Wednesday, May 30, 2007

VirtualLab Data Recovery

VirtualLab Data Recovery Software is like six data recovery programs in one! While other programs just recover deleted files or camera cards, VirtualLab recovers everything from deleted files, corrupted or formatted drives, CD & DVD-ROM Disks, RAID, flash drives, thumb drives, camera cards, USB/Firewire drives, Outlook & Thunderbird E-mail and even Mac Volumes. VirtualLab will even make a sector-by-sector disk image of a failing hard drive so a recovery can be performed safely. Supports many file systems in one application including FAT 12/16/32, NTFS, NTFS5 (VISTA), NSF, Mac HFS/HFS+, Ext2FS.

Version 5.5.15 includes new file type scan and minor interface enhancements.

Download VirtualLab Data Recovery

Registry Mechanic™ 6.0 for Windows

With Registry Mechanic you can safely clean, repair and optimize the Windows® registry with a few simple mouse clicks! Problems with the Windows® registry are a common cause of Windows® crashes, slow performance and error messages. By using a registry cleaner regularly and fixing registry errors your system should not only be more stable but it will also help improve your system performance without expensive hardware upgrades. Learn more about the importance of a clean registry with our registry insight.

Registry Mechanic uses a high-performance detection algorithm to quickly identify missing and invalid references in your Windows® registry. These problems can occur for many reasons including being left-behind after the un-installation or incorrect removal of software, by missing or corrupt hardware drivers, or orphaned startup programs.

With a few easy steps Registry Mechanic will scan your entire registry for any invalid entries and provides a list of the registry errors found, you can then choose to selectively clean each item or automatically repair them all. For your convenience and protection Registry Mechanic can also make a backup of any repairs made so that you can easily recover any changes if required.

the best register cleaner with 5 star CNET download rating

download register mechanic

Tuesday, May 22, 2007

Inside Bill Gates House - Pictures of Bill Gates Home


Picture Gallery of Bill Gates house - Virtual tour of Bill Gates house in Media overlooking Lake Washington. Bill Gates Family resides in this home.

Take a virtual tour of the Bill Gates Mansion where he stays with his family. Watch the beautiful neighbourhood of Bill Gates house.

The Bill Gates family lives in the exclusive suburb of Medina, Washington, in a huge earth-sheltered home in the side of a hill overlooking Lake Washington.

Billionaire Bill Gates home is a very modern 21st century house in the "Pacific lodge" style, with advanced electronic systems everywhere. In one respect though it is more like an 18th or 19th century mansion: it has a large private library with a domed reading room. While it does have a classic flavour, the home has many unique qualities.

Lights would automatically come on when you came home. Speakers would be hidden beneath the wallpaper to allow music to follow you from room to room. Portable touch pads would control everything from the TV sets to the temperature and the lights, which would brighten or dim to fit the occasion or to match the outdoor light.

Visitors to Bill Gates House are surveyed and given a microchip upon entrance. This small chip sends signals throughout the house, and a given room's temperature and other conditions will change according to preset user preferences. According to King County public records, as of 2002, the total assessed value of the property (land and house) is $113 million, and the annual property tax is just over $1 million.

According to the National Association of Home Builders, the median American house size is slightly more than 2,000 square feet. Microsoft founder William Gates III house is more than 30 times that size.

Bill Gates Mansion satellite view from Google Maps

Bill Gates House Aerial view from MSN Virtual Earth

There has been lot of speculation that the home of Bill Gates on Lake Washington was designed on a Macintosh. Pictures of the Gates' complex are both private and copyrighted, so in order to see what this place really looks like you need to go to BCJ's website. Following the "residential menu" click on the forward arrow key at the bottom of the pictures to advance to the house entitled, "Guest House and Garage, Medina, Washington".

USNews.com provides an interactive tour of Bill Gates home that covers the Pool building, Exercise facilites, Library, Theater, Formal dining room. Microsoft's own Seattle Sidewalk site has a birds-eye view of the project under construction. (Medina Washington project)

It took seven years to build the 40,000-square-foot Bill Gates mansion on a wooded five-acre compound in the moneyed Seattle suburb of Medina. [Bill Gates House Address: 1835 73rd Ave NE, Medina, WA 98039 map - arial photo] Much of the Bill Gates house is built underground into the hill, so the house looks smaller than it actually is. Unfortunately the hidden section underground did not escape the taxman's view; Bill paid over a million dollars last year on property taxes.

Earlier, Bill Gates organized a private party at his waterfront mansion. The U.S. Department of Homeland Security announced a "temporary security zone" around Gates' Lake Washington home which locked down all of Lake Washington south of the Highway 520 bridge and stayed in effect for two days. Gates' homestead is approximately 48,000 square feet with a garage that reportedly accommodates 30 cars.

The architects who designed Bill Gates' famous residential compound in Washington were James Cutler Architects and the architectural firm Bohlin Cywinski Jackson (BCJ).

Inside Bill Gates' Garage, you'll find a 1999 Porsche 911 Convertible and 1988 Porsche 959 Coupe. Steven Ballmer drives a 1998 Lincoln Continental. In fact, due to the 959’s questionable emissions and unknown crash ratings, it took a federal law signed by President Clinton for Bill Gates to legally drive his 959 on American roads.

Read this interview with James Cutler, FAIA, the best-known architect of Northwest Style and the designer of the Bill and Melinda Gates residence on Lake Washington near Seattle. Firm: Anderson Cutler Architects (formerly James Cutler Architects), on Bainbridge Island, off the Seattle coast.

Sunday, May 20, 2007

IT Spending Shifts Away From Security

Over the next year IT managers will focus their spending on infrastructure rather than security, risk management, and compliance.
Denise Dubie, Network World

IT executives in the next 12 months will be focusing their budget dollars on projects such as server consolidation and network upgrades, as previously high priorities such as security, risk management and compliance fall off their Top 10 lists.

Goldman Sachs this week released its most recent survey of 100 IT managers, and it shows that while budgets remain flat and spending moderately steady, the technologies IT buyers are investing in most heavily have changed. For instance, IT initiatives such as server consolidation and server virtualization jumped from the middle of the pack to the first and third spots, respectively. More than 40 percent of respondents listed consolidation as a high priority for the next year, and just under 40 percent said virtualization is more directly on their radar. The financial services firm predicted the shift when server unit sales stalled last year.

"The big move upward coincides with an increasing number of comments from CIOs about the deployment of virtualization in production and test environments and the recent dislocation between industry-standard server unit and revenue growth," the report reads. But that doesn't mean all equipment makers will see a loss. "We expect blade growth to remain strong relative to stand-alone or rack-mounted servers, highlighted by HP's c-Class offerings, which grew by 45 percent in the January quarter," the firm says, adding that HP beat out its primary competitor IBM in that market.

Another significant advance could mean more money for Cisco. Both VOIP and network upgrades landed in IT decision-makers' Top 10 lists, with more than 30 percent planning to invest in voice and another third indicating a LAN or network upgrade would be on the road map in the next 12 months. According to the firm, for every US$1 spent on VOIP gear another $3 is spent on network upgrade equipment, which can be seen as nothing but good news for the network gear vendors -- in particular Cisco.

"Increasing VOIP demand would have positive pull-through effects for Cisco's enterprise network infrastructure business, particularly switching, as well as Cisco's VOIP equipment business," the report reads. "We expect to see significant market share shifts away from Nortel and Avaya to Cisco."

Investments in PC hardware could be driven by a growing trend toward laptop adoption, Goldman Sachs says, but the firm does not credit the release of Microsoft's Vista as the driving factor for about 25 percent of respondents indicating an upgrade in client machines as a top priority. And for software, survey respondents indicated ERP and business intelligence would remain high priorities going forward. ERP landed in the No. 2 position, with more than 40 percent planning projects with it, and more than 35 percent said they were looking into business intelligence software -- positive signs for software makers SAP and Oracle, which recently spent $3.3 billion to acquire Hyperion Solutions.

On the downward slide were security, practically a constant in the top three priorities in recent years, and compliance and risk management, which also fell out of the Top 10 lists probably due to previous work done to get ahead of regulations. Goldman Sachs attributes the slide to mature products and confident buyers.

"A slippage in security may indicate some increased comfort with security issues in the enterprise," the firm writes. "It could also be partially a result of few high-profile security breaches or highly disruptive malware incidents in recent memory."

