EjectUSB

EjectUSB by William Hedrick can be used to close all programs running from a specified removable drive or folder and then attempt ejection if a drive is specified. Extended functionality includes flushing the file cache, closing Explorer windows and removing registry entries and Recent Document shortcuts referencing the specified drive or folder. EjectUSB reads its settings from EjectUSB.ini which resides in the same folder as EjectUSB.exe. If EjectUSB.ini does not exist, EjectUSB will run with default settings.

Once launched EjectUSB sits in System Tray and can be used to eject USB media. It supports following 6 command line arguments:

  • drive letter or folder path
  • /eject
  • /force
  • /ini
  • /nobat
  • /settings
Technorati Tags:

HJSplit – Free file splitting program for Windows

HJSplit 2.4 is a file splitting program for Windows XP, Vista, 2000, NT, 95, 98, ME. HJSplit is able to split files of any type and any size. It can be used freely for commercial and non commercial purpose.

hjsplit - 1

Click on Split button and select Input File and Output location. Select split file size and click on Start button. HJSplit splits input file into multiple files and stores these in selected output folder. Click on Close button once finished.

hjsplit - 2

Click on Join button on main screen. Select first part of split file (file extension .001) and select output folder. Click on Start button and HJSplit joins all parts to create original file. Click on Close button once finished.

hjsplit - 3

HJSplit can also be used to compare 2 files. Select File 1 and File 2 and click on Start button to start comparison. Click on Close button once finished.

hjsplit - 4

HJSplit can also be used to calculate checksum of a file. Select file and click on Start button. The calculated checksum value is shown under file path.

hjsplit - 5

USB Safeguard – Portable application for data protection

USB Safeguard is a portable tool to encrypt and protect data with a password on your removable pen drive using the AES 256 bits encryption algorithm (Rijndael). This is helpful in securing your data in case drive is lost or stolen. Download a copy of this tool and store it on your removable drive.

USB Safeguard

Set your password and confirm by pressing OK button. You can also use Windows On-Screen Keyboard to type password by clicking small keyboard icon left to OK button.

On-Screen Keyboard

Clicking on USB Safeguard - dropdown button shows follows menu.

dropdown menu

Click on first entry to set your contact details in case your drive is lost or stolen.

Customize your USB pen

USB Safeguard offers you to store your password in a file.

Passwords match

Now drag & drop files/folders of your removable drive that you want to protect.

Files to be encrypt...

Files to be encrypt...

Click on Encrypt button to protect files/folders dropped inside the file box or click on Encrypt All button to protect everything on your removable drive.

After successful encryption of the data, you can erase the original files/folders using standard data erasure algorithms.

File Shredder

Click OK button to continue.

Operation Concluded

Click OK button to continue.

To access your protected file, launch USB Safeguard from removable drive. Type your password and select which files/folders you want to decrypt. You can also erase encrypted files/folders along with decryption.

Encrypted Files

Confirm File Delete

Decryption Success

7 tools for USB protection

1. Arpantech iKill

iKill

2. Net Studio USB FireWall

USB Firewall

3. Netwrix USB Blocker

usb-blocker

4. Thumbscrew USB Write Blocker

When launched it placed an icon Thumbscrew USB Write Blocker - icon in System Tray and allows you to make USB read only or writeable.

5. USB Disk Security

USB Disk Security

6. Panda Research USB Vaccine

Panda Research USB Vaccine

7. USB WriteProtector

USB WriteProtector

Proxy+ – A freeware proxy server for Windows

Proxy+ from FORTECH Ltd. is an application level proxy server, that connects your LAN to Internet. The main Proxy+ features are:

  • support of HTTP, HTTPS, FTP, Gopher, RealAudio (and other) protocols
  • disc cache which saves bandwidth on the Internet connection
  • mail server with many options
  • POP3 downloader which allows to download multiple POP3 boxes from the Internet.

It supports restriction rule sets you can apply to  POP3 boxes or messages in the boxes. 3 users is for free (freeware application). If you want a version for more users you have to order a registration key.

Proxy+ can be configured through web interface - http://x.x.x.x:4400 where x.x.x.x is the name or IP address of the computer running Proxy+. Proxy+ allows you to configure security settings to restrict access to limited number of clients.

Although single page help file installed along with Proxy+ is enough, you can also access Knowledge base articles at following URL:

http://www.proxyplus.net/kb/searchkb.php

 

Freeware USB Firewall

Net Studio USB FireWall 1.1.3 detects automatically all files which try to launch itself when an USB device is inserted.

USB Firewall

When launched, USB FireWall resides in System Tray and monitors USB devices for autorun applications.

Technorati Tags: ,

Technitium MAC Address Changer

Technitium MAC Address Changer (TMAC) by Shreyas Zare is a freeware network setting manipulation tool for Windows. You can use is to

  • change MAC address of an Network Interface Card
  • enable/disable a network connection
  • add/remove an IP address
  • add/remove a gateway
  • add/remove a DNS server IP address
  • enable/disable DHCP on a network connection
  • release IP and renew lease for selected connection
  • set interface metric
  • create/modify/delete a configuration preset
  • configure Internet Explore HTTP proxy settings

TMAC

TMAC also provides command line interface for above-listed operations. The command line syntax is as follows.

tmac -n network_connection_name   [-m mac_address / -nm mac_address / -r / -nr ]   [-h]   [-i ip_address_1[,ip_address_2...] :subnet_mask_1[,subnet_mask_2...]]   [-g gateway_1[,gateway_2...] :metric_1[,metric_2...]]   [-d dns_server_1[,dns_server_2...]]   [-pxy http_proxy_server_address:port]   [-p preset_name]   [-s]   [-re]   [-di]   [-rn]   [-rl]   [-sv]   [-ro]   [-nta]   [-nst]   [-f preset_file]

OPTION DETAILS-

-n     Specifies name of the network connection/adapter (NIC). Name may be complete or partial or just a part of it.

-m     Specifies a MAC address. Blank MAC address implies original MAC address of the NIC.

-nm    Specifies a non-persistent MAC address. Blank MAC address implies original MAC address of the NIC.

-r     Specifies to use a random MAC address from manufacturers list.

-nr    Specifies to use a non-persistent random MAC address from manufacturers list.

-h     Enables DHCP and removes previous IP addresses and Gateways.

-rl    Releases DHCP server assigned IP address.

-Rn    Renews IP address lease from DHCP server.

-i     Changes IP address. IP address list is comma separated, subnet masks list is comma separated. Both IP addresses and subnet masks lists are separated using a colon ':'

-g     Changes Gateway address. Gateway addresses list is comma separated, metrics list is comma separated. Both Gateway addresses and metric lists separated using a colon ':'

-d     Changes DNS server address. DNS server address list is comma separated.

-pxy   Sets Internet Explorer HTTP proxy server. If server address is blank, proxy settings are disabled.

-s     Silent mode. Do not show any message window.

-re    Restarts network connection/adapter.

-di    Disable network connection/adapter.

-p     Specifies name of a preset saved earlier to be used. Preset name may be complete or partial or just a part of it. This parameter over powers all other network settings.

-sv    Loads short vendor list which makes TMAC load faster. This parameter over powers all other parameters.

-ro    Resets the original MAC address info saved in registry by TMAC. Use this only if original MAC address saved is wrong. This parameter over powers all other parameters.

-nta   Disable system tray animated icon.

-nst   Disable system tray icon.

-f     Specify preset file to load.

-help  Displays help message.

Disk space analysis with Disk Space Fan

Disk Space Fan is a freeware disk space analysis tool for Windows, which displays disk space allocation in Ringschart. The Ringschart is composed of a set of nested rings around a central circle.

Disk Space Fan - 1

The central circle symbolizes the root folder. Each ring represents a level in the directory. Each subfolder or file is represented by a sector of the ring. Its angle being proportional to the size of the folder's contents, and painted with a different color to ease visualization. Files are painted in light gray color. Folder or file which is smaller than 1/180 of the size of root folder will be ignored.

The chart displays five levels. In case a folder in that last fifth level contains even more subfolders, this situation is pointed by presenting a curve close to the edge of that folder's ring sector. When the mouse pointer hovers on one of the folders in the graphic, it is highlighted and a tooltip appears with information about its name and size.

Xenu Link Sleuth – Freeware spider

Xenu's Link Sleuth is a freeware that is used to check Web sites for broken links. Link verification is done on "normal" links, images, frames, plug-ins, backgrounds, local image maps, style sheets, scripts and java applets. It displays a continuously updated list of URLs which you can sort by different criteria. A report can be produced on following parameters.

  • Broken links, ordered by links
  • Broken links, ordered by page
  • Broken local links
  • Redirected URLs
  • FTP and gopher URLs
  • Valid text URLs
  • Site Map
  • Statistics
  • Orphan files