|
|
Algorithms
|
cryptlib License: Freeware
|
|
|
Cryptlib by Peter Gutmann is a security toolkit that allows even less experienced programmers to add strong encryption and authentication services to their programs, security features that are becoming more and more indispensable. The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their projects more secure. Some of the symmetric encryption (private key) and authentication algorithms that cryptlib supports include the following: · AES (Rijndael) · Blowfish · DES, 3DES · RC2, RC4, RC5 The following hash algorithms are available in the library: · MD2, MD4, MD5 · RIPEMD-160 · SHA It offers services such as: · S/MIME · SSL/TLS · ssh It features various hashed message authentication code algorithms: · HMAC-MD5, HMAC-SHA, HMAC-RIPEMD-160 Finally, asymmetric (public/private key) encryption algorithms such as the following are available: · Diffie-Hellman, DSA, RSA cryptlib can also be used with a variety of crypto devices (for example, Fortezza cards and Smart cards). The library is free if used in personal, freeware, or shareware projects. The library is written in C. ActiveX and C++ wrappers are provided. The project is OSI Certified Open Source Software.
Author: ComponentSpot| Date: 10-03-2004 | Size: 1347 KB
|
|
- |
|
CHAOS Compressor License: Freeware
|
|
|
Data compression utility, which allows you to quickly open, create, and modify your archives.
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 491 KB
|
|
- |
|
Penis Size-O-Matic License: Freeware
|
|
|
This program uses a complex set of algorithms and some hella nifty DLLs to dynamically increase and decrease the size of the user's penis using only their computer. Oh! But it doesn't really.
Author: Kevin Lyall| Date: 19-10-2003 | Size: 1870 KB
|
|
- |
|
OpenSSL License: Freeware
|
|
|
By using the Open SSL 0.9.7c library, developers can write applications that take advantage of Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1). The Open SSL library uses the included full-strength general-purpose cryptography library, which can be used by itself. Security features such as the following can be implemented: · Data integrity: An application can detect if data has been modified during transmission. · Authenticity: An application can verify the identity of the sender using certificates. · Privacy: An application can ensure that no intermediary between the sender and the recipient can understand the data. Transport Layer Security is an extension of SSL. It is now overseen by an international standards organization. It provides the same capabilities as SSL (data integrity, authenticity, and privacy between client and server), but takes advantage of newer, more advanced cryptographic technology. It is backwards compatible with SSL. The cryptographic library includes a multitude of encryption algorithms. The symmetric, or private key, encryption algorithms offered include Rijndael (now officially the Advanced Encryption Standard, or AES, algorithm of the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are message digest algorithms such as MD2, MD5, MDC2, and SHA, whose resulting hashes can be used by digital signature schemes to digitally sign documents. The Open SSL library uses some but not all of these algorithms. To compile for the Win32 platform, Perl or compiling under Cygwin is required. Some of the encryption routines/algorithms are covered by patents.
Author: ComponentSpot| Date: 30-09-2003 | Size: 2879 KB
|
|
- |
|
ClipSecure License: Freeware
|
|
|
ClipSecure is a simple, secure, freeware text encryption utility that operates with the Windows clipboard, and therefore can be used within any text-based program and most email clients. It uses many industry-accepted algorithms, including the AES (Rijndael) standard, to provide maximum security. Encrypt and decrypt text with one keystroke, or manually control every step of the process. File encryption is also supported. ClipSecure was designed to be a small, fast, easy-to-use security solution for those (like me) who prefer to avoid the size and complexity of programs like PGP, and yet still have industry-strength encryption. Here's your first look at ClipSecure... the paragraph above encrypted with the default AES algorithm and a password of 'test': 6CPnKHPDoy6Sd+p/e2crR77pQXNZr9umnDGyE98l2Pfcqmp8lRcvwdhcpd4j0qNK52X3SwH0NS2W OtypLte+Wn35SPxuRhixXZIWdB/FiuQacM0UFg5umM4od4+TVBQXMDX8xe7O9o9ElsjPh0ejvgM4 ZDYh9jbspJRAkNFCUbBCydtfeG8lXjDWSrajpyWb/hyFwcYpFHCokETexxNo
Author: Andrew Ferguson| Date: 20-11-2002 | Size: 330 KB
|
|
- |
|
FineCrypt Archiver License: Freeware
|
|
|
FineCrypt Archiver is a powerful but easy-to-use file encryption software for protecting files on your computer with strong encryption algorithms. FineCrypt Archiver integrates with Windows shell so that you can encrypt and decrypt files from within Windows Explorer or desktop. You can choose for encryption one of 10 encryption algorithms. Package also contains integrated file wiper for permanent deletion of files from your hard disk.
