05 February 2011

Fiddler Web Debugging Proxy 2.3.2.1

0 comments

Fiddler is a Web Debugging Proxy which logs all HTTP(S) traffic between your computer and the Internet. Fiddler allows you to inspect all HTTP(S) traffic, set breakpoints, and "fiddle" with incoming or outgoing data. Fiddler includes a powerful event-based scripting subsystem, and can be extended using any .NET language.

Fiddler is freeware and can debug traffic from virtually any application, including Internet Explorer, Mozilla Firefox, Opera, and thousands more.

Changelog:

2.3.2.1 [2/5/2011]
Improved AutoResponder
Improved Performance
Various bugfixes

2.3.1.0 [11/17/2010]
Improved support for Windows Phone emulator
Editing preferences enabled in about:config

2.3.0.5 [10/1/2010]
Latency support in AutoResponder

Changelog Beta Version: http://www.fiddler2.com/Fiddler2/newbeta.txt

Changelog Final Version: http://www.fiddler2.com/Fiddler2/new.txt

BBS: http://groups.google.com/group/httpfiddler

Homepage: http://www.fiddler2.com/fiddler2/ | http://www.fiddler2.com/fiddler2/version.asp

Download

VPN - use the internet anonymous

1 comments



Internet Freedom

When Internet first appeared, a few could assume that it would develop with this speed, both in terms of number of users and speed of internet connection.

That growth however wasn’t in same time followed by countries law regulations. Because of it, with time, huge differences began to appear in terms of using internet, which were different from country to country.

Many of those countries introduced laws which limited their citizens access to specific Internet resources (networks, sites, user services, etc.). Considering that the basic idea of creating Internet was free exchange of information and access to same, laws like this were conflicted with purpose of Internet existence. This caused the appearance of users who wanted complete internet freedom without restrictions on one side, and laws which imposed different prohibitions on specific internet resources on the other.

Aside from that, there is one more important fact which imposes: considering that internet providers have a possibility of keeping track of complete behavior of their users, we come to a conclusion that there is an increased amount of people who want protection of their privacy and anonymous surfing.

Also many organizations looking to expand their networking capabilities and reduce their costs which is today very important.

It is clear that the solution that is imposed as the best is Virtual Private Network.

What is VPN?

A VPN or Virtual Private Network is a private, secure, communication tunnel between two or more devices across a public network such Internet. One benefit derived from using a VPN is that the "tunnel" protects your data from being "overheard" as it passes over the public Internet. Another is that, when using a VPN connection, your computer "appears" on the campus network as if it were on campus.


These VPN devices can be either a computer running VPN software or a special device like a VPN enabled router and allows your home computer to be connected to your office network or can allow two home computers in different locations to connect to each over the Internet.

For security it uses features like encryption, encapsulation, authorization and tunnels. VPN have great secure level because encryption is very strong from 128bit – 2048bit and that is the main reason why they becoming increasingly popular with their many benefits.

A VPN server is a piece of hardware or software that can acts as a gateway into a whole network or a single computer. It is generally always available and listening for VPN clients to connect to it. This enables any user to access a Private Network securely from anywhere in the world as long as an internet connection is available and the private network provides the user the access to its resources. VPN also allow employees to access information from remote locations, making collaboration possible even when employees are scattered around the globe which can significantly reduce costs of any company.

Types Of VPN

Several computer network protocols have been implemented specifically for use with VPN tunnels. The most popular VPN tunneling protocols are PPTP, L2TP and IPsec.

Point to point tunneling protocol (PPTP) is an extension of the pre-existing PPP or point to point protocol. It is the technology that allows the private transmission of data via a public network such as the internet. PPTP is best suited for the remote access applications of VPNs, but it also supports LAN internet-working.

The Layer 2 Tunnel Protocol (L2TP) is an emerging Internet Engineering Task Force (IETF) standard that combines the best features of two existing tunneling protocols: Cisco's Layer 2 Forwarding (L2F) and Microsoft's Point-to-Point Tunneling Protocol (PPTP).

IPsec (Internet Protocol Security) is a security protocol that provides encryption and authentication over the Internet. It can be used as a complete VPN protocol solution or simply as the encryption scheme within L2TP or PPTP.

