mendelson OFTP2 is a simple, handy OFTP2 solution. It contains a logging- and configuration GUI (SWING) and supports encryption, digital signatures, message compression, SSL. FEATURES: · Data encryption · Data signature · Data compression · SSL · Partner management · Certificate and key handling · Large file transmission · User defined event management (send/receive) · Batch processing · Virtual filename processing · Configuration backup/import-export
ProgDVB and ProgTV is two is 2 independent user interfaces which can work together from one folder at one list of channels, settings etc. ProgTV is aimed at use with remote control(HTPC). ProgDVB contains more functions but is intended for use by a mouse. Thus it is very convenient to use both interfaces. ProgDVB is a piece of software which allows you to watch SAT-Television and listen to Radio channels directly from satellite by using DVB-PCI cards with hardware decoders on the board, SAT-dish, and personal x86-compatible computers. Support for various types of data sources: * Internet TV and Radio. About 4000 channels in the list. * DVB-S (satellite), DVB-S2, DVB-C (cable), DVB-T, ATSC, ISDB-T * IPTV * Analog TV * Playback from a file Main functions: * High Definition TV support including H.264/AVC * Picture-in-picture support as well as independent simultaneous recording/playback of several channels from one or more devices * Support for the majority of DVB, ISDB-T and ATSC devices including DiSEqC and CAM interfaces support * Support for all digital TV audio formats: MPEG, AC3, AAC,... * Time shifting functionality using the RAM or disk buffer of unlimited size * 10 Bands equalizer * TV and Radio channels recording * Playback from disk based files * Electronic program guide (EPG) from Digital TV or XmlTV,JTV. * Teletext * Subtile(Teletext, image-based and closed captions) * Support for VR, VMR7,VMR9 and EVR renderers including OSD (except VR) independently from channel type or signal presence * Network broadcasting * Skins for OSD and GUI * Both Win32 and full-fledged Win64 versions are available * Interface Language Localizations Currently works with DVB-S, DVB-S2, DVB-T and DVB-C cards of the following manufactures: * Anysee (E30S Plus,...) * AverMedia DVB-S * Azurewave (TwinHan) (VP-1027, VP-1034, VP-1041,... ). * BroadLogic 2030/1030 * Compro VideoMate DVB-S * Digital everywhere FireDTV/FloppyDTV * DVBWorld USB2.0 DVB-S/DVBWorldDTV(PCI-Sat), Acorp TV878DS/DS110/DS120, Nextorm NBS240/NSC120 * GeniaTech products(Digistar DVB-S PCI, satbox, TVStar, Digistar2, Digiwave 103G,...) * Hauppauge * Kworld DVB-S 100 compatible (Vstream, Dynavision..... ) * LifeView FlyDVB * 10moons * Netcast DVB * NEWMI Advanced DVB * Pinnacle * Technotrend * Tevii * TBS Q-Box * Technisat * Telemann Skymedia 300 DVB (not official) * Tongshi * Terratec * St@rKey usb box * Cards with BDA driver (possible issues with some cards) * Also works without a card, for example, as a video player or as a broadcast client
Batch Photo Resizer is a simple yet rich user experience and full-featured photo resizer utility. You can resize, convert, rename, sort, rotate, flip, stretch and adjust your photos in batch mode with the tiny tool. The powerful program will help you change multiple photos from digital cameras or other devices in one time, automate and simplify duplicate tasks and save you a lot of time. Main features: Resize your pictures with batch processing. Batch or single image file conversion. Sort images by the file time or name for batch rename. Search photos in a folder. Add text watermark, rotate, flip, stretch image files in batch mode. Drag and drop files. Optimize photos without losing quality. Support input photo formats like JPG/JPEG, BMP, GIF, PNG, TIF, ICO, EXIF, WMF, EMF, etc. Support output formats like BMP, JPEG, PNG, TIF.
Trogon MAC Scanner is a necessary tool for efficient network administration and network maintaince. You will always know which computers and other network devices connected to the network, who are used them and where they are located. Trogon MAC Scanner automatic compare scan results with database and indicate new or changed hosts and you can immediately detect illegal access to the network. You can save scan results database to the file for future network monitoring and maintenance. Trogon MAC Scanner scan local network and detect IP addresses and MAC addresses for every network devices. Also find additional attributes: host name, workgroup, network adapter manufacturer. Trogon MAC Scanner use ARP protocol for scan subnet and use multithreading for simultaneous a large number of queries send out. This allows scan network incredible fast. If your computer connected with a several subnets, you can select any for scan. Features: Scan and list IP addresses and MAC addresses of all the network devices. Scan local network, find all network devices, detect their IP addresses and MAC addresses and list these addresses in pairs. Just a few seconds and you will get information about all connections to the network Save scan results into the database. After scan is finished you can add scan results to the database. When results has been added to the database you can edit records. Also the database will used for comparison with future scan results and detection new connections or any other changes in your subnet. Scan results can be saved for future reference and maintenance. Edit database records, add attributes (user name, location) to any record. When scan results has been added, you can add more details for any computer in the network. For every network device you can indicate where his physical location and who is his owner and any comments. Trogon MAC Scanner allows set attributes: host name, workgroup, user name, location, comments. It is enable to create new records manually (without scan) and change IP addresses and MAC addresses for an existed records. You will always have information for efficient network management about users and devices in your network. Automatic compare scan results with database records and indicate difference. Automatic comparison of the scan results and the database records indicate changes in your local network. You can immediately detect unauthorized IP addresses or MAC addresses modifications and illegal access to the network. Also you can always add new devices without manual addresses entering. Click record marked as changed and get comparison details contains databases and new addresses. Automatic addresses comparison always started after every scan. Export and Import database in file formats (txt, xml, csv). Trogon MAC Scanner can export scan results to the file (support formats are TXT, CSV, XML) for future usage and import records from file to the database. You can export some selected records or the entire database.
jalada Textual is your Swiss Army Knife to edit any kind of text based files. Whether you simply need a tool to edit your configuration files, an application to modify or reformat large text files, a programming IDE or just an editor to tweak your web pages. Textual does what you want, the way you would expect. Textual focuses on manipulating text in ways that word processors generally cannot. In service of this goal, it offers many features including syntax highlighting, code folding, regular expression based find and replace operations, code completion, multiple character sets, split views and other useful features that enables you to edit small and also very large text files quicker and more easily. Textual is able to highlight the syntax of all important languages including bash, batch, C/ C++, C#, cmake, CSS, D, diff files, HTML, IDL - both MSIDL and XPIDL, Java, JavaScript, Lua, make, Perl, Python, PHP, Ruby, SQL, TeX and LaTeX and XML. Features at a glance: + Unicode/UTF-8 editing support. + Auto completion. + Auto-indent. + Find, find next, find previous, replace and replace all. + Regular expressions support. + Search files on disk. + Unlimited multilevel undo/redo. + Syntax highlighting for nearly any important language including bash, batch, C/ C++, C#, cmake, CSS, D, diff files, HTML, IDL - both MSIDL and XPIDL, Java, JavaScript, Lua, make, Perl, Python, PHP, Ruby, SQL, TeX and LaTeX or XML. + Code folding. + Zoom in or out on text. + Windows, Mac and Unix charset support. + Duplicate active line or selection. + Move lines up or down. + Open files in a tab or new window. + Split Views. + Color printing. + File change polling. + Wide range of commands to transform text like changing line endings, commenting code, convert text to ascii, shifting text, zapping gremlins or upper/lower case. + Drag-and-drop editing. + Marker support. and many more.
K7 TotalSecurity 11 safeguards your computer and network from newly emerging internet security threats such as email borne viruses, worms, Trojans, spywares, adware, unwanted spam emails, key loggers and much more. K7 internet security software suite comprises of Anti-virus software, which protects your pc from email borne potential virus attacks, Anti-spam, which recognizes and controls unwanted emails flooding your inbox, Anti-spyware, which prevents unwanted programs being installed in your computer without your authentication, Firewall, an intrusion prevention system, which functions as a traffic monitor and prevents unauthorized hackers entering your network, Privacy, which acts as a parental control software. And finally System monitor, which stops unwanted programs slowing down the performance of the system and detects / notifies if there are any unauthorized changes made to the computer security settings. The advanced virus removal and scan engine, in the total security makes your system safe and secure. Download your free trial version of K7 Total Security and protect yourself against any kind of internet security threats. Try K7 TotalSecurity – internet security suite for free.
Spy Emergency is an anti-spyware software that fast and secure removes spyware and other internet infections from your computer. Spy Emergency protects you against spyware, adware, malware, homepage hijackers, remote administration tools, dialers, keyloggers, and many other types of internet infections. Spy Emergency supports resident shields for real-time protection and automatic infections database updates for better protection. Secure Your Ideas with Spy Emergency! Spy Emergency is a security application that protects your PC from spyware, malware and adware. FEATURES: · Built-in proactive resident shield protection with dynamic heuristic engine that can even detect new and unknown Internet threats · Lowlevel Anti-rootkit Protection · Site Identity Verifier · Extended behavioral heuristic scanning · Support for Internet Explorer, Mozilla Firefox and Opera browsers · Scan of your system memory · Scan of your registry · Scan of your storage · Built-in anti-spam · System directory storage scan · Tracking cookies scan · Host file scan · Hijackers scan · Heuristic malware detection · Polymorhic malware detection · Generic unpacker with support for UPX, Aspack, ... · Command line interface · Automatic LSP stack repair · Real-time memory shields that blocks spyware before it executes · Prevention shields that blocks malware installation · Browser shields, including homepage shield · Tracking cookies shields · Automatic incremental database updates · News updates · Individual items restore functionality · Keeplist · Scheduling support · Simple configuration · Intuitive and clear user interface for spyware removal · Handy Shell Extension Scanning · Skin support · Language support · Premium Technical support
The Google App Engine SDK will let you run your web applications on Google's infrastructure. App Engine applications are easy to build, easy to maintain, and easy to scale as your traffic and data storage needs grow. With App Engine, there are no servers to maintain: You just upload your application, and it's ready to serve your users.
ASUS Access Point is an easy-to-use software that turns your ASUS laptop into a Wi-Fi wireless access point. Anyone nearby can surf the Internet through your sharing. This is also an ideal solution for setting up a temporary AP in a hotel room, meeting room, at home or the like. Different from Virtual Access Point software which is hardware-independent, ASUS Access Point is designed for ASUS hardware only. Other laptops are not supported officially. So please choose the correct software from Laptop Access Point Series for your laptop.
Easy portrait editing software, remove blemish and wrinkles, gain a perfect look. Support working as a Photoshop & Photoshop Elements plug-in. 1.Skin blemishes removal Quickly remove skin blemishes such as acnes, moles, redness, etc. Dramatically reduce wrinkles, eye bags, skin blotchiness and deep pores. Maintain nature skin texture so the portrait doesn't look over retouched. 2.Skin smoothing and enhancement Smooth skin, fine facial shine and enhance skin tone to give the portrait a professional look. 3.Features enhancement Remove red - eye, enhance eyes and eyebrows instantly. Whiten teeth and make lips look more vivid. 4.Face reshaping Reshape face, eyes, nose and mouth simply by moving sliders. Give the portrait a better look. 5.Full-body skin perfection With the skin brush you can customize the skin area easily to perfect all visible skin, not just the facial area. 6.Image color correction Remove color casts and adjust overall image color to restore a real photographic scene. 7.Formats supported Support importing file in these formats: Bitmap, JPEG, 24/48-bit TIFF, Camera RAW and Adobe DNG. Support saving as TIFF and JPEG.
Active Directory change auditing is an important procedure for limiting unauthorized changes and errors to AD configuration. One single change can put your organization at risk, introducing security breaches and compliance issues. Built-in Active Directory auditing lacks many important features and doesn't have reporting capabilities. Careful analysis of multi-megabyte Security logs can take enormous resources and still never paint the whole picture. Netwrix Active Directory Change Reporter is a free tool that reports the changes made to Active Directory and delivers a summary and detailed information on a daily basis. The report includes the 4 "W"s - Who, What, When, and Where - of all changes and includes "before" and "after" values for each setting. This report lists changes made to AD and Exchange configurations, mailboxes, AD schema, and many more. Generated data can be used to: * Monitor day-to-day administrative activities. * Prepare compliance reports for your SOX, GLBA and HIPAA auditors. Netwrix Active Directory Change Reporter records all modifications, including both user and administrative activity, and e-mails daily reports to AD administrators detailing every Active Directory change. Collected audit data is archived and can be stored for years, so you can build a summary of changes made to Active Directory during any period and drill down to detailed information as necessary. This archiving function allows organizations to analyze any policy violations, adhere to security best practices and maintain established internal policies. The tool is provided free of charge for use by organizations and individuals.
GOM Media Player The only media player you need - for FREE! Not only is GOM Media Player a completely FREE video player, with its built-in support for all the most popular video and Media Player formats, tons of advanced features, extreme customizability, and the Codec Finder service, GOM Media Player is sure to fulfill all of your playback needs. With millions of users in hundreds of countries, GOM Media Player is one of the world`s most popular video players. Whats New : Added "Touch Setting" feature for touch screen devices. Added "Search box" feature on playlist. (Ctrl+F) Supported "HTTPS URL" for youtube or net radio playback. (Ctrl+U) Added "Music Tap" on preferences related to play music files. Improved performance related to "speed of add & delete" of files on playlist. Other miscellaneous corrections, fixes, and changes
Iperius Backup is one of the best free backup software, also released in commercial editions for those who need advanced backup features for their companies. The freeware version of Iperius Backup allows you to backup to any mass storage device, such as NAS, external USB hard drives, RDX drives, and networked computers. It has comprehensive scheduling and e-mail sending functions. It supports zip compression with no size limit, incremental backup, network authentication and the execution of external scripts and programs.
Maryfi is a free and easy to use software router for Windows 7, 8 , and 8.1 computers. With Maryfi, users can wirelessly share any Internet connection such as: a cable modem, a cellular card, or even another Wi-Fi network. Other Wi-Fi enabled devices including laptops, smart phones, music players, and gaming systems can see and join your Maryfi hotspot just like any other Wi-Fi access point and are kept safe and secure by password-protected WPA2 Encryption.