Recently Added

Netwrix 7.504.873

Netwrix 7.504.873 Free version 14961 

Active Directory change auditing is an important procedure for limiting unauthorized changes and errors to AD configuration. One single change can put your organization at risk, introducing security breaches and compliance issues. Built-in Active Directory auditing lacks many important features and doesn't have reporting capabilities. Careful analysis of multi-megabyte Security logs can take enormous resources and still never paint the whole picture. Netwrix Active Directory Change Reporter is a free tool that reports the changes made to Active Directory and delivers a summary and detailed information on a daily basis. The report includes the 4 "W"s - Who, What, When, and Where - of all changes and includes "before" and "after" values for each setting. This report lists changes made to AD and Exchange configurations, mailboxes, AD schema, and many more. Generated data can be used to: * Monitor day-to-day administrative activities. * Prepare compliance reports for your SOX, GLBA and HIPAA auditors. Netwrix Active Directory Change Reporter records all modifications, including both user and administrative activity, and e-mails daily reports to AD administrators detailing every Active Directory change. Collected audit data is archived and can be stored for years, so you can build a summary of changes made to Active Directory during any period and drill down to detailed information as necessary. This archiving function allows organizations to analyze any policy violations, adhere to security best practices and maintain established internal policies. The tool is provided free of charge for use by organizations and individuals.

jalada Textual for Windows 3.1.5

jalada Textual for Windows 3.1.5 Trial version 14959 

jalada Textual is your Swiss Army Knife to edit any kind of text based files. Whether you simply need a tool to edit your configuration files, an application to modify or reformat large text files, a programming IDE or just an editor to tweak your web pages. Textual does what you want, the way you would expect. Textual focuses on manipulating text in ways that word processors generally cannot. In service of this goal, it offers many features including syntax highlighting, code folding, regular expression based find and replace operations, code completion, multiple character sets, split views and other useful features that enables you to edit small and also very large text files quicker and more easily. Textual is able to highlight the syntax of all important languages including bash, batch, C/ C++, C#, cmake, CSS, D, diff files, HTML, IDL - both MSIDL and XPIDL, Java, JavaScript, Lua, make, Perl, Python, PHP, Ruby, SQL, TeX and LaTeX and XML. Features at a glance: + Unicode/UTF-8 editing support. + Auto completion. + Auto-indent. + Find, find next, find previous, replace and replace all. + Regular expressions support. + Search files on disk. + Unlimited multilevel undo/redo. + Syntax highlighting for nearly any important language including bash, batch, C/ C++, C#, cmake, CSS, D, diff files, HTML, IDL - both MSIDL and XPIDL, Java, JavaScript, Lua, make, Perl, Python, PHP, Ruby, SQL, TeX and LaTeX or XML. + Code folding. + Zoom in or out on text. + Windows, Mac and Unix charset support. + Duplicate active line or selection. + Move lines up or down. + Open files in a tab or new window. + Split Views. + Color printing. + File change polling. + Wide range of commands to transform text like changing line endings, commenting code, convert text to ascii, shifting text, zapping gremlins or upper/lower case. + Drag-and-drop editing. + Marker support. and many more.

ASUS Access Point 5

ASUS Access Point 5 Trial version 14956 

ASUS Access Point is an easy-to-use software that turns your ASUS laptop into a Wi-Fi wireless access point. Anyone nearby can surf the Internet through your sharing. This is also an ideal solution for setting up a temporary AP in a hotel room, meeting room, at home or the like. Different from Virtual Access Point software which is hardware-independent, ASUS Access Point is designed for ASUS hardware only. Other laptops are not supported officially. So please choose the correct software from Laptop Access Point Series for your laptop.

ProgDVB (64 bit) 6.96.0

ProgDVB (64 bit) 6.96.0 Free version 14955 

ProgDVB and ProgTV is two is 2 independent user interfaces which can work together from one folder at one list of channels, settings etc. ProgTV is aimed at use with remote control(HTPC). ProgDVB contains more functions but is intended for use by a mouse. Thus it is very convenient to use both interfaces. ProgDVB is a piece of software which allows you to watch SAT-Television and listen to Radio channels directly from satellite by using DVB-PCI cards with hardware decoders on the board, SAT-dish, and personal x86-compatible computers. Support for various types of data sources: * Internet TV and Radio. About 4000 channels in the list. * DVB-S (satellite), DVB-S2, DVB-C (cable), DVB-T, ATSC, ISDB-T * IPTV * Analog TV * Playback from a file Main functions: * High Definition TV support including H.264/AVC * Picture-in-picture support as well as independent simultaneous recording/playback of several channels from one or more devices * Support for the majority of DVB, ISDB-T and ATSC devices including DiSEqC and CAM interfaces support * Support for all digital TV audio formats: MPEG, AC3, AAC,... * Time shifting functionality using the RAM or disk buffer of unlimited size * 10 Bands equalizer * TV and Radio channels recording * Playback from disk based files * Electronic program guide (EPG) from Digital TV or XmlTV,JTV. * Teletext * Subtile(Teletext, image-based and closed captions) * Support for VR, VMR7,VMR9 and EVR renderers including OSD (except VR) independently from channel type or signal presence * Network broadcasting * Skins for OSD and GUI * Both Win32 and full-fledged Win64 versions are available * Interface Language Localizations Currently works with DVB-S, DVB-S2, DVB-T and DVB-C cards of the following manufactures: * Anysee (E30S Plus,...) * AverMedia DVB-S * Azurewave (TwinHan) (VP-1027, VP-1034, VP-1041,... ). * BroadLogic 2030/1030 * Compro VideoMate DVB-S * Digital everywhere FireDTV/FloppyDTV * DVBWorld USB2.0 DVB-S/DVBWorldDTV(PCI-Sat), Acorp TV878DS/DS110/DS120, Nextorm NBS240/NSC120 * GeniaTech products(Digistar DVB-S PCI, satbox, TVStar, Digistar2, Digiwave 103G,...) * Hauppauge * Kworld DVB-S 100 compatible (Vstream, Dynavision..... ) * LifeView FlyDVB * 10moons * Netcast DVB * NEWMI Advanced DVB * Pinnacle * Technotrend * Tevii * TBS Q-Box * Technisat * Telemann Skymedia 300 DVB (not official) * Tongshi * Terratec * St@rKey usb box * Cards with BDA driver (possible issues with some cards) * Also works without a card, for example, as a video player or as a broadcast client

mendelson OFTP2 1.0 B27

mendelson OFTP2 1.0 B27 Free version 14955 

mendelson OFTP2 is a simple, handy OFTP2 solution. It contains a logging- and configuration GUI (SWING) and supports encryption, digital signatures, message compression, SSL. FEATURES: · Data encryption · Data signature · Data compression · SSL · Partner management · Certificate and key handling · Large file transmission · User defined event management (send/receive) · Batch processing · Virtual filename processing · Configuration backup/import-export

 Bmp Picture Maker 1.2.9.6

Bmp Picture Maker 1.2.9.6 Trial version 14953 

BMP Picture Maker is an useful software to convert many picture formats to BMP format. It supports JPG, GIF, PNG, TIF(TIFF), ICO, EXIF, WMF, BMP, EMF format etc. It resizes the original picture's width or height, and has a convenient proportional calculator to keep aspect ratio easily. It outputs the different pixel format RGB24, RGB32, RGB64 or indexed 2, 16, 256 color. It can rotate or flip bitmap. You can add text watermark which can be placed into any position of the picture. It also converts a frame of animated picture to a bmp file.

Ghostery for Chrome 4.1.0

Ghostery for Chrome 4.1.0 Free version 14953 

Ghostery sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity. After showing you who's tracking you, Ghostery also gives you a chance to learn more about each company it identifies. How they describe themselves, a link to their privacy policies, and a sampling of pages where we've found them are just a click away. Ghostery allows you to block scripts from companies that you don't trust, delete local shared objects, and even block images and iframes. Ghostery puts your web privacy back in your hands.

Google App Engine SDK for Java 1.8.7

Google App Engine SDK for Java 1.8.7 Free version 14953 

The Google App Engine SDK will let you run your web applications on Google's infrastructure. App Engine applications are easy to build, easy to maintain, and easy to scale as your traffic and data storage needs grow. With App Engine, there are no servers to maintain: You just upload your application, and it's ready to serve your users.

SkyDrive for Windows

SkyDrive for Windows Free version 14948 

SkyDrive for Windows is the easiest way to access your SkyDrive from your PC. When you install SkyDrive, a SkyDrive folder is created on your PC. Everything that you put in this folder is automatically kept in sync between your computers (PC or Mac) and SkyDrive.com, so you can get to your latest files from virtually anywhere. Whenever you add, change or delete files in one location, all of the other locations will be updated. If you forget to put something in your SkyDrive folder, you can still get back to your PC to access all of its files and folders from SkyDrive.com. Features Access your SkyDrive from Windows Explorer – photos, documents and all your other important files. Quickly add new files to SkyDrive by dragging them to the SkyDrive folder. Easily organise your files and folders in SkyDrive, just like any other folder. Connect back to your PC if you forget to put something in SkyDrive. Choose the folders in your SkyDrive that you want to sync on your PC.