Author: Crypto Systems, Inc.| Date: 11-03-2003 | Size: 2600 KB
|
|
- |
|
ABC CHAOS License: Freeware
|
|
|
What can you do with ABC CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. The additional special protection completely excludes an opportunity of selection of the password to the encrypted information at use of the generator of the passwords and keys.
Author: Security Resources Group| Date: 10-01-2003 | Size: 368 KB
|
|
- |
|
CHAOS Generator License: Freeware
|
|
|
CHAOS Generator is an application designed to generate passwords of any length and character content. CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. The passwords are displayed and can be copied to your clipboard.
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 201 KB
|
|
- |
|
BCArchive License: Freeware
|
|
|
With BCArchive software you may encrypt and compress a group of files/folders to an encrypted archive (i.e. single file). You may store all you confidential files in such archive accessing it whenever you need it. All your files are encrypted, i.e. protected from unauthorized access. You may create self-extracted program containing encrypted archive and e-mail it to your friend. He/she will receive this archive and can read your files, either via knowing correct password or via using public/secret key technology. All already generated public and secret keys used in other programs can be also used in BCArchive to create encrypted archive and e-mail it to desired recipient. BCArchive uses strong symmetric encryption algorithms such as Blowfish, IDEA, Triple-DES, CAST5; secure hash algorithms: SHA-1, MD5, RIPEMD-160; asymmetric (public/secret key) algorithms such as RSA, ELGamal/Diffie-Hellman; conforms to specifications PKCS #5, PKCS #12, X.509. BCArchive is convenient software product providing you with strongest encryption technology and ability for efficient management of sensitive data.
Author: Jetico, Inc.| Date: 22-10-2004 | Size: 2399 KB
|
|
- |
|
AES Free License: Freeware
|
|
|
AES Free is the program that creates self-extracting encrypted AES-files for Windows. Self-extracting files are executable programs (EXEs) that contain a AES-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting AES-files simply by running it like any other program. No other software is needed. These self-extracting AES-files are ideal to storage and electronically distribute the information because they contain multiple compressed files and folders.
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 515 KB
|
|
- |
|
CHAOS Self Extractor License: Freeware
|
|
|
CHAOS Self-Extractor is the program that creates self-extracting chaos-files for Windows. Self-extracting files are executable programs (EXEs) that contain a chaos-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting chaos-files simply by running it like any other program. No other software is needed.These self-extracting chaos files are ideal to electronically distribute the information because they contain multiple compressed files and folders.
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 531 KB
|
|
- |
|
HashCalc License: Freeware
|
|
|
Free calculator to compute multiple hashes, checksums and HMACs for files, text and hex strings. It allows to calculate hash (message digest), checksum and HMAC values based on the most popular algorithms: MD2, MD4, MD5, SHA1, SHA2 (SHA256, SHA384, SHA512), RIPEMD160, PANAMA, TIGER, CRC32, ADLER32, and the hash used in eDonkey (eDonkey2000,ed2k) and eMule tools. It supports 3 input data formats: file, text string and hexadecimal string. It is a very fast, easy to use and to install application. It works with large size files, supports file drag-and-drop functionality. HashCalc generates hash, check sum, and HMAC for files of any type which makes it a valuable utility to test for corruption your FTP and other download/upload transfers. With this tool you can quickly compare music, audio, sound, video, film, game, image, icon, document and other files, verify CD and hard drive files, perform checking of your .mp3, .mpeg, .mpg, .avi, .vcd, .iso, .zip, .gif, .jpg, .doc and other downloads.
Author: SlavaSoft Inc.| Date: 15-07-2004 | Size: 440 KB
|
|
- |
|
CHAOS Shredder License: Freeware
|
|
|
Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, there are many tools available which can let others easily recover your sensitive files even after you have formated the hard disk. Sensitive data can easily fall into the wrong hands. And because Windows is not capable of deleting information beyond recovery, you are at risk! Passwords, financial documents, even those "about last night" e-mails are fair game for the IT professionals, computer technicians or hackers. CHAOS Shredder allows you to purge, wipe and erase data with methods that far exceed US Department of Defense standards for file deletion (DOD 5220.22).
