Jump to content
Donations Read more... ×

Search the Community

Showing results for tags 'list'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 10 results

  1. The Pirate Bay has slowly but steadily returned to its former glory. After more than three years, the deviant torrent site has regained a spot among the 100 most-visited sites on the Internet. While many of the site's users may cheer at the news, there's also a dark side to the recent resurgence. When the The Pirate Bay suffered over a month of downtime late 2014, many of the site’s regular visitors went elsewhere. This resulted in a significant traffic dip afterwards, but in recent months the notorious torrent site has seen a massive uptick in visitors. At the beginning of the year TPB was already the largest torrent site. Today, Internet traffic ranking service Alexa lists the site among the 100 most-visited domains in the world once again, in 99th place. That’s the first time in three years. While external traffic measurements are far from perfect, the graph below shows a steady increase in ranking since last summer. Exactly how many visitors The Pirate Bay has remains unknown, but SimilarWeb estimates it at a quarter billion ‘visits’ per month. Keep in mind that the estimates above don’t account for the dozens of Pirate Bay proxies that serve users in countries where the site is blocked. That will likely add several millions of monthly visitors, at least. Whether Pirate Bay’s recent resurgence is something torrent users should be happy about is another question. The recent uptick in traffic is mostly caused by the demise of other torrent sites. Last summer both KickassTorrents and Torrentz left the scene, and ExtraTorrent followed a few weeks ago. Many of these users have flocked to The Pirate Bay, which is the prime source for user uploaded torrents. That the Pirate Bay is still around is somewhat of an achievement in itself. Over the years there have been numerous attempts to shut the site down. It started in 2006, when Swedish authorities raided the site following pressure from the United States, only for the site to come back stronger. The criminal convictions of the site’s founders didn’t kill the site either, nor did any of the subsequent attempts to take it offline. While many pirates have fallen in love with TPB’s deviant behavior, the recent downfall of other sites means that there’s a lot of pressure and responsibility on the shoulders of the site now. Many other indexers rely on TPB for their content, which is something not everyone realizes. For now, however, TPB continues its reign. TorrentFreak
  2. Lineage OS Announces A Bunch Of Newly Supported Devices For Its Preview Builds Last month, Cyanogen announced that it was shutting down its offices, leaving the future of CyanogenMod in question. However, from the company's digital ashes rose a new project called Lineage OS. The developer team behind the operating system announced that it would support more than 80 devices. However, at launch, it only supported a handful of devices. Now, the company has updated its roster of supported devices, adding a number of older handsets to the list. Previously, the developer team had only included the LG Nexus 5X, Huawei Nexus 6P, Motorola Moto G4 / G4 Plus, Nextbit Robin and Xiaomi Redmi 1S. The company has now updated its list of supported devices to include: Asus Nexus 7 2013 (4G / Wi-Fi) LG Nexus 5 Huawei Honor 5X LG G4 (T-Mobile / International) LG G3 S LG G3 Beat Motorola Moto X Pure (2015) Motorola Moto E Motorola Moto G Motorola Moto G4 Play OnePlus One Oppo Find 7a Oppo Find 7s Samsung Samsung Galaxy S III (AT&T / Sprint / T-Mobile / Verizon / International) Samsung Galaxy S II (International) Sony Xperia SP Xiaomi Mi 3w and Mi 4 Xiaomi Mi 5 Xiaomi Mi Max Xiaomi Redmi 3/Prime Xiaomi Redmi Note 3 As can be seen, the list of devices has increased drastically. That said, the developer team has not announced how many installs its operating system has garnered. Previously, the company had announced that experimental builds of Lineage OS had been downloaded more than 50,000 times. This figure is bound to change with more devices being supported everyday. You can download the latest nightly and experimental builds on supported handsets by heading over to the download page here. Source
  3. When you visit a web site in your favorite web browser, it interacts with the web servers in a variety of ways. It sends data to the web server such as the browser name, operating system, browser locale and your geographical location. All this data is then used by the server to offer you the content suitable for your browser or locale. For example, if you visit the Bing or Yahoo search engine web site (e.g. yahoo.com) and you are not from the US, then it will redirect you to the relevant local search engine web site (e.g. yahoo.co.uk). Unfortunately, some of the web servers also monitor your web browsing habits across a multiple of sites. With your web browsing data or habits, they can then use it to analyze how what people look for and deliver them the advertisement of the products that they might be looking for. Such servers are called tracking servers or just trackers. Although it is pretty much harmless, some people take it as an invasion of their privacy. Firefox offers to block such tracking servers inside the private browsing mode (also called the incognito mode). You can open a private browsing window in Firefox using the hotkey Ctrl+Shift+P. By default, Firefox blocks only some trackers web bad reputation. But you can change the settings for blocking all the known tracking servers in Firefox. Here is how: Open Firefox browser, type about:preferences#privacy in the address bar and press the Enter key. Alternatively, you can also click on the menu icon (looks like three layered burger), choose Options and then select Privacy section from the left side of the screen. Click on the Change Block List button shown under the Tracking section. 3. You will be shown two options and you can select any of these. One is for blocking only some of the trackers and other is for blocking all of the known trackers. . 4. Click on the Save Changes button when done. Restart Firefox web browser for the changes to take effect. Note that even after you restart Firefox browser, tracking protection will not work in the regular mode unless you have changed some other settings. It will work only in the private browsing mode. Article source
  4. Ultimate list of the Top Fun Things to do With Google Search or the “Hidden Google Tricks”. Just like our brains, we utilize less than 20% of Google’s potential. There are numerous hidden tricks and Easter eggs in not just its search engine but also in Google maps, Google Earth, GDocs, Hangouts and even Google translate. Enough chit chat. Who wants have some fun with Google! Entering certain words into Google makes it do funny, interesting or weird things. It may even present you with games on the search results page for some words. So enjoy! Best Hidden Google Tricks 399999999999999-399999999999998 – Google search says the answer is zero! Wolfram Alfa calculates the same to ‘1’. The mystery behind this is yet to be solved. Festivus – The holiday, which originated on the show “Seinfeld” in 1997, generally takes place on Dec. 23. In celebration of the holiday, when you search “Festivus” Google displays the traditional “Festivus” pole. The loneliest number – The answer to this question will shock you to your very core. Webdriver torso – Turns the Google logo into the moving colored blocks. Webdriver Torso is a YouTube account made by Google that posts mostly 11-second videos consisting of blue and red rectangles that change position, accompanied by a series of beeps which change in pitch. This is one of the best fun things to do with Google search. Super Mario Bros – Shows an info card for Super Mario Bros. Clicking on the flashing question mark generates a coin and 200 points. After 100 coins, the “1UP” sound plays. I killed about 30 mins on this. Google in 1998 – Will generate a layout similar to the one Google used for its search engine in 1998. And it’s only available for 1998 and not any other year. Conway’s Game of Life – Ggenerates a running configuration of the game to the right of the search results. The process cannot be stopped or altered by the user once it starts. So try at your own risk! Google.com/teapot – Returns a page that says “418. I’m a teapot” among other things. Clicking on the teapot will make it tip over and pour out. Google engineers have way too much free time.Once in a blue moon – Its not a vague term like you think. It’s a specific number. The answer to life, the universe and everything presents – is 42. There, you have it! Cool things you can do with Google Bletchley Park – Will show an info card on the side of the page where the headline will be decoded in real time. Bletchley Park is the location of the U.K.’s code-breaking center, which helped the allies break axis power codes in WWII. Flip a coin – A coin will be flipped and returned via your CD tray or the slot where you enter the floppy disc. Roll a die – Unfortunately, unlike the coin, only a virtual die will be rolled and the result will be displayed. How boring! Pacman – Click to play the popular game Pacman (with the same music and sounds). Bacon Number – [Any actor’s name] followed by “Bacon Number” will reveal how many degrees of separation they are from actor Kevin Bacon, who has been the victim of the “Six Degrees of Kevin Bacon” game since the 1990s. More tricks list here
