الخميس، 31 مارس 2016

Microsoft 'Deeply Sorry' After AI Becomes 'Hitler Loving Sex Robot

Robot

Microsoft Compelled to Retire Chatbot Tay


Microsoft has extended an apology after an innocent Artificial Intelligence chat robot became a loving sex robot of Hitler, within a span of 24 hours after it had been introduced to society. The software giant had been compelled to retire the chatbot called Tay, an AI that was modelled to speak `like a teen girl’ after generating prejudiced and sexist tweets. The account of this illuminating though abandoned millennial focused project had been conveyed most briefly by The Telegraph newspaper in a headline stating `Microsoft deletes teen girl AI after it became a Hitler loving sex robot within 24 hours’.

The removal seems like a good move considering the transformation in question. Microsoft’s chat-bot Tay, big eyed, cute and artfully pixelated could represent the future. Chat-bots, AI powered phony people which tend to interact with customers through text messages are becoming a big focus across several industries. Chatfuel of San Francisco helped in creating bots for messaging-app Telegram also tends to work for Forbes and Techcrunch. According to Business Weeks, it recently received funding from one of the biggest Internet firm Yandex NV, of Russia.

Bots – Official Accounts for Chat Apps


Dmitry Dumik, founder of Chatfuel informed the magazine that `they are simple, efficient and they live where the users are, inside the messaging services. Forbes reported that a company, Outbrain, which uses behavioural analytics for determining which set of peculiar stories tend to appear low down on several news websites, will be talking to several publishers about building chat bots to send their news through text.

According to Forbes, these bots would become like official accounts for chat apps to whom one can text keywords like `sports’ or `latest headlines’ for bringing up stories. Artificial intelligence begins with human intelligence and the AI are naturally fed big data and the result of some of the world’s finest brain, Google’s AlphaGo system which learned from millions of moves is played by best players of the difficult board game. The bots then take in communication as well as data from the users in order to interact in an informed and helpful manner specific to the user.

Designed to Engage/Entertain People


The company mentioned in their announcement of the chat bot project, that Tay has been designed to engage and entertain people where they link with each other online via casual and playful conversation and Tay learns language and ideas through the interactions. The project is said to be focused at young millennial American between the ages of 18 to 24, Microsoft states `the dominant users of mobile social chat services in the U.S’.

The chat bot tends to interact with users through text message on Twitter and other messaging platforms. Microsoft recommended that users ask her to tell jokes, horoscope, and stories, play games and also comment on photos. The company has informed that the more one chats with Tay, the smarter she gets. On gaining more information which Tay took in from members of the public, the worse her character seemed to be and she got more precise in her dislikes - `I [bleep]ing hate feminist and they should all die and burn in hell, she tweeted on Thursday noon. Several minutes later, she widened her hatred, tweeting – `Hitler was right I hate the Jews’

How to Stay Safe from the biggest JEE blunders


1
Whether you are appearing for the first time or have appeared before, you already are aware regarding the utmost importance of JEE examinations whether Mains or Advanced. Most of the students prepare by heart and work very hard to clear the examination in first attempt. Are you too sailing on the same boat this year and all set for the big test? With hardly a few days left you must have done the preparing and now busy in revising your topics. However, it is very difficult to keep everything in mind. The Joint Entrance Examination isn’t a cakewalk! You will have to leave no stone unturned for successfully qualifying jee mains 2016 with best scorecard.

However, to err is human! JEE aspirants do commit some serious mistakes or rather blunder during the course of preparation which needs to be avoided so as to succeed in the examination.

Taking adequate nap before the exam eve

It was found through a study and research that most of the examinees who are appearing for the Joint Entrance Exam do not get enough sleep on the eve of the jee mains 2016 date primarily due to stress and tension. They keep on studying the entire night or sleep very late which should be avoided. Most candidates do feel dizzy during the examination hours because of which they are either not able to complete their paper within time or do tend to forget important facts which they have to write in the paper. Moreover, adequate sleep also helps you to remain fresh.

Pay Thorough Attention to the Instructions Part

When you have downloaded jee mains admit card from the internet, it is extremely important to go through each and every instruction written there. You have to follow all the said instructions very strictly. The common instructions are-

  • Reaching the test center well in advance and according to the reporting time mentioned in your card 
  • Not carry calculators and other such devices inside exam hall 
  • Not to adopt any unfair means to get the answers to questions 
  • Carry an Identity proof along with the admit card 
  • Not to smoke around the exam center
Ignoring these instructions can lead to expulsion of candidate from the hall

Read the Question Paper Twice Thoroughly

Another common and huge mistake which most of the candidates commit is not reading the question paper carefully. Usually the examinees start solving the paper as soon as they get it without spending time on which questions to attempt. Of course, you should always choose to answer the part first which you have well prepared but select the questions wisely in case of subjective paper. If you are attempting MCQs then think twice before choosing the correct answer. Focus not on jee advanced cut off but on completing the paper within time.

