free, legal, superbly great.
that's how we spell coolness.



With so many audio editors out there, finding the right tool for the job can be tricky. The multiplatform, open-source editor Audacity has leaped to the top of our list with its clean interface, excellent features, and support for 32-bit floating-point audio. Audacity succeeds at being both feature-rich and flexible, while keeping the toolbar and work space uncluttered. It does this by relegating most functions--such as effects, edits, and project management--to handy drop-down menus.

Audacity supports uncompressed audio standards such as WAV and AIFF in addition to OGG and MP3 files. A full complement of basic effects such as reverb, delay, and compression are included. Virtual Studio Technology (VST), Linux Audio Developers Simple Plugin Architecture (LAPSDA), and Nyquist plug-ins also are available if you're looking to expand. Another eye-catching feature is the Beat Analyzer, which helps you peg the beats per minute of a phrase.

The performance of most functions is quick--even CPU-hogging tasks such as exporting to MP3 or adding complex effects. Though Audacity doesn't offer advanced effects or features out of the box, its usability and price set this freeware wonder above the crowd.


Download it Now


Areca Backup is an Open Source backup solution

It basically allows you to select a set of files / directories to back-up, choose where and how (as a simple file copy, as a zip archive, ...) they will be stored, and configure post-backup actions (like sending backup reports by email or launching custom shell scripts)

It has been designed to :
  • Be as simple as possible to set up : No complex configuration files to edit - Your backup configuration (which is stored as an XML file) can be edited with Areca's graphical user interface.
  • Be as versatile as possible : Areca can use advanced backup modes (like "delta backup") or simply produce a "basic" copy of your source files as a standard directory or zip archive (readable by WinZip or other archivers).
  • Allow you to interact with your archives and the files they contain : Track different versions of a specific file, browse your archives, recover or view specific files, merge a set of archives, ...


The Defraggler helps computer users who feel their system is running too slow. This simple program performs a complicated task that streamlines your PC's thought processes, but be prepared for a wait.

This free unlimited download attempts to bring order to your scattered RAM. When a file is created, portions of the item are spread into free spaces throughout the hard drive. As more files accumulate the computer has to work harder to piece together the puzzle that has become your specific file. This results in a slow computer. Defragmenting seeks out all these matching pieces and lines them up, making work easier and faster for the computer.

Defraggler downloads easily and is simple to understand. Its display shows users how much memory is available on their computers and also performs a search to show exactly how many files are fragmented in the entire computer. From here you can choose to defragment all or select specific files for defragmentation. Experts recommend regular defragmentation to keep computers running smoothly, so the Defraggler offers a scheduler to automatically run the program.

Defraggler is easy to understand and performs its job well. There is a strange chart along the top that seems to move for no real reason and is best ignored, but is only a minor annoyance. In addition, be prepared for a long wait time. Defragmenting a computer can take dozens of minutes. Still, if you want to improve computer performance, this is a great place to start.


Download it Now



Accidentally deleted an important file? Lost something important when your computer crashed? No problem! Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3 player. And it's free!


From publisher :

Protect your sensitive data with this free open-source disk encryption software. Creates a virtual encrypted disk within a file and mount it as a real disk. Encrypt an entire hard disk partition or a device, such as USB flash drive. Automatically and transparently encrypt in real time.

TrueCrypt provides two levels of plausible deniability, in case an adversary forces you to reveal the password: a hidden volume (steganography- more information may be found here); no TrueCrypt volume can be identified (volumes cannot be distinguished from random data). TrueCrypt uses encryption algorithms AES-256, Blowfish (448-bit key), CAST5, Serpent, Triple DES, and Twofish. It is based on Encryption for the Masses (E4M) 2.02a, conceived in 1997.


Download it Now




Jingle Keyboard is a unique novelty desktop program that can make your typing sound like a real typewriter (for those of us who remember REAL typewriters). The program is a simple install that that runs in the task tray. In addition to typing and carriage returns, Jingle Keyboard also lets users assign sounds to the Esc and function keys, and even to mouse clicks. Users can choose from different sound schemes, including bird singing.




The story follows the player, an AH-64 Apache (although the title screen for most versions seems to show a Comanche used in the game's sequel instead as the rear rotor of the helicopter used in the game was actually Comanche's rear rotor) pilot in a conflict inspired by the Gulf War. A year after the Gulf War, General Ibn Kilbaba takes over a small Arab Emirate and plans to start World War III.




