Support unlimited multiple video track and audio track.
Support video mixing and audio mixing.
Support chroma key video effect.
Support resize video with Nearest Neighbor, High Quality Bilinear, High Quality Bicubic, BiLinear MMX resizing algorithm.
Support Picture in Picture with multiple zone video effect.
Support Adjust audio volume or add crossfade audio effect at any point on the timeline using unique volume track.
Allow Input FLV, F4V, AVCHD (m2ts, ts), Mp4, m4v, QuickTime MOV with aac audio, 3gp, 3g2 with amr audio , MPEG1, MPEG2, VOB, WMV, AVI, ASF DIVX file.
Convert, Resize video to AVCHD (m2ts,ts), RMVB (Real Media Video), Animated GIF, QuickTime MOV , DIVX, AVI, WMV, MPEG1, MPEG2, VCD-PAL ,VCD-NTSC, SVCD-PAL, SVCD-NTSC, DVD-PAL, DVD-NTSC.
Load Subtitle file (srt file) and display subtitle on video.
Support change audio pitch when save to mp3, wav, wma file.
Allow output AVCHD(m2ts, ts) with 1920x1080, 1280x720, 720x576, 720x480.
Allow use built-in MPEG layer 3 audio compressor when outp ...
Captcha Breaker is an automated software to solve captchas. This revolutionary software works together with any third party web promotion software to effortlessly analyse and solve captchas for you. No need to type in captchas manually or pay captcha services to solve them ever again. The program is an excellent alternative to the popular online services that had the monopoly over decrypting captchas. Supports more than 600 pre-configured captcha types to solve and you can also add your own captcha solving algorithms using the most advanced and easy to use SDK (Software Development Kit).
Just start Captcha Breaker and on your web promotion program select either decaptcher, death-by-captcha or any of the other supported captcha services as your captcha solver. That's it, you are now ready to start your submissions and solve captchas on autopilot.
Captcha Breaker's captcha solvers algorithms are so advanced that depending on the level of difficulty of the captchas you routenily need to solve, it is ...
The extended version of Plagiarism Finder comprises of the extended module for plagiarism search and updated text analyzer, whereby the application defines plagiarism in the text as accurately as possible.The plagiarism search is produced by accelerated algorithm involving the latest technologies in the field of plagiarism detection.
Traditional disk wipers are often stuck in bad sectors leaving no time to sanitize data on healthy area of the disk, or just skip them leaving sensitive information around bad sectors not erased. WBD(Wipe Bad Disk) can thoroughly wipe disks with bad sectors in a hierarchical and elegant way. Even the disk has no bad sectors, you can also take advantage of the WBD's unique wiping algorithm to gain high security degree in a short time.
Due to the occurrence of mishaps such as power failure, unexpected system shutdown, attack of virus, corruption of MS Word doc file, corruption in the storage media, corruption in Windows OS, corruption in Windows Registry etc. the word file becomes inaccessible. Recoveryfix for Word software is a professional and result oriented tool that carry out a faultless and efficient word recovery process. Using this utility, the user can restore data items like OLE objects, images, forms, graphs, hyperlinks, tables, etc. from word files. The software even lets the user to repair Unicode characters with this Word 2007 recovery tool within the word file. During the recovery process, the software retains the original structure, formatting and properties of the data files. While recovering Word files data, the tool creates a separate folder under the REC at a defined location on the hard disk. Recoveryfix for Word is embedded with powerful algorithms that enable the tool to thoroughly scan corrupted word files and recove ...
Free MD5 SHA1 Verifier is a freeware tool designed to calculate and verify checksums (hash) of downloaded files. Supports MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512. Key Features: The program has a convenient user interface. Instantly calculate checksum (hash) for any file. Verify file checksum. Supports most hashing algorithm: MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512. Drag-and-Drop is supported. The program is very customizable.
One of the best fully automatic image optimizations in the world! How many photos of your last holidays are still waiting for being edited? Present your photos in top form: Use the latest optimization algorithms and don't let your marvellous memories be spoilt by a poor photo quality! The innovative "Simply Good Pictures 3" software optimizes your photos with just one click!
This program offers you various methods to resize digital photos including new STOIK Smart Resize algorithm which allows to enlarge digital images up to 1000% without loss of visual sharpness. You will find it useful for multiple tasks - from quality zooming to increasing resolution of digital photos to creation of good-looking photo thumbnails.
Recovery Toolbox for PowerPoint is your effective assistant in recovery of corrupted .ppt or .pptx presentations created in MS PowerPoint. Using intelligent scanning algorithm, this software is able to recover not only structure of slides and alphanumeric data, but also embedded objects, such as pictures, tables and animations. User friendly, it will allow to quickly restore MS PowerPoint files, corrupted by PC errors or malicious programs.
AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from C/C++ applications. Uses the latest 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, key generation from text and password phrases. Implements buffer padding and does random byte data generation. Works with C++, C#.NET, Visual Studio, MFC and C++ Builder. Win32/Win64.
The encrypted file clipboard abylon SHAREDDRIVE is shown in the File Explorer on the desktop level and protect your secret files. The complete integration into the Explorer environment simplify using of the software. The encryption and decryption with the AES algorithm is done for each file operation automatically in the background. The file-based structure allow the simultaneous access of several users and reduce the backup data transfer volume.
Page 1 of 10
1 2 3 4 5 6 7 8 9 10