  5. munkee

    Renaming a list

    So I have 23 episodes of a TV show and I have the english subtitles for these episodes what i want to do is rename every subtitle as the same as the correspondent episode and i want to add a the suffix _EN at the end of each subtitle like this Is there a software of a way to rename these subtitles without renaming them on-by-one and save time ?? Thank you
  6. Thawte experiment aims to expose issuers of dodgy creds Google's announced another expansion to the security information offered in its transparency projects: it's now going to track certificates you might not want to trust. Certificate Authorities (CAs) that your browser (or smartphone) trusts have a suitable entry in “settings”, but if a site presents a certificate from an unknown source, the user is prompted about what to do. Since users too often click through those warnings, Google's decided that a list of untrusted CAs might be useful to developers and sysadmins. Mountain View's software engineer, certificate transparency Martin Smith writes that while browser-trusted Certificate Authorities (CAs) are easy to keep track of, there are two classes of CAs that pose a much harder problem. CAs that have been withdrawn from the trusted list, and new CAs that are on track for inclusion. “Including these in trusted logs is problematic for several reasons, including uncertainties around revocation policies and the possibility of cross-signing attacks being attempted by malicious third-parties”, Smith writes. Mountain View has dubbed the new Certificate Transparency log “Submariner”, and hosts it at ct.googleapis.com/submariner. Smith notes that it has the same API as Google's existing CA logs. The post hints that last year's Symantec certificate SNAFU provided some of the impetus to create a lookup of untrustworthy certificates. Symantec's subsidiary Thawte.com created a bunch of dodgy certificates for internal use – including one for Google.com – that escaped into the outside world. Those certificates are included on the don't-trust-this Submariner list: “Initially, Submariner includes certificates chaining up to the set of root certificates that Symantec recently announced it had discontinued, as well as a collection of additional roots suggested to us that are pending inclusion in Mozilla”, the post says. While the log provides “a public record of certificates that are not accepted by the existing Google-operated logs”, the list itself won't be trusted by Chrome. The Source
  7. The developers of the popular torrent client qBittorrent have released version 3.3 of the software for Windows and Mac systems. I switched from uTorrent to qBittorrent years ago as I did not like the direction the once-popular torrent client uTorrent was taking. Just this year for instance, uTorrent shipped a Bitcoin Miner with the application which wasted resources on unsuspecting user systems. The client shipped with cross-promotions and advertisement as well since 2012. I picked qBittorrent as my client of choice after testing a good dozen or so clients as it served my purpose perfectly. The UI of the client is streamlined, it ships with all the features that I could possibly need, and is updated regularly as it is in active development. The update to version 3.3 introduces new features, changes and fixes to the torrent client which can be partially attributed to the "healthy amount of devs contributing to it". So what are the core changes in qBittorrent 3.3.0? The project switched from Qt4 to Qt5. Qt is a cross-platform application development framework. Along with it comes core code refactoring which should resolve issues with labels, temporary folders and other core features that some users experienced while using the client. Note: When you upgrade to qBittorrent 3.3.0 you won't be able to go back to an earlier version anymore. The program displays a notification to you on first start about that. Speed Graph A new speed graph is provided that highlights the total upload and total download speed over a selected period of time (minutes or hours are selectable, and you may add more information to the graph such as overhead, payload, DHT or tracker upload or download stats). Add multiple peers / copy peers You may add multiple Peers to the "Add Peers" dialog. You find that dialog by selecting a torrent first, switching to Peers in the lower toolbar, right-clicking in the peer list and selecting "add a new peer". A selection of peers, one, multiple or all, can be copied right away now as well. Select peers, right-click on the selection and pick "copy selected" to copy the IP address and ports of all peers to the clipboard. Additional "run external program" parameters The