Software Updates & Downloads
Discover more software you'll love!
Search or browse to find programs, get recommendations, or
find out what people with similar interests are using.
See something you like? Click to download it, or save it in a Pack!
Note: As of May 13, 2013 these pages are no longer being updated with new versions.
Before you continue, run a free scan for out of date software.
Outdated software can contain vulnerabilities that put
  your system at risk!
Driver Update Directory
-
TitleVendor/Packer
-
-
Gmail Notifier
Download...
-
-
Many DJ controllers on the market come with a special edition of VirtualDJ, brought to you for free, so that you can start playing with your new console right away. However, if you plan to use this product professionally, you should consider upgrading to the full professional version.
Download...
-
-
avast! 4 Home Edition is a free complete ICSA certified antivirus software for home noncommercial use. avast! obtained VB100% awards in 2002/3 Virus Bulletin comparative reviews under Windows XP Pro and under Windows 2000 Advanced Server.
Download...
-
-
TuneUp Utilities Version 2010. Enjoy Your PC: fast, stable, customized. Have more fun--with your computer without all the hassles thanks to your new PC assistant. Work faster and get a better gaming experience. Now compatible with Windows 7.
Everything new right from the start: from 1-Click Maintenance to Turbo Mode — our Power Tools simplify your Windows optimization.
Download...
-
-
Internet TV Utility.
Download...
-
-
IsoBuster can rescue lost files from a bad or trashed CD or DVD or a Blu Ray disc (e.g. BD or HD DVD). Save important documents, precious pictures or video from the family, your only system backup, etc.
Download...
-
-
* Immersive experiences with Flash video, content and applications with full-screen mode. * Low-bandwidth, high-quality video with advanced compression technology. * High-fidelity text using the advanced text rendering engine. * Real-time dynamic effects with filters for Blur, DropShadow, Glow, Bevel, Gradient Glow, Gradient Bevel, Displacement Map, Convolution, and Color Matrix. * Innovative media compositions with 8-bit video alpha channels. * Blend modes, radial gradient, and stroke enhancements.
Download...
-
-
IS Scan Plus Application
Download...
-
-
Full system backup - Backs up everything on a hard drive or partition.
File and folder backup - Choose only the specific files and folders you want to back up rather than saving an entire drive. Great for archiving old files.
Efficient backups - Makes incremental backups to your system to maximize space and save time - no restart required.
File backup search - Browser-based interface allows you to quickly find archived files.
Multiple Storage options - Backs up to almost any media, including CDR/RW and DVD+-R/RW drives, USB and FireWire (IEEE 1394) devices, network drives, and Iomega Zip and Jaz drives.
NEW! Google Desktop integration - Searchable backup indexes makes recovering your data even faster.
NEW! Remote management
- Control other Norton Ghost 12 installations on your network.
NEW! LightsOut Restore - Restore your system with on-disk software recovery environment - no bootable CD required.
NEW! Create a Virtual Disk - Converts recovery points to a VMWare Virtual Disk (.vmdk) or a Microsoft Virtual Disk (.vhd).
Supported File Systems:
FAT16,FAT16X,FAT32,FAT32X,NTFS
Dynamic Disks
Linux EXT2/3 and Linux Swap Partitions ghost 8.2 you can free download Norton Ghost 14.0 now.
Download...
-
-
BitThief is an ongoing project of the Distributed Computing Group at ETH Zurich.
The project deals with incentive problems in peer-to-peer filesharing systems. The lack of incentives to upload potentially results in a total collapse of the network, implying that it is essential for a completely decentralized system to incorporate protocols that ensure a fair sharing of resources. We developed a BitTorrent client that free rides on BitTorrent, that is, it downloads from BitTorrent swarms without contributing any resources itself which illustrated that the BitTorrent protocol currently fails to prevent uncooperative behavior as it does not provide any countermeasures against free riding clients.
We argue that the BitTorrent protocol has to be modified in order to effectively prevent selfishness. Our proof-of-concept client BitThief is a byproduct of our HotNets-V paper "Free Riding in BitTorrent is Cheap". Note that, as it is a scientific project, we require measurements of the performance of our exploits. For that purpose, the client occasionally transmits data to our webserver. The transmitted data merely contains information about the time required to download files of any size. In particular, only a hash of the info hash is transmitted, which means that it is not feasible to determine what has actually been downloaded which is not of our concern. However, we advice all testers not to download any copyrighted material.
Download...
-
-
A Google approach to email.
Gmail is built on the idea that email can be more intuitive, efficient, and useful. And maybe even fun. After all, Gmail has:
Less spam
Keep unwanted messages out of your inbox with Google's innovative technology.
Mobile access
Read Gmail on your mobile phone by pointing your phone's web browser to http://gmail.com/app.
Lots of space
Over 7402.436756 megabytes (and counting) of free storage.
Download...
-
-
Punto Switcher is designed to help Windows users who forget to switch languages—it automatically changes messed-ups to correct words.
Download...
-
-
PC World's Editorial Review of F-Secure Blacklight Rootkit Eliminator
One of the more esoteric but dangerous pieces of malware that might infect you is a rootkit. This software uses tricky techniques to shield itself from many anti-spyware, anti-malware, and anti-virus programs. A rootkit hides deep in your system, and allows someone to take complete control of your PC without your knowledge. Rootkits typically are spread online in a variety of ways, such as riding along on another download.
