Internet Download Manager 6.11 Build 2 with Patch

IDM is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

Internet Download Manager 6.11 Fixed compatibility problems with different browsers including Internet Explorer 9 Final,Mozilla Firefox 12 and Mozilla Firefox 11, Google Chrome. Improved FLV grabber to save videos from web players on YouTube, WOW! Google Video, MySpace TV, and other popular sites.

(Released: Apr 23, 2012)
    • Fixed false interception of web ads
    • Added Socks traffic monitoring for Google Chrome & Opera
    • Added compatibility with address hiding programs. 

    • Download here with password techreg

    Read more ...

    Web Page Maker v3.2 full version


    Web Page Maker is a software Creator and Uploader page site that is very easy to use and with just minutes, a page for your site is ready to be published even without elementary knowledge of HTML code. Web Page Make v3.2 Full can help you to better facilitate the making pages with a variety of features that are very simple.
    Additional features for Web Page Maker include built-in color picker, Java script library, image library and built in FTP clien. To further away following some of the features of the Web Page Maker.

    Download HERE with password techreg
    Read more ...

    Angry Birds Space for PC full version

    Angry Birds Space is the fourth (and latest) installment to the Angry Birds series. The release date was March 22nd. It was first announced on the Angry Birds Space page.
      After a giant claw kidnaps their eggs, the Angry Birds chase it into a wormhole and find themselves floating in a strange galaxy surrounded by space pigs! Luckily the Angry Birds have super powers of their own...

    Angry Birds Space features 60 interstellar levels on planets and in zero gravity, resulting in spectacular gameplay ranging from slow-motion puzzles to lightspeed destruction. With regular free updates, new in-app purchases, brand new birds, brand new superpowers, and a whole galaxy to explore, the sky is no longer the limit! 
    Download HERE with password techreg
    Read more ...

    Panda Security 2013 Beta Launched with support Windows 8

    Panda Security has launched the beta version of its comprehensive security solution Panda Global Protection 2013 with support for Windows 8. Its unique Collective Intelligence technology offers better and instant protection against all kinds of known and unknown malware threats.Collective Intelligence continuously improves protection levels by gathering information on malware from the worldwide Panda community and offers quick response to new malware attacks.

    Benefits of the new Panda Global Protection 2013:
    1. New user interface look and feel, making it easier than ever to use the tools included in the 2013 lineup.
    2.  Improved antivirus engine with better detection and disinfection capabilities. 
    3.  New password manager: Encrypted password repository that protects your digital identity and allows you to log into websites with just one click. 
    4. New installer that makes installation easier and faster than ever. New feature to automatically shut down the computer after completing a scan
    5. Compatible with Windows 8 Consumer Preview, the beta version of Microsoft’s new operating system. 
    6. New system for sending questions to Tech Support. Resolve your queries faster. 
    7. Improved operating system vulnerability detection 

     Along with the beta release, Panda has also announced a beta tester contest. All participants will receive a 50 percent discount on the purchase of the final product, whereas the ten beta testers suggesting the most helpful improvements will each receive a $200 gift certificate.

    You can download Panda Global Protection 2013 Beta from source here
    Read more ...

    Bit Measurements


    The basic unit used in computer data storage is called a bit . 8 Bits is equal to 1 Byte .
    1 byte vs  1KB vs  1MB vs  1GB vs  1TB vs  1PB vs 1EB vs  1ZB vs 1YBHow much is 1 byte vs  1KB vs  1MB vs  1GB vs  1TB vs  1PB vs 1EB vs  1ZB
    Bit :  A Bit is a value of either a 0 or 1.
    Byte : 1 Byte = 8 Bits
    Kilobyte (KB) : 1 KB = 8,192 Bits ,
    1 kB = 1,024 Bytes
    Megabyte (MB) 1MB =1024 KB
    Gigabyte (GB) 1GB = 1024 MB
    Terabyte (TB) 1TB = 1024 GB
    Petabyte (PB) 1PB = 1024 TB
    Exabyte (EB) 1EB = 1024 PB
    Zettabyte (ZB) 1ZB = 1024 EB
    Read more ...

