Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Advertising
Display: short descriptions | full descriptions
  • Convert between any video formats: Input Formats: FLV (Flash Video), AVI (DIVX, XVID), MPEG1, MPEG2, MPEG4 (iPod, PSP, MP4), 3GP, 3GP2, MOV, DAT, WMV, ASF. Output Formats: FLV, SWF, AVI, MPEG (DVD, VCD, SVCD, MPEG1, MPEG2), MPEG4 (iPod, PSP), 3GPP, 3GPP2, WMV, RMVB, MOV, MP3, WAV. Cut, Merge a lot of video/audio files into 3GP, FLV, SWF, iPod, PSP, MP4, RMVB, MP3, WAV, WMA, MOV, MPEG1, MPEG2, VCD, SVCD, DVD, AVI or WMV files. Add Overlay Image (Bitmap, GIF, JPEG, PNG) to your video file, user define transparent color, position of image, Alpha channel value. Add 3D transitions (70 transitions) (any combination of video clips). Draw Banner text in video file, support different text style, including outline , filled outline, hash brush text style. Add awesome effects (over 50 effects) (any combination of video clips). Draw multi-line text at a specific time in your video file, user define transparent color, position of text, Alpha channel value. User define thumbnail ...
  • Hashing and checksum operations for text or files. Algorithms for calculations: MD2, MD4, MD5, SHA1, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, WHIRLPOOL, Tiger, Adler32, CRC32 and Panama. Fast and easy.
  • Break MDB Access Password to open database by unlock, uncovered, retrieve, crack restore access mdb database file's password. Break MDB Access Password program recovers the lost MS access password by persecuting recovery algorithms. Break MDB Access Password and reveal the password protected mdb MS access database files to reuse. MDB Password Cracker Recovery Tool recovers passwords from MS access 95, 97, 2000, XP, 2003 databases mdb files. If you have lost or forgot the MS Access database password, Don't get anxious, you already have chance to recover it with our recovery program. MDB Password restoration software restores complete password in just two steps browse the file click the button to recover password. And you can open the database for any manipulation or work. Access Password Cracking - Recovery Tool supports to recover access password of MS Access version 2007/2003/2002/2000/97/95. Tool can recover restore unmask lost passwords instantly. Crack password recovery tool allow ...
  • FoxCrypt is a security software product. It uses AES 256 encryption algorithm and RIPEMD 160 hash function. FoxCrypt supports multiple user accounts. Without password, not even FBI could recover the original. Move files into vault and keep them private even if you share a computer. Users will not be able to open, read, modify, delete, move or copy the protected files/folders. The hidden files/folders will be totally invisible to users or to any other programs including Windows Explorer. FoxCrypt is designed to protect files and folder on your local disk. FoxCrypt will not slow down the system speeds and it will never have the chance to destroy your data. Read and write files as usual. Just drag your files into a secure virtual disk in the Explorer, they will be encrypted on-the-fly.
  • A quick and professional way to add strong encryption to your application. 1Crypt is an ActiveX control which allows you to easily and securely encrypt files and strings using 256-bit AES Rijndael) encryption. String and file ceccksums using SHA 256-bit hashes. Using strong encryption in your application doesn't have to be complicated. For more information: http://www.buy-for-fun.com
  • This is a freeware Windows Explorer extension. It installs itself into the file context menu, adding two new items: Get Sign, Check for Sign. Crypto Helper can generate and verify MD5, SHA1 and CRC32 signatures. This can be useful for checking the integrity of a downloaded file, for backup and virus protection. If some hash does not match it's original - then the file was modified somehow. Crypto Helper is always ready at a click of a button.
  • HashTray is a windows hash calculator for verification of file integrity.With HashTray you can generate different hashes for a single file, or use the multi file hasher to easy compare files or find duplicate files.
  • Convert between any video formats: Input Formats: FLV (Flash Video), AVI (DIVX, XVID), MPEG1, MPEG2, MPEG4 (iPod, PSP, MP4), 3GP, 3GP2, MOV, DAT, WMV, ASF. Output Formats: FLV, SWF, AVI, MPEG (DVD, VCD, SVCD, MPEG1, MPEG2), MPEG4 (iPod, PSP), 3GPP, 3GPP2, WMV, RMVB, MOV, MP3, WAV. Cut, Merge a lot of video/audio files into 3GP, FLV, SWF, iPod, PSP, MP4, RMVB, MP3, WAV, WMA, MOV, MPEG1, MPEG2, VCD, SVCD, DVD, AVI or WMV files. Add Overlay Image (Bitmap, GIF, JPEG, PNG) to your video file, user define transparent color, position of image, Alpha channel value. Add 3D transitions (70 transitions) (any combination of video clips). Draw Banner text in video file, support different text style, including outline , filled outline, hash brush text style. Add awesome effects (over 50 effects) (any combination of video clips). Draw multi-line text at a specific time in your video file, user define transparent color, position of text, Alpha channel value. User define thumbnail ...
  • Play all files without codecs. Play rar files without extracting. Play AVI,. MPGE, RMVB, OGG, MP3, RAR, MKV/MKA and some not popular formats. Automatic download subtitles form opensubtitles.org using hash. Image grabber function (generate thumnails from movie on one jpg). "Compressed video is a great way to download and share movies, but it does have a downside in that you normally need to wait for the whole thing to unpack in WinRAR before you can see it. This nifty little tool solves that problem, by allowing you to watch parts of a video before it has fully unpacked." James Thornton from softonic.com
  • 3GP, FLV, SWF, iPod, PSP, MP4, RMVB, VCD, SVCD, DVD, MOV, AVI, DIVX, WMV, MP3, WMA, WAV formats video converter. In current market, if you want to convert different video format or join, cut video/audio files, you may need buy several video/audio converter application. Video Edit Converter Gold can convert to iPod,3GP, PSP, MP4, RMVB, VCD, SVCD, DVD, MOV, AVI, DIVX, WMV, MP3, WMA, WAV formats in one application and it including a lot of video editing function - add video effects, transitions, overlay texts, images on video. Product Features: Cut, Merge a lot of video/audio files into iPod, PSP, MP4, RMVB, MP3, WAV, WMA, MOV, MPEG1, MPEG2, VCD, SVCD, DVD, AVI or WMV files. Convert to iPod, PSP ,AVI, RMVB, MPEG, MPEG 1, MPEG 2, MPEG 4, VCD, DVD, SVCD, WMV, MOV, DIVX, MP3, WMA, WAV video/audio formats. Add Overlay Image (Bitmap, GIF, JPEG, PNG) to your video file, user define transparent color, position of image, Alpha channel value. Draw Banner text in video file, support different text ...
  • We are proud to present you our unique image comparison algorithm implemented as standalone dll file. It has only one exported function with two bitmap pointers in and similarity percentage out. Can work with many programming languages including Delphi, Visual C++, C#, VB and VB.NET. We can also provide you with the modified DLL. It can precalculate image hash (768 bytes) and you can use these hashes for comparison then.
  • One of the most favorite characters of Japanese anime by Japanese manga artist Rumiko Takahashi has become one of the best in this genre. InuYasha charms children and adults all over the world.
  • Protect your website from unauthorized changes (hacking). Protects against defacement (visible changes) and malware (invisible changes) via date change and/or MD5 hash of all files on your site. Application is free, without restriction and contains no adverting or other annoyances. Source code available for nominal charge.
  • Speed up .NET development and create secure and trouble-free code. CryptoSharp Security Library provides complete data security throughout your .NET applications. Encrypt, store, and erase data securely. Saves time on development and debugging, and creates fast, secure and reliable code. Cryptographic and compression algorithms, secure hash functions and cryptographically strong random number generators are included.
  • Ai Takahashi is the lead singer of japanese pop group Morning Musume. Born September 14, 1986, Ai Takahashi is a pretty and cute girl. See her posing in various outfits including bikinis and swimsuits. Free screensaver containing 25 high quality full screen images.
  • Shashki is played by two people, on opposite sides of a playing board, alternating moves. One player has blue pieces, and the other has red pieces. Pieces move diagonally and pieces of the opponent are captured by jumping over them. The playable surface consists only of the dark squares. A piece may only move into an unoccupied square. In all variants, the player who has no pieces left or cannot move anymore has lost the game.
  • FreeOTFE4PDA is a free, open source, "on-the-fly" (OTFE) transparent disk encryption program. Using this software, you can create one or more "virtual memory cards" on your PDA - anything written to which will be automatically, and securely, encrypted before being stored. Features include: - Source code freely available - Easy to use; full wizard included for creating new volumes - Powerful: Supports numerous hash/encryption algorithms, and provides a greater level of flexibility than a number of other (including commercial!) OTFE systems - Hash algorithms include: MD5, SHA-512, RIPEMD-160, Tiger and many more - Cyphers include AES (256 bit), Twofish (256 bit), Blowfish (448 bit), Serpent (256 bit) and many more - "Hidden" volumes may be concealed within other FreeOTFE volumes, providing "plausible deniability" - Encrypted volumes have no "signature" to allow them to be identified as such - Modula ...
  • FreeOTFE is a free, open source, "on-the-fly" (OTFE) transparent disk encryption program. Using this software, you can create one or more "virtual disks" on your PC - anything written to which will be automatically, and securely, encrypted before being stored. Features include: - Source code freely available. - Easy to use; full wizard included for creating new volumes. - Data encrypted on your PC can be read/written on your PDA, and vice versa. - Powerful: Supports numerous hash/encryption algorithms, and provides a greater level of flexibility than a number of other (including commercial!) OTFE systems. - Hash algorithms include: MD5, SHA-512, RIPEMD-160, Tiger and many more. - Cyphers include AES (256 bit), Twofish (256 bit), Blowfish (448 bit), Serpent (256 bit) and many more. - "Portable mode" included; FreeOTFE doesn't need to be installed before it can be used - making it ideal for carrying your data securely on USB dr ...
  • Paraben's SIM Card Seizure is a forensic analysis tool used to acquire and examine data from a SIM Card. Used by forensic experts around the world, SIM Card Seizure can not only analyze data on the card, it can recover deleted items such as SMS/Text messages, verify data integrity with hash values, and generate a full report of the data on the card which preserves the evidence you gather. It also has unicode support to read multiple languages such as Arabic, Chinese, & Russian. Whether you're an idividual trying to find that important message or a coporation in need of eDiscovery of SIM Cards, SIM Card Seizure can help you find the information you need. FEATURES: Complete Data Acquisition of SIM Card. Recovers deleted text/sms messages. PIN/PUK code management. Full html reporting options. Works with PC/SC compliant SIM card readers. Software includes a compatible SIM card reader. SIM Card Seizure also acquires the whole catalog system with data in a tree-view presentation. Additiona ...
  • Password tool for Windows NT/2000/XP/2003 system administrators for find breaches in system security. Win Password tries to recover plain-text passwords analyzing user password hashes. If it is possible to recover a password within reasonable time, the password should be considered insecure. WinPassword uses Smart Table Recovery (TM) technique based on precomputed rainbow tables that allows recovering long and complex passwords quickly.
  • Business, or Network version of innovative password management software Arovax TraySafe allows to forget password problems of small offices or whole corporations. There are a lot of password keeping solutions nowadays, however none of them can be compared to TraySafe password manager in terms of safety and convenience. Network password management meets the requirements of any corporate network security policy. This program shares common passwords between users; it is able to specify access permission for each password per each user. Also, users can save their personal passwords on the server and protect them even for case of disaster. They can forget passwords and they will not lose them. There is no other password management tool, which could compete to TraySafe in security level. Arovax TraySafe offers a wide choice of world's most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Currently it supports 19 encryption algorithms to protect password files and 10 hash algorithms to ge ...
  • Windows registry files can have thousands upon thousands of entries. Viewing, analyzing, and reporting on these files can be a daunting task. Registry Analyzer is a comprehensive computer forensic analysis tool for analyzing Windows registry entries. FEATURES: Compatible with Paraben's P2 Examination Technology. Hash value verification: MD5, MD4, & SHA1. Load multiple registries. Bookmarking. Advanced searching options. HT ML reporting & more.
  • Paraben's P2 eXplorer allows you to mount a forensic image (or Linux DD, RAW, or other drive images) and explore it as though it were a drive on your machine while preserving the forensic nature of your evidence. This means that an image isn't just mounted to view logical files, it is mounted as the actual bitstream image, preserving unallocated, slack, and deleted data. FEATURES: Mounts Paraben's Forensic Replicator images (PFR). Mounts compressed & encrypted PFR images. Mounts EnCase images. Mounts SafeBack 1 & 2 images. Mounts WinImage non-compressed images. Mounts RAW images from Linux DD & other tools. Supports Dynamic drive images. Auto-detects image format. Supports both logical and physical images types. MD5 hash verification. Shell support for easy mounting/unmounting. Write-protection for preserving evidence. MD5 checksum verification. Supports mounting over a network. Mount several images at a time.
  • Forensically analyze PDA & cell phone data. Supports Palm, Windows CE/Mobile, BlackBerry, & Psion devices as well as certain Nokia, Sony Ericsson, Motorola, Siemens, LG, Samsung, & Symbian based phone models. Also supports GSM SIM card aqcuisition. Focuses on the physical level of acquisition offering more physical downloads of devices. The physical acquisition plug-in offers memory imaging on most of the devices supported in Device Seizure. Logical data acquisitions can?t acquire more data than the device Operating System was designed to allow. Features include: Comprehensive easy-to-use interface, USB and serial support, Comprehensive data acquisition of text messages, address books, call logs, and more, Recovers deleted data, Verification of file integrity with use of MD5 and SHA1 hash values, Built-in file viewing of proprietary files, Multi-language (Unicode) support for languages such as Arabic, Russian, Chinese, etc., Built-in searching and bookmarking, Text and Hex viewing options availabl ...
  • Recover passwords for over 30 applications. This advanced password recovery suite recovers passwords for Office, Excel, Word, Windows XP/2000/NT, Access, Outlook, Outlook Express, Exchange, WinZip, PKZip, ZIP, VBA Visual Basic modules, Internet Explorer, Acrobat, Quicken, QuickBooks, Lotus 1-2-3, Lotus Organizer, Lotus WordPro, Backup, Project, MYOB, Paradox, ACT!, Mail, Schedule+, Money, WordPerfect, Filemaker, Peachtree Accounting. Utilizes MD5 Hash Verification for forensic integrity. Simple, easy-to-use interface - just drag and drop file to be recovered. Lists most recent files recovered. HTML reporting of recovery results. Password cache for quick recovery of repeat passwords.
Advertising

Page 3 of 4
1 2 3 4


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware