VZ Enhanced 56K is a caller ID notifier that can block phone calls through the use of a 56K modem. It can block incoming calls based on individual phone numbers, ranges of phone numbers, and even caller ID names.
Incoming calls will appear in the Call Log and will be displayed in a specific color depending on any action that was taken against them. Normal calls will appear with black text, and ignored calls will appear with red text.
When you have an incoming call, you can right click the entry in the Call Log and choose to ignore the incoming call. If you ignore the call, then you will be disconnected from the caller and your phone will stop ringing.
Of course you don't have to manually do any of this. VZ Enhanced 56K has two supplementary lists that can automate the process of ignoring incoming calls. This is a great way to fight back against annoying telemarketers. Select the Ignore Lists tab from the main window to access these features. Right click a list to add an entry. The ignore phone number list will prompt you for a phone number to automatically ignore whenever that number calls. You can ignore an incoming phone number based on the caller ID name as well. Select the ignore caller ID name list to add entries. Caller ID names can be ignored using regular expressions.
If you would like to ignore a range of phone numbers (up to 15 digits), you can specify a wildcard value '*' in replace of a digit. For example, suppose you want to ignore a 10-digit phone number with an area code of 555. In the ignore text box you would type the following: 555******* This represents a range from (555) 000-0000 to (555) 999-9999. In total, 10 million numbers will be blocked by using this example. Pretty cool, huh?
Now here's something even cooler. The following four entries will block all invalid 10-digit US phone numbers. These particular phone numbers are guaranteed to be fake and can be outright ignored without consequence.
These four entries will block 3.6 billion potential telemarketers.
The Allow Lists work similarly to the Ignore Lists, but they allow calls to come through. The Allow Lists have precedence over the Ignore Lists. Knowing this, you can turn the program into a whitelist blocker instead of a blacklist blocker.
It should be noted that the phone number lists have precedence over the caller ID name lists.
VZ Enhanced 56K has various options to configure the behavior of the program. The options can be accessed from Tools > Options... The first tab that appears is the General tab. In it you can choose to display the System Tray icon which will generally appear on the lower right corner of the taskbar (next to the clock). The program can be set to minimum to the System Tray instead of to the taskbar and close to the System Tray instead of exiting the program. The Silent startup option causes the program to be hidden in the System Tray when it's loaded. This way you don't have to hide or minimize the program while it logs in. Always on top will cause all the program's windows to appear on top of every other program's windows. Enable Call Log history will save the entries in the Call Log so that they can be loaded the next time the program starts. If left unchecked, then any Call Log history will be lost. Finally, the Log events to Message Log will log various events such as connection attempts and list modifications to the Message Log. You can access the Message Log by clicking the View > Message Log menu.
The Modem tab handles modem related settings. If a modem is found on the system, it'll be listed in the Default modem dropdown list. If the modem supports voice communication, then you'll be able to select Play recording when call is answered. To allow the program to load recording files, create a folder called recordings in the same directory as VZ_Enhanced_56K.exe. Recordings should be 8 bit or 16 bit .wav files with a frequency of 8000 Hz. The recording can be repeated up to 10 times, although you should keep the total length (including repeats) to 30 seconds or less. Finally, the Drop answered calls settings will drop the answered call after the selected amount of seconds. It is recommended to keep this set to 4 or more seconds so that the call has time to drop properly after it's been answered.
The Popup tab will allow you to Enable popup windows and configure their appearance. You can change the popup's width, height, position, transparency, how long it's displayed for, whether it has a border, displays a contact picture, and if it should have a ringtone played. To allow the program to load ringtone files, create a folder called ringtones in the same directory as VZ_Enhanced_56K.exe, and copy to it any .wav, .mp3, or .mid audio file. Per-contact ringtones can be set when adding or editing contacts in the Contact List. The other popup options allow you to change the order of the text that's displayed, their font attributes and the popup window's background color. You can preview the popup by clicking the Preview Popup button.
HTTP Downloader is a download manager for the HTTP(S) protocol. Maximize your download throughput by utilizing high performance input/output completion ports (IOCP). HTTP Downloader can open thousands of connections at a time and consumes very little system resources.
HTTP Downloader is a high-performance, multi-part download manager. You can Start, Pause, Stop, and Queue up to 100 downloads at a time. Each download can be split into 100 parts. That's 10,000 connections!
Drag and drop links into the program's main window or, select File > Add URL(s)... to bring up the Add URL(s) window. From here you can select the download location to save the files. The Advanced button allows you to configure the number of parts to split each download, the SSL / TSL version to use for HTTPS connections, authentication information (basic or digest), and any necessary cookies, headers, and POST data. Clicking the Download button will begin the download(s).
HTTP Downloader has various options to configure the behavior of the program. The options can be accessed from Tools > Options... The first tab that appears is the General tab. In it you can choose to display the System Tray icon which will generally appear on the lower right corner of the taskbar (next to the clock). The program can be set to minimum to the System Tray instead of to the taskbar and close to the System Tray instead of exiting the program. Always on top will cause all the program's windows to appear on top of every other program's windows. Enable download history will save the entries in the main window so that they can be loaded the next time the program starts. If left unchecked, then any download history will be lost. Enable quick file allocation will quickly preallocate a file on the disk by not overwriting the file location with zeros. Windows, by default, will write zeros to a preallocated file as a security measure. This can be bypassed with Administrator access. Allow[ing] one instance of the program to run will prevent other copies of the program from interfering with the currently running copy. You can enable a URL drop window to quickly drag and drop URLs into instead of the main window. It'll remain visible on top of other windows unless you either right click it and deselect Always on Top, or use your mouse to middle click the window. Drag and dropped URLs can also be set to download immediately without bring up the Add URL(s) window. The Default download directory sets the location in the Add URL(s) window. Finally, the Thread pool count is the number of threads the program will use to manage all the connections that it makes.