Trogon MAC Scanner 2.5

Trogon MAC Scanner 2.5 Trial version 14948 

Trogon MAC Scanner is a necessary tool for efficient network administration and network maintaince. You will always know which computers and other network devices connected to the network, who are used them and where they are located. Trogon MAC Scanner automatic compare scan results with database and indicate new or changed hosts and you can immediately detect illegal access to the network. You can save scan results database to the file for future network monitoring and maintenance. Trogon MAC Scanner scan local network and detect IP addresses and MAC addresses for every network devices. Also find additional attributes: host name, workgroup, network adapter manufacturer. Trogon MAC Scanner use ARP protocol for scan subnet and use multithreading for simultaneous a large number of queries send out. This allows scan network incredible fast. If your computer connected with a several subnets, you can select any for scan. Features: Scan and list IP addresses and MAC addresses of all the network devices. Scan local network, find all network devices, detect their IP addresses and MAC addresses and list these addresses in pairs. Just a few seconds and you will get information about all connections to the network Save scan results into the database. After scan is finished you can add scan results to the database. When results has been added to the database you can edit records. Also the database will used for comparison with future scan results and detection new connections or any other changes in your subnet. Scan results can be saved for future reference and maintenance. Edit database records, add attributes (user name, location) to any record. When scan results has been added, you can add more details for any computer in the network. For every network device you can indicate where his physical location and who is his owner and any comments. Trogon MAC Scanner allows set attributes: host name, workgroup, user name, location, comments. It is enable to create new records manually (without scan) and change IP addresses and MAC addresses for an existed records. You will always have information for efficient network management about users and devices in your network. Automatic compare scan results with database records and indicate difference. Automatic comparison of the scan results and the database records indicate changes in your local network. You can immediately detect unauthorized IP addresses or MAC addresses modifications and illegal access to the network. Also you can always add new devices without manual addresses entering. Click record marked as changed and get comparison details contains databases and new addresses. Automatic addresses comparison always started after every scan. Export and Import database in file formats (txt, xml, csv). Trogon MAC Scanner can export scan results to the file (support formats are TXT, CSV, XML) for future usage and import records from file to the database. You can export some selected records or the entire database.

K7 TotalSecurity 11

K7 TotalSecurity 11 Trial version 14945 

K7 TotalSecurity 11 safeguards your computer and network from newly emerging internet security threats such as email borne viruses, worms, Trojans, spywares, adware, unwanted spam emails, key loggers and much more. K7 internet security software suite comprises of Anti-virus software, which protects your pc from email borne potential virus attacks, Anti-spam, which recognizes and controls unwanted emails flooding your inbox, Anti-spyware, which prevents unwanted programs being installed in your computer without your authentication, Firewall, an intrusion prevention system, which functions as a traffic monitor and prevents unauthorized hackers entering your network, Privacy, which acts as a parental control software. And finally System monitor, which stops unwanted programs slowing down the performance of the system and detects / notifies if there are any unauthorized changes made to the computer security settings. The advanced virus removal and scan engine, in the total security makes your system safe and secure. Download your free trial version of K7 Total Security and protect yourself against any kind of internet security threats. Try K7 TotalSecurity – internet security suite for free.

11 from 15615

« First « Prev 1 2 ... 185 186 187 188 189 ... 1419 1420 Next » Last »

Best Apps for Windows From the Editors

GOM Media Player 2,2,71,5231

GOM Media Player 2,2,71,5231

GOM Media Player The only media player you need - for FREE! Not only is GOM Media Player a completely FREE video player, with its built-in support for all the most popular video and Media Player formats, tons of advanced features, extreme customizability, and the Codec Finder service, GOM Media Player is sure to fulfill all of your playback needs. With millions of users in hundreds of countries, GOM Media Player is one of the world`s most popular video players. Whats New : Added "Touch Setting" feature for touch screen devices. Added "Search box" feature on playlist. (Ctrl+F) Supported "HTTPS URL" for youtube or net radio playback. (Ctrl+U) Added "Music Tap" on preferences related to play music files. Improved performance related to "speed of add & delete" of files on playlist. Other miscellaneous corrections, fixes, and changes

Iperius Backup 3.8.2

Iperius Backup 3.8.2

Iperius Backup is one of the best free backup software, also released in commercial editions for those who need advanced backup features for their companies. The freeware version of Iperius Backup allows you to backup to any mass storage device, such as NAS, external USB hard drives, RDX drives, and networked computers. It has comprehensive scheduling and e-mail sending functions. It supports zip compression with no size limit, incremental backup, network authentication and the execution of external scripts and programs.

Maryfi

Maryfi

Maryfi is a free and easy to use software router for Windows 7, 8 , and 8.1 computers. With Maryfi, users can wirelessly share any Internet connection such as: a cable modem, a cellular card, or even another Wi-Fi network. Other Wi-Fi enabled devices including laptops, smart phones, music players, and gaming systems can see and join your Maryfi hotspot just like any other Wi-Fi access point and are kept safe and secure by password-protected WPA2 Encryption.