Batch Photo Resizer is a simple yet rich user experience and full-featured photo resizer utility. You can resize, convert, rename, sort, rotate, flip, stretch and adjust your photos in batch mode with the tiny tool. The powerful program will help you change multiple photos from digital cameras or other devices in one time, automate and simplify duplicate tasks and save you a lot of time. Main features: Resize your pictures with batch processing. Batch or single image file conversion. Sort images by the file time or name for batch rename. Search photos in a folder. Add text watermark, rotate, flip, stretch image files in batch mode. Drag and drop files. Optimize photos without losing quality. Support input photo formats like JPG/JPEG, BMP, GIF, PNG, TIF, ICO, EXIF, WMF, EMF, etc. Support output formats like BMP, JPEG, PNG, TIF.
The Google App Engine SDK will let you run your web applications on Google's infrastructure. App Engine applications are easy to build, easy to maintain, and easy to scale as your traffic and data storage needs grow. With App Engine, there are no servers to maintain: You just upload your application, and it's ready to serve your users.
Trogon MAC Scanner is a necessary tool for efficient network administration and network maintaince. You will always know which computers and other network devices connected to the network, who are used them and where they are located. Trogon MAC Scanner automatic compare scan results with database and indicate new or changed hosts and you can immediately detect illegal access to the network. You can save scan results database to the file for future network monitoring and maintenance. Trogon MAC Scanner scan local network and detect IP addresses and MAC addresses for every network devices. Also find additional attributes: host name, workgroup, network adapter manufacturer. Trogon MAC Scanner use ARP protocol for scan subnet and use multithreading for simultaneous a large number of queries send out. This allows scan network incredible fast. If your computer connected with a several subnets, you can select any for scan. Features: Scan and list IP addresses and MAC addresses of all the network devices. Scan local network, find all network devices, detect their IP addresses and MAC addresses and list these addresses in pairs. Just a few seconds and you will get information about all connections to the network Save scan results into the database. After scan is finished you can add scan results to the database. When results has been added to the database you can edit records. Also the database will used for comparison with future scan results and detection new connections or any other changes in your subnet. Scan results can be saved for future reference and maintenance. Edit database records, add attributes (user name, location) to any record. When scan results has been added, you can add more details for any computer in the network. For every network device you can indicate where his physical location and who is his owner and any comments. Trogon MAC Scanner allows set attributes: host name, workgroup, user name, location, comments. It is enable to create new records manually (without scan) and change IP addresses and MAC addresses for an existed records. You will always have information for efficient network management about users and devices in your network. Automatic compare scan results with database records and indicate difference. Automatic comparison of the scan results and the database records indicate changes in your local network. You can immediately detect unauthorized IP addresses or MAC addresses modifications and illegal access to the network. Also you can always add new devices without manual addresses entering. Click record marked as changed and get comparison details contains databases and new addresses. Automatic addresses comparison always started after every scan. Export and Import database in file formats (txt, xml, csv). Trogon MAC Scanner can export scan results to the file (support formats are TXT, CSV, XML) for future usage and import records from file to the database. You can export some selected records or the entire database.
BMP Picture Maker is an useful software to convert many picture formats to BMP format. It supports JPG, GIF, PNG, TIF(TIFF), ICO, EXIF, WMF, BMP, EMF format etc. It resizes the original picture's width or height, and has a convenient proportional calculator to keep aspect ratio easily. It outputs the different pixel format RGB24, RGB32, RGB64 or indexed 2, 16, 256 color. It can rotate or flip bitmap. You can add text watermark which can be placed into any position of the picture. It also converts a frame of animated picture to a bmp file.
Advanced Task Manager is a program that focuses on keeping your computer secure and helping you find and disable spyware rapidly. Advanced Task Manager shows you exactly what is running on your computer, including the hidden processes. You can view the details of each process, including a security rating and security details such as whether a program connects to the Internet, watches what you type, is an Internet server, is hidden, is encrypted on disk, has invisible windows, etc. The security rating of a program indicates the likelihood of it being a virus, spyware, trojan, etc. If you discover a rogue program you can easily stop, quarantine or uninstall it so it doesn't run anymore. You can also manage your Windows startup programs with the included Startup Manager. Several other tools offer you detailed information about Internet connections, DLL files, CPU and memory use, Internet server programs running on your computer.
jalada Textual is your Swiss Army Knife to edit any kind of text based files. Whether you simply need a tool to edit your configuration files, an application to modify or reformat large text files, a programming IDE or just an editor to tweak your web pages. Textual does what you want, the way you would expect. Textual focuses on manipulating text in ways that word processors generally cannot. In service of this goal, it offers many features including syntax highlighting, code folding, regular expression based find and replace operations, code completion, multiple character sets, split views and other useful features that enables you to edit small and also very large text files quicker and more easily. Textual is able to highlight the syntax of all important languages including bash, batch, C/ C++, C#, cmake, CSS, D, diff files, HTML, IDL - both MSIDL and XPIDL, Java, JavaScript, Lua, make, Perl, Python, PHP, Ruby, SQL, TeX and LaTeX and XML. Features at a glance: + Unicode/UTF-8 editing support. + Auto completion. + Auto-indent. + Find, find next, find previous, replace and replace all. + Regular expressions support. + Search files on disk. + Unlimited multilevel undo/redo. + Syntax highlighting for nearly any important language including bash, batch, C/ C++, C#, cmake, CSS, D, diff files, HTML, IDL - both MSIDL and XPIDL, Java, JavaScript, Lua, make, Perl, Python, PHP, Ruby, SQL, TeX and LaTeX or XML. + Code folding. + Zoom in or out on text. + Windows, Mac and Unix charset support. + Duplicate active line or selection. + Move lines up or down. + Open files in a tab or new window. + Split Views. + Color printing. + File change polling. + Wide range of commands to transform text like changing line endings, commenting code, convert text to ascii, shifting text, zapping gremlins or upper/lower case. + Drag-and-drop editing. + Marker support. and many more.
Spy Emergency is an anti-spyware software that fast and secure removes spyware and other internet infections from your computer. Spy Emergency protects you against spyware, adware, malware, homepage hijackers, remote administration tools, dialers, keyloggers, and many other types of internet infections. Spy Emergency supports resident shields for real-time protection and automatic infections database updates for better protection. Secure Your Ideas with Spy Emergency! Spy Emergency is a security application that protects your PC from spyware, malware and adware. FEATURES: · Built-in proactive resident shield protection with dynamic heuristic engine that can even detect new and unknown Internet threats · Lowlevel Anti-rootkit Protection · Site Identity Verifier · Extended behavioral heuristic scanning · Support for Internet Explorer, Mozilla Firefox and Opera browsers · Scan of your system memory · Scan of your registry · Scan of your storage · Built-in anti-spam · System directory storage scan · Tracking cookies scan · Host file scan · Hijackers scan · Heuristic malware detection · Polymorhic malware detection · Generic unpacker with support for UPX, Aspack, ... · Command line interface · Automatic LSP stack repair · Real-time memory shields that blocks spyware before it executes · Prevention shields that blocks malware installation · Browser shields, including homepage shield · Tracking cookies shields · Automatic incremental database updates · News updates · Individual items restore functionality · Keeplist · Scheduling support · Simple configuration · Intuitive and clear user interface for spyware removal · Handy Shell Extension Scanning · Skin support · Language support · Premium Technical support
Easy portrait editing software, remove blemish and wrinkles, gain a perfect look. Support working as a Photoshop & Photoshop Elements plug-in. 1.Skin blemishes removal Quickly remove skin blemishes such as acnes, moles, redness, etc. Dramatically reduce wrinkles, eye bags, skin blotchiness and deep pores. Maintain nature skin texture so the portrait doesn't look over retouched. 2.Skin smoothing and enhancement Smooth skin, fine facial shine and enhance skin tone to give the portrait a professional look. 3.Features enhancement Remove red - eye, enhance eyes and eyebrows instantly. Whiten teeth and make lips look more vivid. 4.Face reshaping Reshape face, eyes, nose and mouth simply by moving sliders. Give the portrait a better look. 5.Full-body skin perfection With the skin brush you can customize the skin area easily to perfect all visible skin, not just the facial area. 6.Image color correction Remove color casts and adjust overall image color to restore a real photographic scene. 7.Formats supported Support importing file in these formats: Bitmap, JPEG, 24/48-bit TIFF, Camera RAW and Adobe DNG. Support saving as TIFF and JPEG.