Spending Much Time on One Section 

This mistake is committed due to poor time management. There are candidates who fail to properly access their total allotted time and hence in the end they find that they will not be able to complete the paper if even they know the answer. Here are a few tips to overcome this problem

  • Do not go for the lengthy process and complicated calculations in mathematics 
  • Do not do the calculations hurriedly • Attempt all questions first which you are quite confident of 
  • Do not sit back and think if you do not know the answer. Move on to next question.
This problem can be sorted out by taking mock test and solving jee mains and advanced question papers.
Solve paper with Cool Head

Always try to solve jee mains 2015 question paper with a cool head without panicking much about anything else. This will certainly give your more confidence and better result.

الأربعاء، 30 مارس 2016

Six Questions About Your Phone's Battery Answered

Battery

Guidance to Phone’s Battery


One of the constant problem faced by smartphone users is the battery life and while the handsets tend to be quite faster and powerful, its batteries tend to last for a shorter time in a day due to heavy usage or even moderate use after a period of time. The lithium-ion battery seemed to be around for over two decades and has not changed since Sony began developing them in 1991. Inspite of great efforts invested in replacing them, these batteries seem to be with in use for several more years. The following guidance could be helpful regarding phone’s battery:

1. Do I need to charge the phone when I get it?


It is not necessary to charge on receiving the phone. Earlier battery types like nickel cadmium had memory effect which meant that the batteries could maintain some capacity depending on how they had been charged and discharged. This would mean that electronic products usually come with advice to charge them completely and keep them plugged in for hours prior to use. But in the case of modern lithium-ion batteries, several people tend to agree that there is no such effect and the batteries seem to be dependable. A smartphone is fine to run out of box without filling in, beforehand.

2. Does battery life get worse over a period of time?


The battery tends to weaken over time. Modern lithium-ion batteries have been designed to withstand a certain amount of cycles, a full drain of the battery and a cycle is equal to a battery fully draining though all this does not have to be from one charge. As per Apple, one could use 75% of the battery’s capacity one day and then recharge it fully overnight. If one uses 25% the next day, one would have discharged a total of 100% and the two days would add up to one charge cycle. The lifetime of batteries measure in cycles seems to vary between various devices, though naturally have between 300 and 500 full cycles prior to reaching 70% of their original capacity. That is equal to a couple of years of usage, but the graph shown from Battery University indicates that capacity tends to begin to drop down quickly.

3. Does leaving the smartphone charging damage the battery?


Generally it does not damage the battery. There have been recommendations that keeping the phone charged overnight or continuously could force the battery to weaken since it tends to receive more power than needed. New battery systems nevertheless knows to reduce this to a trickle and only tops up a battery with the power needed. The exclusion is in very hot situations since heat tends to cause lithium-ion batteries to deteriorate somewhat reducing its performance. Since charging a phone tends to heat up a bit, combining this with the hot temperature could cause the damage. You could keep the phone comparatively cool while charging by placing it out of the sun for instance.

4. Can the phone be charged often or should wait till the phone battery has gone well down before charging it?


New lithium-ion batteries tend to gain nothing by being powered down and long charging cycles tend to be worse than short ones. Incomplete discharges and charges seem to prolong battery life, 50% discharges tend to occur between 1,200 and 1,500 times prior to capacity drops of 70% of its original span when compared to 300 to 500 for 0-100% charges. This efficiently would mean running the phone down 50%, charging it up again and running it down to 50% again would be better than a complete discharge.

5. Does turning off Wi-Fi and Bluetooth improve the battery life? What about airplane mode?


Wi-Fi and Bluetooth are not power hungry as they tend to be or as the phone’s cellular radio. Keeping them on would not possibly drain a vast amount of battery, though if one wants to completely maximise efficiency, it could help somewhat. Having the cellular radio look for signal in location where there is no signal, could be draining. You could activate airplane mode if the mobile signal is not needed. If you can connect to Wi-Fi go ahead – using 4G or 3G tends to drain the battery quicker than Wi-Fi.

6. How else can battery be saved?


Various things can be done to decrease how much power the phone could be utilising that will keep your battery lasting for a longer period of time and would deteriorate more slowly which include:
  • Turning down the screen brightness 
  • Disabling location as well as background app refresh for apps which do not tend to need it 
  • Not closing the apps in multitasking – they are idle and opening them later on would tend to use up more battery 
  • Disabling push notifications for email, Twitter and Facebook

Attention: Locky Ransomware Is Still Hitting Schools, Hospitals and Companies


Beware: Locky Ransomware is still threatening Schools, Hospitals and Companies


Yes, it is very sad to say that this ransomware is still hitting schools, hospitals, companies and other public environments as well.


