عشر اداوت مجانية رائعة لمستحدمي الويندوز

المقال الاصلي بالانجليزية

10. Speccy

download here

clip_image002يمكنك من خلال هذا البرنامج التعرف علي مكونات الجهاز لديك بالتفصيل مثل الشركة المصنعة لكل قطعة في الجهاز و درجة حرارة الجهاز و غيرها من المعلومات الهامة حول الجهاز.  البرنامج متوفي بثلاث اصدرات نسخة مجانية و نسخة مدفوعة و نسخة portable  محمولة يمكن استخدامها دون تثبيتها علي الجهاز.

 

 

9. Ultimate Windows Tweaker

download here

 clip_image004

يمكنك من خلال هذا البرنامج التحكم في خصائص كافة مكونات برنامج النوافذ مثل شريط المهام وشاشة التوقف وشاشة الاغلاق. يعد هذا البرنامج أكثر البرامج تفصيلا في مجال التحكم في خيارات النوافذ. يمكنك كذلك الاحتفاظ بنسخة احتياطية من الاعدادات الخاصة بك قبل بدء التعديل فيها.

تحذير: استخدام هذا البرنامج دون خبرة قد يؤدي لمشاكل في النظام لذا يرجي الاحتفاظ بنسخة من الاعدادات والتحكم فقط في الاعدادات المفهومة بالنسبة لك.

 


 

 

8. Stress MyPC

download

Click to see larger images

 

يقوم هذا البرنامج باختبار سرعة استجابة المعالج للتطبيقات المختلفة من خلال فحص مشاكل زيادة سرعة الساعة OVERCLOCK وهو مفيد في حل الشك في وجود مشكلة في المعالج. يتوفر البرنامج بنسخة مجانية و اخري محمولة.

كذلك يمكنك فحص البطارية الخاصة بالجهاز المحمول و قدرة كارت الشاشة

 

تحذير: استخدام هذا البرنامج دون خبرة قد يؤدي لمشاكل في النظام

 

7. MalwareBytes, VirusTotal, AdwCleaner , and security essentialsclip_image008

 

تعتبر البرامج الثلاثة الاولي افضل برامج كشف فيروسات و برامج خبيثة مجانية موجودة، نقطة القصور الوحيدة انها لا تعمل باستمرار مثل برامج مقاومة الفيروسات حيث يجب عليك تشغيلها في كل مرة تريد فحص النظام ضد أي مخاطر.

Malware bytes كثر من رائع و يقوم بعمل فحص كامل او مخصص بناء علي اختيارك.

VirusTotal تقوم بفحص ملف محدد باستخدام قاعدة بيانات اكثر من برنامج مقاومة فيروسات

Adwcleaner هي الأداة الأفضل للتخلص من شرائط الأدوات و النوافذ و الإعلانات التي تقوم بعض البرامج بتحميلها علس جهازك

البرنامج الرابع هو security essentials هو برنامج مقاومة فيروسات كامل و مجاني من مايكرسوفت.

6. Magical Jelly Bean KeyFinder

 

clip_image010اذا كنت تريد إعادة تثبيت برنامج و فقدت رمز التفعيل ، يقوم هذا البرنامج بالبحث في الجهاز عن المفتاح المستخدم لتفعيل البرنامج وعرضه في صورة نص مكتوب حتي تتمكن من كتابته مرة اخري و عادة تثبيت البرنامج.

5. Process Explorer and outrun for windows

للتحميل اضغط هنا

 

clip_image012من اقوي وافضل الأدوات الموجودة علي موقع sysinternals من مايكرسوفت و بقليل من الخبرة يمكنك التحكم في كل العمليات التي تتم في جهازك و مراقبة التطبيقات و معرفة ما هي التطبيقات التي لها صلاحيات خاصة.

مثلا اذا كنت تقلق من وجود برنامج لديه صلاحية استخدام الكاميرا الخاصة بك يمكن التأكد من ذلك من خلال Process Explorer او اذا كان برنامج ما يبدا مع بداية التشغيل و لا تجدة في winconfig يمكنك باستخدام autorun ايقافة تمام.

