![]() ![]() Thanks for belittling everyone else and explaining the completely imaginary properties of the software you haven't used and just googled to someone who's been using it for over a decade. You don’t need a special super-gui replacement for simple OS command line and built in features.īut features like - show me two different directories side by side and show me which files are different between the two of them, like the opensource tools have - that the OS does not do and is handy. And all that, and if you pay extra you can have it delete empty folders with the pro version, just like xdel. It confirms the copy was good, like every file copy utility in the history of the information technology era, and it shows a confirmation dialog box, like the one everyone checks the “don’t show me this again” box in in windows. Google robocopy.Ĭurrently in the ad for Teracopy - it keeps track of what files you have used recently. It is pretty much the poster child for pointless bloatware. So because the downvoters don’t know what they are talking about. So, in short, you may stick to your "open-source only" policy if you like, but you should know that you will be missing on a hell of a lot of great stuff and considerably better alternatives in the process, no doubt about it. Not only that, but I've been recommending it to everyone I know as one of the best–if not the best–file transfer utilities out there for years. As someone who has no affiliation with it but plenty of experience and technical expertise to identify a potential threat, I've been using it on a nearly daily basis for over a decade and encountered exactly zero of "ads, viruses, trojans, and bloatware" in any of its versions, free or paid. In case of TeraCopy specifically, your suspicions were beyond laughable. ![]() VoidTools Everything would be a great example, and something like Nirsoft freeware has been used by millions of tech-savvy power users for decades without problems or breaches of trust. When it comes to always free closed-source stuff, there are plenty of invaluable programs out there that are superb, stable, and 100% safe. ![]() The correct approach is to research and get the the best software you know you can trust from its official source, and then use other security tools like antiviruses and firewalls to make sure that you stay safe and in control of its permissions. Just because something like MSI Afterburner is free and closed-source doesn't automatically make it any more of bug-ridden malware than any its open-source counterparts. I've been using countless free closed-source software for decades and never had any of the problems you describe. To answer your year-old question, you got downvoted because your suggestion was too simplistic (and frankly, a bit too silly) to be applied dogmatically to the real world. Just make sure to tag the post with the flair and give a little background info/context. On Fridays we'll allow posts that don't normally fit in the usual data-hoarding theme, including posts that would usually be removed by rule 4: “No memes or 'look at this '”
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |