CodeCanyon new Apps items 2018-05-26T11:23:36+00:00 FeedCreator 1.8 (info@mypapit.net) Screener - Lightweight Screen Capture 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/screener-lightweight-screen-capture/9718750 Follow me on CodeCanyon Follow me on Twitter

Screener is a lightweight windows form application for fast screen capture.

Features

  • Partial screen capture
  • Full screen capture
  • Google image search
  • Multiple image formats
  • Offline screenshot access
  • Simple and fast installation
  • Source code included

Usage

After reviewing and successfully editing the settings, to take a screenshot all you have to is:
  • Press ALT+1 (or right-click the tray icon and click on Capture)
  • Select the region you want to capture
  • Done! A direct link to the image is in your clipboard (CTRL+V)
Screenshots are also stored offline. You can view them in your Documents directory:
  • C:\Users\{YourName}\Documents\Screener\Screenshots
Screener has also an built in image search functionality that uses Google image search. To use that feature, instead of hitting ALT+1 simply hit ALT+2.

Storing images online

We have included a quick start guide and example PHP script which is used to upload the screenshot. Simply upload the script to your web server, open Screener’s settings and check the `Upload file` checkbox. After the checkbox is checked type in the url to the script in the now writable textbox. Also, you can watch the preview video to see how to properly configure Screener for upload.]]>
Follow me on CodeCanyon Follow me on Twitter

Screener is a lightweight windows form application for fast screen capture.

Features

  • Partial screen capture
  • Full screen capture
  • Google image search
  • Multiple image formats
  • Offline screenshot access
  • Simple and fast installation
  • Source code included

Usage

After reviewing and successfully editing the settings, to take a screenshot all you have to is:
  • Press ALT+1 (or right-click the tray icon and click on Capture)
  • Select the region you want to capture
  • Done! A direct link to the image is in your clipboard (CTRL+V)
Screenshots are also stored offline. You can view them in your Documents directory:
  • C:\Users\{YourName}\Documents\Screener\Screenshots
Screener has also an built in image search functionality that uses Google image search. To use that feature, instead of hitting ALT+1 simply hit ALT+2.

Storing images online

We have included a quick start guide and example PHP script which is used to upload the screenshot. Simply upload the script to your web server, open Screener’s settings and check the `Upload file` checkbox. After the checkbox is checked type in the url to the script in the now writable textbox. Also, you can watch the preview video to see how to properly configure Screener for upload.]]>
ISSUU Downloader magazine & ebooks 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/issuu-downloader-magazine-ebooks/9584597 The ISSUU Downloader is a simple tool to automatize the download of free magazines and free books page from issuu.com to create a PDF file or a ComicBook CBZ file. You can change skin style from contextual menu on mouse right click on the main window. Create a PDF or a CBZ is very easy… you only have to paste the Issuu web url of your magazine or ebook, then press CAPTURE INFOS and wait few seconds. Once information appears, you can download alla pages pressing the DOWNLOAD PAGES button. When page are downloaded on you pc in a temp folder, you can create the file you need, easily pressing the CREATE COMICBOOK FILE button or the CREATE ACROBAT FILE PDF button.

]]>
The ISSUU Downloader is a simple tool to automatize the download of free magazines and free books page from issuu.com to create a PDF file or a ComicBook CBZ file. You can change skin style from contextual menu on mouse right click on the main window. Create a PDF or a CBZ is very easy… you only have to paste the Issuu web url of your magazine or ebook, then press CAPTURE INFOS and wait few seconds. Once information appears, you can download alla pages pressing the DOWNLOAD PAGES button. When page are downloaded on you pc in a temp folder, you can create the file you need, easily pressing the CREATE COMICBOOK FILE button or the CREATE ACROBAT FILE PDF button.

]]>
Quick CSS Constructor 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/quick-css-constructor/9550235 There are many different ways to build a website. But there is only one leading way to make the website look attractive. This can primarily be done by applying styles to specific HTML elements. Thus, declaring how the specific elements are to be displayed. These style declarations are usually written down in a separate Cascading Style Sheets file (CSS file), that is linked by the HTML file.

The appearance of almost every HTML element is modifiable. Each HTML element, that has to be modified, is targeted by a so-called selector from inside of the CSS file. Depending on the complexity of website design, the CSS file grows in lines and gets cluttered quickly. When you are working on many different website projects simultaneous, it can be quite difficult to stay on the top of the things.

But creating Cascading Style Sheets can also be done with less pain, if the right tool is available and the approach is correct. Quick CSS Constructor is a toolbox with the main purpose: It facilitates creating and managing CSS styles.

One important principle to preserve clarity, is to make a distinguish between superior and subordinate parts of something. In our case, it means, splitting (visually) selectors from declarations (which are nothing else but property + value).

This is realized by having selectors and properties in separated lists. First you choose a selector from the selectors-list, that targets an HTML element. Afterwards (only) you will be able to add a declaration from the property list or change an existing declaration. This way you construct the code consciously, step-by-step, and the resulting change appears in the code output box immediately.

Another principle to preserve clarity, is to make visible the difference between common and custom. Here: simple type selectors and custom selectors. This is solved in Quick CSS Constructor by color-coding different selector groups: IDs have a green, classes a blue and custom selectors a yellow background. All other selectors are coded white.

The third important thing to preserve clarity is, to keep all relevant information together. It’s always advantageous to have all needed information collected in one easy accessible place, to prevent long searching and getting lost in tons of irrelevant files.

The integrated “Session Manager” offers a possibility to store any number of CSS styles. You can switch between them, exporting the necessary code or extending it, but having the originals always in a sure place, within a collection.

Quick CSS Constructor has all known simple selectors and properties “on board”. They are tightly integrated and are ready to use. So, there is no need to waste time on searching the right words in the internet or books. Just choose the necessary selector from the one list, add some properties from the other one and fill in property values – and a rule, that styles a HTML element, is ready.

Beside simple selectors, with Quick CSS Constructor, you can also build custom complex selectors or chains of selectors and integrate them into your style sheet. The usage of complex selectors is widespread nowadays. They allow to work more precise, more dynamic.

The function of adding web files into a session allows to extract automatically all available IDs and classes from the file. This files can be located either on a local drive or on websites online. So, if you have a website project and all IDs and class-names of tags (that you want to modify) are set, load the project files into Quick CSS Constructor and accelerate your work flow.

There is also a safety technology integrated: Extracted IDs and classes from files, will remain (until they get removed manually), in case that the project files are at an unreachable place.For example: You have previously added files from an online source and currently you don’t have access to the internet. Another example: You worked on a project, that was on a lent USB-Stick, but you forgot to make an copy of the last version and gave the stick back. Nevertheless, your CSS data is safe.

Other noticeable functions:

+ Adding at-rules (@charset and @import)

+ Code, that includes anchor pseudo-classes (:link, :visited, :hover, :active) gets automatically sorted by the integrated sorting algorithm, to make the result effective

+ Copying all code to clipboard with two clicks

+ Working in fullscreen mode

+ Working window size and position gets remembered and recalled on next launch

+ Unready code can also be exported / saved / or what

+ Intuitive, smooth and balanced workflow

+ All main interface elements are resizeable: Everything will fit and look good at the same time.

+ Predefined unique session names

+ Supports HTML5 and all previous versions

+ Supports CSS3 and all previous versions

+ Imported documents, that are unreachable get marked as such

+ ID- and class-names from files and custom selectors are color-coded for a better clarity

+ Current block of code you are working on is highlighted for a better clarity

+ Serious and user-friendly documentation. PDF file with screenshots

Good luck & happy creating!

]]>
There are many different ways to build a website. But there is only one leading way to make the website look attractive. This can primarily be done by applying styles to specific HTML elements. Thus, declaring how the specific elements are to be displayed. These style declarations are usually written down in a separate Cascading Style Sheets file (CSS file), that is linked by the HTML file.

The appearance of almost every HTML element is modifiable. Each HTML element, that has to be modified, is targeted by a so-called selector from inside of the CSS file. Depending on the complexity of website design, the CSS file grows in lines and gets cluttered quickly. When you are working on many different website projects simultaneous, it can be quite difficult to stay on the top of the things.

But creating Cascading Style Sheets can also be done with less pain, if the right tool is available and the approach is correct. Quick CSS Constructor is a toolbox with the main purpose: It facilitates creating and managing CSS styles.

One important principle to preserve clarity, is to make a distinguish between superior and subordinate parts of something. In our case, it means, splitting (visually) selectors from declarations (which are nothing else but property + value).

This is realized by having selectors and properties in separated lists. First you choose a selector from the selectors-list, that targets an HTML element. Afterwards (only) you will be able to add a declaration from the property list or change an existing declaration. This way you construct the code consciously, step-by-step, and the resulting change appears in the code output box immediately.

Another principle to preserve clarity, is to make visible the difference between common and custom. Here: simple type selectors and custom selectors. This is solved in Quick CSS Constructor by color-coding different selector groups: IDs have a green, classes a blue and custom selectors a yellow background. All other selectors are coded white.

The third important thing to preserve clarity is, to keep all relevant information together. It’s always advantageous to have all needed information collected in one easy accessible place, to prevent long searching and getting lost in tons of irrelevant files.

The integrated “Session Manager” offers a possibility to store any number of CSS styles. You can switch between them, exporting the necessary code or extending it, but having the originals always in a sure place, within a collection.

Quick CSS Constructor has all known simple selectors and properties “on board”. They are tightly integrated and are ready to use. So, there is no need to waste time on searching the right words in the internet or books. Just choose the necessary selector from the one list, add some properties from the other one and fill in property values – and a rule, that styles a HTML element, is ready.

Beside simple selectors, with Quick CSS Constructor, you can also build custom complex selectors or chains of selectors and integrate them into your style sheet. The usage of complex selectors is widespread nowadays. They allow to work more precise, more dynamic.

The function of adding web files into a session allows to extract automatically all available IDs and classes from the file. This files can be located either on a local drive or on websites online. So, if you have a website project and all IDs and class-names of tags (that you want to modify) are set, load the project files into Quick CSS Constructor and accelerate your work flow.

There is also a safety technology integrated: Extracted IDs and classes from files, will remain (until they get removed manually), in case that the project files are at an unreachable place.For example: You have previously added files from an online source and currently you don’t have access to the internet. Another example: You worked on a project, that was on a lent USB-Stick, but you forgot to make an copy of the last version and gave the stick back. Nevertheless, your CSS data is safe.

Other noticeable functions:

+ Adding at-rules (@charset and @import)

+ Code, that includes anchor pseudo-classes (:link, :visited, :hover, :active) gets automatically sorted by the integrated sorting algorithm, to make the result effective

+ Copying all code to clipboard with two clicks

+ Working in fullscreen mode

+ Working window size and position gets remembered and recalled on next launch

+ Unready code can also be exported / saved / or what

+ Intuitive, smooth and balanced workflow

+ All main interface elements are resizeable: Everything will fit and look good at the same time.

+ Predefined unique session names

+ Supports HTML5 and all previous versions

+ Supports CSS3 and all previous versions

+ Imported documents, that are unreachable get marked as such

+ ID- and class-names from files and custom selectors are color-coded for a better clarity

+ Current block of code you are working on is highlighted for a better clarity

+ Serious and user-friendly documentation. PDF file with screenshots

Good luck & happy creating!

]]>
Hakros ProjectSync 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/hakros-projectsync/9425321 OFICIAL WEBSITE http://www.hakros.com/

LIMITED DEMO VERSION

http://www.hakros.com/envato/_demos/Hakros-ProjectSync-Demo.zip

DESCRIPTION

Hakros ProjectSync gives you all the options to easily sync any project between your computer and another location on the same computer or on a local network.

MAIN FEATURES

-Manage multiple projects.
-Different modes of evaluation (by date and by content).
-Complete backups system.
-Exclude subdirectories.
-Include / Exclude filetypes by extension.
-Collect all files modified to store/send them.
-Filter all modified files with multiple options.

CHANGES LOG

Release 1.4

- New feature : Read-Only Mode.
- New feature : Multiple sources and targets.
- Interface & stability enhancements.

Release 1.3

- New feature : Auto check of changes.

Release 1.2

- New feature : List of changes in destination.

Release 1.1

- Files administration enhancements.
- Interface & stability enhancements.

Release 1.0

- Initial release.

]]>
OFICIAL WEBSITE http://www.hakros.com/

LIMITED DEMO VERSION

http://www.hakros.com/envato/_demos/Hakros-ProjectSync-Demo.zip

DESCRIPTION

Hakros ProjectSync gives you all the options to easily sync any project between your computer and another location on the same computer or on a local network.

MAIN FEATURES

-Manage multiple projects.
-Different modes of evaluation (by date and by content).
-Complete backups system.
-Exclude subdirectories.
-Include / Exclude filetypes by extension.
-Collect all files modified to store/send them.
-Filter all modified files with multiple options.

CHANGES LOG

Release 1.4

- New feature : Read-Only Mode.
- New feature : Multiple sources and targets.
- Interface & stability enhancements.

Release 1.3

- New feature : Auto check of changes.

Release 1.2

- New feature : List of changes in destination.

Release 1.1

- Files administration enhancements.
- Interface & stability enhancements.

Release 1.0

- Initial release.