تحذير: استخدام هذه البرامج بدون حذر قد يؤدي لعطل في نظام التشغيل

 

4. UNetbootin and YUMI

 

clip_image014

كثير من الأدوات تمكنك من تحويل ISO إلي Bootable USB مثل Windows7USBtool و Rufus , linuxlive ولكن يمتاز برنامج UNetbootin بانه يدعم كافة أنظمة التشغيل تقريبا و كل أنظمة حماية البيانات. ويمتاز YUMI بانه يمكنك من نسخ اكثر من أسطوانة علي فلاشة واحدة بحيث يمنك الاختيار في كل مرة النسخة التي تريد البداية بها.

4

clip_image016

3. Wireless Network Watcher

توفر هذه الأداة رؤية سريعة لكل الأجهزة المتصلة بالشبكة لديك مع عنوان IP الخاص بالجهاز و كذلك ال MAC  و بخلاف اسمها فهي تدعم الشبكات السلكية واللاسلكية.


 

 

 

2. WinDirStatP

 

clip_image018توفر هذه الأداة رؤية تفصيلية عن مساحات كافة المجلدات لديك و يمكنك من خلالها مراقبة المساحات المختلفة و بها خاصية تشبه الي حد ما خاصية تنظيف القرص من الملفات غير المرغوبة.

 

 

1. Sandboxie

clip_image020

أداة متقدمة توفر بيئة عمل منفصلة عن نظام التشغيل للتطبيقات ، تستخدم اذا كنت ترغب في تشغيل برنامج وغير واثق في مصدره.

 

Can We Apply The Rule Of Law In Cyberspace?

 

William Gibson coined the term "cyberspace" in his short story "Burning Chrome" (1982)[1] to describe data matrices existing in a dark distant future, the term cyberspace has entered into the common lexicon. It has come to mean the information spaces created by the technology of digital networked computer systems, most of which ultimately connect with the mother of all networks, the Internet. [2]

According to recent research about 360,985,492[3] person all over the world has a valid access to the internet. They communicate through the internet and they share almost every possible piece of information over the internet. They exchange their ideas, photos, events, etc. some of these information is supposed to be privacy to different extent. The fact that all these information are stored on web server and can be tracked raise the concern of public privacy. The issue is that there are many incidents recently when people find out that their data might be used in ways they didn't expect, or that information they did not know about is being silently collected. We can consider the NASA case as the most announce scandal where The US government, with assistance from major telecommunications carriers including AT&T, has engaged in a massive illegal dragnet surveillance of domestic communications and communications records of millions of ordinary Americans since at least 2001[4]. These events heighten the issue of cyber security as well. The internet is not safe haven for data to protected, is not safe for our privacy. With internet there is no guarantee for privacy even if we are in a private room in our home. To an extent, this is a problem of our own making. Our personal diaries are an open book because we open them. We put details about ourselves out into the ether that often forfeit our right to privacy.[5] We can say we are in the post privacy era.

 

Article 29 from The Universal Declaration of Human Rights (UDHR) consists:

“everyone shall be subject only to such limitations as are determined by law solely for the purpose of securing due recognition and respect for the rights and freedoms of others and of meeting the just requirements of morality, public order and the general welfare in a democratic society.[6]

We can apply the same definition over the internet usage, we need to feel free to express, free to access the information, and free to share our ideas and concerns over the internet. Of course, there are some reasonable restrictions over freedom of speech. Restrictions are possible due to spoil others freedom, use hate speech, racism, or discrimination. We can use “don’t harm clause” to recap all these restrictions. But the fact is in the name of national security lot of privacy and freedom are restricted. Many other charter ensures the Human Rights such as the article 3 from the International Covenant on Civil and Political Rights (ICCPR) when no discriminations rule it ensure the equal right of men and women to the enjoyment of all civil and political rights set forth in the present Covenant[7].

We need to transfer these contextual concepts about human rights and how to apply it over the internet. These concepts should be applied worldwide from here the term international regime emerges. Stephen Krasner in a special issue of the journal in 1982 defined international regime as

“International regimes are defined as principles, norms, rules, and decision-making procedures around which actor expectations converge in a given issue-area[8]

This definition refers to the influence entities as actors, in internet regime actors can be states, no-states, international organization, and non-governmental organizations (NGO). In addition to the regime actors there are other actors with a strong influence over the internet privacy and security such as the technical actors, Microsoft and Google, Yahoo, and Apple are examples. Also, network actors like Facebook and Twitter. These actors gather a huge amount of our personal data, they track and keep our conversations, express of ideas and feeling, our photos, and videos. The main aim of internet international regime is to protect this data (privacy) and how to protect human of being punished because of his ideas or opinion (security). The international organization in the internet regime almost agree about the main rules that ensure privacy and security but they can’t confirm these rules to be applied only governmental actors can implement them.  Before moving to the rule of governmental actors rule, let’s discuss some attempt for configuring the main rules that can protect our privacy and security over the internet. The Organization for Security and Co-operation in Europe (OSCE) declaration in 2001 declare a set of principles to ensure the privacy of human, these includes freedom access to the internet, freedom of expression as Internet Human Rights. Also, this declaration includes that cutting of the internet can be justified, slow-down or filtering the internet should be under the international law[9].

Many other attempts come with an agreement about Human Rights online. One of these attempt is the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression it includes[10]:

·        Everyone shall have the right to hold opinions without interference;

·        Everyone shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of his choice;

The European Union plan to protect open internet and online freedom conference in 2013 aims at an open and free cyberspace has promoted political and social inclusion worldwide; it has broken down barriers between countries, communities and citizens, allowing interaction and sharing of information and ideas across the globe; it has provided a forum for freedom of expression and exercise of fundamental rights, and empowered people in their quest for democratic and more just societies - most strikingly during the Arab Spring[11].

We can assume that the international actors can agree about a clear definition for privacy and security. These entities have common main principles for example they all confirm that Human should have a valid access to the internet with no unjustified restrictions. They agree about the freedom of human to express their ideas and opinion. They all emphasis that gathering and misusing the personal data over the internet is not acceptable and is considered as a crime.

The bad news is that they can’t impose these guidelines over the governments around the world. All the international declarations are optional, some countries avoid signing on these agreement so they are free not to join them. Other agreements have many exceptions that governments can use to bypass the principles the agreements. One of the crystal clear example is that international covenant on civil and political rights states:

The above-mentioned rights shall not be subject to any restrictions except those which are provided by law, are necessary to protect national security, public order (ordre public), public health or morals or the rights and freedoms of others, and are consistent with the other rights recognized in the present Covenant.[12]

The opened statement of necessary to protect national security can be misused to spoil the human rights. Under this wide expression of national security internet access can be blocked, filtered, or slowed down. Citizens’ privacy can be hacked and they can be confined due to their opinion.

To conclude, international organizations can set a guide for human rights online. They can use what they already agree on human rights offline to establish a crystal clear border that describe in details the human rights on the internet. But they can’t impose or ensure the application of these rules. Only, governments can apply them. The fact that different types of governments around the world don’t accept these rules, they prefer to filter, block, or slow down the internet. Some dictators reject any opinion that is against them and punish anyone who express his ideas over the internet. Many bloggers around the world are sentenced to court only because they declare that they have another opinion rather that the national one, they are accused of being against the national security. The international organizations should seek more tools and methodology to get these countries comply with the international treaties and declarations. Also, they also should raise the awareness of people about their rights and support them to fight for their rights.



[2] http://www.cyberspacelaw.org/chon/

                                             

ليس بهدف السخرية من الام الراقصة

انتهت تقريبا مرحلة السخرية على قرار تكريم راقصة كام مثالية واظن انه الوقت الملائم لبداية الكلام في الامر قبل ان يمر كغيره.
وابدا بالقلة التي اختارت ان تقف عكس التيار بين دفاع عن القرار او تبرير له او انكار لكمية السخرية التي اجتاحت الحوار. وهذه الفئة تتحدث حديث منظم ومرتب حول انه لا تقاطع بين كونها راقصة وكونها ناجحة في تربية الابناء. وهذه النقطة تحديدا هي التي دفعتني للكتابة بعدما كنت عازما علي عدم الخوض في الامر.عزيزي الحقوقي العادل الذي يري بضرورة الفصل بين الامرين سأذكرك بحادثة قريبة جدا في ايطاليا منذ ست سنوات عندما تنافست عاهرتين من نجمات افلام الاباحية علي لقب المحافظ وعندما انتفض المجتمع رافضا لذلك خرج دعاه الحرية يرددون نفس قولك انه لا علاقة بين العمل في الدعارة وبين القدرة على القيادة والادارة.عزيزي التقدمي هناك حدود يجب ان تحترم واطر يجب ان تبقي واضحة والا سنصل من الافراط الي التفريط. إذا اردت فعلا مساعدة في حل مشكلة عدم تقبل الاخر حاول ان تحافظ على البقاء في المنطقة الوسط التي اوشكت على الاختفاء.ان الامر لم يمر كما نتخيل وهناك فكرة يتم زراعتها كل يوم وبكل السبل، هناك غرس نضج ويتم حصده الان في قطاع واسع من الشباب وحتى الكبار تبدلت قناعتهم وأصبحنا لا نسمع نصائح الحفاظ على الصدق والامانة بقدر ما نسمع تعليمات تحقيق الربح والانتصار.


من ناحية اخري ان الفئة الرافضة لهذا الاختيار تزداد شعورا بالغربة في وطن لا يهتم بأم الايتام التي جاعت ولم تأكل بثديها، يزداد شعورهم بالغربة في وطن يخشون من ترك ابناءهم له فيدمر سريعا ما حاولوا غرسه من قيم على مدار سنوات.
نعم لدينا فئة تقف في أقصى اليمين لكن ايضا لدينا فئة تحاول بكل قوة جرنا الي اسوء ما في الناحية الأخرى ويجب ان نحذر ان نمهد لهم الطريق فننجرف جميعا الي الناحية الأخرى. يجب ان نتذكر ان لدينا قيم ومبادئ يجب ان نحافظ عليها من التدمير التدريجي ولا مانع ابدا من تنقيتها من الشوائب ولكن بحرص.


سأظل مؤمن ان الفضيلة وسط بين رذيلتين وان عدم الحرص كان ينقلنا من رذيلة لنقيضها حتى دون أن نعي، فالجبن والتهور بينهما الشجاعة والكرم بين التبذير والبخل.قناعتي الخاصة ان هذا الكلام لن يجدي وان مجتمعنا متجه الي أحد الطرفين وسنفشل في الوصول للمنطقة الوسطي الدافئة، قناعة لها اسباب واتمني ان اكون مخطي لكن كل الشواهد تشير اننا في طريقنا لأحدي الرذيلتين

 

مقال بالانجليزية عن حقوق الانسان علي الانترنت

Human rights can give guidance to the protection of data in cyber space under certain conditions.

When internet comes to public, no one expects it to become such powerful tool of communication and sharing information. This lead to increase the number of activities that internet users do to communicate. These communications usually include private data. People involved in communication over internet usually don’t care if their communication is kept private as it is supposed to be. Also, with the growth of virtual communities include activities of people assemble and give them more means to express their opinion regarding political and culture issues. Some activities such as blogging lead the internet user to the court or end as detainee. From this point the need for limitation or board to preserve the human rights in the internet becomes a must.

Almost all world countries has agreed the universal declaration of human rights – even it is not obliged to apply – but we can use this UDHR as a guideline for protect the human rights on the internet. Fundamental human rights includes the freedom to express which guarantees the person right to say his opinion and announce his political, religious, and civil ideas. In the internet you can easily feel free to express but the dilemma is that government may penalize you for your ideas over the internet. This why freedom of express can only be enjoyed if it is accompanied with security. They are indivisible, interdependent, and reciprocity.

Other important fundamental human rights which can guide the cyber space is the right to privacy. As mentioned our internet usage includes some private data. Internet user should have the right to keep his data private. Governments should respect this privacy and don’t interfere with private in normal circumstances. In addition to freedom of expression, security, and privacy also the right to access to information can be very helpful guidance for drawing the internet usage boarders as it will disallow activities such as blocking and filtering internet contents, deleting websites, and slowing down the internet.

Human rights in internet usage should include some restrictions. For example the freedom to express should be restricted with no-harm as you can express your ideas without harming others. The same for access to information which can be restricted for children as they need more protections which includes blocking and filtering internet usage. Public morals and orders as mentioned in article 19 can be used as bases for restriction over the internet usage.

To conclude in my point of view the human rights in internet usage is conflicting subject for two reasons, first: national rights sometimes counteract the human rights and in such circumstances government violates the human rights. Examples to these includes the NSA violated internet users privacy and in Egyptian Jan revaluation government cut the internet connectivity to all citizen. Second, some of the rights are restricted by other rights. These restrictions permit government activities against some rights and although this is logical but government can misuse them.