31 Temmuz 2009 Cuma

iStarSoft iPhone Video Converter 1.1.0


The iStarSoft iPhone Video Converter application will help you convert video to iPhone formats including AVI, MPEG, WMV, MOV, MP4, VOB, XviD, WMA, ASF, 3GP, MP3, M4A to iPhone.It also lets you set encoding parameters including resolution, bit rate, frame rate, aspect ratio to get the best video quality. And of course, you can also choose to use the default settings.With its user-friendly interface, you can easily finish the conversion with just a few clicks of your mouse.Support Input Video Formats:AVI, AVM, ASF, WMV, AVS, FLV, MKV, MOV, 3GP, MP4, MPG, MPEG, DAT, OGM, VOB, RM, RMVB, TS, TP, IFO, NSVConvert any video / audio format to iPhone & iPhone 3G

30 Temmuz 2009 Perşembe

ASP.NET Report Maker 3.0.1


ASP.NET Report Maker is a powerful reporting tool that can generate dynamic ASP.NET Web reports from a Microsoft Access Database or any data source that supports ADO. You can instantly create live detail and summary report or crosstabs reports for your Websites. Basic Flash charting (Column, Bar, Line or Pie charts) is al (Column, Bar, Line or Pie charts) is also supported. The generated Web pages are pure ASP.NET code, no DLL on the server side and no ActiveX control on the client side is required. You will appreciate this software for its high flexibility and numerous options that enable you to generate the reports that best suit your needs. The generated codes are clean and easy-to-customize. ASP.NET Report Maker can save you tons of time and is suitable for both beginners and experienced developers alike.Can save you tons of time and is suitable for both beginners and experienced developers alike.

29 Temmuz 2009 Çarşamba

Trojan Killer 2.0.4.2


Trojan Killer application was designed to be a malicious computer software (malware) removal tool. Samples of malware include various types of adware (displays unwanted advertising); spyware (may keep and send logs of your keyboard and mouse activity, such as credit card or personal identity information); hidden dialers (may initiate unsolicited phone call which then shows on your bill), and more.If you are an active internet user, you should take steps to protect your sensitive personal information from possible cyber exposure. Trojan Killer will help you to timely identify and safely remove dangerous applications before it is too late.A malicious computer software (malware) removal tool.

Gnarly


An original truetype font with a special appearance

WinASO Disk Cleaner 2.5


WinASO Disk Cleaner is a usefull utility that will find and delete junk files and clear up some space on your hard drive,freeing up valuable space and streamlining your system.Find and delete junk files and clear up some space on your hard drive

28 Temmuz 2009 Salı

Work Examiner Standard 2.2 Build 374


Work Examiner Standard is a system for controlling employees office hours designed for small and medium businesses. The distinguishing features of the Standard edition include quick deployment, simple and intuitive use of the program, ease of controlling the program. This solution will allow you to effectively control your employees efficiency.A system for controlling employees' office hours designed for small and medium businesses.

DRE - Multi Drive Imaging 1.0.3


Copies hard disks to image files. Supports multiple hard disk drives, all drive types including ATA/PATA, SATA, eSata, SCSI, USB, Firewire, SAS. Will also image memory cards. Data can be stored on locally attached hard disks or to network shared media. Other features let you turn off the computer once the imaging process is complete. In addition, this application will also warn you when there is not enough space on the selected target media.Easily copy hard disks to image files.

