Whether you are a brave commander who aims to wipe out all enemy forces, or a wise tactician who defeats your opponent through tactics and intrigue, the historic game of chess will surely make you sit on the edge of your chair. Your goal is to move your pieces to capture the king of your opponent. When the game starts, you will be given a chessboard with 64 squares, and each player will be assigned a set of pieces. Each set contains 1 king, 1 queen, 2 rooks, 2 bishops, 2 knights, and 8 pawns, making a total of 16 pieces. The two players will take turns to make their moves. Note that during your turn, you need to finish your moves within the time limit indicated by the timer on the left of the screen, or you will lose. A pawn can only move forward. During its first move, it can choose to move 1 or 2 squares forward, given that both squares are unoccupied. After that it can move 1 square forward vertically to an empty square, or move 1 square forward diagonally to capture the opponent piece on that square. When an opponent's pawn makes its first move by taking 2 squares forward and it lands on a horizontally or vertically adjacent square with your pawn, you can capture that pawn immediately by moving your pawn 1 square forward diagonally. This move is called "en passant". If your pawn can reach the farthest row on your opponent's side, it will be "promoted" and transformed into a queen, a rook, a bishop or a knight of your choice. A rook can move and capture horizontally or vertically for any distance. A knight can move and capture by moving 2 squares horizontally and then 1 square vertically, or 2 squares vertically and then 1 square horizontally. It can leap over other pieces along its moving path and reach the destination. A bishop can move and capture diagonally for any distance. The queen can move and capture horizontally, vertically or diagonally for any distance. The king can move and capture 1 square in any direction. Once in every game, the king can perfo
Start recovering damaged archives of WinZip format on your own computer if something goes wrong and there are no other copies of input archive. This program is compatible with any version of WinZip software so you can get back the contents of compressed documents in a minute. ZIP Open File Tool is compatible with any version of MS Windows starting from Windows 98 and later moreover it is efficient on older computers.
Anti-virus, firewall and more for all-round proactive protection. Online and offline malware prevention and powerful web control tools deliver strong but light on resources PC security. Outpost is designed to make your Internet surfing as safe as possible without impacting system speed. Outpost includes SmartDecision technology to help facilitate decision-making in security issues by rating every executable file against a number of criteria and providing visual guidance as to the best way to proceed (allow or block) along with a corresponding window color - red, yellow or green. The 4th generation of SmartScan technology ensures faster subsequent scans (compared to SmartScan 3) by storing statistics and avoiding repeat scanning of previously verified and unchanged files. The antimalware engine delivers great detection accuracy by grouping similar virus implementations under a single signature; thus, even an increase in the number of signatures contributes to reduced performance impact. The anti-leak module offers the clipboard and screen content protection functionality to prevent data leaks and inadvertent information disclosure during "copy-paste" operations. In order to combat malware which spreads via USB storage devices by using the Windows auto-run vulnerability, Outpost includes specific USB virus protection that can completely block USB device or block all executable files and scripts on USB devices. Outpost's PDF scanning module is able to check non-standard and damaged files more effectively including PDF email attachments. Outpost Security will meet your needs with automatically-applied anti-malware and blacklist updates as well as real-world security policies from the ImproveNet user collaboration network.
This tool is an advanced local browser history search engine. Within a few seconds it will extract the chosen keywords of most web browsers (Google Chrome, Comodo Dragon, Internet Explorer, Opera Browser, RockMelt). The program will attempt to find the keyword(s) in the history title and search. If the keyword is present or suspected to be, it will be display in the resultslist with his URL and Title. The software also gives you the opportunity to edit the default keywords and of course add and/or modify your own keywords. Also available in console mode as Orion Browser Dumper.
Adblock IE is an adblock addon for Microsoft Internet Explorer. With Adblock IE, all advertisement will be removed automatically from the websites you browse, and it allows you to enjoy the web without annoying ads! Various settings allow you to customize the Adblock IE addon to your personal preferences. - Made for all current versions of Microsoft Internet Explorer - Blocks ads before they are downloaded: Surf the web faster and safer - Always up to date with automatic software and filter updates - Adblock IE is simple to use and does not require any special skills Simply the latest and fastest adblocker for Internet Explorer on the market. There is no other adblocker that is integrated better in Internet Explorer. Adblock IE is simple to use and does not require any special skills. Adblock IE is meant to be used by any user.
Orion Browser Dumper is a tiny program that will extract the total history of the Orion Browser into a single csv-file. Lunascape ORION is a simple, easy to use browser for Windows. Orion Browser Dumper will extract the information into a single csv-file. Unlike Browser Forensic Tool with Orion Browser Dumper, all histories are extracted and not only the url's and/or titles. It is faster and really usefull to analyse the output history later.
Trojan Remover is designed to automatically remove malware (trojans, worms, adware, spyware, etc.) from a PC when standard anti-virus software has either failed to detect the malware or is unable to effectively eliminate it. It can also detect and disable/remove malware hidden using rootkit techniques. The majority of Virus and Trojan scanners are well able to detect malicious files but are not very efficient in removing them if they have already been triggered. Trojan Remover can detect and remove malware without the user having to manually edit system files, including the Windows Registry, and all without using SAFE mode. New malware files are found daily. Many of the newer trojans, worms (and some Spyware) use rootkit techniques to hide their presence. This means that the files are not visible on the system. Trojan Remover uses specially designed routines to automatically detect files hidden in this way, and alerts the user of their presence. These files can be disabled and/or completely removed. Trojan Remover also removes the additional system modifications some malware programs carry out which are ignored by most other Virus and Trojan scanners. Trojan Remover records information to a logfile each time a new Scan is activated. This logfile contains detailed information on which system areas were checked, which programs/files are loaded at boot time and what (if any) actions were taken. The logfile is viewable from the Main Menu and can provide valuable system information.
