VMware ThinApp 4.0.1 Build 2866


VMware ThinApp 4.0.1 Build 2866


VMware ThinApp v4.0.1 | 6MB

Run any version of virtually any application on a single operating system without conflicts. You can even run multiple versions of the same application. Plug VMware ThinApp, formerly known as Thinstall, into your existing management infrastructure and accelerate your software development and desktop deployment. Deliver and deploy applications more efficiently, more securely, and more cost-effectively with agentless application virtualization.

100% Agentless Application Virtualization

Application isolation.
VIsolated applications run in a virtual bubble in restricted user accounts without requiring any host modification. Deploy Office 97, 2003, 2007, and .NET applications on the same OS without conflict as the applications run independent of one another.

Zero-runtime execution.
With no installed agent, no footprint is left on the endpoint device. Applications run directly from the compressed state without first caching data to the hard disk, achieving better performance and security of data.

100% User Mode execution.
Client runs on locked-down, unmanaged “kiosk” PCs without Admin rights to execute applications, enabling it to be used on managed and unmanaged PC.

Block-by-block network streaming.
Applications virtualized execute once the minimum amount of code required to run the application is available in the desktop’s memory. For example, less than 10% of Microsoft Office needs to be physically streamed to the client in order for it to run. LAN streaming has an average start-up time of just a few seconds.

Sandbox environments for terminal services.
Provide sandboxing for applications running in a terminal services environment so that multiple users can run their own sandboxed application without affecting each other. If one instance of the application tries to make system-wide changes, other users running the same applications are not affected.

64-bit operating system support.
Enables applications to be virtualized and run on 64-bit systems.

Execution on thin clients.
Tested and certified to run virtualized applications on Windows XP-based thin clients.

Compatibility with a broad range of applications.
Proven deployments on simple-to-complex applications ranging from basic Microsoft Office to custom applications with Java or .NET.

Conflict-free Application Delivery

Active Directory integration.
VMware ThinApp does not require any distribution, streaming, or activation servers or agents. It works with AD, ESD enforcement tools, and open protocols so no additional hardware, software licenses and ongoing maintenance costs for backend infrastructure is required.

Execution from USB key with portable profiles/user settings.
Enable a user to run critical applications from a USB key while maintaining corporate security requirements.

Integration with 3rd-party application management solutions.
Creates .MSI and/or .EXE file that plugs into existing electronic software delivery systems (Inventory, Configuration Management Database, Definitive Software Library, Packagers) without additional integrations required.

Application Sync.
Enables application updates for mobile users as well as third parties on the corporate extranet, ensuring availability of the latest version of the application, reducing patch risks to machines that are taken off the network. Update virtual applications via http/https over the LAN or WAN leveraging existing software delivery systems.

Simplified Application Packaging

Application Link.
Allows packaged applications to dynamically establish dependencies ("links") with other packaged applications. Administers create separate packages of interdependent components such as Java or .NET runtimes and the applications that rely on them. Each component is delivered independently while sharing resources across multiple ThinApp packages.

Package it once, deliver to many.
Execute a packaged application on Windows NT, Windows PE, or XP Embedded without retesting or repackaging the application for each operating system.

System snapshots.
Provides administrators with a rapid three-step process for pre- and post-install system states for packaging simplicity and for supporting applications that require a reboot during the installation process.

ISV embeddable.
Organizations can deliver their custom application throughout their extranet using VMware ThinApp application virtualization technology.

Download 1:

Download 2:

VMWare ThinApp 4.0.1.2866 Portable



VMWare ThinApp 4.0.1.2866 Portable | 5.35 MB

Package and Run Applications without Installation Run any version of virtually any application on a single operating system without conflicts. You can even run multiple versions of the same application. Plug VMware ThinApp, formerly known as Thinstall, into your existing management infrastructure and accelerate your software development and desktop deployment. Deliver and deploy applications more efficiently, more securely, and more cost-effectively with agentless application virtualization.

* Package each application with its own DLL file and registry changes to eliminate installation conflicts
* Execute applications on locked-down PCs in 100% user mode
* Run applications from any media without needing admin privileges

100% Agentless Application Virtualization

* Application isolation. Isolated applications run in a virtual bubble in restricted user accounts without requiring any host modification. Deploy Office 97, 2003, 2007, and .NET applications on the same OS without conflict as the applications run independent of one another.
* Zero-runtime execution. With no installed agent, no footprint is left on the endpoint device. Applications run directly from the compressed state without first caching data to the hard disk, achieving better performance and security of data.
* 100% User Mode execution. Client runs on locked-down, unmanaged “kiosk” PCs without Admin rights to execute applications, enabling it to be used on managed and unmanaged PC.
* Block-by-block network streaming. Applications virtualized execute once the minimum amount of code required to run the application is available in the desktop’s memory. For example, less than 10% of Microsoft Office needs to be physically streamed to the client in order for it to run. LAN streaming has an average start-up time of just a few seconds.
* Sandbox environments for terminal services. Provide sandboxing for applications running in a terminal services environment so that multiple users can run their own sandboxed application without affecting each other. If one instance of the application tries to make system-wide changes, other users running the same applications are not affected.
* 64-bit operating system support. Enables applications to be virtualized and run on 64-bit systems.
* Execution on thin clients. Tested and certified to run virtualized applications on Windows XP-based thin clients.
* Compatibility with a broad range of applications. Proven deployments on simple-to-complex applications ranging from basic Microsoft Office to custom applications with Java or .NET.

Conflict-free Application Delivery

* Active Directory integration. VMware ThinApp does not require any distribution, streaming, or activation servers or agents. It works with AD, ESD enforcement tools, and open protocols so no additional hardware, software licenses and ongoing maintenance costs for backend infrastructure is required.
* Execution from USB key with portable profiles/user settings. Enable a user to run critical applications from a USB key while maintaining corporate security requirements.
* Integration with 3rd-party application management solutions. Creates .MSI and/or .EXE file that plugs into existing electronic software delivery systems (Inventory, Configuration Management Database, Definitive Software Library, Packagers) without additional integrations required.
* Application Sync. Enables application updates for mobile users as well as third parties on the corporate extranet, ensuring availability of the latest version of the application, reducing patch risks to machines that are taken off the network. Update virtual applications via http/https over the LAN or WAN leveraging existing software delivery systems.

Simplified Application Packaging

* Application Link. Allows packaged applications to dynamically establish dependencies ("links") with other packaged applications. Administers create separate packages of interdependent components such as Java or .NET runtimes and the applications that rely on them. Each component is delivered independently while sharing resources across multiple ThinApp packages.
* Package it once, deliver to many. Execute a packaged application on Windows NT, Windows PE, or XP Embedded without retesting or repackaging the application for each operating system.
* System snapshots. Provides administrators with a rapid three-step process for pre- and post-install system states for packaging simplicity and for supporting applications that require a reboot during the installation process.
* ISV embeddable. Organizations can deliver their custom application throughout their extranet using VMware ThinApp application virtualization technology.

Homepage

12 Must Have Tools when Fixing a Computer Infected by Virus



12 Must Have Tools when Fixing a Computer Infected by Virus | 7 MB

When a good and powerful virus infects a computer, most likely it will disable you from running Task Manager (taskmgr.exe), Registry Editor (regedit.exe), Command Prompt (cmd.exe), System Configuration Utility (msconfig.exe), configuring Folder Options and hide the Run from Start Menu. Reason the virus does that is because most of the time it is “possible” for computer experts to remove the virus by using the built-in Windows programs without any third party tools

But if you can’t run Task Manager, you cannot end the suspicious process. You could use the taskkill command in command prompt to kill the process but again you won’t be able to do that if CMD has been disabled. Perhaps you can run msconfig to stop the virus from auto startup but also cannot because of the virus. For advance computer users who has knowledge in registry and thought that they could manually remove the virus auto startup entries there, they too can’t do anything about it if regedit has been disabled. Disabling of Folder Options is to stop you from setting your computer to display hidden and system files. This way you can’t see the virus file and hence you won’t be able to delete them.

It is easy to re-enable all those tools back by modifying some values in your registry but if the is still virus active in your computer, the restrictions will be restored back. So for emergency cases, here are some replacement tools you can use to replace the disabled Windows tools.

1. Task Manager taskmgr.exe Replacement



- Task Manager is very important because that is where you get to see all the running processes and also the amount of memory and CPU usage. If you find anything suspicious there, you can try terminating it. If you cannot run Task Manager and get the error message “Task Manager has been disabled by your administrator”, you can try using Process Explorer. It is portable and you can save it in your USB flash drive.



2. Registry Editor regedit.exe Replacement



- Without the ability to access Windows registry, you cannot manually make any changes at all. You can however, import registry REG files. When a virus has disabled regedit, you should see the message “Registry editing has been disabled by your administrator” when you try to run it. A good regedit alternative is RegAlyzer, developed by the author of the famous SpyBot. RegAlyzer requires installation but you can copy the whole RegAlyzer folder to your USB flash drive and run it as portable application.



3. Command Prompt cmd.exe Replacement



- Command Prompt is a very powerful command line tool which supports a lot of commands when you find it impossible to do it in Windows. If you try to run cmd and get the following message “The command prompt has been disabled by your administrator. Press any key to continue”, you can try using GS. GS is a cmd replacement but it is a little old, dated back in year 2005. We’re not looking for a permanent replacement, so it is good enough as long as it can support some important command lines. Do take note that “Console2″, is an EXTENSION for command prompt. If cmd is disabled, Console2 won’t work. GS is small, free and portable.



4. Run Dialog Box Replacement




- Some virus will also remove the run command from your Start Menu and it is not easy to restore it back. Although this is not really important, but it could easily allow you to run important commands. Run dialog replacement v1.0 is small, only 48KB in size and portable. If you have Process Explorer, you can also access the run command from File > Run, or just hit CTRL+R.


5. System Configuration Utility msconfig.exe Replacement



- MSCONFIG is the first place that I will go to check if a computer has a virus. If you run msconfig and go to the Startup tab, it will list all programs that will start when Windows is booted up using the common startup method. Virus makers are aware of this and usually they will either delete your original msconfig.exe file or change the reference location in registry. You should get this message “Windows cannot find ‘msconfig’. Make sure you typed the name correctly, and then try again. To search for a file, click the Start button, and then click Search.” when type msconfig at the run dialog box. One very good msconfig alternative is definitely Autoruns, which is from the same author as Process Explorer. Autoruns has the most comprehensive knowledge of auto-starting locations of any startup monitor, shows you what programs are configured to run during system bootup or login.


6. Enable Show hidden files and protected operating system files



- I’ve tried many File Managers and most of them inherits the Show Hidden Files and Folders or Hide protected operating system files from Folder Options settings in Windows. If a virus is still active in memory, it will keep on changing the settings to disable you from viewing hidden and system files. I found one free file manager called FreeCommander which is able to show you all hidden files and folders as well as protected operating system files no matter what is the settings in Folder Options. It actually ignores the permission in Folder Options! It is portable, so you can also copy the whole extracted folder to your USB flash drive.


and 6 more ....
- autorun management application
- Proccess Master
- Sohand Removal tool
- Files And Folders Reset attrebiutes
and ...

Download Link from Rapidshare

http://rapidshare.com/files/174439373/admin.rar


4 Boot and Rescue CD's-very useful

4 Boot and Rescue CD's


4 Boot and Rescue CD's
Multi CD | 60MB, 482MB, 102MB, 205MB | Multilang. | RS.COM

Avira.AV.Emergency-Rescue-LiveCD.11.08
BitDefender.AntiVirus.Emergency-Rescue-CD-v2.0
kav_rescue_04-11-2008
Rescue.CD.Eset-Nod32.V4

Your Windows system (or a friend/relative's) just took a flaming nose-dive. It has been shot out of the skies and kissed the ground horribly.

Really bad. Kick a small dinosaur bad. You know what I mean. Blue screen of death. Have I reminded you there hasn't been a backup on this system for many many years?

What are you to do?

First, resist the urge to pop in your "system restore" disk. There is a good chance it will restore your system to brand-new status--and just as good a chance it will overwrite all your data and files to the land of "you're not getting that stuff back."

Assuming the hardware is fine, you have a couple of choices:

Option 1: If you have a 2nd system handy, you can pull the hard-drive out of your current system and place it into the second system as a slave drive. That should let you recover the files off the drive and save them. However, if you aren't used to dealing with jumper settings, master/slave drive numbers, BIOS configuration and opening up your pc case, this might be to scary, even though it isn't as bad as it sounds.

Option 2: Use a Boot and Rescue CD.

My early experiences were using Linux "live cd" versions to recover data from OS damaged systems. There are tons of these things nowdays and are all pretty easy to use. A benefit of Linux is that most Linux systems can read NTFS drives of Windows machines (though writing to them is improving, it is not as easy a process). Some Linux distributions support older hardware better than others. You download the ISO file, then burn the ISO file to a CD. Set your boot order to boot from CD before HDD and you are good to go.