gleeburger


A bold truetype font with a strong look to it

27 Temmuz 2009 Pazartesi

LAlarm 2.1 Build 3493


LAlarm is free laptop alarm security software, which sounds an alarm when a laptop is in danger of being stolen or losing data, and it destroys data if the laptop is stolen. LAlarm protects laptop and precious data against theft. It also prevents laptop failure and data loss due to HDD (hard disk drive) errors and sudden power loss. LAlarm also destroys the data if the laptop is stolen.Protect laptop against theft. Laptop theft is common and a constant threat to laptop security. LAlarm emits a loud siren sound when a thief tries to steal a laptop. For example, removing the AC power cord from a locked laptop will trigger the alarm. Protect data against theft. LAlarm protects sensitive data in a laptop by permanently destroying the data if the laptop is stolen. The US Department of Defense clearing and sanitizing standard (DOD 5220.22-M) is used to ensure that data is securely destroyed. Prevent data loss. The HDD (hard disk drive) holds important data but is subject to frequent error and logical or physical damages due to various causes. If error or damage is detected at an early stage, it could be repaired before becoming a more serious problem and prevent serious data loss. As a matter of fact, this application will notify you of both physical and logical disk issues.Prevent laptop failure. Hard disk drive problem is a common cause of laptop failure. But most users are not aware of such problems being developed and escalated until the HDD finally halts and the data becomes irrecoverable. LAlarm detects signs of HDD deterioration and recommends a HDD replacement, thereby, a laptop failure is prevented. As a result, a costly laptop repair expense is saved. Prevent laptop damage. LAlarm alerts when a possible sudden power loss is imminent. The user will then be able to save the data and shutdown the computer properly and/or switch to the AC power. LAlarm not only helps prevent data loss but also the hardware damage because a sudden power loss could damage the laptop hardware and corrupt data.NOTE: Free for personal use.Laptop alarm that protects laptop and data.

Aella Mass Emailer 2.1.0


Aella is a windows mass email program designed to create HTML and text emails for targeted campaigns or newsletters to increase your profits!Easy to useAella provides everything you need to get up and running within minutes of starting the application. From handy hints and tips right through to e-mail templates and simple to use scripts to capture your subscribers email addresses on your website. We can even host these lists for you!Marketing software for people who get results!Aella lets you maintain an unlimited number of separate mailing lists to better allow you to target the right audience and increase your profits. Aellas advanced email composing screen allows you to effectively handle HTML quickly & easily to give an extremely professional feel to your emails.A windows mass email program designed to create HTML and text emails

TrustPort Antivirus U3 Edition 2.8.0.2255


TrustPort Antivirus U3 Edition  is designed specifically for protection of U3 smart drives. It is a special version of USB flash drive, with a standalone program manager. The user can have his applications always at hand and launch them on any computer with USB interface.Get TrustPort Antivirus U3 Edition and give it a try to see what it can actually do for you!Compact antivirus, antispyware and antispam

AVG Anti-Virus Definitions July 27, 2009


Latest free virus definitons for AVG AntiVirus

25 Temmuz 2009 Cumartesi

ConsoleWrapper 2009-07-22


A new look for your command line.

Photoalbum Control


Photoalbum Control was developed to be a photo-album class.The .cs file contains two parts:1. Servercontrol which generates a photo-album.2. Http-handler to create server-side thumbnails of specified size (in percentages) en display them on the index-page.This photo-album is build according to the directory-structure underneath. An index-page gets a random picture from the subdirectories it includes inside the index.A directory which contains only .JPG files automatically becomes a details page. You can place a XML file inside this subdirectory with the comments for the photos.This is a photo-album class.

FileMaker Search Results 2.03


A handy FileMaker addon that adds fast, multi-table searching to your solutions by importing a few scripts and pasting a simple search field on to your layouts -- Get your users out of find mode and into a single search field they already know how to use.A handy FileMaker plugin that will allow you to search through your data with ease

24 Temmuz 2009 Cuma

HaDES 1.0


HaDES is a hard disk encryption tool, designed to enhance TrueCrypt by adding functionality that enables TrueCrypt for enterprise use, for example multi user capability and recovery.Encrypt your hard drive with this tool.

SimpleDraw


The SimpleDraw application was designed to be a simple line drawing program that illustrates overriding mouse movement and button functions. Also demonstrates use of color and pens.Illustrates overriding mouse movement and button functions

VSuite Ramdisk Server Edition 3.4.7723.1137


VSuite Ramdisk can greatly reduce the work of hard disk by using computers RAM to simulate a hard disk. Access time can be greatly improved to files held on Ramdsiks, and so the throughput of your computer may improve by many times. Besides the service life of a physical hard disk will be prolonged via reducing access.VSuite Ramdisk can also detect the memory which is invisible to OS when your system has 4GB RAM or more.This edition is designed for applications like server system, large image/data processing or 3D game etc. Support huge size of RAM and provide optimization for server system etc.A great solution to hard disk bottleneck

