| ||Category|| || ||VISIT|
|8||Computers - Buying|
|6||Computers - Networking|
|2||Computers - Tech News/Reviews|
|8||Computers - Tech Support Links|
|Connect802 Corporation, founded in 1994 as Optimized Engineering Corporation, is a privately held wireless network design, equipment sales, and consulting firm. The company's products and services are an extension of its flagship patent-pending predictive wireless LAN design methods found in the Connect EZ Solution Suites and Suite Spot Predictive Site Survey. The Connect802 organization includes channel partners and affiliates with installation services available from over 200 locations across the United States.
|Download.com is a leading source for downloads, providing the 'digital fuel' that brings technology to life, including software, music and games. Download.com is a thriving community and marketpalce for digital-content distribution. On a monthly basis, tens of millions of people turn to the site to discover free-to-try, legal downloads for business or pleasure. Editorial reviews and ratings, user opinions, most popular, and suggestions are available to help the user choose the right download.|
| ||Hamachi (Free VPN)|
|LogMeIn Hamachi is a zero-configuration virtual private networking (VPN) application.
In other words Hamachi is a program that allows you to arrange multiple computers into their own secure network just as if they were connected by a physical network cable.
Hamachi is fast, secure and simple. Its core version is also free.
| ||Hoax Busters|
|Interspersed among the junk mail and spam that fills our Internet e-mail boxes are dire warnings about devastating new viruses, Trojans that eat the heart out of your system, and malicious software that can steal the computer right off your desk. Added to that are messages about free money, children in trouble, and other items designed to grab you and get you to forward the message to everyone you know. Most all of these messages are hoaxes or chain letters. While hoaxes do not automatically infect systems like a virus or Trojan, they are still time consuming and costly to remove from all the systems where they exist. At CIAC, we find that we spend much more time de-bunking hoaxes than handling real virus and Trojan incidents. These pages describe some of the warnings, offers, and pleas for help that are filling our mailboxes, clogging our mailservers, and that generally do not have any basis in fact.|
| ||Reseller Ratings|
|Research online stores before buying that new product...|
|Runtime Software's data recovery software will help you rescue your lost or inaccessible files from any imaginable data recovery disaster.
Data Recovery is possible more often than you might think - even without having to send your hard drive to a data recovery service.
Our powerful, yet easy to use, data recovery tools are designed not only to undelete accidentally deleted files or partitions but also recover your data with GetDataBack after fdisk, formatting your drive, power failure, virus attack, software failure, or after deleting files, folders or partitions.
Runtime Software also offers a wide range of file system utilities and forensic tools as well as data recovery service for all kinds of logical hard drive failures and RAID reconstruction and recovery.|
| ||Tight VNC|
|TightVNC is a free remote control software package derived from the popular VNC software. With TightVNC, you can see the desktop of a remote machine and control it with your local mouse and keyboard, just like you would do it sitting in the front of that computer. TightVNC is:
* free, GPL-licensed, with full source code available;
* useful in remote administration, remote customer support, education, and for many other purposes;
* cross-platform, available for Windows and Unix, compatible with other VNC software.
|Various O.S. wallpapers and icons.|
|7||DEV - Lotus Notes/Domino|
|7||DEV - Photoshop|
|15||DEV - Web Resources|
|11||Hosted By WMOZE|
|13||Hosting - Web Resources|