Saturday, May 19, 2007

Camfrog Video Chat 3.92

Camfrog Video Chat allows you to join real streaming video chat rooms where you can hear, see, and chat with many people at a time. Instant message a user to get to know them before you Webcam chat, and add them to your contact list. This videoconferencing software also works behind most firewalls and routers. Camfrog Video Chat allows multi-user videoconferencing where you can join a room with up to 1000 users and just click a user name to begin seeing someone. Press the 'talk' button to talk to the entire room with audio. The video chat rooms are hosted by broadband users who are running the Camfrog Video Chat Room Server software so any user can set up their own multi-user videoconference for other users to join. No Webcam is required to see people, but some rooms might not allow users without Webcams. Camfrog Video Chat is optimized for broadband users so it has fast video.

Version 3.92 includes multimedia and IM messaging enhancements.

Download Camfrog Video Chat

Saturday, May 12, 2007

Folder Lock v5.7.3

Folder Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from networked PCs, cable users and hackers. Files can also be protected on USB Flash Drives, Memory Sticks, CD-RW, floppies and notebooks. Protection works even if files are taken from one PC to another on a removable disk, without the need to install any software. It locks files in Windows, DOS and even Safe Modes. Additional Options include Stealth Mode, Hacker Attempt Monitoring, Shred files, AutoLock, Auto Shutdown PC, Lock your PC, Erase PC tracks, 256-bit Blowfish Encryption and Context Menu in Explorer. It is Windows Vista/2003/XP/2000/NT/Me/98/98S compatible and works on all kinds of disk types like FAT16, FAT32, NTFS. Folder Lock is the most downloaded file-security program in the market today.

Download Folder Lock v5.7.3

Ringtone Media Studio 2.20


Make your own ringtones from your own CDs and MP3s. Ringtone Media Studio gives you the tools to personalize your cell phone with your own creations. Ringtones, wallpaper and mobile videos. Transfer digital

Make your own ringtones from your own CDs and MP3s. Ringtone Media Studio gives you the tools to personalize your cell phone with your own creations. Ringtones, wallpaper and mobile videos. Transfer digital media to your phone instantly…in a single click. No cables requred!

Thursday, May 10, 2007

Paris Hilton Logs On for Forgiveness

Paris Hilton has posted a blog on her MySpace page that urges visitors to sign an online petition that asks authorities for leniency.Zoe Mutter, PC Advisor.

Paris Hilton has used her MySpace site to post a blog urging visitors to sign an online petition that asks authorities for leniency regarding her drink driving conviction.

The petition, which was set up by a Hilton supporter, calls on California governor Arnold Schwarzenegger to terminate her jail sentence.

Hilton was charged in Los Angeles with driving under the influence and sentenced to 45 days in Century Regional Detention Facility in California beginning on 5 June.

The petition claims Hilton provides "beauty and excitement to our otherwise mundane lives."

"We do not support drunk driving or DUI charges. Paris should have been sober. But she shouldn't go to jail, either," the petition continues.

Those who have signed the petition also claim that the sentence is unfair and was given to put the dangers of drink driving into the public eye. The petition has received almost 12,000 signatures so far.

In addition to the petition, Hilton's lawyers said that they will appeal the decision. The online petition is yet to be reviewed by the governor's office.

Read our blog entry about the other petition on this subject: Jail Paris Hilton.

Wednesday, May 9, 2007

Free Rapidshare Premium Accounts

Dont Change password
Login ;............. Password:
17877 ................4868118
18549............... 4646182
42283 ...............9315398
36275 ................8018801
45202 ...............4377824
49964 ................714426

Internet Encyclopedia to List all 1.8 Million Species

The free Encyclopedia would focus initially on animals, plants, and fungi with microbes to follow.

From apples to zebras, all 1.8 million known plant and animal species will be listed in an Internet-based "Encyclopedia of Life" under a $100 million project, scientists said on Tuesday.

The 10-year scheme, launched with initial grants of $12.5 million from two U.S.-based foundations, could aid everyone from children with biology homework to governments planning how to protect endangered species.

"The Encyclopedia of Life plans to create an entry for every named species," James Edwards, executive director of the project which is backed by many leading research institutions, told Reuters. "At the moment that's 1.8 million."

The free Encyclopedia would focus mainly on animals, plants and fungi with microbes to follow, blending text, photographs, maps and videos in a common format for each. Expansion of the Internet in recent years made the multi-media project possible.