BS Icon Maker 1.1 Build 1.1.0.17


If you want to make icons by yourself, but you have not any drawing ability, how canyou do? Maybe this icon maker will help you.BS Icon Maker can auto create a cartoon-like icon from a photo. Its easy to use,just load the photo, then adjust the slider bars.Anti-aliasing is an important tech for an icon maker, without this tech, we cantdistinguish a 5 pixels width ellipse from a 5 pixels width round rectangle. BS IconMaker provides anti-aliasing for Line, Rectangle, Ellipse and Text.Sometimes, we need write text on icon, but the icon is too small to write enoughcharacters, to write more characters, we have to write rotated text. To write rotatedtext via BS Icon Maker is easy, we can rotate to any angle by dragging the handle.BS Icon Maker includes an Icon Library Editing tool, by this tool you can create oredit ICL files. Far more than ICL file, this tool can extract icons from EXE, DLL,OCX and CPL files.There are many effects and filters in this icon maker, such as Emboss, Blur, PrewittEdges, Stroke, and Sharpen. BS Icon Maker provides a History Window. You can instantly undo or redo multiplesteps with this window.Microsoft Vista comes with a new format of icons. Vista Icons differ from Windows-XPIcons, Vista Icons have a maximum size of 256x256 pixels, and supports 32-bit icons,which are 24-bit images with an 8-bit alpha channel. BS Icon Maker provides completely support for Windows Vista Icons.A professional and easy-to-use icon maker.

23 Temmuz 2009 Perşembe

Portable WinHTTrack 3.43-7


An offline browser utility that allows you to download a website from the Internet to a local directory

NNC Audio Converter 1.7.0.310


NNC Audio Converter is a simple and handy audio converting tool. The program converts between the most popular audio formats, including WMA, WAV, MP3, FLAC, M4A, AAC, OGG, MPEG audio, also extracts audio track from video files: DVD, AVI, WMV, FLV, MP4. You can easily prepare your audio collection for using in PC, iPod, iPhone, Mobile Phone (Nokia, Motorolla, Samsung, Sony Ericsson), DVD / CD / Flash player, Auto Audio system etc.Embedded Audio Cutter can cut and trim a large audio file into multiple smaller pieces. Also has a convenient mechanism for recording, editing Audio Text Info (ID tags), to better control your music.A quick and easy-to-use audio converting utility.

SysTrayX 4.00.139 Beta / 3.84.119


SysTrayX is a very useful tool created to maximize the way you can use your system tray. The hidden icons can still be seen and used in the special SysTrayX menu but will no longer permanently take precious space from your system tray.System Tray Enhancer / Manager / Crash recovery

22 Temmuz 2009 Çarşamba

LiveProject Professional 4.1.3.0


LiveProject is a premier tool for sharing and collaborating using Microsoft Project files. LiveProject is developed to empower your team with up-to-date information and to provide managers with direct feedback from team members.Using LiveProject, your team can send new tasks and edit existing tasks without having Microsoft Project installed. Start collaborating now!Team members do not need to have Microsoft Project installed. Anyone on your team can view, edit and add tasks to the project plan. All changes are approved/rejected by the Manager. Changes are visible to all participants Live.A premier tool for sharing and collaborating using Microsoft Project files

