From: Franklin on
Jeffrey Bloss wrote:

> On Sun, 06 Sep 2009 23:38:08 -0700, Ron wrote:
>
>> miskairal wrote:
>>>
>>> "Bear Bottoms" <bearbottoms1(a)gmai.com> wrote in message
>>> news:Xns9C7EC4E06F003bearbottoms1gmaicom(a)188.40.43.213...
>>>> "miskairal" <miskairal(a)gmail.com> wrote in
>>>> news:h81a4p$mqo$1(a)news.eternal-september.org:
>>>>
>>>>> (1) PROGRAM NAME: Colorcop
>>>>>
>>>>> (2) LINK: http://colorcop.net/
>>>>>
>>>>> (3) DESCRIPTION:Color Cop is a multi-purpose color picker for web
>>>>> designers and programmers. It features an eyedropper, magnifier,
>>>>> variable magnification levels, 3 by 3 and 5 by 5 average sampling,
>>>>> snap to websafe, color history, and a 42 color complementary
>>>>> palette. Color Cop will convert RGB decimal values to Hexadecimal
>>>>> color codes. It has color code support for HTML Hex, Delphi Hex,
>>>>> PowerBuilder, Visual Basic Hex, and Visual C++ Hex. Color Cop is a
>>>>> multi-purpose color picker for windows
>>>>>
>>>>
>>>> KolorGenerator is 10 times the program of that one.
>>>> http://www.kolorgenerator.godula.com/
>>>
>>> In your humble opinion of course.
>>
>> Bear, if you think so highly of KolorGenerator, why not submit it for
>> deliberation for PL 2009? All it would need is a second from a
>> legitimate poster to be considered for the voting process. iirc. Just
>> a thought.
>>
>> Ron Moore
>
> You don't get it. Bear has his own agenda and it has nothing to do
> with Pricelessware. Why invite an admitted criminal into your fold
> anyway?

Bottoms has more than enough sockpuppets to support his own nomination.
Maybe his sock "David W" will second it?

<http://h.imagehost.org/view/0696/Bottoms_sock>

Bob Adkins is a good alternative for a seconder. He's a big supporter
of all Bearware software, no matter how buggy or unfinished.
From: Ron May on
UPDATE - Sep 8, 2009 - 1:30pm CDT - 1830 UTC/GMT

The following program has been nominated and seconded:

ImgBurn (N) Thip (S) TOM, Loren


The following programs have been nominated and need a second:

Color Cop (N) miskairal
KeePass (N) miskairal
NewsProxy 1.2.5 (N) Artemus Ward
RJ TextEd (N) miskairal

(You can second a program by posting a message to this thread with
just the name of the program and the word "second" or "seconded".)

We're off to a slow start, but the nominations will remain open until
Sunday, September 27, after which voting will begin. To nominate a
program, post the following three items to this thread:

(1) PROGRAM NAME:

(2) LINK:

(3) DESCRIPTION:

You can nominate as many programs as you wish as often as you wish.

You might want to review last year's choices:

http://www.pricelesswarehome.org/new2008/2008pl.php

Or you could look at the cumulative list here:

http://www.pricelesswarehome.org/2008/CumulativePL.php

That could give you some ideas. Maybe you've come up with newer and
better choices for the group to consider.

Next update in a few days depending on how many additions are made to
the list.

--
Ron M.
Help improve the ACF experience. Please don't feed the trolls.
New to the group? Check out http://www.pricelesswarehome.org/
and try to ignore the threads that aren't freeware related.
From: iNcReDuLoUs on
(1) PROGRAM NAME: GnuPG (GPG) (GNU Privacy Guard)

(2) LINK: http://www.gnupg.org/

(3) DESCRIPTION: GnuPG is the GNU project's complete and free
implementation of the OpenPGP standard as defined by RFC4880. GnuPG allows
to encrypt and sign your data and communication, features a versatile key
managment system as well as access modules for all kind of public key
directories. GnuPG, also known as GPG, is a command line tool with
features for easy integration with other applications. Frontend
applications and libraries are available.
From: iNcReDuLoUs on
(1) PROGRAM NAME: TrueCrypt

(2) LINK: http://www.truecrypt.org/

(3) DESCRIPTION: Free open-source disk encryption software system for
establishing and maintaining an on-the-fly-encrypted volume (data storage
device). On-the-fly encryption means that data is automatically encrypted
or decrypted right before it is loaded or saved, without any user
intervention. No data stored on an encrypted volume can be read
(decrypted) without using the correct password/keyfile(s) or correct
encryption keys. Entire file system is encrypted (e.g., file names, folder
names, contents of every file, free space, meta data, etc). TrueCrypt can
on-the-fly encrypt a system partition or entire system drive, i.e. a
partition or drive where Windows is installed and from which it boots.
From: Ron May on
On Tue, 08 Sep 2009 21:39:33 +0000, Dave <nodlee5spam(a)fuse.net> wrote:

> > (1) PROGRAM NAME:Keepass Password Safe

Dave, I'll take this as a second to miskairal's earlier nomination.

--
Ron M.
Help improve the ACF experience. Please don't feed the trolls.
New to the group? Check out http://www.pricelesswarehome.org/
and try to ignore the threads that aren't freeware related.