    Difference between Intel Core i7 and Intel Core 2 Duo Processors


    Intel Core i7

    Codenamed: Bloomfield – Nehalem
    Fabrication: 45 nm
    Instruction set: X86, X86-64, MMX, SSE 4.2
    Socket: LGA 1366
    Bus: Quick Path Interconnect
    RAM: DDR3
    Chipset Support: X58
    Intel Core 2 Duo
    Codenamed: Conroe, Allendale, Wolfdale – Core 2
    Fabrication: 65 nm / 45 nm
    Instruction set: X86, X86-64, MMX, SSE 4.1
    Socket: LGA 775
    Bus: 1333 MHz FSB
    RAM: DDR2
    Chipset Support: 965, P3x, G3x, P45, X48

    DIFFERENCE BETWEEN Intel Core i7 and Intel Core 2 Duo Processors:
    The Core i7 is a completely new architecture which is much faster and more efficient than the Core 2 Duo. Currently only the Core i7 920, 945 and 965 XE versions are available. Of that the Core i7 920 is available at just $284 which makes it a great buy. It offers better performance than almost all Core 2 Duo processors.

    Native Quad Core, More Cache and Hyper Threading:
    All the Core i7 processors are Native Quad cores (4 cores), which means that they actually have 4 cores on a single die, while the older Core 2 Duo processors like the Q6600 (2×2 = 4 cores) had two cores on a single die, and two such dies merged together. This increases the processing speed greatly. They also have 256 KB L2 cache per core and a shared 8 MB L3 cache which has proven to be much better than any cache configuration in Core 2 Duo.
    It also has HyperThreading support which means that each of the 4 cores can process 2 threads simultaneously, so you get 8 virtual cores. This helps in running many applications parallely and also in gaming.
    Quick Path Interconnect (QPI) and On Die Memory Controller:
    The Core i7 processors sport the new Quick Path Interconnect technology which replaces the FSB (Front Side Bus) to connect the various components in a computer. QPI is much faster than FSB and hence improves the overall performance. It is even faster than AMD’s similar HyperTransport 3.0 standard.
    The Core i7 have an On Die Memory Controller which means that it can access memory much faster than the Core 2 Duo processors which had an external memory controller. Intel has borrowed this feature from AMD. All the four cores, memory controller, cache are on the same die which improves the speed and performance greatly
    Read more ...

    Tune Up Utilities 2012 Keys


    Tune Up Utilities 2012 is a System Tunning software.
    First download & Install the Tune Up utilities form the Official Website.

    if you see the message shown below 
    Click on Enter Product Key

    now enter the product Key which is available HERE with password techreg
    Read more ...

    Android Ice cream theme for Windows 7

    If you are an Android fan, and want that beautiful ICS look on your desktop machine, then the world wide web has you covered. Thanks to Flickr member, David Molina, the Windows 7-owning world can now enjoy the aesthetic delights which the latest version of Android has to offer, displayed on a much larger screen. Unfortunately, to achieve this desktop glory, it isn’t simply a case of pressing a few buttons and you are up and running. The ICS desktop will take some time to recreate and requires quite an extensive list of components to be running in tandem to get the necessary look and feel.Use it and enjoy the android experience on your windows 7.

    Download here for Windows 32bit
    Download here for Windows 64bit
    Read more ...

    How to use Premium cookies in google chrome

    In this article am going to tell how to use coolies in Google chrome. follow the steps.

    Step 1: You need to install Premium Cookie Injector. You can download here and Install

    Step 2: Go to the filehosting website eg Hotfile, megaupload and click the button which is visible in right corner next to the address bar between settings button.(It will be in small cookie in yellow colour) Like shown below

    Step 3: After clicking this button you will see a page opened like picture shown below
    Step 4: Paste premium cookie in the box

    Step 5: click inject cookie. It will auto refresh and you should be logged in
    Read more ...

    IDM coolie importer


    IDM Cookie Importer:
    Follow the Steps:
    Step 1: A  Cookie Name (Change It To according to your file host )
    Step 2: Cookie Value (Paste here your premium cookie)
    Step3:  Links (put your downloading links)
    step4:  Create IDM Export File (now generate IDM file)
    Step 5: Now Open Internet Download Manager And  Import this File resume your Download enjy
    Use FAQ Button for instructions .
    just change cookies name for Diff. domain
    Wupload Cookies (Cookie name = PHPSESSID)
    Filesonic Cookies (Cookie name = PHPSESSID)
    Hotfile Cookies (Cookie name = auth)
    Megaupload Cookies (Cookie name = user)
    Rapidshare Cookies (Cookie name = enc)
    Download HERE  with password techreg

    Read more ...

    Definition of some Bits & Byte terms

    Bandwidth refers to how much data you can send through a network or modem connection. It is usually measured in bits per second, or "bps." You can think of bandwidth as a highway with cars travelling on it. The highway is the network connection and the cars are the data. The wider the highway, the more cars can travel on it at one time. Therefore more cars can get to their destinations faster. The same principle applies to computer data -- the more bandwidth, the more information that can be transferred within a given amount of time.

    Baud Rate:

    Contrary to popular belief, baud is not a direct measurement of data transfer speed, but instead it measures how many electrical signals are sent per second. Baud is used to measure the rate of electrical signals, or "signaling elements," for modems, networks, serial cables, and other data transfer mediums.
    Some people think that baud and bits per second are equal. For example, they'll say a 28,800 bps modem transmits at 28,800 baud, and act like they know everything. But the fact is, most modems transmit multiple bits of data per baud, so while the the two values are related, they are typically not equal. So the next time your friend says his 56K v.90 modem can transfer data at 56,000 baud, you can kindly tell him that he is incorrect and explain to him the difference between baud and bps.
    The computer term "bit" comes from the phrase "Binary DigIT," which is different than that thing you put around a horse's mouth. A bit is a single digit number in base-2 (a zero or a one) and is the smallest unit of computer data. A full page of text is composed of about 16,000 bits.
    It is important not to confuse bits with bytes. Both are used to measure amounts of data, but it takes eight bits to make one byte. The most common area where bits are used intstead of bytes is in measuring bandwidth (in bits per second). Why? Probably because it makes your Internet connection sound faster than it really is.
    Abbreviation: b
    Bitrate, as the name implies, describes the rate at which bits are transferred from one location to another. In other words, it measures how much data is transmitted in a given amount of time. Bitrate is commonly measured in bits per second (bps), kilobits per second (Kbps), or megabits per second (Mbps). For example, a DSL connection may be able to download data at 768 kbps, while a Firewire 800connection can transfer data up to 800 Mbps.
    Bitrate can also describe the quality of an audio or video file. For example, an MP3 audio file that is compressed at 192 Kbps will have a greater dynamic range and may sound slightly more clear than the same audio file compressed at 128 Kbps. This is because more bits are used to represent the audio data for each second of playback. Similarly, a video file that is compressed at 3000 Kbps will look better than the same file compressed at 1000 Kbps. Just like the quality of an image is measured in resolution, the quality of an audio or video file is measured by the bitrate.
    A byte is a unit of measurement used to measure data. One byte contains eight binary bits, or a series of eight zeros and ones. Therefore, each byte can be used to represent 2^8 or 256 different values.
    The byte was originally developed to store a single character, since 256 values is sufficient to represent all standard lowercase and uppercase letters, numbers, and symbols. However, since some languages have more than 256 characters, modern character encoding standards, such as UTF-16, use two bytes, or 16 bits for each character.
    While the byte was originally designed to measure character data, it is now the fundamental unit of measurement for all data storage. For example, a kilobyte contains 2^10 or 1,024 bytes. A megabyte contains 1,024 x 1,024, or 1,048,576 bytes. Since bytes are so small, they are most often used to measure specific data within a file, such as pixels or characters. Even the smallest files are typically measured in kilobytes, while data storage limits are often measured in gigabytes or terabytes.

    Read more ...