New Moshii World - Icon Pack


A high quality set of icons for you dock applications

Kaspersky Administration Kit 8.0 RC1 Build 1999


Kaspersky Administration Kit was developed to be a dynamic and flexible tool for centralized management of Kaspersky Lab applications on a corporate network.Kaspersky Administration Kit was expressly designed to meet the needs of networks of any size or complexity. This tool enables central administration of dynamic networks that number tens of thousands of nodes, extending to remote access and laptop users.The Kaspersky Administration Kit provides a centralized solution for managing corporate network anti-virus security systems that are based on Kaspersky Labs applications included in Kaspersky Open Space Security products. Kaspersky Administration Kit supports all network configurations that use the TCP/IP protocol.Product philosophyVersatility and scalability. Kaspersky Administration Kit allows for the effective management of antivirus protection on networks of any complexity and configuration. The tool allows communication between administrative servers and clients on networks with dedicated lines, VPN, firewalls and proxy servers.Single-point administration. Deploying antivirus protection, setting parameters for groups and individuals, updating antivirus databases and program modules, monitoring system status and responding effectively to critical situations – these as well as other administrative tasks can all be carried out from the administrator’s workstation.Continuous control. Data on administrative servers and client computers (including laptops) is regularly synchronized to ensure compliance with the company’s security policy and server settings. This also ensures that administrators receive up-to-the-minute information on network incidents, even when they are not in the office (via SMS, for example).Minimal disruption. Administration of antivirus protection should be barely perceptible to the end user. With Kaspersky Administration Kit, administrators can perform all tasks related to deploying and maintaining the company’s antivirus protection remotely, without having to disrupt end users’ work.Tightened security. A number of additional safeguards for the administrative network help to harden network security: configuration of administrator role and task definitions, auditing of administrative activities and data exchange via SSL. Moreover, by operating the antivirus program in non-interactive mode, administrators can ensure that users do not make local changes to application settings that could put the network at risk.Simplified administration. The system is administered via the Microsoft Management Console (MMC), which is a familiar tool for network administrators. A choice of wizards is available to simplify integration and setup of the solution. There is also the option of making backup copies of the database and all application settings, which saves the administrator time when re-installing the program. Moreover, color-coded graphic reports make for easy reading.FunctionsRemote installation. There is a choice of methods for installing antivirus solutions. Computers can be added to the administration group either manually or automatically, using the physical network structure, Active Directory service or IP address ranges.Centralized administration of applications. Configuring parameters for applications across all nodes on the managed network (including laptops) and updating antivirus databases and program modules can be carried out centrally, from the administrator’s workstation.Monitoring antivirus protection. Administrators can plan how the program will respond to specific events, for instance by sending notifications via email. Copies of infected files and suspicious objects are saved in backup folders, which are accessible to administrators via a single console.Security policies for laptops. Administrators can create a special security policy for laptop users, which will activate as soon as the laptop disconnects from the corporate network (for example, when an employee is away on business or vacation).Support for Cisco Network Admission Control (NAC). If the security settings of a mobile device (e.g., a laptop or PDA) do not meet the requirements of the security policy established on the local network, Cisco NAC can deny network access to the device, place it in quarantine or grant it limited access to network resources.Kaspersky Administration Kit is designed to manage the companys network anti-virus security system. Using this application, the administrator can: - Create the structure of administration groups, ensuring the anti-virus protection of the company. Administration groups allow managing a selection of computers as a whole. - Perform remote install and uninstall of the companys anti-virus applications. - Ensure remote centralized management of the anti-virus applications. - Ensure centralized download and distribution to the network computers of updates of the anti-virus applications databases and application modules. - Receive notifications about critical events in the operation of the anti-virus applications. - Receive statistics and reports about the operation of the anti-virus applications. - Manage licenses of all installed anti-virus applications. - Ensure centralized management of objects placed into Quarantine or into Backup by the anti-virus applications and with objects whose disinfection is postponed. Ensure centralized management of the third-party applications within the network. The Kaspersky Administration Kit consists of three major components: - Administration Server centralizes the storage of information about Kaspersky Labs applications installed in the corporate network and about the management of these applications. - Network Agent coordinates interaction between the Administration Server and Kaspersky Labs applications installed on a specific network node (a workstation or a server). This component supports all Windows applications included in Kaspersky Open Space Security products. Separate versions of the Network Agent exist for Kaspersky Labs Novell and Unix applications. - Administration Console provides a user interface to the administration services of the Administration Server and Network Agent. The management module is implemented as an extension of the Microsoft Management Console (MMC).System RequirementsAdministration Server (Service Only)- Operating systems: Microsoft Windows NT Server / Workstation 4.0 SP 6a and higherMicrosoft Windows 2000 Server / Professional SP1 and higherMicrosoft Windows XP Professional SP1 and higherMicrosoft Windows XP Professional x64Microsoft Windows Server 2003Microsoft Windows Server 2003 x64Microsoft Windows Server 2008Microsoft Windows Server 2008 x64Microsoft Windows Vista- Hardware requirements:Intel Pentium III 800 MHz or fasterAt least 128 MB of available RAMAt least 400 MB available HDD spaceDatabase Server:(can be installed on another computer)Microsoft SQL Server 2008Microsoft SQL Server 2008 Express editionMicrosoft SQL Server 2005Microsoft SQL Server 2005 Express EditionMicrosoft SQL Server 2000 SP 3 and aboveMicrosoft SQL Server 2000 Desktop Engine (MSDE) SP 3 and above (the MSDE 2000 SP3 distributive is in the distributive set of Kaspersky Administration Kit and can be installed directly from a CD of Kaspersky Administration Kit)MySQL Enterprise 5.0.32, 5.0.34, 5.0.36MySQL Community Server 5.0.33Other:Microsoft Data Access Components (MDAC) version 2.8 and above (should be installed on the Administration Server)Microsoft Management Console 1.2 and aboveAdministration Console- Operating systems:Microsoft Windows NT Server / Workstation 4.0 SP 6a and higherMicrosoft Windows 2000 Server / Professional SP1 and higherMicrosoft Windows XP Professional SP1 and higherMicrosoft Windows XP Professional x64Microsoft Windows Server 2003Microsoft Windows Server 2003 x64Microsoft Windows Server 2008Microsoft Windows Server 2008 x64Microsoft Windows VistaMicrosoft Management Console 1.2 and above- Hardware requirements:Intel Pentium III 400 MHz or fasterAt least 64 MB of available RAMAt least 12 MB available HDD spaceNetwork Agent (for Windows systems)- Operating systems:Microsoft Windows NT Server / Workstation 4.0 SP 6a and higherMicrosoft Windows 2000 Server / Professional SP1 and higherMicrosoft Windows XP Professional SP1 and higherMicrosoft Windows XP Professional x64Microsoft Windows Server 2003Microsoft Windows Server 2003 x64Microsoft Windows Server 2008Microsoft Windows Server 2008 x64Microsoft Windows Vista- Hardware requirements:Intel Pentium 233 MHz or fasterAt least 32 MB RAMAt least 10 MB available HDD spacefor NetWare-server- Operating systems:Novell NetWare 6 SP3 and aboveNovell NetWare 6.5 SP3 and above- Hardware requirements:Intel Pentium 233 MHz or fasterAt least 32 MB of available RAMAt least 10 MB available HDD spaceApplications required for operation will be installed on the computer (if they were not installed earlier): Microsoft Windows Installer 3.1; Microsoft Data Access Components (MDAC) 2.8; Microsoft .NET Framework 2.0; Microsoft SQL Server 2005 Express Edition. The installed applications will not require any maintenance or administration. NOTE: All applications require a license key in order to successfully install and use them. Download the public key here.A centralized solution for managing corporate network anti-virus security systems

21 Temmuz 2009 Salı

JPG to PDF Creator 4.3.2.1


JPG to PDF Creator software is quick way to converts photos to PDF files. Software easily converts JPG image file to PDF format. JPG to PDF Creator is a application which can directly convert specific image formats such as JPG into PDF file. You can even converts scanned paper documents directly to image files and then convert them to PDF using JPG to PDF Creator.JPG to PDF Creator is a quick and easy-to-use PDF utility that is designed to batch convert image files to PDF document. Just add image files to the list and click the Convert button, this software will directly convert them to a PDF document.Give JPG to PDF Creator a try to see what its really capable of!An easy-to-use program that will allow you to convert of various image types

NanoHTTPD 1.11


The NanoHTTPD was developed to be a free, simple, tiny, nicely embeddable HTTP server in Java.Ways to use- Run as a standalone app (serves files from current directory and shows requests) - Subclass serve() and embed to your own program - Call serveFile() from serve() with your own base directoryA free, simple, tiny, nicely embeddable HTTP server in Java.

WordTempl 1.3.4


WordTempl was designed to be a user-friendly software to accelerate the creation of day-to-day Microsoft Word documents.WordTempl is a program for automatic issue of documents by a template. WordTempl makes possible automatization and acceleration of issuing standard documents by means of templates created by MS Word.WordTempl - is a simple and powerful tool designated for completion of the following tasks:- reducing time needed for completion of standard documents; - systematization of standard documents; - avoidance of mistakes during completion of documents; - simplification of routine work; WordTempl saves as much as 60% of working time used for preparation of documents as compared to standard MS Office tools. Also the system allows avoiding the mistakes when creating a document as the user can enter only the data to be changed and not to scroll the whole document searching for necessary fields for filling.The template is a MS Word document. The labels of {{LABEL_NAME}} type are put in required positions of the document. The program will find all the labels in the document and will let you add their values. Then a finished document can be formed. The delivery set includes the samples of document templates.The system allows to add, to change and to edit any amount of your own templates for their further automatization with no help of technicians or programmers.A program for automatic issue of documents by a template

Twitter FriendAdder 3.3.1


Twitter FriendAdder is small but useful software which allows users to add friends into their list in order to chat or to visit their websites.Add or remove your twitter friends automatically, get 2000+ vistors everyday!

