17 октября 1906 г. в г. Гжатске Смоленской области родился Андрей Николаевич Тихонов - лауреат Ленинской премии, был деканом факультета ВМиК МГУ, работал в области автоматизация программирования и математического обеспечение ЭВМ.
17 октября 1985 г. компания Intel начала производство процессора Intel 386DX с частотой 16 МГц, содержавшего 275 тыс. транзисторов.
Avi2Dvd Утилита для перекодирования различных видеоданных в DVD
Disc Library Программа-каталогизатор дисковых данных (на CD, DVD, жестких
IDwhois Программа для получения регистрационной информации о
Folder Pilot С помощью этой программы можно легко и быстро перемещаться
Описание: When you are working on your computer performing the day to day activity like surfing the Internet, paying your bills online and logging into the websites with passwords, your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures you downloaded, all the pages and text you see, are being recorded by the system. It is done so when you log in to the web site later, you don't have to type a whole name and you don't have to complete forms and enter passwords again. In many cases it is done for your ease of use, but the problem with that is you compromise on your security when you use all these features. If somebody were to look at your PC, which happens quite often. For example your wife wanted to use it for something, or your kids would need to play with it. Or if your computer is at work, your coworkers or your boss would have access to it. Most of the sources of information that may represent your sensitive information are stored on your computer unprotected, and can be recovered by people with some minimal knowlege of computers. It can even affect you when you least suspect it. If you, for example, let your kids download some stuff from the internet. They may download a virus or a malicious program or pictures or other offensive content without you even knowing anything about it or suspecting anything like that has happened. They can also use your computer to make purchases on the Internet (remember, your credit card an all the details are stored there and you will be left to bare the consequences of all their actions. To solve this problem, you need to clean up all the unwanted garbage that is cluttering your computer to get rid of the unwanted evidence that may be used against you one day. You need Evidence Destructor to do the job for you. This program will let you remove all the unwanted evidence from your computer and continue getting rid of it on a scheduled basis as the clutter starts
1st Disk Drive Protector 1.55 - 1st Disk Drive Protector - protect your PC from abusive use of removable media with 1st Disk Drive Protector. This software will easily help you enforce whether your users are allowed to use removable media or access your local drives. You can not only hi
Advanced Drive Protector - Password-protect, hide and lock your local, network, Floppy, CD/DVD and USB drives; disable AutoRun; ensure security and privacy. The program itself can be protected with a password and can not be uninstalled under a regular user account.
Windows 2000: синдром отсутствия дискеты - Проблема:==Проблема: многие приложения пытаются при запуске обратиться к floppy дисководу, некоторые из них выкидывают диалог Abort, Retry, Ignore c сообщением "There is
Drive Snapshot 1.40 - a disk image backup and restoration tool for Windows - It is inevitable that at some point your operating system will develop problems, become corrupted or lose files. The thousands of computer viruses are only one threat that may eventually cause this, and no anti-virus software is guaranteed to stop any and every virus that may come along. It is therefore vital that you