Demonstration pages at http://www.eol.org include entries about polar bears, rice, death cap mushrooms and a "yeti crab" with hairy claws recently found in the South Pacific.

"This is about giving access to information to everyone," Jesse Ausubel, chairman of the project who works at the Rockefeller University in New York City, told Reuters.

The Encyclopedia would draw on existing databases such as for mammals, fishes, birds, amphibians and plants. English would be used at the start with translations to other languages.

Edwards said the project would give an overview of life on earth via what he termed a "macroscope" -- the opposite of a microscope through which scientists usually peer.

Species would be added as they were identified. Edwards said there might be 8-10 million on earth, adding that estimates ranged from 5-100 million. Fossil species may also be added.

The encyclopedia, to be run by a team of about 25-35 people, could help chart threats to species from pollution, habitat destruction and global warming.

The project would be led by the U.S. Field Museum, Harvard University, Marine Biological Laboratory, Missouri Botanical Garden, Smithsonian Institution, and Biodiversity Heritage Library -- a group that includes London's Natural History Museum, the New York Botanical Garden, and the Royal Botanic Garden in Kew, England.

Initial funding comes from a $10 million grant from the John D. and Catherine T. MacArthur Foundation and $2.5 million from the Alfred P. Sloan Foundation.

Extra funds would be raised in coming years.

Ausubel noted that 2007 was the 300th anniversary of the birth of Sweden's Carl Linnaeus, influential in working out ways to classify species. "If he were alive today we think he'd be jumping up and down celebrating," he said.

Copyright 2007 Reuters

Wednesday, May 2, 2007

Download Accelerator Plus 8.5

Download Accelerator Plus (DAP)--the popular download manager with over 136 million users. DAP leverages patented technology, easy management of downloads and rich features including: multi connections, download security feature by ZoneAlarm, auto-recovery, privacy tools, faster downloads from fastest sources, preview of files as you download; broadband optimization; tabbed downloading. Availabe in 10 languages.

Version 8.5 may include unspecified updates, enhancements, or bug fixes.

Download DAP 8.5

Tuesday, May 1, 2007

Internet Business Promoter

Internet Business Promoter (IBP) is a multi-award winning website promotion software tool that helps you to get the best results with your site:

* Get top 10 rankings on Google, Yahoo, MSN Search and others.
* Get more website visitors and increase your revenue.
* Outperform your competition.

Everything you need for successful website promotion

IBP offers everything you need to successfully promote your website. IBP is a proven suite of professional web promotion tools that helps you with all aspects of website promotion and search engine optimization. you can download Internet Business Promoter 9.0.

Corsair Debuts Uber Tough Flash Drives


The new Corsair Flash Survivor USB drives are described as being water-resistant, CNC-milled aluminum encased, and shock-proof and come in 4GB and 8GB configurations.

Corsair, a maker of computer accessories, today unveiled what they are calling the world's toughest USB flash drive. The new Flash Survivor line, available now in 8GB and 4GB memory configurations, is priced at around $130 and $60 respectively.

The Corsair Flash Survivor drives are described by Corsair as being "water-resistant, CNC-milled aluminum encased, and shock-proof." The drives have a waterproof seal which offers water resistant up to 650 feet. They are crafted from aluminum found in aircraft part production, rubber molded collar shielding and an outer metal tube for triple protection. They also reportedly deliver read/write performance up to 34MB/sec and 28MB/sec respectively.

The Flash Survivor family of USB drives is also pre-loaded with a security application that allows users to create a hidden, password-protected partition on the drive. The password is encrypted with 256-bit AES encryption.

“Corsair has built the Flash Survivor family specifically for customers with a ‘Bring It On!’ attitude – for someone who doesn’t want to worry if his/her equipment can stand up to the active lifestyle they lead,” said Jack Peterson, VP of Marketing at Corsair, in a statement. “Storing your valuable information on a USB flash drive capable of weathering the storm of everyday life while ensuring your data is safe – that is what Flash Survivor is all about."