    Batch File Programming


    A batch file is a type of script that contains a list of commands. These commands are executed in sequence and can be used to automate processes. For example, some programs may include a batch file that executes a number of commands as the program starts up. A user can also create a custom batch file to automate tedious processes such as copying multiple directories or renaming several files at once.
    Batch files are run by the COMMAND.COM program, which is part of DOS and Windows. Therefore, batch files can only be run within the Windows operating system. Macintosh and Unix have other scripting tools, such as AppleScript and Unix shell commands, that can be used for similar tasks. Because batch files contain executable commands, it is important not to open unknown batch files on your hard disk or in e-mail attachments.
    File Extensions: .BAT, .CMD

    Download the Ebook about this HERE
    Read more ...

    Fight Is On Between Oracle And Google Over Java API Copyrights


    Oracle has been quite public with its argument (pdf), which is mostly based on taking snippets from Google emails that suggest a need to license Java. The favorite of the bunch is this one: 

    They also point to some snippets of code that do appeared to be copied:

    If you just see that side of it, you might be convinced, but the details suggest a much less convincing story. First off, there are serious concerns about whether or not an API even can be covered by copyright. In fact, before Sun was acquired by Oracle, Sun's own CTO had said that "internet specifications are not protectable under copyright," which (you might think) gives Google an implied go ahead to make use of the API. Furthermore, many of the email snippets that Oracle presents are taken out of context -- they show little snippets of big emails and pull from very very different time periods -- ranging from 2005 to 2010, when different factors applied. Oracle also scrubbed a blog from former Sun CEO Jonathan Schwartz in which he warmly welcomed Google to the Java family when the company launched Android.

    Perhaps more damning: Larry Ellison himself in 2009 at the JavaOne event spoke about Google's Android development and how they were contributing code back to Java. Ellison himself was put on the stand and appeared to contradict his own depositions when it came time to discuss the specifics of the copyright. That can't go over well. Not only that, but he stumbled, and claimed he was "not sure" when asked specific questions:
    On cross-examination, Google came out firing and the room got tense quickly. “Do you understand that no one owns the Java programming language?” lead counsel Robert Van Nest asked.

    Ellison began a longer answer, but Judge William Alsup interrupted him and said it was a “yes or no” question. Finally Ellison said, “I’m not sure.”

    “And anyone can use it without royalty?” Van Nest followed up.

    “I’m not sure,” Ellison said again.

    Then Van Nest showed a video of Ellison receiving the same question on a deposition video and answering “That’s correct” to both.
    Oracle's response, of course, will be that it just meant for developing apps, not for using the API -- but its other statements are a lot less clear on that. Either way, it seems pretty clear that Sun gave an implied open license to these things, so to come back now and insist otherwise is pretty questionable. Furthermore, there still are questions as to whether or not an API can actually be covered by copyright at all.

    Separately, Oracle keeps talking about just how much work it is to create APIs, and even points to some Google statements about the difficulty of doing so. That's smoke and mirrors. Difficulty has no bearing on copyright law. It's kind of surprising that Oracle's lawyers would even bring it up, as "sweat of the brow" arguments won't get very far. Hell, even if it biases a jury, it would get rejected on appeal. It seems like Oracle's strategy here is just to confuse the jury and go for guilty by association because they're going to have trouble showing actual guilt.

    As for the specific code snippets shown above, those a few lines out of 50,000 or so files. Under copyright there's a defense known as de minimis copying, if you're just found to have copied a very tiny portion of something. It seems like that might apply here as well.

    Also, you may have heard stories about the results of this trial potentially being worth billions of dollars or something, but that was before most of the patents got thrown out. The patents left over aren't worth very much at all, and the end result means that if Oracle wins, it'll likely get less than $100 million. That's still a significant sum, but it's a lot less than what Oracle had hoped to get in this lawsuit.

    In the end, as it seemed from the beginning, Oracle's case looks pretty weak (and getting weaker).

    Source: Techdirt
    Read more ...