Award winning anti-virus that just works High quality protection. For surfing, searching and social networking. * Award-winning protection that works quietly in the background * Game and surf without interruptions * Surf, download files and use social networks safely Brilliant protection for surfing, searching and social networking Anti-virus protection that automatically updates to protect you from continually evolving threats. As hackers develop new techniques, AVG’s research labs are constantly processing web data to provide new defenses to keep you automatically protected. Exceptional anti-virus protection Anti-Virus, Anti-Malware, Anti-Spyware Our Anti-Virus technology protects you from falling victim to (or unwittingly spreading) a virus, worm, or Trojan horse. The first layer of protection is traditional anti-virus, which keeps known threats out of your system by matching them to a database. AVG Anti-Spyware protects you from Spyware and Adware that can keep track of your personal information. AVG Resident Shield provides an additional layer of protection by examining files for threats as they are being copied opened or saved and prevents you opening infected files. AVG Protective Cloud Technology Emerging threats are identified “in the cloud” and prevented from infecting your computer via AVG’s automatic updates to your anti-virus software. AVG Community Protection Network Information about the latest threats is collected from customers who choose to participate, enabling us to constantly identify new threats, supporting everyone in the AVG community and helping us to provide superior anti-virus protection. Gaming and surfing without interruptions Get on with your surfing and gaming without interference. Scans operate when you are away from your PC, and it also knows when you are gaming and ensures that the security operates in the background only, leaving you free to play. AVG Smart Scanning Our intelligent and lightweight smart scanning technology operates in high-priority mode while you’re away from your PC and drops into low-priority mode when you move your mouse or strike a key. AVG Smart Scanning ignores files it has scanned in the past and already knows are safe, enabling vast improvements in scan times. Game Mode AVG’s Game Mode provides non-stop protection during non-stop action in multi-player games like Call of Duty without annoying lags and freezes caused by scheduled updates and scans. AVG safeguards your digital profile against teams of hackers who are crawling the web, specifically looking to steal your game rewards and sell them for real money. Auto-Fix AVG 2012 constantly monitors your protection level and reports back to our labs team if it detects a security risk. Next to the flagged alert message you will see an Auto-Fix button -- once click resolves the problem. The Auto-Fix button in AVG2012 will automatically correct errors and set itself back to the best protection mode. Safe downloads Files are checked before you download them without you having to do a thing. AVG Anti-Virus will also protect you when exchanging files through popular instant messaging like MSN and Yahoo. AVG Online Shield™ AVG Online Shield checks files before you download them and ensures online chat links are safe. It checks files against both AVG’s Scanning Engine and our own LinkScanner technology. Instant Messaging Protection also makes sure you are safe when exchanging files using ICQ, MSN and Yahoo! instant messenger.
The outSSIDer application was developed to be a small tool that scans for open WiFi networks and automatically tries to connect to them. Sound instructions let you close the laptop lid while walking down the streets hunting for WiFi. But outSSIDer is also useful at your usual hotspot places (home, work, etc) where you just start the program and lean back and wait for connection instead of clicking around manually. The connection is verified by trying to fetch www.google.com/favicon.ico to exclude payment hotspots and closed networks. The new Resume function resumes scanning if the connection is lost.
Card game for 3 or 4 players with 36 or 52-card deck. The 18th century ancestor of Hearts was called Reverse, because in this card game, you want to lose certain tricks rather than win them. This realization suggests variant of The Tarot of Marseilles, one of the standard patterns for the design of tarot cards, also widely known by the French designation Tarot de Marseille.
Low cost, high performance cross compilers for PICmicro microcontrollers from Microchip. We offer complete development solution that includes C, C++ and Basic compilers for PICmicro, IDE with project management tools, editor, code browser and built-in debugger and plugin system that emulates real world devices. Our products are aimed at both the professional user the hobbyist, especially those with a tight budget.
GOM Media Player The only media player you need - for FREE! Not only is GOM Media Player a completely FREE video player, with its built-in support for all the most popular video and Media Player formats, tons of advanced features, extreme customizability, and the Codec Finder service, GOM Media Player is sure to fulfill all of your playback needs. With millions of users in hundreds of countries, GOM Media Player is one of the world`s most popular video players. Whats New : Added "Touch Setting" feature for touch screen devices. Added "Search box" feature on playlist. (Ctrl+F) Supported "HTTPS URL" for youtube or net radio playback. (Ctrl+U) Added "Music Tap" on preferences related to play music files. Improved performance related to "speed of add & delete" of files on playlist. Other miscellaneous corrections, fixes, and changes
Iperius Backup is one of the best free backup software, also released in commercial editions for those who need advanced backup features for their companies. The freeware version of Iperius Backup allows you to backup to any mass storage device, such as NAS, external USB hard drives, RDX drives, and networked computers. It has comprehensive scheduling and e-mail sending functions. It supports zip compression with no size limit, incremental backup, network authentication and the execution of external scripts and programs.
Maryfi is a free and easy to use software router for Windows 7, 8 , and 8.1 computers. With Maryfi, users can wirelessly share any Internet connection such as: a cable modem, a cellular card, or even another Wi-Fi network. Other Wi-Fi enabled devices including laptops, smart phones, music players, and gaming systems can see and join your Maryfi hotspot just like any other Wi-Fi access point and are kept safe and secure by password-protected WPA2 Encryption.
