Free Programming .


25 views
Uploaded on:
Category: Art / Culture
Description
Free Software. From the Internet. Rosemary Lloyd Big Bear Computer Club June 6, 2010. Freebies Safety Considerations. Consult tech savvy people Search reputable web sites carefully Read user reviews Not integrated into Windows Less popular can translate to smaller target. RocketDock.
Transcripts
Slide 1

Free Software From the Internet Rosemary Lloyd Big Bear Computer Club June 6, 2010

Slide 2

Freebies Safety Considerations Consult technically knowledgeable individuals Search trustworthy sites precisely Read client surveys Not incorporated into Windows Less mainstream can mean littler target

Slide 3

RocketDock If you have acquired a PC from Dell in the most recent year or something like that, you may have seen the Dell Dock. It is a stand alone "toolbar" that contains program symbols. RocketDock is a comparative application launcher. It is anything but difficult to include or evacuate symbols, change the look and conduct of the dock and migrate it to another region on the screen. These characteristics are in \'Dock Settings… \'. I like RocketDock on the grounds that it helps me to remember the Windows Quick Launch bar that used to inhabit the base of the screen. In Windows 7, the Taskbar has some cool, new elements. Be that as it may, Quick Launch is not accessible. The new Taskbar won\'t acknowledge the majority of the application dispatching symbols that I need to utilize. Subsequently, we discovered RocketDock.

Slide 4

Some RocketDock Features What does RocketDock do? It gives you a quick approach to open projects that are utilized frequently. Rather than filling the desktop with system symbols, drag them to the dock. Move the mouse over a symbol and it augments for less demanding review Open projects have a bolt indicating their symbols. (That is extremely Mac-like) The right half of the dock indicates minimized projects Open the \'Dock Settings… " to change RocketDock\'s look and conduct 1, 2 3 4 http://rocketdock.com/Created by Punk Labs

Slide 5

Security Essentials Microsoft\'s Security Essentials is a hostile to malware program. Download from Microsoft.com Security Essentials is excluded with Windows 7 (or any past adaptation) It is anything but difficult to introduce and design The default is to plan a week after week filter. The UI is quite fundamental. http://www.microsoft.com/security_essentials/

Slide 6

Foxit PDF Reader Foxit is a contrasting option to Adobe\'s free PDF peruser. It is not always calling home searching for upgrades Not as helpless against potential adventures Current rendition 3.3.1.0518 is accessible From Foxit Corporation. They have other pay for programming . http://www.foxitsoftware.com/pdf/peruser/

Slide 7

CutePDF is basically a PDF printer. Introduces as a printer S hows up in the rundown of accessible printers Asks the client to choose where to spare the record (going to be made), and to give it a name The document made is in PDF group Use CutePDF to spare electronic "prints" of solicitations, receipts, website pages, archives, and so forth. On the off chance that you can print it on paper, you can "print" (spare) it with CutePDF It is from Acro Software, which likewise offers pay for projects. http://www.cutepdf.com/

Slide 8

SyncToy 2.1 is from Microsoft.com. Synchronizes documents and organizers between areas SyncToy oversees record synchronization After introductory setup, it screens new documents made changes to document content c hanges to document names record cancellations Whatever happens to records on the first drive is reproduced on the reinforcement drive Synchronization might be done physically , or run naturally by means of Windows Task Scheduler SyncToy does not have an inherent scheduler. http://www.microsoft.com/downloads/details.aspx?familyid=C26EFA36-98E0-4EE9-A7C5-98D0592D8C52&displaylang=en

Slide 9

Firefox is the open source web program from Mozilla. Microsoft\'s Internet Explorer has around 60% of overall piece of the pie Firefox is number 2 with roughly 25% - 30% R emaining web use is for the most part shared by Google\'s Chrome, Apple\'s Safari and Opera May be less powerless against malware abuses that Internet Explorer K eep Firefox up and coming T he client is the principal line of guard against getting malware on their PC.

Slide 10

A Few Firefox Features Open various sites in one window Click on the tabs over the top to rapidly move between site pages Open numerous windows Many accessible modules and additional items Themes Automatic redesigns Manage and secure passwords The program is profoundly adaptable http://www.mozilla.com/en-US/firefox/personal.html

Slide 11

Thunderbird is another open source item from Mozilla. Email customer that introduces on your PC . A lternative to Microsoft\'s Outlook, Live Mail or Outlook Express email programs Manages different email accounts Each message opens in its own tab Under the "Sent" organizer, every mail record is recorded independently The \'Pursuit every one of messages\' looks in the greater part of the letter boxes Thunderbird has a location book C reate \'Mailing Lists\' to send messages to gatherings of contacts Thunderbird does not have a schedule or errand list. http://www.mozillamessaging.com/en-US/thunderbird/

Slide 12

Open Office Open Office is an open source \'Profitability Suite\'. A contrasting option to Microsoft Office 2003 Open Office comprises of 5 projects Writer is the word processor, comparable to Word Calc impersonates Excel Impress does presentations like PowerPoint Draw is generally proportional to Visio Base is a database program like Access Writer, Calc and Impress can open and spare records with Microsoft group. Draw and Base are capable and can do the majority of what Visio and Access do. In any case, their documents are not perfect with Microsoft. Essentially supported by Oracle. http://www.openoffice.org/

Slide 13

GIMP and GIMPShop GIMP is open source photograph altering programming. The Windows working framework incorporates Paint (situated under Accessories in the Start Menu). You can utilize paint for essential photograph altering. At the flip side of the range is the star standard, Adobe Photoshop. In the middle of are numerous other photograph altering programs. GIMP is effective. You can do essential photograph control and favor impacts (counting one of my top picks, make the foundation straightforward). Include GIMPShop on the off chance that you need a Photoshop like interface. GIMPShop has numerous altering devices accessible. "Levels" and "Bends" can be utilized to tweak shading, brilliance, contrast, and so on. These and different elements are found in top of the line photograph altering programming. http://www.gimp.org/

Slide 14

Peter\'s Online Typing Course If you need to sharpen your writing aptitudes, Peter\'s can offer assistance. There are other pay for projects accessible. Mavis Beacon Teaches Typing is one of the better known. http://www.typing-lessons.org/

Slide 15

Araneae Create sites utilizing Araneae , a content based proofreader. Use Araneae to make and alter site pages S upports HTML, CSS, XML, XHTML, PHP, and so on. It has a quest capacity for finding particular words in a report View the page quickly in the default program Open various website pages in isolated tabs From Orangeline Interactive Incorporated. http://www.ornj.net/araneae/

Slide 16

FileZilla After you make and alter your pages, they should be transferred to the site host server. FileZilla is one approach to do as such. It is a FTP program Input the web host login data into the FileZilla \'Webpage Manager\' Connect to the web host Drag and drop documents from your nearby PC to the remote server and tight clamp versa The site is then redesigned on the Internet. http://filezilla-project.org/

Slide 17

Audacity is a sound recording and altering program. Use to record sound (voice, music, and so forth.) Convert records and tapes into advanced recordings B urn onto CD\'s I mports and sends out MP3, WAV and other sound documents Remove clamor A dd impacts Change pitch or speed Record various tracks Mix music http://audacity.sourceforge.net/Audacity created at Sourceforge.net.

Slide 18

Windows 7 Upgrade Advisor If you have a generally new PC running Windows XP or Vista, you might consider overhauling to Microsoft\'s most recent Operating System. That is Windows 7. The Windows 7 Upgrade Advisor takes the vast majority of the mystery out Download and introduce it The Advisor checks equipment and programming on the PC It completes with a report on potential issues with running Windows 7 The report makes suggestions for what to do before overhauling the OS http://windows.microsoft.com/en-US/windows/downloads/redesign counsel

Slide 19

Gibson Research Corporation GRC is the brainchild of Steve Gibson, a long-lasting PC security master. This site has numerous valuable instruments to help clients recognize security gaps in their PC frameworks. At that point it offers approaches to settle security issues. ShieldsUP checks Internet security on your framework. It plays out a converse DNS query to find your PC\'s \'machine name\' on the Internet. Experience the arrangement of administrations that it tests, searching for vulnerabilities on your PC. Impeccable Passwords is a secret key generator. It makes 63 or 64 character passwords that are greatly irregular and safe. If it\'s not too much trouble take note of that SpinRite6 is not free. Be that as it may, it is an awesome apparatus for recuperating information from hesitant hard drives. http://www.grc.com/intro.htm

Slide 20

KeePass Today we have to recollect numerous passwords. You require a secret key for the Windows logon, your email account, online passwords (like site part accounts), and so on. The rundown is unending. Likewise, you ought to utilize diverse passwords for every record. Why? In the event that you utilize one and only secret key all over the place and somebody gets this watchword, you have a difficult issue. The criminal would have entry to you\'re various records. It could be a bad dream . KeePass is an open source watchword supervisor. Oversee passwords safely Keep all passwords in one database Locked with one expert key or a key record Store database on glimmer drive So you just need to recollect that one single expert secret key or select the key document to open the entire database. The databases are scrambled utilizing the best and most secure encryption calculations as of now known. http://keepass.info/

Slide 21

Donations Please take note of that a hefty portion of the sites where freeware is offered will request gifts. It is something to

Recommended
View more...