    Mac OS X Lion 10.7.3 VMware Image


    Mac OS X Lion 10.7.3 VMware Image - Download Links
    1. For information on how to use this image, see:
    2. All links are interchangeable, however I think Rapidshare are generally faster.
    3. Extract using 7zip or WinRAR. 
    4. The MD5 of the image's hard drive (\Mac OS X Lion\Mac OS X Lion.vmdk) is:      
       (I only included this as it's the main and essential file, so it *has* to be correct).
    Note: Please don't repost my links without them being shortened as displayed below. This means no reuploading, or posting the un-shortened links. I went through the effort to make this so please respect my wishes. Other than that, feel free to post the below links to anywhere you wish.
    Rapidshare Links:
    Part 1
    Part 2
    Part 3
    Part 4
    Part 5
    Part 6
    Part 7
    Part 8
    Fileserve Links:
    Part 1
    Part 2
    Part 3
    Part 4
    Part 5
    Part 6
    Part 7
    Part 8   
    Torrent Link: Here
    Read more ...

    Virtual Memory Information


    Today application is getting bigger and bigger. Therefore, it requires a bigger system memory in order for the system to hold the application data, instruction, and thread and to load it. The system needs to copy the application data from the HDD into the system memory in order for it to process and execute the data. Once the memory gets filled up with data, the system will stop loading the program. In this case, users need to add more memory onto their system to support that intense application. However, adding more system memory costs the money and the normal user only needs to run the the intense application that requires the memory only for one or two days. Therefore, virtual memory is introduced to solve that type of problem.
    Terminology & Explanation
    There are two types of memory, which are as follows:
    * System Memory is a memory that is used to store the application data and instruction in order for the system to process and execute that application data and instruction. When you install the memory sticks to increase the system RAM, you are adding more system memory. System Memory can be known as either the physical memory or the main memory.
    * Virtual Memory is a memory that uses a portion of HDD space as the memory to store the application data and instruction that the system deemed it doesn't need to process for now. Virtual Memory can be known as the logical memory, and it controls by the Operating System, which is Microsoft Windows. Adding the Virtual Memory can be done in system configuration.

    Tutorial Information & Facts or Implementation

    Virtual Memory is a HDD space that uses some portion of it as the memory. It is used to store application data and instruction that is currently not needed to be process by the system.
    During the program loading process, the system will copy the application data and its instruction from the HDD into the main memory (system memory). Therefore the system can use its resources such as CPU to process and execute it. Once the system memory gets filled up, the system will start moving some of the data and instruction that don't need to process anymore into the Virtual Memory until those data and instruction need to process again. So the system can call the next application data and instruction and copy it into the main memory in order for the system to process the rest and load the program. When the data and instruction that is in the Virtual Memory needs to process again, the system will first check the main memory for its space. If there is space, it will simply swap those into the main memory. If there are not any space left for the main memory, the system will first check the main memory and move any data and instructions that doesn't need to be process into the Virtual Memory. And then swap the data and instruction that need to be process by the system from the Virtual Memory into the main memory.
    Having too low of Virtual Memory size or large Virtual Memory size (meaning the size that is above double of the system memory) is not a good idea. If you set the Virtual Memory too low, then the OS will keep issuing an error message that states either Not enough memory or Virtual too low. This is because some portion of the system memory are used to store the OS Kernel, and it requires to be remain in the main memory all the time. Therefore the system needs to have a space to store the not currently needed process data and instruction when the main memory get filled up. If you set the Virtual Memory size too large to support the intensive application, it is also not a good idea. Because it will create the performance lagging, and even it will take the HDD free space. The system needs to transfer the application data and instruction back and forth between the Virtual Memory and the System Memory. Therefore, that is not a good idea. The ideal size for the Virtual Memory is the default size of Virtual Memory, and it should not be exceed the value of the triple size of system memory.

    To determine how much virtual memory you need, since the user's system contains the different amount of RAM, it is based on the system. By default, the OS will set the appropriate size for Virtual Memory. The default and appropriate size of Virtual Memory is:

    <Amount_Of_System_Memory> * 1.5 = <Default_Appropriate_Size_Of_Virtual Memory>

    For example, if your system contains 256 MB of RAM, you should set 384 MB for Virtual Memory.

    256 MB of RAM (Main Memory) * 1.5 = 384 MB for Virtual Memory

    If you would like to determine how much the Virtual Memory is for your system and/or would like to configure and add more virtual memory, follow the procedure that is shown below. The following procedure is based on windows XP Professional.

