<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>[NEWS] Karen's Power Tools Newsletter</title>
    <link>http://forum.geizhals.at/feed.jsp?id=308373</link>
    <description>Geizhals-Forum</description>
    <item>
      <title>[NEWS] Making Hash</title>
      <link>http://forum.geizhals.at/t308373,2130806.html#2130806</link>
      <description>&lt;blockquote&gt;Making Hash&lt;br&gt;-----------&lt;br&gt;After all that, a lot of programs might have rested on their laurels. But &lt;br&gt;not the hard-charging Directory Printer! One of its newest tricks is &lt;br&gt;making hash. &lt;br&gt;&lt;br&gt;No, the program hasn't taken up cooking with corned beef. These hashes are &lt;br&gt;what mathematicians call "cryptographic hashes", or sometimes "message &lt;br&gt;digests".&lt;br&gt;&lt;br&gt;We've talked about these hashes before. They are the result of complex &lt;br&gt;mathematical formulas that transform data in a very special way. Feed a &lt;br&gt;series of 0s and 1s to a "hash algorithms", and produces a short sequence &lt;br&gt;of its own. This new string of 0s and 1s is called the "hash value" of the &lt;br&gt;original data.&lt;br&gt;&lt;br&gt;&lt;br&gt;Now you may be wondering: what's so special about these formulas? After &lt;br&gt;all, any child can write rules to change data from one form to another. &lt;br&gt;But hash algorithms have two important features that make them very &lt;br&gt;unusual, and very valuable. &lt;br&gt;&lt;br&gt;First, each formula always produces the same number of bits, no matter how &lt;br&gt;many bits it's asked to process. For example, one popular hash algorithm &lt;br&gt;is called SHA-1 (Secure Hash Algorithm version 1). Feed it one bit, or a &lt;br&gt;trillion bits. It always provides 160 bits in return.&lt;br&gt;&lt;br&gt;Second, the bits produced by hash algorithms are exquisitely sensitive to &lt;br&gt;the data they process. The tiniest change in the original data produces &lt;br&gt;huge changes in the end result.&lt;br&gt;&lt;br&gt;To see this in action, let's use a formula called MD5 (Message Digest &lt;br&gt;version 5). The hash values it calculates always contain exactly 128 bits. &lt;br&gt;As an experiment, I fed it two nearly identical streams of data.&lt;br&gt;&lt;br&gt;The first stream contained exactly eight billion binary 1s. Here's the &lt;br&gt;hash value it computed:&lt;br&gt;&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;1000100011111110 0100100011110010 0110100110111011 &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;0000010011011011 0100100000010111 0010101001001100 &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;1111101001001100 1110001010001110&lt;br&gt;&lt;br&gt;Hmm... That's a little hard to read. Let's try again, this time showing &lt;br&gt;the result in the (slightly) more human-friendly hexadecimal numbering &lt;br&gt;system:&lt;br&gt;&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;88FE 48F2 69BB 04DB 4817 2A4C FA4C E28E&lt;br&gt;&lt;br&gt;Not great, but it will have to do. &lt;br&gt;&lt;br&gt;Next, I asked the formula to process a slightly different block of data. &lt;br&gt;This time, the input contained "just" 7,999,999,999 1s, followed by a &lt;br&gt;single 0. In other words, this second test differed from the first by just &lt;br&gt;one bit - one out of eight billion.&lt;br&gt;&lt;br&gt;This time the MD5 algorithm calculated this hash value:&lt;br&gt;&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;6F87FE5068BF3FA23628152A1FF962BB&lt;br&gt;&lt;br&gt;&lt;br&gt;See any similarities between the two hashes? I don't either. And that's &lt;br&gt;the point. Although the two blocks of data fed into the equation differed &lt;br&gt;by only one bit in eight billion, the results have almost nothing in &lt;br&gt;common. &lt;br&gt;&lt;br&gt;Together, these two features make hash values convenient "fingerprints" of &lt;br&gt;files. If two files contain the same data, their hash values will be &lt;br&gt;identical too. Likewise, if a file doesn't change over time, its hash &lt;br&gt;value won't change either.&lt;br&gt;&lt;br&gt;But make any change in a file's contents - no matter how slight - and the &lt;br&gt;new data's hash value will change. And even if two files have exactly the &lt;br&gt;same name, size, attributes, dates, and other characteristics -- if their &lt;br&gt;hash values differ, their contents do too.&lt;br&gt;&lt;br&gt;Computer crime investigators use hash values to test and prove the &lt;br&gt;integrity of evidence. When data is recovered from a suspect's computer, a &lt;br&gt;hash value of each file is computed. Later, a witness can demonstrate a &lt;br&gt;file hasn't changed while in police custody, by showing the hash value &lt;br&gt;computed at the time of the trial exactly matches the one computed when &lt;br&gt;the data was seized.&lt;br&gt;&lt;br&gt;Some careful folks compute the hash values of backup files containing &lt;br&gt;sensitive data. Later, they can verify the archived data's integrity by &lt;br&gt;re-computing data's hash value. If the new and old values are the same, &lt;br&gt;the backup data is intact. If not, the data has suffered bit-rot, with at &lt;br&gt;least one 0 becoming a 1, or vice versa. &lt;img src="sad.gif" width="16" height="19" align="absmiddle" alt=":("/&gt;&lt;br&gt;&lt;br&gt;Now you and I can use hash values too. Just ask the Directory Printer to &lt;br&gt;compute and print hash values for all your important files. Later, if you &lt;br&gt;suspect a file has been altered, ask the Directory Printer to perform the &lt;br&gt;task again. If the hash reported today matches the original value, the &lt;br&gt;file is intact. But if the hash values differ, the file's contents have &lt;br&gt;changed.&lt;br&gt;&lt;br&gt;&lt;br&gt;Incidentally, there are six hash algorithms in common use today. I've &lt;br&gt;already mentioned two of them: MD5 which produces hash values containing &lt;br&gt;128 bits, and SHA-1 which produces hashes that are 160 bits long.&lt;br&gt;&lt;br&gt;The others are: SHA-224, SHA-256, SHA-384 and SHA-512.&amp;nbsp;&amp;nbsp;In each case, the &lt;br&gt;number following the letters "SHA" indicates the length of the hash values &lt;br&gt;produced by the algorithm, in bits. For example, the SHA-512 formula &lt;br&gt;yields hash values containing 512 bits (64 bytes).&lt;br&gt;&lt;br&gt;For most purposes, the shorter hash values serve us just as well as their &lt;br&gt;longer colleagues. [Nerdy Note: Exceptions include hash values used in &lt;br&gt;some types of cryptography. There, longer hash values provide greater &lt;br&gt;security] Shorter hashes are easier to read and compare. But the new &lt;br&gt;Directory Printer lets you chose which hash values you'd like to see. Now &lt;br&gt;you can select any, or all, of the six SHA and MD5 variations!&lt;/blockquote&gt;&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Tue, 25 Jan 2005 22:27:47 GMT</pubDate>
      <guid>http://forum.geizhals.at/t308373,2130806.html#2130806</guid>
      <dc:creator>Vorauseilender Gehorsam</dc:creator>
      <dc:date>2005-01-25T22:27:47Z</dc:date>
    </item>
    <item>
      <title>[NEWS] Karen's Power Tools Newsletter</title>
      <link>http://forum.geizhals.at/t308373,2130787.html#2130787</link>
      <description>&lt;blockquote/&gt;KAREN'S POWER TOOLS NEWSLETTER&lt;br&gt;&lt;br&gt;January 25, 2005&lt;br&gt;&lt;br&gt;By Karen Kenworthy&lt;br&gt;&lt;br&gt;Read the Web version of Power Tools online!&lt;br&gt;&lt;a href="http://www.karenware.com/newsletters/2005/2005-01-25.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;newsletters/&lt;wbr/&gt;2005/&lt;wbr/&gt;2005-01-25.asp&lt;/a&gt; &lt;br&gt;&lt;br&gt;New Directory Printer!&lt;br&gt;----------------------&lt;br&gt;While there's still time left in the day, I decided to upgrade one of the &lt;br&gt;most popular of my Power Tools programs. The project started modestly, but &lt;br&gt;before long turned into a big job. Along the way I wore out one keyboard, &lt;br&gt;and ran my poor computer mouse ragged. I refurbished thousands of old &lt;br&gt;bits, and still needed buckets of new 1s and 0s.&lt;br&gt;&lt;br&gt;But I think it was worth it. Finally, the new Directory Printer v5.0 is &lt;br&gt;ready!&lt;br&gt;&lt;br&gt;Long-time readers will remember the Directory Printer. It began as a small &lt;br&gt;program that could print lists of files found on our hard disks, &lt;br&gt;diskettes, and CDs. In addition to each file's name, the program printed &lt;br&gt;the file's size, and the dates it was created, last modified, and last &lt;br&gt;accessed.&lt;br&gt;&lt;br&gt;True to its name, the Directory Printer also printed details about the &lt;br&gt;folders where our files are stored. Naturally, the number of files and &lt;br&gt;sub-folders each folder contains were reported. The total size of the &lt;br&gt;folder's contents could be printed too. Want to know when a folder was &lt;br&gt;created, last modified, or last accessed? The program could report those &lt;br&gt;details too.