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 287 KB
|
|
- |
|
FSUM License: Freeware
|
|
|
Free command line utility for file multi-checksum generation and verification. It allows to create/verify popular file hashes/checksums: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD-160, PANAMA, TIGER, CRC-32, ADLER32, and the message digest used in eMule/eDonkey (ed2k) software. Its most common use is checking files for corruption (data integrity checking). A hash/checksum calculation might be performed on data before transferring (downloading/uploading) it from one location to another. Making the same calculation after the transfer (download/upload) and comparing the former and latter results, you can check if the received data is corrupted or not. FSUM notifies about any bad, incorrect, missing file. It is a very fast, easy to use tool. Allows to recurse directories. Works with large size files. Supports .MD5 and .SFV file formats (automatically recognizes the format when verifying). Compatible with md5sum, MD5Summer, Easy MD5 Creator, SFV Checker/Verifier, WinSFV, Win CRC32.
Author: SlavaSoft Inc.| Date: 06-07-2004 | Size: 80 KB
|
|
- |
|
Password Depot License: Freeware
|
|
|
Password Depot is a powerful and user-friendly tool to securely manage your passwords. Take advantage of the following features: -Up-to-date security algorithms for the encryption of your data -Protection by virtually uncrackable passwords, generated by the integrated password generator -Top bar for easy navigation -Auto-completion of password fields -Easy management of all your passwords -Backup and export tools for your data
Author: Stefan Richter| Date: 16-03-2003 | Size: 2360 KB
|
|
- |
|
UserManagemeNT Lite License: Freeware
|
|
|
UserManagemeNT Lite is the free version of UserManagemeNT Professional, featuring advanced user creation for Windows NT and Active Directory networks including user resources, such as home directories & shares, customizable permissions, group memberships and Exchange mailboxes. UserManagemeNT Lite features a graphical user interface, advanced username and password generation algorithms and template based configuration.
Author: Tools4ever| Date: 16-08-2003 | Size: 4158 KB
|
|
- |
|
AEVITA No Right Click License: Freeware
|
|
|
Ever wanted to prevent users from "borrowing" images from your site through right-clicking them and "save image as..." or right-clicking the page and viewing your page source? The No Right Click will disable the right click on your page in just a few clicks. The user-friendly wizard helps you to protect your HTML files in just a few clicks, so you don't need to learn complicated Perl, PHP, ASP and Web DB, profound encryption algorithms, do not need to write a piece of CGI or JavaScript code. Protect the content of your Web page by preventing others from viewing your source code!
Author: AEVITA Software Ltd.| Date: 18-11-2004 | Size: 734 KB
|
|
- |
|
Crypto Anywhere License: Freeware
|
|
|
Crypto Anywhere is secure email on the move ! Crypto Anywhere is small enough to fit on a single floppy or USB key chain drive and so easy to use your grandma will be using it. Don't have a computer yourself but want to protect your web based e-mail at your local internet cafe ? Crypto Anywhere is for you ! If you suspect your employer is reading your private email, put an end to that. If you run Crypto Anywhere from a floppy disk or USB drive, you can encrypt your email without even installing software on your workstation. With Crypto Anywhere you can send and receive secure mail to and from anyone with an email account - the recipients do not have to be "crypto savvy" or even have Crypto Anywhere themselves. Crypto Anywhere implements trusted, industry standard, strong encryption algorithms based on RSA public key encryption, the Twofish block cipher and the ISAAC random number generator. Crypto Anywhere e-mail is compatible with SecExMail client based and SecExMail Gate server based encryption.
Author: Bytefusion Ltd.| Date: 16-04-2003 | Size: 1301 KB
|
|
- |
|
Zilla Data Nuker License: Freeware
|
|
|
When you delete a file from Windows it just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! This powerful program helps you shred important files & folders so that they cannot be restored & prevent attempts to recover sensitive deleted files from your hard drive by data recovery or forensic software. Shredder allows you to purge, wipe & erase data with methods that far exceed US Department of Defence standards for file deletion (DOD 5220.22). Easily automate the cleaning process with batch files, shortcuts and scheduler. Completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Overwrites all bits in selected files, including cluster slack space, with binary 1's, 0's, and/or random bit patterns. Supports complete folder deletions including subfolders. Shreds disk free space so you can even use shredder to destroy previously deleted files on your hard drive. Drag & Drop files or entire folders Delete even if the file is locked! No trails are left of any compromising or confidential information. Easily choose the number of overwrites according to your security ambitions. The higher the number the less the probability that even finest magnetic tracks could be detected. The Department of Defense (DOD 5220.22-M) recommends seven passes for top security. You can also shred files by right-clicking on them from the MS Windows Explorer or on the recycle bin and selecting the shred item on the popup context menu.
Author: ZillaSoft.ws| Date: 28-04-2004 | Size: 4214 KB
|
|
- |
|
!Date Cracker 2000! License: Freeware
|
|
|
Date Cracker 2000 is a program which removes the date protection from programs which expire after a specific date. It is most useful for shareware or trial versions of software. Note that this program should be used for educational purposes only. Another interesting software developed allows you to remove passwords from MS Access '95 or '97 MDB files. Software like Date Cracker 2000 helps two kinds of people. Software Users........... Software Developers... Software Users are benefitted by a great extent because they can use a shareware or trial version of a software indefinitely. This means that most software which expire after a certain date can be used well after that date (almost indefinitely). The key is to run the software via Date Cracker 2000 when you get a demo / trial version of any software. Software Developers should be aware of such programs (trust me, they are!). They must devise better algorithms so that their software will be protected better. But the fact is, most software developers do not mind their software (Trial versions/ Demo's) being run by such programs....while some developers cannot do anything about their software after releasing it. But they can ensure that later versions of their software should have better date protection. Of couse, there will be always be a newer version of Date Cracker 2000.
Author: E-Tech Inc| Date: 01-01-1995 | Size: 1500 KB
|
|
- |
|
Raster To Vector License: Freeware
|
|
|
Raster To Vector converter is the most powerful and absolutely free solution for digitizing vector data from image sources. It combines the power of outline vectorizing technology with many unique features such as: - Customizable noise suppression; - Autoincrease quality for small-sized objects; - Intelligent nodes optimization; - Bezier Spline smoothing; - Automatic contours creation; - Full True Color support; - Ultrahigh conversion speed and many other. You can use Raster To Vector PlugIn to process charts, drawings, maps, schemes and other similar images. Palette and True Color images are supported in BMP, JPG and GIF formats. Raster to vector conversion process is fully automatic and needs no human intervention. R2V Converter is an ultimate platform for industry-oriented solutions and has different tools to get a perfect set of vector data faster and easier. The unique intelligent conversion algorithms is the result of our extended research effort.
Author: Stas Semenov| Date: 17-08-2004 | Size: 1430 KB
|
|
- |
|
Chilkat XML Messaging License: Freeware
|
|
|
Makes adding peer-to-peer XML messaging to your distributed applications easy. Integrates with Chilkat SSL, Chilkat Real-Time Compression, and Chilkat Crypt for automatic compression and security. Send and receive XML messages. Integrates with Chilkat SSL for secure messaging over SSLv3 or TLSv1. Integrates with Chilkat Crypt for automatic encryption and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive binary or text messages using CkData. The CkData component is handy for loading/saving data to files, accessing as binary, strings (with or without line-endings translated), Base64, Quoted-Printable, compressed, encrypted, etc. Send and receive raw binary data at the socket level if desired.
Author: Matt Fausey| Date: 04-03-2002 | Size: 1000 KB
|
|
- |
|
Trace Zapper WinCleaner N' Optimizer License: Freeware
|
|
|
TraceZapper WinCleaner N' Optimizer has 9 easy-to-use modules that were especially designed for that but also includes an absolutely unique feature - the One-Click-Optimization optimizes your complete Windows® with only one click. If you use the default options, the functions "Drive Cleaner" : Optimizes your hard disk drives by getting rid of general redundant files , "Registry Cleaner" : Optimizes your system by getting rid of leftover garbage in the Windows® , "DLL Cleaner" : Gets rid of unused or duplicate DLL files ,and "Internet Cleaner" : Cleans up the temporary files and "data trail" left by Internet surfing sessions.Faster, smoother and snappier internet surfing with Internet Tuner by Optimizing your Internet connection for faster, more efficient performance, Get full control over the programs that start automatically with Windows® with StartUp Tuner, Permantly removes files and folders so that they cannot be restored. Note: This is an advanced shredder, with multiple algorithms,so be aware before you use this feature with "Data Nuker", Choose which files are associated with which program. Quick, easy and whenever you want with File Associator. With the new user interface and many new features you get an unbeatable collection of tools that make your Windows® system fast, easy and safe.
Author: Tracezapper.com| Date: 25-08-2004 | Size: 9133 KB
|
|
- |
|
Trace Remover WinCleaner N' Optimizer License: Freeware
|
|
|
TraceRemover WinCleaner N' Optimizer has 9 easy-to-use modules that were especially designed for that but also includes an absolutely unique feature - the One-Click-Optimization optimizes your complete Windows® with only one click. If you use the default options, the functions "Drive Cleaner" : Optimizes your hard disk drives by getting rid of general redundant files , "Registry Cleaner" : Optimizes your system by getting rid of leftover garbage in the Windows® , "DLL Cleaner" : Gets rid of unused or duplicate DLL files ,and "Internet Cleaner" : Cleans up the temporary files and "data trail" left by Internet surfing sessions.Faster, smoother and snappier internet surfing with Internet Tuner by Optimizing your Internet connection for faster, more efficient performance, Get full control over the programs that start automatically with Windows® with StartUp Tuner, Permantly removes files and folders so that they cannot be restored. Note: This is an advanced shredder, with multiple algorithms,so be aware before you use this feature with "Data Nuker", Choose which files are associated with which program. Quick, easy and whenever you want with File Associator. With the new user interface and many new features you get an unbeatable collection of tools that make your Windows® system fast, easy and safe.
Author: Trace Remover.com| Date: 19-09-2004 | Size: 9253 KB
|
|
- |
|
Sophisticated Rename License: Freeware
|
|
|
Sophisticated Rename is an out of the common program for batch processing. Its power is not limited to renaming functions only. The main features of SR are as follows: It changes the names and extensions of files using flexible algorithms with the help of various data types: Constants, Counters (numerical and alphabetical), Variables, Extra variables, External variables, Conditionals. In contrast to programming languages, all data types are defined visually and added to the template with just one click. All your preferences can be saved to a preset to be used later with other files. SR can also change attributes, dates and times of files (it can be done in compliance with EXIF as well); you can choose one of five available case types for any item in the template of for the whole name. Internal EXIF and ID3v1/v2 editors are included. You can edit the data for all files at once of for each file separately. Only this program allows you to fulfill all your ideas connected with batch processing. If you happen to find that SR is short of some features, you can write a plugin for it in any programming language. It will take just a couple of minutes, and it will be certainly faster than to rename a thousand files manually! And last but not least is the reliability of the program. First of all, it shows the results preview every time you change parameters - you don t have to rename files to see how your template works. Second, it allows to restore old file names even after the renaming process. The distributive includes a tutorial that explains how to manage with various renaming situations. === Visit the author s website to download the latest version. If you like this program, please feel free to donate any sum of money to the developer. ===
Author: Anatoliy Kovalenko| Date: -99-2004 | Size: 911 KB
|
|
- |
|
Hard Angel License: Freeware
|
|
|
Do you remember CIH? The virus has injured 500000 computers and many computers have been destroyed as a result of erasing of the Flash-BIOS. Now owners of motherboards lock it but this problem is actual for hard disks still. Hard Angel it is jumper for your hard drive. Protect your hard drive with a Hard Angel! The Hard Angel: provides the hardware protection of your drive for the prohibition of unauthorized access; allows to lock attacks of viruses which use this mechanism for destruction of the information; allows to warn the user about the risk of a data loss if drive starts to fail; provides reliable storage of the passwords and possibility of their restoring; allows to bypass limitations of the BIOS of capacity of your drive; works under any OS. Ideas and algorithms are checked out in the gangsters world of Russia and by speculators of inside in America.
Author: AHI-2| Date: 12-03-2004 | Size: 195 KB
|
|
- |
|
MoRUN.net FREE Post It Notes License: Freeware
|
|
|
Free Post It Notes that offers you an easy way to keep all information you have to remember on the desktop and manage your time in a more efficient way. This is a great tool to organize information, make to-do lists or just write down imformation using post it notes. Friendly user interface lets you start using the program within minutes.You'll be amazed at how easy and quickly you can create post it sticky notes. MoRUN.net FREE Post It Notes is developed to make your work with information as convenient as possible. The appearance of computer post it notes is customized that allows you to create any post it notes you want. Various post it note settings including default settings can be modified to your preference. Using MoRUN.net FREE post it notes you can accelerate your work with post it notes using hotkeys, lock post it notes. All desktop post it notes contain information about user and time of creation. Ability to create computer post it notes with different priorities, hide post it notes or place them on the desktop, hide note's body and use transparency effect allows organize your desktop the way you want it. Post it notes are saved automatically. All information is encrypted using the strongest algorithms (with 256-bit key encryption). Download FREE Post it Notes software to keep and organize information on the computer desktop.
