Granularity of accesses and user profiles for each group and each user. * Integrated internal auditing for any operation. * Alert filtering to avoid false positives. * Event system with user validation for operation in teams. * Integrated incident system with flows and different profiles. * Any collected value can be displayed as graph or data table. * Alerts can be triggered any kind of event, in many ways. * WebConsole on line HTML contextual help. * Integrated DB management: purge and DB compaction. * Mass configuration/alert manager to copy and distribute agent-module and/or agents/alerts setup to other agents. * Profiles could be personalized using up to eight security attributes without limitation on groups or profiles. * Filters for collected data to avoid bad data.

Babel Enterprise

Babel Enterprise is a systems auditing tool. Babel performs a security level check of the machine, or hardening. The check consists of a number of auditing tests that obtain a snap of the security status of each machine. The result is a security index of the system that is given after each execution. Babel enterprise is a non-intrusive tool, meaning that it does not make any changes in the system at all. It simply takes note of what is not working properly and reports it to the user. . Babel Enterprise has being designed to manage security on many different systems, different technologies and versions, and different issues and requirements. It is a distributed management system, multi-user, that allows redundant installation in all its critical components.