DriveSentry provides FREE security for home users. It takes a new approach to that of traditional security software by combining Antivirus, Antispyware and HIPS technologies

DriveSentry protects the user's system and data from the very latest threats using a combination of over a million blacklisted signatures, whitelisted program identities and information from the DriveSentry Advisor Community.

DriveSentry provides next generation PC security for FREE, by combining antispyware, antivirus and HIPs technologies in order to protect the users from all known or unknown threats.


Features


* DriveSentry is the new generation antivirus product providing security 2.0 protection, allowing you to protect and control access to your folders, files and system settings.
* DriveSentry can protect all drives including all removable storage devices attached to your computer.
* Devices such as Compact Flash, SD cards, Sony MagicGate, iPODs, memory cards, media players, mobile phones, digital camera media, removable PDA memory and USB flash drives.
* Automates write access decisions, minimizing popup notifications.
* Allows user to create powerful rules detailing exactly how programs can write to your drives.
* Only allow trusted programs to write to your protected items preventing damage from zero day threats which go undetected by conventional antivirus software.
* "Tri-security" technology (good programs, bad programs, and Advisor community information) to protect your drives and automate write access decisions.
* Over 1 million unique malware signatures in database enabling effective offline protection and automation of write access decisions.
* Scans the content of files to check for malware before allowing them to write to your drives.
* Automatically blocks and quarantines known viruses, trojans, and malware code.
* DriveSentry enables the immediate scanning of files, folders and drives for over 1 million malware files held in our
* Advisor database.
* Powerful realtime statistical advice from the rapidly growing Advisor community.
* DriveSentry offers a range of technical support.





This is a very easy to use free software for creating fully automatic backups of your files and folders. The backups can be stored either on an external local hard disk or (for a small fee) via the internet on the specially secured and highly reliable Ocster Secure Storage. The software supports incremental backups, encryption, compression and backups of open files. Backups can also be interrupted at any time and later resumed at the same point.


Fantasy Battlefields is a free turn-based tactical battle game located in a fantasy universe like you've never seen before.

Each player leads an army to fight against the armies of virtual ennemies (artificial intelligence) or against other players on a network or on the same computer.

Each army is composed of a great number of fighters having their specific characteristics (Strength, Movement ...) and is organized according to a determined hierarchy (commands, units, individuals ...)

Developed in Java, this game is a multi-platform game (Windows, Mac, Linux, or others)

Requirements:

· Java 1.4 or more recent






Sometimes you run across a game that just makes you say "Wow". Battle Tanks II is one of these. The effects, graphics, sound scheme, fluidity of gameplay, and design of this game is simply astounding! On the main menu, you choose whether to play a quick game (no setup options) or a normal game where you can choose the landscape, difficulty, aiming method, game stlye, etc.






In this game you need to play 10 matches of Rock Paper Scissors to determine the winner. The result of each match is determined by the sign the players show, a rock sign wins a scissors sign, a scissors sign wins a paper sign, a paper sign wins a rock sign. The one who wins more in the 10 matches is the winner.



The object of chess is to move your pieces to capture the opponent's king. A pawn can only move forward, it can move 2 steps on its first move and then one step on subsequent moves. A pawn can move one step diagonally to capture the piece on its diagonal. When your opponent's pawn has just moved 2 steps and lands on a side of your pawn, then you can capture that pawn by moving your pawn diagonally to the back of that pawn, this is called en passant. Rooks can move and capture horizontally and vertically for any distance. Knights can move by moving 2 steps forward and then 1 step sideways. Bishops can move and capture diagonally for any distance. Queens can move and capture in any direction and in any distance. The king can move and capture in any direction but only for one step. The king can also perform a move called castling, where the king moves 2 steps towards a rook and the rook will be moved to the side of the king on the opposite side. In order to perform castling, the king and the rook must both have not been moved, and that there must be no pieces between the king and the rook, also, the king and the two empty spaces from the king to the rook must not be under attack. When you move a piece to attack the king (i.e. the piece can capture the king on its next move), then the opponent must make a move so that the king is no longer under attack, failing to do so will result in a checkmate and the opponent loses. If you moved so that the opponent cannot make any valid move, then this is called stalemate and the result is a draw game.



Portinho is an optimization suite for Windows. It can be used to clean your system (useless files, borken shortcuts, registry, history, etc.), tweak it (the operating system, memory, or connection) or diagnose it (information about the computer, HDD and fonts).

only search moneylessMAX