Author: Morun. net| Date: 05-09-2003 | Size: 68 KB
|
|
- |
|
MoRUN.net Free Sticky Notes License: Freeware
|
|
|
FREE sticky notes software that offers you an easy way to keep all information you have to remember on the desktop and manage your time in a more efficient way. This is a great tool to organize information, make to-do lists or just write down imformation using personalized sticky notes. Friendly user interface lets you start using the program within minutes.You'll be amazed at how easy and quickly you can create post it sticky notes. MoRUN.net FREE Sticky Notes is developed to make your work with information as convenient as possible. The appearance of computer sticky notes is customized that allows you to create any sticky notes you want. Various sticky note settings including default settings can be modified to your preference. Using MoRUN.net FREE Sticky Notes you can accelerate your work with electronic sticky notes using hotkeys, lock sticky notes. All desktop sticky notes contain information about user and time of creation. Ability to create computer sticky notes with different priorities, hide sticky notes or place them on the desktop, hide note's body and use transparency effect allows organize your desktop the way you want it. Sticky notes are saved automatically. All information is encrypted using the strongest algorithms (with 256-bit key encryption). Download FREE Sticky Notes software to keep and organize information on the computer desktop.
Author: Morun. net| Date: 05-09-2003 | Size: 68 KB
|
|
- |
|
TS-WIDI Pro License: Freeware
|
|
|
TS-WIDI Pro performs automated recognition of polyphonic music, stored in MP1, MP2, MP3, MPP, MPA, AIF, SND, AU, WAVE formats as well as audio CD tracks. In real-time mode it instantly converts music coming through the microphone or line input of your computer into a MIDI sequence. TS-WIDI Pro contains interactive Note Editor. Recognizing pre-recorded music allows converting digital sound to MIDI format. MIDI file takes hundreds times less space than any digital sound format, which allows you to use it as a melody for your web page or make a preview of your mp3 Internet music collection. As MIDI file is, in fact, a layout of music, you can change its arrangement in contrast to digital sound. Instruments, number of voices or melody itself can be easily modified using any third-party score editor, which allows creating remixes, variations and printing musical notation. You may even put the melody in your mobile phone! On-fly recognition is a process performed in real-time, without noticeable delay. Detected notes can be either recorded or played in real time, or both. Thus you can change instruments in real-time, for example, play the guitar and get piano sound. TS-WIDI Pro provides four different note detection algorithms. A number of filtering options allows to leave aside odd notes. Monophonic methods provide recognition of one (the loudest) voice in melody but with great accuracy. Polyphonic method transcribes several voices.
Author: TallStick Software| Date: 07-05-2004 | Size: 1750 KB
|
|
- |
|
MoRUN.net Sticky Notes Lite License: Freeware
|
|
|
Desktop sticky notes freeware that offers you an easy way to keep all information you have to remember on the desktop and manage your time in a more efficient way. This is a great tool to organize information, make to-do lists or just write down imformation using personalized sticky notes. Friendly user interface lets you start using the program within minutes.You'll be amazed at how easy and quickly you can create post it sticky notes. MoRUN.net Sticky Notes Lite is developed to make your work with information as convenient as possible. The appearance of computer sticky notes is customized that allows you to create any sticky notes you want. Various sticky note settings including default settings can be modified to your preference. Using MoRUN.net Sticky Notes Lite you can accelerate your work with electronic sticky notes using hotkeys, lock sticky notes. All desktop sticky notes contain information about user and time of creation. Ability to create computer sticky notes with different priorities, hide sticky notes or place them on the desktop, hide note's body and use transparency effect allows organize your desktop the way you want it. Sticky notes are saved automatically. All information is encrypted using the strongest algorithms (with 256-bit key encryption). Download FREE Sticky Notes software to keep and organize information on the computer desktop.
Author: Morun. net| Date: 05-09-2003 | Size: 68 KB
|
|
- |
| 1 | 2 |
|
|
Universal Explorer
Powerful windows explorer file manager and viewer.

Disk Size Manager Analyses hard disk space and collects statistics.

Web Data Extractor Email marketing software to extract specific contact.
 BackStreet Browser Powerful Offline Browser - Download Entire Website.
ListMotor Email List Manager, operates with email stored in simple text files or csv files.

|