20 Temmuz 2009 Pazartesi

ESA Portable Security 2010 10.5.0


ESA Portable Security is a handy security solution for every computer to protect computer against any kind of threath including: viruses, trojans, worms, keyloggers & other malicious attacks.With ESA Portable Security you can remove: File viruses, Trojans, Spyware, Rootkits, SpyBots, Backdoors, Adware, Riskware, Hacktools, E-mail viruses, Macro viruses, Script viruses, Paid dialers, Internet worms, Polymorphic viruses, Stealth viruses, Peer-to-peer viruses, Bodiless viruses, MS Office viruses, Malicious scripts, Mass-mailing worms, Password stealers, Joke programs & Other malware.ESA Portable Security component can easily scan your entire computer in a very short time.You can use this version on USB Flash Drive or on Any other Removable Media!Best freeware security solution for your computer

TMPRegionImage 3.0


Hilited:Integer currently hilited region (where the cursor is, painted by HilitedBitmap)TmpRegionImage was developed to be a TGraphicControl descendant. It displays a bitmap (like TImage) and contains a list of clickeable regions (e.g. like countries on a map). You can specify different bitmaps for normal, hilited and selected state of a region. The package contains an editor for creating lists of regions (rectangle, ellipse, polygon, fill, combinations). Also included are some utility functions (in rgnpkg.pas) to store/load normal, hilited and selected bitmap and region lists of a TmpRegionImage component in one single compressed file or resource.TmpRegionImage properties:NormalBitmap:TBitmap the bitmap to display HiliteBitmap:TBitmap the bitmap to display when the mouse cursor is over a clickeable region SelectedBitmap:TBitmap the currently selected region is painted by a part of this bitmap RegionCursor:TCursor this cursor is displayed when the mouse is over a clickeable region Regions:TStringList textual representation of all clickeable regions AutoSelect:Boolean if set to true, a region will be change its state to selected/not selected by clicking on it ItemIndex: Integer currently selected region (painted by SelectedBitmap) MultiSelect: Boolean decides whether more than one region can be selected at a time (by shift-clicking) Selected[Index:Integer]: Boolean decides whether a region is to be drawn in selected state HiliteCurrent:Boolean if set to true, a hilited region will be painted by HiliteBitmap Hilited:Integer currently hilited region (where the cursor is, painted by HilitedBitmap) SingleRegion[Index:Integer]:HRGN returns the windows HRGN object of the specified region CombinedRegion[Index:Integer]:HRGN returns the windows HRGN object of the xord combination of the specified region and all regions on top of it StrTag[Index:Integer]:string textual Tag property of each region (for user defined purposes, like descriptions...) TmpRegionImage events:type TRegionEvent = procedure(Sender: TObject; const AIndex: integer) of object;OnEnterRegion:TRegionEvent is triggered when the mouse moves over a region OnLeaveRegion:TRegionEvent is triggered when the mouse leaves a region OnSelectionChange:TNotifyEvent is triggered when the selection changed (e.g. when a different region has been clicked) TmpRegionImage methods:function RegionAtPos(X, Y: integer): integer get the region at the specified cursor position function RegionAtCursorPos: integer get the region at the current cursor position procedure OffsetRegion(Index, dX, dY: integer) change the position of a region function IndexOfStrTag(sName: string): integer find a region by StrTag value function RegionsCount: integer get the number of regions Utility functions in rgnpkg.pas:procedure LoadRegionImage(fObj: TmpRegionImage; sFile: TFileName) load the bitmaps and regions list of a TmpRegionImage component from a compressed package file procedure ResLoadRegionImage(fObj: TmpRegionImage; fInst: HInst; fRes: string; fType: PChar = RT_RCDATA) load the bitmaps and regions list of a TmpRegionImage component from a compressed package in a resource procedure SaveRegionImage(fObj: TmpRegionImage; sFile: TFileName) save the bitmaps and regions list of a TmpRegionImage component to a compressed package fileIt displays a bitmap and contains a list of clickeable regions

19 Temmuz 2009 Pazar

SUPERAntiSpyware Database Definitions Updates 4004


Keep SUPERAntiSpyware up-to-date with the latest definitions

List


Wildcards File Editor

Pandora Sidebar 1.0.0 Beta 1


A simple Maxthon plugin that loads Pandora internet radio