My favorite Linux tool for this was the Helix CD. As an added bonus, if you place the cd in your system while Windows is running, it launches a Windows auto-run menu/tools launcher that has a number of useful tools for light forensics work, while the Linux side has heavy-duty forensics tools.

Nowdays, I live by the wonderful Bart's Preinstalled Environment (BartPE) bootable live windows CD/DVD. If you have a Windows XP system, you really need to make a copy of this and keep it handy. This allows you to create an XP PE bootable CD or DVD that will give you an XP environment to use for file recovery and troubleshooting, without booting off your hard-drive. This is worth a million-dollars! It takes some time getting the hang of building this (Bart doesn't offer "pre-rolled" ISO's) so you have to do it yourself, but it is a great learning experience. And once you get the hang of making them, you can really customize the heck out of them.

Microsoft has some more information as well about this whole "Windows PE" thing Bart has based his work on.

More system rescue tools worth looking into:

RescueME CD/floppy Ultra-portable

Ultimate Boot CD for Windows Based on Bart's PE system. Described by the developer as "UBCD4Win is a bootable CD which contains software that allows you to repair/restore/diagnose almost any computer problem. All software included in UBCD4Win are freeware utilities for Windows."

Anti-virus vendor Avast! offers their Avast! BartPE specialized build. Not free, but pre-packaged, packed with Avast! AV, a registry cleaner, junk file remover, a disk checker, a secure-data shredder, a registry editor, event viewer, service/driver manager, command-line tool, a file manager, and text editor. This might be a great alternative if making your own boot and rescue cd sounds to technically challenging, but you like the idea.

If you work in a corporate/Enterprise environment and the IT Tech budget has some need for spending, seriously consider purchasing Winternals Corporate Solutions ERD Commander. Now a Microsoft product, the products aren't cheap, but are really geared for recovering critical systems from OS failures. If you can't rescue the OS with these tools, there is a very strong chance you can at least rescue the data I still carry a Winternal Emergency Rescue CD, even though Bart's PE and a few Linux disks are all the coverage I ever need. I just feel extra confident knowing I have it available.

Trinity Rescue Kit is another Linux boot/rescue cd. It can handle lots of specialized sysadmin situations. And if you are like me and like to make CD labels to match the disks, their logo looks pretty bad-assed (even it really is just a 45-LP spacer disk). Pull this baby out and your users will think you are pretty cool, whether or not you really know what you are doing!

911 Rescue CD - A number of Rescue and Boot media offerings can be found here: Per the developer's site: "The 911 Rescue CD is the Admin's Swiss Army knife it is an integrated set of software designed for the emergency situations when the system doesn't function properly or when assembling a new PC and no pre-installed operating systems or software is found. The 911 Boot Disks are a set of startup disks based on the ModBoot framework, they have mouse-driven user interface and greatly simplify the process of setting up and recovering failed systems, and allow the user to diagnose problems and assist in the fixing steps." Give them a closer look.




Remote Administrator Control 3.3.1



Remote Administrator Control 3.3.1 | 5.53 MB

Radmin (Remote Administrator) is the world famous, award winning secure remote control software and remote access software which enables you to work on a remote computer in real time as if you were using its own keyboard and mouse.

Features:
- Safe and fast computer control through Internet/Intranet network with TCP/IP protocol
- Computer administration and maintenance, e.g. on administrator or management workplaces
- User support and problem solution, e.g. helpdesk workplaces
- Observing teaching in computer classes
- File and folder transfer
- Activity recording when controlling a computer
- Activity monitoring or recording on a remote computer
- Starting commands and tools on a remote system
- Access to home computer from work through HTTP tunnel
- Access to work computer from home or another private network through HTTP tunnel



Supported Operating Systems:
- Windows® 95
- Windows® 98
- Windows® ME
- Windows NT® 4.0
- Windows® 2000
- Windows® XP (32/64-bit)
- Windows® Server 2003 (32/64-bit)
- Windows Vista™ (32/64-bit)

Vortex Admin Tools



Vortex Admin Tools | 354 Mb
Vortex Admin Tools is a bootable CD witch contains more than 120 software toprotect, recover, scan, identify or rescue your hardware. This CD works in Microsoftdisk operating system (DOS) environment so it is easy to manage your hardwareproblems immediately because all this software are ready to use also Admin Tools CD lets you use your mouse and left click so it seems as if you are using windows environment.


354 Mb