client supports running an external program when a torrent completes. This can be an antivirus program for instance to scan the downloaded files. The following list of parameters are now supported by qBittorrent: %N: Torrent name%L: Label%F: Content path%R: Root path%D: Save path%C: Number of files%Z: Torrent size%T: Current tracker%I: Info hashOther changes This is a list of other changes in qBittorrent 3.3 Option added to "use proxy only for torrents".GeoIP2 database for IPv6 peers.Detection of network interface state changes (VPN connection resets).Automatically add trackers to new downloads.You may select a download path for watched folders.In addition to those, you find more than 40 bug fixes, cosmetic changes, Web UI changes and more listed on the official release announcement page of the project. Article source
  8. If you are using tools from Nirsoft, and you should if you are running a flavor of Windows on a machine, then you may have ran into issues before when an antivirus solution notified you that the program you were about to run was malicious in nature. Nirsoft has been fighting with false positives for a long time, and I can only imagine how many support requests Nir Sofer gets about that. What makes this even worse for him is that companies may blacklist his website or pages on it because of these false positives. Google's SafeBrowsing service for instance blocked Nirsoft tools from being downloaded in 2014, and since it is being used by Chrome, Firefox and other browsers, it was certainly devastating at that time for Nirsoft. Nir Sofer tried to make changes to some of the programs but the result, as of today, is still the same. He then decided to create a report about the issue by scanning all of his programs on Virustotal and ranking antivirus engines based on false positives. Virustotal scans files that you upload to the service against 56 different antivirus engines. The ranking calculation is simple: each antivirus engine starts with a score of 100 points. Negative points are awarded for alerts which vary depending on whether it is a generic alert or one that points to malicious code in particular. The results Only 12 of the 56 antivirus solutions did not report a single false positive while the remaining 44 antivirus engines did report at least one. The engines with a perfect score are: AegisLab, Alibaba, ALYac, ByteHero, ClamAW, Emsisoft, Panda, Qihoo-360, Tencent, Total Defense, VBA32, Zoner. Many popular antivirus solutions did not rank well. TrendMicro got a score of 67 and 24 alerts, Nod32 a score of 57 and 26 alerts, Symantec a score of 71 and 20 alerts, and Malwarebytes a score of 83 and 11 alerts. Three antivirus engines ended the test with negative scores: Antiy-AVL with -6.5 points, TheHacker with -230.5 points and Bkav with -1280.5 points. You can check the full listing over on the Nirsoft blog for additional details. Conclusion False positives are a big issue for Nirsoft and -- likely -- other software developers -- and users on the Internet. The ranking does not reflect how effective an antivirus engine is as a whole and one at least has to wonder whether the good placement of certain antivirus engines is due to them being really good at avoiding false positives or other factors. Nirsoft could use the findings in several ways. First, it is shaming companies who report false positives even though it is clear that Nirsoft programs are not malicious in nature. Second, by informing security companies about the results and hoping that they will do something about it. Considering that these companies had years to fine tune their engines, it seems unlikely that this is going to happen though. Source
  9. Directory List and Print Pro 2.30 Directory List & Print is a software tool for Windows™ and enables listing and printing the content of any directory in a simplest way. By copying to the clipboard the lists can be exported into other programs or opened directly in Word™ and Excel™. The Free Version (Freeware) has all the basic features included, the Pro Version (Shareware) provides interesting additional features. Features Website: http://www.infonautics.ch/ OS: Windows XP / Vista / 7 / 8 Language: Eng Medicine: Laxity Size: 4,36 Mb.
  10. Directory List and Print Pro 2.25 Directory List & Print is a software tool for Windows™ and enables listing and printing the content of any directory in a simplest way. By copying to the clipboard the lists can be exported into other programs or opened directly in Word™ and Excel™. The Free Version (Freeware) has all the basic features included, the Pro Version (Shareware) provides interesting additional features. Features Website: http://www.infonautics.ch/ OS: Windows XP / Vista / 7 / 8 Language: Eng Medicine: Laxity Size: 4,48 Mb.