Some anti-virus tools, such as Avast, claim to detect and kill rootkits. Many don't. But even if you are using an anti-virus tool that claims to detect them, you can't be too safe. So you'd do well to download, install, and use F-Secure Blacklight Rootkit Eliminator, a freebie designed to do one thing, and one thing alone: detect and kill rootkits.
The program looks inside your PC's folders, files, and hidden processes, looking for signs that you've been infected with a rootkit. It then tells you whether your system is rootkit-free, or possibly infected. It lists every possible sign of infection. Double-click on every one of them, and you'll be shown more information, such as a description, the company that made it, the file location, and so on. You can then use Blacklight Rootkit Eliminator to get rid of the threat, by renaming the file and giving it a .ren extension so that it can't do any further damage. However, before taking that step, it's a good idea to search for the file name on Google and make sure that the file truly is a rootkit, and not a legitimate file. If your PC continues to function well after you've renamed the file, you can eventually delete the renamed files.
Note that if you're not experienced, you might want to stay away from this program. Renaming and deleting files could possibly wreak havoc on a PC, so if you're not comfortable renaming, restoring, and deleting files--and troubleshooting PCs--you may be courting danger.
--Preston Gralla - http://www.pcworld.com/downloads/file/fid,72632/description.html
Download...
-
-
Comodo's free Firewall is your first layer of defense against viruses, worms, Trojans, hackers and all Internet threats. Comodo's Firewall uses Default Deny Protection to prevent threats from occurring, rather than just detecting them when it's already too late. Whenever an unknown piece of software is introduced to your system, Comodo Firewall cross-references it with a white-list of over 15 million trusted files and applications. If the file asking for access is on the list, Comodo Firewall can be sure it's safe for your computer to allow it to execute. If not, Comodo Firewall will alert you that a possibly malicious file is trying to enter your PC. The latest version sees a major leap forward in security and usability with the addition of cloud based scanning and behavior analysis of unrecognized files - making Comodo Firewall unbeatable at detecting zero-day attacks. Under default settings, unknown and untrusted files are automatically scanned by our cloud-based virus scanners then, while the file undergoes behavior analysis on our cloud server, it is run in a virtual environment (sandbox) on your local machine so that it cannot modify or affect data on your 'real' system. This ground-breaking method of protecting your PC means that only trusted applications are allowed to run. Malware and untrusted files get nowhere near anything important AND you get to use your computer without interruption from nagging alerts. The software also boasts a powerful packet filtering firewall that helps you securely connect to the internet while blocking hackers from making incoming connections. It's easy to use and features an attractive interface that lets even beginners change settings to their liking. Comodo Firewall comes with automatic updates and is winner of the prestigious Editor's Choice award from PCMag.com.
Download...
-
-
SlimBrowser is a multiple-site browser based on tab-page interface. It incorporates a large collection of wonderful features like recoverable popup killer, skinned window frame, form filler, site group, quick-search, auto login, hidden sites, built-in commands and scripting, online translation, script error suppression, blacklist / whitelist filtering. It brings you convenient and comfortable browsing.Main Features:
- Multiple site browser based on tab-page interface.
- Seamless integration of the power of Windows Explorer and Internet Explorer.
- Access both remote and local resource (http, https, ftp, local files) in a uniform interface.
- Fully automatic web form filler
- Convenient access to major search engines
- Enabling Web form autocompletion based on IntelliForm
- Open and save a collection of sites as a group
- Ability to register as default browser
Download...
-
-
IZArc is the ultimate freeware archive utility supporting many archive formats like: 7-ZIP, A, ACE, ARC, ARJ, B64, BH, BIN, BZ2, BZA, C2D, CAB, CDI, CPIO, DEB, ENC, GCA, GZ, GZA, HA, IMG, ISO, JAR, LHA, LIB, LZH, MDF, MBF, MIM, NRG, PAK, PDI, PK3, RAR, RPM, TAR, TAZ, TBZ, TGZ, TZ, UUE, WAR, XXE, YZ1, Z, ZIP, ZOO. With a modern easy-to-use interface, IZArc provides support for most compressed and encoded files, as well as access to many powerful features and tools. It allows you to drag and drop files from and to Windows Explorer, create and extract archives directly in Windows Explorer, create multiple archives spanning disks, creating self-extracting archives, repair damaged zip archives, converting from one archive type to another, view and write comments and many more. IZArc has also build-in multilanguage support.
Download...
-
-
From Wikipedia: A BitTorrent client is a program that manages torrent downloads and uploads using the BitTorrent protocol.
The first client, known as BitTorrent, was created by Bram Cohen, in October 2002. Cohen created the client based on what he refers to as the Golden Rule: the faster a user uploads, the faster he or she can download.[1]
Many subsequent clients have been at least partially based on it. Not all clients were originally built for BitTorrent, having added support for the protocol later on. There have been attempts to package malware as BitTorrent clients, probably due to the availability of many legitimate clients and users willingness to try new ones.
Download...
-
-
ATI Multimedia Center
Download...
-
-
Of course I only compare here the unlocking features. Process Explorer and Take Control are very good programs featuring much more things than just unlocking folders. The goal of this list is not really to pretend Unlocker is better but instead to provide a list of all other alternative programs in case you have some difficulties with Unlocker.
Download...
-
-
NetPumper
Download...
![]() |