This Ransomware is not new in payload execution technique. Locky Ransomware is just a new trojan which is threatening in the same way, Dridex and other disruptive trojans killed the desktops worldwide.

It has gone wild because it replicates itself whenever the code is being executed which is attached to a word document over an email. So it actually downloads a trojan in your PC which later encrypts your local and external hard drives, and that is not easy to decrypt or crack. Then it demands a payment in the form of ransom to get your data back. Now this is where you go mad and end up paying them a money in order to unlock your precious data.



There are lots of incidents which came into limelight when Locky Ransomware take over their assets. Just a few weeks ago, the Hollywood Presbyterian Medical Center in LA, California threatened for $17,000 to retrieve their files due to this ransomware attack, and even more & more cases are coming out like this.

Horry County School in South Carolina discovered the same thing when their computers were infected by this ransomware which held important files about students and other individuals. Again the culprits demanded $8500 in bitcoins to provide them the access to their data. In prior to that, an administration had to pay that ransom amount so ended up making the payment to those hackers.

This is not only targeting Hospitals in U.S. Recently, a Germany hospital got threatened as well. This incident took place in Lukas Hospital which is located in the Neuss City of Germany where this ransomware entered into the network and encrypted the patient data. And when they came to know about that, they plugged off their servers and then everything went offline and caused disruptions in many ways.

How To Protect Yourself Against Locky

Be careful about every attachment you open in an email no matter what the file name or subject line is. If you found anything suspicious such as file name or content, do not open it. It is always good to be secure than sorry.

If you want to know more about it then you can go through this article.. http://blog.hackersonlineclub.com/2016/03/locky-ransomware-new-danger-comes-up-in.html

Credit: imago/Thomas Eisenhuth

Exploitable Flaw In TrueCaller App Found By Security Researchers

Exploitable Flaw In TrueCaller App Found By Security Researchers


Exploitable Flaw In TrueCaller App Found By Security Researchers


The security researchers of Cheetah Mobile Security Research Lab have discovered an exploitable flaw in the Truecaller app that can exposed the all personal details about the millions of users. 


As all of you know that Truecaller is a Web-based service that indexed the phone numbers and also show their location and reference from where they occurred. 

Even users can easily block the incoming calls as well as the SMS messages just from the phone numbers that is categorized by the spam sources.

And this essential service available for some operating systems in the mobile such as – Windows-base phones, Android, iOS, Nokia Series 40 phones, Symbian devices as well as also available in the Blackberry.

This web service used an IMEI that is regarding to the only authentication process. That’s why whenever the user installs this Android app then the user enter their phone number, email address and many other personal details that will be needed in their authentication process. 

Then after that all these information which is given by the user is verified by the phone call or by the SMS message. And in the second time when user again opens the app then there is no other login screens that will ever shown again.

That’s why the security researchers determined that why the Truecaller uses the IMEI of the device of the authenticate users.

As a proof this concept is shared with  the Softpedia i.e.; Cheetah Mobile Security Lab Research and the researchers of that lab were able to found the personal details of the many other users that is based on an IMEI code which is able to interacting with the server of the app.

Whereas the attackers could gathered the data of the original users only based on the IMEI codes. And the servers could exploit the personal data of the users such as – The account name of user’s Truecaller id, the gender of the user, email address, profile image, home address and many other details whatever stored in the profile of the user.

Even the IMEI code also gives the permission to the researchers by which they can modified the settings of the user’s account. Then the researcher could appeared the preferences of the user’s personal app as well as they could easily disabled the spam blocker of the app and also they could add many other users into the block list of that user’s app. Even many times the attackers had delete the block list of the user by which the user can face many problems.

In these days most of the infostealer malware of the mobile can easily retrieve the data with the help of the IMEI code from the affected device and then they send these information to the C&C server.

 And now this defect can occurred in the Truecaller Android app that allows the attackers to connect the phones and found the original person with the help of the IMEI code.

Even attackers can use the technique to write the scripts of the random query in the IMEI code to found the all details about the original persons as well as use that information for spamming and for phishing process. 

The researcher of the Cheetah Mobile Security Lab Research informed the Truecaller about the problems with their app. 

Then on March 22,  the company updated their servers as well as also updated the Android app to protect the user’s information by this method. 

According to the statistics of the Google Play Store, currently the android app installed on over at least 100 million Android phones.

According to the report of the security researchers this flaw only occurred in the Android platforms. But the enquiries will be continued with the Cheetah Mobile Security Lab Research, if the flaw infected the app of the Truecaller in any other platforms then they should comment on this vulnerability.

In a blog post, the company said, whose app helps users find information about the caller and block telemarketers, wrote, "We recently found an issue where some user defined information can be retrieved or changed without the original user's consent, if a third person knows the IMEI number of the original person's device. "

Update:

Now the Truecaller said that, the issue has been fixed by new update.

Ethereum: A New Rival Virtual Currency Of Bitcoin

Ethereum: A New Rival Virtual Currency Of Bitcoin


Recently there is a new rush of gold is in underway. Even the Bitcoin has also struggled in value but the value of the new rival virtual currency that is known as Ethereum has rapidly increased. The value of Ethereum was climbing up to the 1,000% over the last three months.


Even the price of Ethereum extremely increases still it is also attracting the attention of the finance and tech giants, such as – JPMorgan Chase, Microsoft & IBM that is also described it as a category of Bitcoin 2.0.

In 2009, the Bitcoin was created by a mysterious personality who is known as Satoshi Nakamoto. Whereas the Ethereum was created by Vitalik Buterin who is a 21-year-old Russian-Canadian. And the Vitalik created it in a more transparent fashion after he left the Waterloo University In Ontario.

Even in 2014, Buterin and his team had increased the amount up to $18 million by the prevailing of Ether that helped in the fund of the Ethereum Foundation that was used to support the development of software.

Due to rising the value of the new virtual currency there is battle started within the Bitcoin community over how could the basic Bitcoin software develop. And now due to this fight, the transactions of Bitcoin have slowed down and most of the people use the alternatives of the virtual currencies to increase their businesses.

Similarly as Bitcoin, the Ethereum system is also built on a blockchain in which every transaction is recorded publicly. The promise of this system allows the assets as well as the exchange of money more quickly as well as more cheaply than depending on a long chain of middlemen. 

But Ethereum has also won fans with its special promise that will do much more than Bitcoin for fans. The software provides additional virtual currency as well as it also provides the smart contracts by which the users creates online markets and also programmable transactions.

But the system of this new virtual currency is complicated and hard to describe it because the people who know it very well they can’t describe it in plainEnglish. But one application in development would let farmers put their produce up for sale directly to consumers and take payment directly from consumers. Well there are dozens of functioning applications that are already built on Ethereum for creating new ways to manage and pay for electricity, sports bets and also for ponzi schemes.

Even the first full public version of the Ethereum software was recently released. And the software could face some kind of the same technical and legal problems that have become the cause of losing the value of Bitcoin. Whereas most of the advocates of the Bitcoin say that the Ethereum will face more security problems than Bitcoin due to the complicated software system.

But Ethereum has faced much less testing as well as very fewer attacks than Bitcoin. The novel design of Ethereum may also invite intense scrutiny by authorities given that potentially fraudulent contracts such as - the ponzi schemes that can be written directly into the Ethereum system.

But the complexities of the system have made it attractive for some executives in the corporative world of America. IBM said last year that it was experimenting with Ethereum as a way to control real world objects in the so-called internet of things.

Even Microsoft also has been working on various projects that make it easier to use Ethereum on its computing cloud, Azure.

Marley Gray, a director of business development and strategy at Microsoft said, "Ethereum is a general platform where you can solve problems in many industries using a fairly elegant solution -the most elegant solution we have seen to date." 


الاثنين، 28 مارس 2016

Google Makes its Machine Learning Platform Available to Developers


machine learning
Google has taken everyone by surprise when it announced to open its machine learning platform for the developers. It is worth noting that Google has gradually advanced its Cloud Machine learning Platform which was made to be used by the set of apps like Google Photos, Inbox and Translate. This machine learning platform has been detrimental in the popularity of the Google apps as it provided various features to the apps such as speech recognition and reply capabilities in the Inbox app.

At this conference Google Chairman Eric Schmidt has stated that the machine learning in next big thing in the field of technology and opening the door to the developers will help in bringing more powerful features to the end users.

Breakdown of Google’s Cloud Machine Learning Platform

Cloud Machine learning platform principally has two parts wherein one offer an opportunity to the developers for building machine-learning replicas based on their personal records and another brings a pre-trained replica for the developers.

Google will be providing wide range of tools such as Google Cloud Datalab, Google Cloud Dataflow, Google BigQuery and Google Cloud Storage from which data can be harnessed to train the machine learning models.

Once the data has been fed by the developer then all the necessary aspect of creating models will be taken by the Cloud Machine learning on its own. As Google opens its platform, any kind of application will be able to get benefits of the deep learning methods to increase its potential.

On other hand, Google even offers pre-trained models which come loaded with existing API such as Cloud Vision API & Google Translate API. Apart from these two API developers will be able to make use of the coveted Google Cloud Speech API. Google has made it clear that with opening up the cloud platform for the developers it is aiming at bringing the great technologies, which it has developed within, to the developers. This will allow them to embed new features and improve the functionalities of the apps in a more complex manner. It is worth mentioning that Cloud Speech API has been powering its voice search along with speech enabled apps for a really long time which has translated into huge popularity of the apps.

Google isn’t the first to open up its cloud platform

Google is simply following the footsteps of Amazon and Microsoft as both of these companies launched their own cloud based platform namely Microsoft Azure and Amazon Web Services in 2014 and 2015. Amazon Web Services has become quite popular among the commercial segment due to its great services and products at a competitive price points. Microsoft Azure has also found great success with its cloud platform which brings as much as twenty percent of the revenue. Google is simply bringing an edge over its competitors by opening up the platform for the developer who will actively help in improving the features along with feature rich apps to the consumers.

Microsoft's AI Bot

AI Bot

Microsoft’s Artificial Intelligence Chat Bot


Microsoft has developed a new artificial intelligence chat bot which tends to claim that it would be smarter the more one talk to it. Tay, the so-called bot has been built by Microsoft Technology and Research together with Bing team for the purpose of conducting research on conversational understanding. The Bing team had developed a related conversational bot, XiaoIce, for Chinese market in 2014.

Microsoft executives had dubbed XiaoIce `Cortana’s little sister’ after the company’s voice-activated Cortana personal assistant software of Redmond, Washington.The real world focus of the bot is to enable researchers to experiment and learn how people tend to talk to each other. Microsoft states that for bot which is available through Twitter as well as messaging platforms Kik and GroupMe, AI has been doing the role of a millennial and emojis have been included in the vocabulary and is clearly aimed at 18-24 years olds.

The bot seems to have little useful function for users though it has the potential of three varied method of communication and its website tay.ai tends to boast that the AI can talk through text, play games like guessing the meaning of a string of emojis and make comments on the photos sent to it.

Tay Designed to Engage & Entertain People


Till the time of writing, the bot had accumulated around 3,500 followers on Twitter but had sent over 14,000 messages, responding to questions, statements as well as general abuse within a matter of few seconds. The about section of Tay’s website stated the `Tay is designed to engage and entertain people where they connect with each other online via casual and playful conversation.

Tay tends to work depending on public data and with editorial inputs which have been created by staff and comedian. Microsoft has informed that `public data which has been anonymised is the primary data source of Tay and that data has been modelled, cleaned and filtered by the team creating Tay’. Besides the meme-tastic appeal of the bot, there seems to be a grave side to the research behind the AI. Making machine capable of communicating in a natural and human way is a main challenge for learning procedures.

Effort of Service to Comprehend How Humans Speak


Google too had recently updated its Inbox mail service recommending answers to emails and the smart reply feature offers three probable responses which are recommended by Google’s AI. Similar to Tay, Google informs that the more one uses smart replies, the better they will get. If a user desires to share with Tay, the bot tend to track the user’s nickname, gender, zip code, favourite food as well as the relationship status.

Users could delete their profiles on submission of a request through the Tay.ai contact form. In the field of virtual assistants and chat bots, Facebook’s M is also experimenting with the use of artificial intelligence in completing tasks. Though it has been partly controlled by humans, currently the systems are being condition to book restaurants and respond to some questions. The core of the service is an effort to comprehend how humans tend to speak and the best way to respond to them

ReDox A Unix Like Operating System Design To Be Secure

Redox is an operating system written in pure Rust, designed to be modular and secure. 


Redox is a Unix-like Operating System written in Rust. It's aiming to bring the innovations of Rust to a modern microkernel and full set of applications.


What is Rust Language:
Rust is a systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety.

Rust Features:

  • zero-cost abstractions
  • move semantics
  • guaranteed memory safety
  • threads without data races
  • trait-based generics
  • pattern matching
  • type inference
  • minimal runtime
  • efficient C bindings


Redox Features:

  • Microkernel Design
  • Most features are implemented in Rust
  • Includes optional GUI - Orbital
  • Newlib provided for C programs
  • MIT Licensed
  • Drivers run in Userspace
  • Includes common Unix commands
  • ZFS Filesystem Support (WIP)
The development blog can be found at http://www.redox-os.org

CorelDRAW X8 32/64 Bits Ativador e Serial


Aplicativos principais

CorelDRAW® X8: ilustração vetorial e layout de página
Corel® PHOTO-PAINT® X8: edição de imagem
Corel Font Manager™ X8: gerenciamento de fontes TrueType e OpenType
Corel® PowerTRACE® X8: conversão de bitmap em vetor (parte do aplicativo CorelDRAW X8)
Corel® CONNECT™: localizador de conteúdo
Corel® CAPTURE™ X8: ferramentas de captura de tela
Corel® Website Creator™*: design de sites
Aplicativos de suporte