The Connection tab lets you set how many downloads can be done at a time, how many parts to split each download, and how many times to retry failed and timed out downloads. You can also enable a web server to allow remote connections to add URLs to download. The browser extensions require that the web server be enabled in order to communicate with the program. The web server can ask for a username and password to authenticate a remote connection. It supports either Basic or Digest authentication. By checking Enable SSL / TLS you can load your security certificate files and choose the appropriate SSL / TLS version to allow for HTTPS connections. The security certificate files can be in the form of either a PKCS #12 file, or a public and private key pair. If the PKCS #12 file has a password associated with it, then you'll want to enter the password in the password text box. Creating a security certificate is somewhat involved, but there are plenty of guides online. Do a Google search for "Create a self-signed certificate with OpenSSL" and it should explain things better than I could.
The Proxy tab lets you connect to both HTTP and HTTPS proxies. You can also set any authentication information (basic or digest) that the proxies require.
The main window shows a listing of downloads and a status bar. You can enable or disable the status bar as well as a toolbar from the View menu. You can change the units of measurement (bytes, kilobytes, etc.) for the status bar by clicking on the status bar panels. The same can be done with the Downloaded, File Size, and Download Speed columns by holding Ctrl and clicking on their respective column headers. The first measurement state is set to auto adjust when the number increases. The other four states will display only bytes, kilobytes, megabytes, and gigabytes respectively. Each column can be dragged into a new position and if you'd like to show or hide any, then right click on any of the column headers to bring up their menu.
The following is a list of command-line switches:
The browser extensions above will allow your browser (Firefox or Chrome) to send HTTP Downloader URLs to download. You will need to enable the web server in the HTTP Downloader Connection options. The server address and port in the extension's options need to match those in the program's options. You can choose to have the extension download HTTP(S) URLs instead of the browser by selecting Override browser's download manager in the extension's options. Right clicking on a link, web page, or media file will allow you to access the HTTP Downloader context menu and various download options.
HTTP Proxy is an HTTP(S) proxy that can relay HTTP(S) traffic. See all the traffic that goes through your web browsers or any other HTTP(S) based program. Uses high performance input/output completion ports (IOCP) to handle multiple connections.
HTTP Proxy is a command-line executable.
The command-line prompts should be fairly easy to follow. If you saved a configuration file, you can load it to bypass all the configuration settings. Otherwise, you can save a configuration file after setting your preferred settings.
If you choose to Enable SSL / TLS, then the security certificate files that you select must be in the form of either a PKCS #12 file, or a public and private key pair. If the PKCS #12 file has a password associated with it, then you'll want to enter its password. Creating a security certificate is somewhat involved, but there are plenty of guides online. Do a Google search for "Create a self-signed certificate with OpenSSL" and it should explain things better than I could.
Here's a list of supported commands:
MD5 Bruteforcer is a CUDA based MD5 bruteforcer. Brute force millions of MD5 hash values per second with optimized MD5 algorithms.
MD5 Bruteforcer is a command-line executable and requires a CUDA based graphics card with a Streaming Multiprocessor version of 13 (sm_13).
The command-line prompts should be fairly easy to follow. Supply the program with an MD5 hash value, the presumed length of the hash's input, a character set to use when generating inputs, whether or not to randomize the character set, and GPU temperature constraints.
Monitor Off will turn off the computer's monitor. A simple system tray program that lets you turn the monitor off with a mouse click or keyboard shortcut.
Monitor Off resides in the System Tray and you can turn the monitor off by middle clicking (pressing the mouse wheel) its icon, or by pressing Ctrl + Shift + F4.
Google Authenticator generates one-time passwords for Google accounts.
Google Authenticator stores its username and key list in an 256-bit AES encrypted file. A key file will be generated and used to encrypt and decrypt the list file. Do not lose it! You will need 2-Step Verification enabled on your Google account and the base32 key that they generate for you to use with their Google Authenticator app.
Add, edit, and remove items from the list using the keyboard commands listed in the program. Copy the one-time password using Ctrl + C. You can scroll the list using the up and down arrow keys. If you'd like to load a list and its key file directly from the command-line, then include their paths after the executable name: Google_Authenticator.exe list.db list.key
Filter out domains that appear in the Google Search results. This is a WebExtension for the Firefox web browser.
Google Search Results Filter will display a Hide or Show link next to the domain name of a search result. The domain name of a filtered search results will appear red. If any of the search results get filtered, then a Show Filtered Results link will appear at the bottom of the page. A full list of active filters can be found in the extension's options.
Thumbcache Viewer - Extract thumbnail images from the thumbcache_*.db and iconcache_*.db database files found on Windows Vista, Windows 7, Windows 8, Windows 8.1, and Windows 10.
Thumbs Viewer - Extract thumbnail images from the Thumbs.db, ehthumbs.db, ehthumbs_vista.db, Image.db, Video.db, TVThumb.db, and musicThumbs.db database files found on various Windows operating systems.
VZ Enhanced - A caller ID notifier that can forward and block phone calls. It is a lightweight, feature-rich version of Time Warner Cable's VoiceZone™ Connect.