Contest Winner: Vista More Secure than Mac OS

The security researcher who took home $10,000 in a highly-publicized MacBook Pro hijack, has been at the center of a week's worth of controversy.
Gregg Keizer, Computerworld

Dino Dai Zovi, the New York-based security researcher who took home US$10,000 in a highly-publicized MacBook Pro hijack on April 20, has been at the center of a week's worth of controversy about the security of Apple Inc.'s operating system. In an e-mail interview with ComputerWorld, Dai Zovi talked about how finding vulnerabilities is like fishing, the chances that someone else will stumble on the still-unpatched bug, and what operating system -- Windows Vista or Mac OS X -- is the sturdiest when it comes to security.

Friday, the vulnerability was first identified as within Safari, but by Monday, QuickTime was tagged. Why the confusion? I knew exactly where the vulnerability was when I wrote the exploit; that is part of the basic vulnerability research usually required to write a reliable exploit. I intentionally did not reveal where exactly the vulnerability was in order to prevent others from reverse engineering the vulnerability from those details. Initially, I was only revealing that the vulnerability affected Safari on Mac OS X, the target of the contest. However, now ZDI [3com TippingPoint's Zero Day Initiative] has been willing to publicly reveal that it affects many more system configurations, including all Java-enabled browsers on Mac OS X and Windows if QuickTime is installed.

As you were working with the vulnerability and exploit, did you know that it would impact non-Mac OS X systems? I had suspected that it might affect other platforms running QuickTime, but I did not have time to look into it.

You found the vulnerability and crafted an exploit within 9 or 10 hours. And you've said 'there was blood in the water.' Does that mean you had a head start -- in other words, prior research -- or was it all built from scratch? Is it really that easy to dig up a vulnerability? I had found other vulnerabilities in Mac OS X and even QuickTime in the past, so I had some familiarity with the code, but I only discovered this vulnerability that night. My quote that there was "blood in the water" referred to the fact that there were reports of other vulnerabilities in QuickTime, and even Java-related vulnerabilities in QuickTime over the last few years. In my experience, if a certain software package has had vulnerabilities in the past, it is more likely to contain other undiscovered vulnerabilities.

Halvar Flake and Dave Aitel, two prominent security researchers, use the fishing metaphor to explain vulnerability finding. Some days you go out and catch nothing, some days you catch something great. Sometimes you hear about some great fishing happening in a stream somewhere and there are lots of fish to catch until everyone else starts fishing there and the stream becomes overfished. In this case, I suspected that there would be good fishing in QuickTime and I got lucky and found something good in a short amount of time. This is far from the first time that I've gone fishing for vulnerabilities, however.

After the positive ID of the vulnerability, there were some unconfirmed claims that your exploit had been snatched at CanSecWest. Although those reports have been discounted, what can you tell us about how you protect your findings? And what are the chances that someone will independently dig out the vulnerability based on the limited information made public? I do everything that I consider reasonable to protect my security research. I keep exploits in encrypted disk images that are only mounted when necessary on hardened systems that are not always powered on. I am very conservative in what details I share and with whom in order to tightly control knowledge of the vulnerabilities. I often give my exploits non-obvious code names so that I can refer to them over non-encrypted channels without revealing anything about them. [But] with the details that have been released so far, I believe that is a very real possibility that someone may be able to independently dig out the vulnerability, but it won't exactly be trivial and I hope that whoever does acts responsibly with it.

With the ongoing 'Mac OS X is safe' vs. 'You're in denial' debate, what would you recommend to a Mac user as reasonable security precautions? I recommend that Mac users make their primary user a non-admin account, use a separate keychain for important passwords, and store sensitive documents in a separate encrypted disk image. I think these are fairly straightforward steps that many users can take to better protect their sensitive information on their computer.

As a researcher who works often in Mac OS X, what's your take on the amount of information that Apple releases when it patches vulnerabilities? I think that the amount of information that Apple releases with its patches is sufficient in the level of detail for a knowledgeable user to determine the criticality of the vulnerabilities. They do not, however, provide guidance on the level of criticality of the security update for less technical users. I do not think this is too much of an issue, though, as I believe that the vast majority of users should simply patch the security vulnerabilities as soon as possible regardless of their criticality.

How important in this case was it that 3com TippingPoint stepped up with a $10,000 prize? Would you have bothered if the prize money had not been there? For me the challenge, especially with the time constraint, was the real draw. I also hoped that the live demonstration of a Mac OS X exploit would provide some much needed hard evidence in the recent Mac security debates.