&lt;br&gt;&lt;br&gt;Contrary to its name, the Directory Printer could also write the &lt;br&gt;information it uncovers to a text file. These files can be stored in a &lt;br&gt;safe place, providing an historical record of a drive's contents. They can &lt;br&gt;also be imported into spreadsheets and databases, letting you analyze, &lt;br&gt;sort, and compare the information the Directory Printer collects.&lt;br&gt;&lt;br&gt;Whew! The early Directory Printer did a lot. But like every successful &lt;br&gt;program, it has never been finished. Over the years the little tool &lt;br&gt;learned to reveal several "attributes" of files and folders, including:&lt;br&gt;&lt;br&gt;Read-Only. Files with this attribute can be read, but not changed or &lt;br&gt;deleted. Files stored in Read-Only folders can be read, but &lt;br&gt;&lt;br&gt;Hidden. These files and folders are not normally displayed by Windows. In &lt;br&gt;theory, this provides a certain amount of protection to important files &lt;br&gt;and folders.&lt;br&gt;&lt;br&gt;System. This attribute indicates a file or folder is used by Windows. &lt;br&gt;Should one of them disappear, or be improperly altered, Windows may behave &lt;br&gt;erratically or not run at all.&lt;br&gt;&lt;br&gt;Compressed. Files and folders with this attribute have been compressed by &lt;br&gt;Windows, to save disk space.&lt;br&gt;&lt;br&gt;Encrypted. This attribute identifies files that have been encrypted by &lt;br&gt;Windows, at our request. A password is required before any program can &lt;br&gt;read or modify their contents.&lt;br&gt;&lt;br&gt;Executable. Files with this attribute are programs, or files containing &lt;br&gt;program fragments. The data stored within them are computer instructions -&lt;br&gt;- numbers that order computers to add, subtract, read and write disks, &lt;br&gt;display cute images, make loud beeping sounds then crash, and do all the &lt;br&gt;other endearing things that make us love our binary buddies.&lt;br&gt;&lt;br&gt;~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;br&gt;&lt;br&gt;All of Karen's Power Tools &lt;br&gt;--------------------------&lt;br&gt;&amp;nbsp;&amp;nbsp;Note: For the most up-to-date list, visit: &lt;br&gt;&amp;nbsp;&amp;nbsp;&lt;a href="http://www.karenware.com/powertools.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools.asp&lt;/a&gt; &lt;br&gt;&lt;br&gt;* Directory Printer - &lt;a href="http://www.karenware.com/powertools/ptdirprn.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptdirprn.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Time Sync - &lt;a href="http://www.karenware.com/powertools/ptsync.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptsync.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Zone Manager - &lt;a href="http://www.karenware.com/powertools/ptzone.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptzone.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Print Logger - &lt;a href="http://www.karenware.com/powertools/ptprnlog.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptprnlog.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;LAN Monitor - &lt;a href="http://www.karenware.com/powertools/ptlanmon.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptlanmon.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;URL Discombobulator - &lt;a href="http://www.karenware.com/powertools/ptlookup.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptlookup.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Window Watcher - &lt;a href="http://www.karenware.com/powertools/ptwinwatch.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptwinwatch.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;'Net Monitor - &lt;a href="http://www.karenware.com/powertools/ptnetmon.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptnetmon.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Drive Info - &lt;a href="http://www.karenware.com/powertools/ptdinfo.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptdinfo.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;E-Mailer II - &lt;a href="http://www.karenware.com/powertools/ptmailer2.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptmailer2.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Countdown Timer II - &lt;a href="http://www.karenware.com/powertools/ptcount2.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptcount2.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Computer Profiler - &lt;a href="http://www.karenware.com/powertools/ptprofiler.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptprofiler.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Replicator - &lt;a href="http://www.karenware.com/powertools/ptreplicator.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptreplicator.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Disk Slack Checker - &lt;a href="http://www.karenware.com/powertools/ptslack.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptslack.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;WhoIs - &lt;a href="http://www.karenware.com/powertools/ptwhois.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptwhois.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Recycler - &lt;a href="http://www.karenware.com/powertools/ptrecycler.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptrecycler.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Show Stopper - &lt;a href="http://www.karenware.com/powertools/ptstopper.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptstopper.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Alarm Clock - &lt;a href="http://www.karenware.com/powertools/ptalarm.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptalarm.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Font Explorer - &lt;a href="http://www.karenware.com/powertools/ptfonts.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptfonts.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Power Toy - &lt;a href="http://www.karenware.com/powertools/pttoy.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;pttoy.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Time Cop - &lt;a href="http://www.karenware.com/powertools/pttimecop.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;pttimecop.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Hasher - &lt;a href="http://www.karenware.com/powertools/pthasher.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;pthasher.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Mailer - &lt;a href="http://www.karenware.com/powertools/ptmailer.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptmailer.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Version Browser - &lt;a href="http://www.karenware.com/powertools/ptbrowse.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptbrowse.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Autorun.inf Editor - &lt;a href="http://www.karenware.com/powertools/ptautorun.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptautorun.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Cookie Viewer - &lt;a href="http://www.karenware.com/powertools/ptcookie.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptcookie.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Registry Pruner - &lt;a href="http://www.karenware.com/powertools/ptpruner.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptpruner.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Registry Ripper - &lt;a href="http://www.karenware.com/powertools/ptregrip.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptregrip.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Snooper - &lt;a href="http://www.karenware.com/powertools/ptsnoop.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptsnoop.asp&lt;/a&gt; &lt;br&gt;&amp;nbsp;&amp;nbsp;Clipboard Viewer - &lt;a href="http://www.karenware.com/powertools/ptclpvue.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;powertools/&lt;wbr/&gt;ptclpvue.asp&lt;/a&gt; &lt;br&gt;&lt;br&gt;* Indicates program was updated recently.&lt;br&gt;&lt;br&gt;NOTE: You should use Control Panel's "Add/Remove Programs" applet to &lt;br&gt;remove the old version, before installing a new version of a Power Tool.&lt;br&gt;&lt;br&gt;Note: Be sure to install the Visual Basic Runtime v6.0 before installing &lt;br&gt;your first Power Tool. It's required by all the Power Tools, and must be &lt;br&gt;installed first. You can download a copy of the Visual Basic Runtime v6.0 &lt;br&gt;installer, vbrun60-setup.exe, from any of the pages where you download the &lt;br&gt;Power Tools themselves, or from my special Runtimes page at: &lt;br&gt;&lt;a href="http://www.karenware.com/runtimes.asp" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.karenware.com/&lt;wbr/&gt;runtimes.asp&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;br/&gt;</description>
      <pubDate>Tue, 25 Jan 2005 22:24:28 GMT</pubDate>
      <guid>http://forum.geizhals.at/t308373,2130787.html#2130787</guid>
      <dc:creator>Vorauseilender Gehorsam</dc:creator>
      <dc:date>2005-01-25T22:24:28Z</dc:date>
    </item>
  </channel>
</rss>