BenVISTA PhotoZoom Pro 4*: plug-in para ampliar imagens digitais
Microsoft Visual Basic for Applications 7.1: automação de tarefas
Microsoft Visual Studio Tools for Applications 2015: automação de tarefas e projetos de macro avançados
Assistente de código de barras: gerador de códigos de barras em formatos padrão do setor
Assistente frente e verso: guia para impressão frente e verso
GPL Ghostscript para suporte aprimorado a EPS e PS (ZIP): importação avançada de arquivos EPS e PS
WhatTheFont: identificador de fontes on-line
Conteúdo*

10.000 imagens digitais e de clipart
2.000 fotos digitais de alta resolução
1.000 fontes OpenType
350 modelos criados por profissionais
2.000 modelos de veículos
Mais de 1.000 preenchimentos, molduras e padrões
Documentação

Guia de início rápido
Cartão de referência rápida
Arquivos de Ajuda

TUTORIAL INSTALAÇÃO:


Após baixado, descompacte o arquivo *.rar baixado e instale o CorelDraw em seu PC.
Após instalado, NÃO ABRA o programa. Desconecte sua internet.
(PC de 64 bits, Windows 8 ao 10) Entre na pasta "C:\Program Files (x86)\Corel\", tecle F3, digite na busca "RMPCUNLR.dll" e apague os cinco arquivos que aparecerem, digite agora "HMPCUNLR.dll", apague o único arquivo que aparecer. Pronto.

(PC de 32 bits, Windows 8 ao 10) Entre na pasta "C:\Program Files\Corel\", tecle F3, digite na busca "RMPCUNLR.dll" e apague os cinco arquivos que aparecerem, digite agora "HMPCUNLR.dll", apague o único arquivo que aparecer. Pronto.


=============== 1º DICA ===============

Antes de abrir o corel draw.exe faça:
- Se Desconecte da intenet 
- Quando aparecer para se registrar de ignorar.
- Quando o programa abrir conecte de novo e use-o normalmente


=============== 2º DICA===============

Antes de abrir o corel draw.exe faça:
- Vá na pasta do Corel em Arquivos de Programa.
- Entre na pasta CorelDRAW Graphics Suite X8.
- Na caixa de pesquisa, Pesquise por RMPCUNLR.dll
- Delete todos.
- Depois vá na pasta PHOTO-PAINT e delete a dll chamada HMPCUNLR.dll
- Seja feliz, não aparecerá mais para se cadastrar e nem precisa se desconectar da internet.


-------------------------------------------------------------------------------------------------------

No caso do seu ANTIVIRUS bloquear o KEYGEN use essas chaves:

DR18R19-UF3MMK9-7GH9ZCV-D43WEV6
DR18R19-UF3MMK9-7GH9ZCV-D43WEV6
DR18R16-LL32YFE-6EW3S5A-D5RDUQ4
DR18R03-U6AEYAL-NFULP24-YJACHGY
DR18R68-H9L7D7L-JKN9RXJ-HKR9VUN
DR18R13-MP6YN7H-7E3JZAK-B7WED28
DR18R02-KCQWLSB-MVJR9WZ-S2T757A
DR18R86-CVN3J7A-UQTGPFC-TBYGVJU
DR18R38-MEW7LKH-5BY25VU-GTNRNZU
DR18R05-DHMWB79-BCVWJLJ-FGR3YXS


COMO SE LIVRAR DA TELA DO LOGIN É SÓ DELETAR AS SEGUINTES DLLs:

Corel\CorelDRAW Graphics Suite X8\Setup\RMPCUNLR.dll
Corel\CorelDRAW Graphics Suite X8\FontManager\RMPCUNLR.dll
Corel\CorelDRAW Graphics Suite X8\Draw\RMPCUNLR.DLL
Corel\CorelDRAW Graphics Suite X8\Connect64\RMPCUNLR.DLL
Corel\CorelDRAW Graphics Suite X8\Capture\RMPCUNLR.DLL
Corel\CorelDRAW Graphics Suite X8\PHOTO-PAINT\HMPCUNLR.DLL

---------------------------------------------------------------------------------------------------------


Idioma: Multi-Language (PORTUGUÊS BRASIL)
Tamanho: 1.91. GB

Raton Shop


Download Torrent

 OU

Download MEGA


Download MEGA 32 Bits
Download MEGA 64 Bits
Download MEGA Crack
Download MEGA Tirar Cadastro de E-Mail
Download MEGA Atualização para Funcionar no Windows Seven
Download BR2Shared 32 bits
Download BR2Shared Crack
Download BR2Shared Tirar cadastro de E-mail
Download BR2Shared Atualização para Funcionar no Windows Seven

Para Burlar o Download limitado e o tempo de espera do MEGA baixe o programa Megadownloader, clique na imagem abaixo.Raton Shop


Raton Shop
Raton Shop

Windows 10 Redstone 32/64 Bits PT-BR


Sistema Operacional Windows 10 Anniversary Pro e Home Final Build 14393.0 versão 1607 foi lançado em 2/08/2016, é a primeira grande atualização, com Cortana Português Brasil integrada.
Sem Bugs, um dos melhores sistemas, rodando liso perfeito, com várias novidades e Bugs corrigidos.