From your research on both platforms, is there a winner between Mac OS X 10.4 and Vista on security? I have found the code quality, at least in terms of security, to be much better overall in Vista than Mac OS X 10.4. It is obvious from observing affected components in security patches that Microsoft's Security Development Lifecycle (SDL) has resulted in fewer vulnerabilities in newly-written code. I hope that more software vendors follow their lead in developing proactive software security development methodologies.

What are you spending most of your time on these days? Last October, for instance, there were news stories that mentioned you showed a VM rootkit to developers at Microsoft. I recently co-authored a book, The Art of Software Security Testing: Identifying Software Security Flaws, which was just published by Addison-Wesley Professional in December. Also since around that time, I have been managing information security for a financial firm in New York City. I do still spend some of my free time researching software vulnerabilities, VM hypervisor rootkits, and 802.11 wireless client security.

The Best Vista Notebooks

The new version of Windows can be a challenge for some notebooks to run. Our tests will point you to the laptops with the power to handle Vista. Carla Thornton; testing by Thomas Luong

Right now could be a great time to splurge on a laptop, given that many come with Microsoft's Windows Vista operating system to sweeten the deal. But is the new OS reason enough to jump now, or should you hang on to your trusty Windows XP laptop for a while longer?

To find out, we rounded up 15 Vista-equipped laptops from Acer, Asus, Dell, Fujitsu, Gateway, HP, Lenovo, Micro Express, and Toshiba, in two categories: desktop-replacement models powerful enough to serve as your Primary PC, and ultraportables weighing less than 5 pounds. We tested speed and battery life and carefully evaluated screens, keyboards, and other vital features.

The best five notebooks in each category and awarded Best Buys:
1. HP Pavilion dv9000t
2. Dell XPS M1210
3. Micro Express NP5760
4. Acer Aspire 9810-6829
5. Toshiba Satellite P105-S6217

Rapidshare, YouSendit, MegaUpload - Free File Hosting Services Compared

Rapidshare is a name synonymous with free file uploading on the internet. If a file is too large to send as an email attachment, just upload it to rapidshare and email the file link to the recipient. Rapidshare also provides a delete link so that you can remove the file from Rapidshare servers once the recipient has download the file to his own computer.

When you download a file from Rapidshare, you will notice a download counter or a waiting limit. This is only for free rapidshare accounts and if you can spare a few Euros and buy a Rapidshare premium account, the download counter is removed. Plus you get unlimited downloads otherwise there's a restriction on the data that you transfer during a certain period.

Rapidshare will delete files that have not been accessed for 30 days or longer. Rapidshare premium account supports download managers and provide much faster downloads. There are very rare moments when Rapidshare provide free accounts for a week rapidshare.de/cgi-bin/freeaccount.cgi but it is next to impossible to get hold of them as the limit is exhaused very soon.

If you are a heavy user, the best bet would be to buy a Rapidshare Premium Account using either the credit card or PayPal. And other than Rapidshare, the other two popular file sharing services are:

Megaupload - No registration is required. File Size Limit: 250 MB. Your uploaded files will be deleted only after it become unused for 30 days. So, if many of your friends download it, over and over again, the files will always be there. The Megaupload site allows only one download at a time from a IP address. Fixed number of slots are provides based on your country.

YouSendIt - YouSendIt lets you send files up to 1GB. YouSendIt can send files securely (https) and scans files for viruses.When you send a file via the YouSendIt Web site, an e-mail goes to your recipient with a link to your file, which is stored securely on YouSendIt's server. The file will stay there for seven days or until it is downloaded 25 times, whichever comes first. You only have to enter a To email address; you are not required to enter a From address. You can also enter an optional message. No registration is required. Recommended large file hosting service.

Rapidshare doesn't have file search engine though you can use Google to search the rapidshare file URL. Here are some examples:

Search Videos on rapidshare.de avi|mpg|mpeg|wmv|rmvb site:rapidshare.de
Search Audio MP3 files on Rapidshare: mp3|ogg|wma site:rapidshare.de
Search archives or programs on Rapidshare zip|rar|exe site:rapidshare.de
Search pdf files, documents, ebooks, magazines: pdf|doc|lit|rar|zip site:rapidshare.de

Related Reading: Rapidshare.de is now Rapidshare.com, Files Upload.com - Rapidshare Clone with FTP support and no download limit. Resumes broken downloads