    1-1) Go to right-click My Computer and choose Properties

    1-2) In the System Properties dialog box, go to Advanced tab

    1-3) Click Settings button that is from the Performance frame

    1-4) Once the Performance Options shows up on the screen, go to Advanced tab

    1-5) Under the Advanced tab, click the Change button from the Virtual Memory frame to access to the Virtual Memory setting

    Then the Virtual Memory dialog box appears on the screen. In there, you are able to check how much the Virtual Memory you set. If you would like to modify the size of Virtual Memory, follow the procedure that is shown below.

    2-1) In there, select the drive letter that is used to install the Operating System

    2-2) Choose the option that says, "Custom Size:"

    Once you choose that option, the setting for Initial Size and Maximum Size become available for you to set. Initial Size (MB) means the actual size of Virtual Memory, and Maximum Size (MB) means the maximum size of Virtual Memory that is allowed to use.

    Let's say if your system contains 512 MB of RAM, then the ideal setting for the Virtual Memory is as follows:


    Initial Size (MB):  768
    Maximum Size (MB):  1500

    Once you are happy with that Virtual Memory size, click the Set button from Paging file size for selected drive to apply the setting for the Virtual Memory size. Then click the OK button to apply the setting.

    That's where you can manage and configure for the size of Virtual Memory.

    Additional Information

    * To maintain the good overall system performance, you should be using the default size of actual size for Virtual Memory and the triple the value of the size of the main memory for the maximum size of Virtual Memory. If you find that main memory plus virtual memory is not big enough to load the intensive application, then you will need to add more main memory onto your system.

    Search Keyword

    virtual memory 
    Read more ...



    Peer2Mail is the first software that let you store and share files on any web-mail account. If you have a web mail account with large storage space, you can use P2M to store files on it. Web-mail providers such as Gmail (Google Mail), Walla!, Yahoo and more, provide storage space that ranges from 100MB to 2GB.
    P2M splits the file you want to share/store zips and encrypts it. P2M then sends the file segments one by one to your account. Once P2M uploaded all file segments, you can download them and use P2M to merge the segments back to the original file.
    u can get the software from here

    and for any info u can log to there website

    How to upload a file to ur e-mail account ?
    In order to send a file to an email account, Peer2Mail needs to split it into segments. Web-mail providers limit the size of an email attachment usually to a nominal 10Megs
    There are 3 ways u can send ur files to the e-mail:
        *  Direct Send - P2M has a built in SMTP component that sends the segments directly to the web-mail providers. You don't need to enter your ISP details in order to use P2M. If you are using this feature please make sure you enter a value in the 'From Email Address' because some web-mail providers reject email messages where there is no 'From' address. You can even enter a fake mail address.
        * Send Via MAPI - P2M can send the segments using MAPI (Usually your outlook client). When you use this option P2M will split the files and move the sending responsibility to Outlook. Note that it will use your ISP SMTP server and details to send the files. You may enter as many recipients as you wish when using this option.
        * Send Via SMTP Server - Send the segments using your ISP SMTP Server. If you are using this feature please make sure you enter a value in the 'From Email Address' because some web-mail providers reject email messages where there is no 'From' address. You can even enter a fake mail address. You may enter as many recipients as you wish when using this option.
    Ill explain the direct send which i find it very easy to use.
    normally when u open ur peer2mail program u receive an image like this u click the split/send tab as shown in the image

    after that u click the folder icon wich is choose a file to send as shown in the picture

    u will see an image like this u click browse and choose the file u want to upload in this case ill choose the movie white chicks wich is 700+ mb after that in mail to i type the e-mail account i want to upload the file to either is gmail yahoo walla or any other email account. in the optional encrypted password leave it blank.
    also u will find the segment size wich will be how u want ur file to be divided into files of 10 mb that means if u have a movie of 700 mb it will be splitted into 70 files that means u will be receiving in ur inbox 70 e-mails.
    after u choose the size wich normally is set to 10 mb u will see the send method here u leave it as direct send wich means u wont need an e-mail to send it this program automatically send it. then there is From Email Address - This is the source address of the mail. This address doesn't have to be valid.
    Once you are done, click on the Ok button. here is an image of what ive been talking now:

    when u click ok u will find ur file u wanna upload splitted as u can see it doesnt really use ure harddrive.. You can now choose if you want P2M to send all the segments or only specific few by checking/un-checking the checkboxes. Once you are ready, click on the Send button. It may take a few hours to complete the operation depending on the file size and your internet connection. the send button is showed in uthe image below wich is the second icon:

    after u done that u can log to ur e-mail in ur browser and find the files there in ur inbox.
    now we finished uploading so we wanna share our files without giving our original password!!!
    Account Password Encryption/Decryption
    If you wish to share your web-mail account with your friends and don't want to give them the real password, you can encrypt the real password and share the encrypted password with your friends. Only P2M will know to decrypt the password and your friends can use it to gain restricted access to the web-mail account without knowing the real password. If a user logged in to either Walla, Gmail or Yahoo with an encrypted password, Peer2Mail limits his permissions on the account. This is done so he wont be able to delete files, change the password or any other settings on the account.
    To encrypt a password click on the browser tab and click on the orange key button. as shown in the image below.

    when u do that a box will appear saying password u type ur original password in this case i putted sexyjoanna (and no dont waste ur time trying to think thats my password lol is just an example :P ) when u do that click on encrypt and ur encrypted password will be seen as shown in the image bellow.

    To insure higher security for your encrypted password, Peer2Mail can use a different encryption key for servers that support SSL (Gmail, Yahoo). This way the password will only work on secured servers. SSL servers encrypt the transportation of data between your computer and the server, so it will be impossible to intercept the password while its being transmitted to the server. To create a secured encrypted password (that will work only with SSL servers) check the "Encrypt password for SSL Servers" checkbox.

    so that means if u gonna log into my account to download the files what u do is u go to gmail in this case as an example in ur peer2mail browser tab there u type my e-mail lets say and as password u use the encrypted password wich in this case is |\srXSyaOn3tm9rA==|/ and u will be logged.
    so we uploaded the files we encrypted the password now how to download them?
    now thats the easy part lol

    P2M includes a built in browser so you can easily log into your web-mail account. Before you can merge the segments you need to download them. It is important that you will save all the segments into the same folder. The first segment name ends with the P2M extension and the rest follow with a serial number 001...00x.

    u can log to ur browser and download the files one by one but it will take u alot  of time!!!  so  Peer2Mail can automatically list and download files from web-mail accounts. Currently P2M supports auto-download from Gmail, Walla, Yahoo, Spymac, Unitedemailsystems, Xasamail and Omnilect.

    so what we do is we click in the browse tab then u click the home icon and u will see the different email accounts available for autodownload as shown in the picture below. after that click the e-mail service u gonna log to type the e-mail and encrypted password( the encrypted password wont work in ur normal explorer or firefox browser)

    when u log into an account wich contains files in it in this case i am into an account of a movie called superbabies or baby geniouses 2 as u can see there are 76 e-maills
    now u can download one by one but that will take ages so what u do is u click in the download segment icon wich is the autodownload wich is faster to use. it is the folder icon as shown in the image below

    when u click it u will see a window appear P2M will then list the segments (may take a few minutes) and at any time you can tell P2M what segment to download by clicking on the checkboxes that appear next to them. as u can see there is an auto merge checkbox u can merge them directly after download if u check it or u can do it later. if u added a decryption password when uploading u will need to type it if u didnt then leave it blank. see the image below

    after u choose the files u wanna send u just click download then a window will appear and choose in what folder u wanna save the file. after that the download will start.
    now concerning merging the files after instead of after downloading what u do is u click the merge segment tab when u do that u will find underneath ur folders choose where u want the files to be merged or in other word unzipped lets say i downloaded the movie in a folder called p2m but i want to unzip them or merge them in my movies folder so what i do i choose my movies folder so it will be saved there after that i click in the first icon wich is merge the segments in the selected folder when i do that a window will appear there where it says p2m file i click browse and i go to my in this example my p2m folder where i downloaded my movie there i look for the file wich extension is P2m and choose it after that i just click the merge button and wait till the file gets unzipped.
    check the image below

    Read more ...