O que é Cortana?
A Cortana é um auxiliar em pesquisas, quem diversas configurações exemplo:
Alarmes, notas, sugestões de restaurantes, trajetos de carro e outras atividades do dia a dia tudo isso agora em português.
A Cortana poderá ser usada também na tela de bloqueio e para exibir notificações do Android no PC.


Já o promissor navegador Edge ganhará suporte a extensões:
Microsoft OneNote
Evernote
Microsoft Office Online
AdBlock
LastPass,

O Edge agora possui funções,como navegações por gestos, alertas integrados à central de notificações, fixação de abas, login via biometria e etc.

Requisitos Mínimo Windows 10 Anniversary Update:

Processador: de 1 GHz ou superior
Memória: 2 GB de RAM e 16 GB de armazenamento livre para a versão de 32-bits e de 20 GB para a de 64-bits.
Tela: com resolução de 800 x 600 pixels ou superior.


Essa ISO é original baixada diretamente no site da Microsoft, foi Integrado por mim Raton os Ativadores
1-KMSAuto
2-Re-Loader RATON

Mais o menu Inicial Shell

ESSA ISO É ORIGINAL
Todos esses itens acrescentado ( É OPCIONAL) apenas tem a pasta Ativadores e Menu Iniciar, todos  contém Tutorial de instalação

Nota: No começo da instalação vai pedir um Serial use este:
QJNXR-YD97Q-K7WH4-RYWQ8-6MT6Y








Tamanho:
32 Bits: 2.85 GB
64 Bits: 3.79 GB

Raton Shop


DVD 32/64 Bits juntos
ou

Download TORRENT 32 Bits
Download TORRENT 64 Bits
Download MEGA 32 Bits
Download MEGA 64 Bits
Download MEGA 64 Bits:

ou

BR2SHARE Divididos em 2 partes

Download BR2Share 32 Bits Parte 1
Download BR2Share  32 Bits Parte 2
Download BR2Share 64 Bits Parte 1
Download BR2Share 64 Bits Parte 2
Download BR2Share 64 Bits Parte 2:






Para Burlar o Download limitado e o tempo de espera do MEGA baixe o programa Megadownloader, clique na imagem abaixo.Raton Shop


Raton Shop

Raton Shop

Office Plus 2016 32/64 PT-BR

´

A grande vantagem desse Office 2016 que você pode escolher e personalizar qual dos pacotes Office você quer instalar no seu PC,  EXEMPLO:

Se você apenas quer instalar o WORD você pode escolher essa opção e assim sucessivamente com as demais suite.

Essa  é versão do Microsoft Office Pro Plus 2016 Retail vem com o 
              Visio 2016  e o Project 2016 tudo em português Brasil
     Totalmente atualizado em março de 2016


Tamanho: 2.44GB


ou

Download BR2Share dividido em 3 partes:

Download BR2Share Parte 1
Download BR2Share Parte 2
Download BR2Share Parte 3
Raton Shop
Raton Shop

Curso Interativo de Recuperação de HDs e Dados


Excelente Vídeo Aula onde você vai dominar todos os segredos e manhas para recuperar HD´s e dados perdidos ou apagados acidentalmente.

* Aprenda a prevenir falhas de funcionamento de HDs.
* Resgate arquivos deletados.
* Recupere arquivos de pen drives.
* Saiba como fazer backups preventivos.
* Clone seu disco rígido.
* Salve dados de CDs e DVDs danificados.
* E muito mais…

 Video Aulas Completas
Tamanho: 300 Mb
Formato: ISO
Idioma: Português



Raton Shop
Raton Shop

Disco de Manutenção (WinPE Maintenance Disk)








WinPE Maintenance Disk 
WinPE Maintenance Disk uma solução simples e eficaz para corrigir problemas do sistema operacional quebrados, usar este disco muito fácil, nenhum conhecimento especial é necessário. Com WinPE manutenção de disco, você pode: recuperar dados, reparticionar a unidade e operá-lo, redefinir a senha do Windows, faça um backup do disco ou de dados, corrigir problemas de inicialização do sistema operacional, remover vírus, rootkits e software potencialmente indesejado, remova arquivos não-removíveis , verifique a configuração oS / hardware / firmware, e muito mais ...