Speculation About VPN Future

Experts predict that the VPN will continue to grown in popularity as businesses to save money on remote network access for employees. There is many reasons that predict great future for VPNs:

● Works for PC on Windows /Linux/Mac OS
● Works for mobile on Android/Windows/Mobile/iPhone/Blackberry/Symbian
● High level of SSL encryption
● Work over any type of Internet connections (Cable, DSL, dial up, Satellite, Wi-Fi, etc)
● Eliminating the need for expensive long-distance leased lines
● Reducing long-distance telephone charges
● Offloading support costs
● Minimum hardware requirements
● Can provide you with dedicated IP address with which people protect their privacy and surf anonymous without provider logs

Summary:

Every day more and more people want to protect their privacy on Internet. Governments around the world put different kind of restrictions on Internet connections of their citizens. VPN is solution for all that with which you can bypass all restrictions and protect your privacy. Many expert predict that VPN is future of Internet freedom.

03 February 2011

uTorrent Serenity 2.2.0 Build 24402

0 comments
uTorrent -Serenity- 2.2.0 Build 24402
by Owyn
URL: http://wp.me/pVDYT-2p

uSerenity 2.2.0 Build 24402



see Feautures page



changelog:
- fixed upload multiplier for high real speeds




Download: mediafire
Password: uSerenity22

Download

DDL: uTorrent_Serenity_2.2.0_24402.7z 1 mb

01 February 2011

Here the list of winners of our free give away for 10x ZEVERA Premium Accounts for almost all File Hosters such as Hotfile, Megaupload, DepositFiles...

0 comments
Zevera was give us 10 Premium Accounts (worth each 16 Euro) for our contest.



The winners are:

Cersc
Anuraag
marcrassy
Roronoa Joenoez
hooligan
natalia{at}
Don37
Roady




We have forwarded all email addresses to Zevera and they will give you directly the account.

31 January 2011

ZEVERA - Win a Premium Account for almost all File Hosters such as Hotfile, Megaupload, DepositFiles - 10x Premium Accounts Give Away for our Blog Readers

11 comments
 We give away 10 Premium Accounts for Zevera.


Are you downloading files from Rapidshare, Hotfile, Megaupload, Netload.in and other one-click-hosters?


Now you don’t have to pay subscription to all these hosters. Download any files you want without waiting time, at a very high speed, no matter on which site the files are hosted and without subscription to those file hosting website.

Supported file sharing websites: zevera.com, rapidshare.com, megaupload.com, filesonic.com, fileserve.com, bitshare.com, depostifiles.com, netload.in, hotfile.com, filefactory.com, easy-share.com, uploading.com, oron.com, freakshare.net, 4shared.com, x7.to, 2shared.com, storage.to, badongo.com

Zevera have an own Desktop downloading software, making it the easiest way to download and organize files on your PC.

Guide to download files from Zevera.com Using jDownloader

With the Web interface you can even download your files to your PC to a later time in your My Files History Window.
Usually the files will be first transfered via Premium Access from the File Share Hosters to Zevera's fast web servers and then downloaded supporting resuming and download managers to your PC.




You can win one from 10 Premium Accounts (worth each 16 Euro) if you do one or more of the following:


● Follow our RSS Feed via Feedburner and get daily updates

Share LeecherMods.com on Facebook with your Friends or

Digg a Story from our Site,

● write a review on Alexa

● Tweet about LeecherMods.

● If you have an own website you can backlink to our Page www.LeecherMods.com


When done Follow LeecherMods.com with Google Friend Connect and

write a comment here.


From all comments we choose 10 winners on 31. January and Zevera.com will send them via email a free Premium Account for 30 Days.
The Winner list will be published here on our site.





29 January 2011

eMule 0.50a Chimera 1.6

5 comments
eMule 0.50a Chimera 1.6

Based on eMule 0.50a No.Name



Change log Chimera 1.6

add some Ban Control [B4n$h33]
fix Drop System [B4n$h33]
fix Up to Uploader [B4n$h33]

http://www.divshare.com/download/13910804-eac

Download
DDL

Archive