IZArc2Go is portable version of IZArc. Just drop it on any USB Flash Drive and you will have full functional archive utility wherever you go. You don't have to install anything on the computer's hard disk. IZArc2Go has all features of IZArc except that it can’t be integrated into the Explorer shell menu and it is not possible to associate any archive file type with it.
ASUS Access Point is an easy-to-use software that turns your ASUS laptop into a Wi-Fi wireless access point. Anyone nearby can surf the Internet through your sharing. This is also an ideal solution for setting up a temporary AP in a hotel room, meeting room, at home or the like. Different from Virtual Access Point software which is hardware-independent, ASUS Access Point is designed for ASUS hardware only. Other laptops are not supported officially. So please choose the correct software from Laptop Access Point Series for your laptop.
Better Privacy serves to protect against undeletable longterm cookies, a new generation of 'Super-Cookie', which silently conquered the internet. This new cookie generation offers unlimited user tracking to industry and market research. Concerning privacy Flash- and DOM Storage objects are most critical. Flash-cookies (Local Shared Objects, LSO) are pieces of information placed on your computer by a Flash plugin. Those Super-Cookies are placed in central system folders and so protected from deletion. They are frequently used like standard browser cookies. Although their thread potential is much higher as of conventional cookies, only few users began to take notice of them. It is of frequent occurrence that -after a time- hundreds of those Flash-cookies reside in special folders. And they won't be deleted - never! BetterPrivacy can stop them, e.g. by allowing to silently remove those objects on every browser exit. So this extension becomes sort of "install and forget add-on". Usually automatic deletion is safe (no negative impact on your browsing), especially if the deletion timer is activated. The timer can delay automatic deletion for new or modified Flash-cookies which might be in use. It also allows to delete those objects immediately if desired. With BetterPrivacy it is possible to review, protect or delete new Flash-cookies individually. Users who wish to to manage all cookies manually can disable the automatic functions. BetterPrivacy also protects against 'DOM Storage' longterm tracking, a browser feature which has been granted by the major browser manufactures.
GOM Media Player The only media player you need - for FREE! Not only is GOM Media Player a completely FREE video player, with its built-in support for all the most popular video and Media Player formats, tons of advanced features, extreme customizability, and the Codec Finder service, GOM Media Player is sure to fulfill all of your playback needs. With millions of users in hundreds of countries, GOM Media Player is one of the world`s most popular video players. Whats New : Added "Touch Setting" feature for touch screen devices. Added "Search box" feature on playlist. (Ctrl+F) Supported "HTTPS URL" for youtube or net radio playback. (Ctrl+U) Added "Music Tap" on preferences related to play music files. Improved performance related to "speed of add & delete" of files on playlist. Other miscellaneous corrections, fixes, and changes
Iperius Backup is one of the best free backup software, also released in commercial editions for those who need advanced backup features for their companies. The freeware version of Iperius Backup allows you to backup to any mass storage device, such as NAS, external USB hard drives, RDX drives, and networked computers. It has comprehensive scheduling and e-mail sending functions. It supports zip compression with no size limit, incremental backup, network authentication and the execution of external scripts and programs.
Maryfi is a free and easy to use software router for Windows 7, 8 , and 8.1 computers. With Maryfi, users can wirelessly share any Internet connection such as: a cable modem, a cellular card, or even another Wi-Fi network. Other Wi-Fi enabled devices including laptops, smart phones, music players, and gaming systems can see and join your Maryfi hotspot just like any other Wi-Fi access point and are kept safe and secure by password-protected WPA2 Encryption.