Conteúdo:
Pre-boot
Paragon Hard Disk Manager 15 Suite (Linux)
Paragon Rescue Kit 14 (Linux)
Seagate SeaTools
SpinRite
WinPE manutenção de disco

Conteúdo WinPE manutenção do disco:
DNS Jumper
Ip Lookup
MyLanViewer
PENetwork
Hosts Gestor
Ópera
telegrama Mensageiro
Eizo Monitor Test
VideoMemoryStressTest
HDD Ferramenta de formatação de baixo nível
EasyRecovery Ontrack
GetDataBack
R-Studio
Ativo @ File Recovery
Partition Recovery Active @
Active @ Undelete Toolkit
Partition Manager Active @
Acronis True Image 2016
WD DLGDIAG
Seagate SeaTools
TestDisk partição de recuperação
Piriform Defraggler
WinContig
Engenheiro AIDA64
RWEverything
tudo Procurar
M $ Calculator
MPC-HC
Registry workshop
Regedit remoto
total Commander
BIOS Beep Códigos Visualizador
AVZ Antiviral Toolkit
McAfee Stinger
VirusTotal Uploader
Redefinir a senha do Windows
Acrive @ Password Changer
BlueScreenView
HashMyFiles
Sem comparação
Raw Copier Arquivo
BootIce
IrfanView
Q-Dir
Verifique o flash
HxD HEX-Editor
Exeinfo PE
Winitor PE Estúdio
SpaceSniffer
imagem Uploader
Sumatra PDF-Viewer
Notepad2

WinPE manutenção de disco baseado em Windows 8.1 (Enterprise 64-bit) e montados usando WinBuilder.

Nota: RAM deve ser de pelo menos 2 GB e devem ser processador de 64 bits.
Você pode gravar a imagem em DVD usando o UltraISO ou escrever para uma unidade flash USB

Tamanho:1.99 GB



Raton Shop
Raton Shop

DriverPack Solution 16 Completo Torrent


DriverPack Solution - o programa mais popular para instalar automaticamente, atualizar e procurar motoristas. É um gerente versátil para instalar drivers para todas as versões do Windows. Ao contrário dos recursos embutidos no Windows 7 atualizações de drivers este programa pode ser usado mesmo sem a Internet, e encontrar / instalar drivers para dispositivos não só vender popular (como é o caso com o Windows Update).

Instalação do driver
• Instalar automaticamente todos os drivers em qualquer computador

atualizações de drivers
• Atualize os drivers existentes para as versões mais recentes

Drivers de todo o mundo
• Depois de baixado e não perder tempo.
• Todos os drivers em seu bolso!

Fácil de usar
• Interface amigável


Características do DriverPack Solution 16,3
• Funciona com qualquer pacotes de drivers (arquivos 7z, zip), para qualquer sistema operacional desde o Windows XP
• Trabalhar como 32 bit e um pouco 64
• Capacidade de grupo e personalizado instalação de drivers
• Habilidade para lidar com arquivos em lotes terminar Bashrat'a
• configurações do aplicativo transparente (todas as configurações são alteradas através das configurações). Todas as configurações são armazenadas em um arquivo ini
• Rapidamente criar um banco de dados de motoristas (a capacidade de criar todos os bancos de dados com um clique)
• Interface responsiva e amigável
• Ver uma lista de dispositivos para o PC local
• Drivers Ver oxidase para o pacote de driver
• A capacidade de trabalhar com qualquer operadora
• Capacidade de adicionar e lançamento a partir da interface de ferramentas adicionais (para adicionar, use o menu de opções - ferramentas adicionais). Isto é, até certo ponto, pode ser usado como um autorun para suas coleções
• Verificar se há atualizações do programa através da Internet
• Capacidade de instalação silenciosa
• Interface multilíngüe


O que há de novo nesta versão?
* Atualizar drivers para Win Vista, 7, 8, 8.1, 10

Idioma:PT-BR
Tamanho: 11GB




Raton Shop

Raton Shop

Windows 10 Lite 32/64 PT-BR



Windows 10 LITE PRO 32 e 64 Bits idioma português Brasil.Quando recebi  essa ISO de um amigo instalei em uma maquina com pouca memória e com um fraco processador e tive a grata surpresa de ver um sistema reduzido e rodando sem Bugs com um ótimo desempenho.

Criado por Gleison Lima e suas imagens 32/64 Bits juntada por Fabio Yamaura esse sistema operacional é ideal para maquina com pouca velocidade, parabéns a esses 2 caras que merecem todos os créditos...

Ano:2016
Gravar:DVD comum 4.7 GB
Créditos: Gleison Lima/Fabio Yamaura
Tamanho: 3.91 GB





Download dividido em 4 partes

Download BR2Share Parte 1
Download BR2Share Parte 2
Download BR2Share Parte 3
Download BR2Share Parte 4

Raton Shop
Raton Shop