]]>
Extractor proxies & check 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/extractor-proxies-check/9383476 Ultimate Proxy Tool

If you need fresh proxies, this is the solution!

This software extracts thousands of daily fresh proxies, on multiple servers, also has an option to “check” that allows you to check proxies valid.



TRAFFIC BOTS:


Do You Need Organic Traffic For Your Website?
Below I have attached you the best traffic tools:
Traffic Bots Official Website: Traffic Bots
Best Traffic Bots In 2018:
Pro Advanced Bot Traffic Traffic Bots – Pro Advanced Bot Traffic
Chaos Proxy Traffic Traffic Bots – Chaos Proxy Traffic
All In One Bot Traffic Traffic Bots – All In One Bot Traffic]]>
Ultimate Proxy Tool

If you need fresh proxies, this is the solution!

This software extracts thousands of daily fresh proxies, on multiple servers, also has an option to “check” that allows you to check proxies valid.



TRAFFIC BOTS:


Do You Need Organic Traffic For Your Website?
Below I have attached you the best traffic tools:
Traffic Bots Official Website: Traffic Bots
Best Traffic Bots In 2018:
Pro Advanced Bot Traffic Traffic Bots – Pro Advanced Bot Traffic
Chaos Proxy Traffic Traffic Bots – Chaos Proxy Traffic
All In One Bot Traffic Traffic Bots – All In One Bot Traffic]]>
POS FOR SERVICE 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/pos-service/9376796 Pos For Service performs a complete record of the sale of goods and services at retail. Easy to use and apply automate everyday actions such as the establishment report (stock lists, bussiness books), receipt of goods, price changes, records of customers and suppliers … Issuance Account

Issuance of fiscal accounts is certainly the most commonly performed surgery in retail. Invoicing in our program is easy, just enter a code, product name or scan the bar code and confirm the operation. when issuing bills have a choice, fiscal, cash account or issuing an invoice, with a choice of payment methods (cash, credit transfer). Calculation – The stock records Calculation is Accounting document relating to the establishment of the sales price of the goods, as well as the entry of goods into retail. The document contains information about the received goods: cost, quantity, sales and purchase price … Our software automatically calculates the items on the calculation, which significantly reduces the time of making their own calculations, while the form for entering calculations it’s simple and easy to understand. Leveling – Price Change Model Leveling is a document that records the change in the price item. In the program, change in price Item carried out very simply, find your product, enter and confirm a new price listing, and that’s it, leveling is automatically created, and all changes are recorded to the program. The return of goods by the buyer Backspace or warrant correction is a document that records the returned goods from the buyer. Backspace is automatically created based on the information you have entered. Returns goods supplier Trackback vendor is a document that records and reduces the inventory in stock. This document can be used for the merchandise that was taken on the commission and consignment sales. Internal delivery Internal lading is a document evidencing the transfer of goods when it comes to the same legal entity, that is, from one retail outlet to another.

Stock List Stock List contains a list of all products in sales; together with all necessary information, quantity, price, value is created automatically.

Bussiness Book – Book trade in goods and services

Bussiness book is a form prescribed by the rules in which the financial shows traffic of goods and services. Our sowtware automatically creates bussiness form. Traffic Traffic registers a report that shows the total turnover in the retail store for a given period of time. Receiving device for service Creating service orders Records of received devices. A record of service orders Receiving complaints Resolving complaints A record of the complaint More…

]]>
Pos For Service performs a complete record of the sale of goods and services at retail. Easy to use and apply automate everyday actions such as the establishment report (stock lists, bussiness books), receipt of goods, price changes, records of customers and suppliers … Issuance Account

Issuance of fiscal accounts is certainly the most commonly performed surgery in retail. Invoicing in our program is easy, just enter a code, product name or scan the bar code and confirm the operation. when issuing bills have a choice, fiscal, cash account or issuing an invoice, with a choice of payment methods (cash, credit transfer). Calculation – The stock records Calculation is Accounting document relating to the establishment of the sales price of the goods, as well as the entry of goods into retail. The document contains information about the received goods: cost, quantity, sales and purchase price … Our software automatically calculates the items on the calculation, which significantly reduces the time of making their own calculations, while the form for entering calculations it’s simple and easy to understand. Leveling – Price Change Model Leveling is a document that records the change in the price item. In the program, change in price Item carried out very simply, find your product, enter and confirm a new price listing, and that’s it, leveling is automatically created, and all changes are recorded to the program. The return of goods by the buyer Backspace or warrant correction is a document that records the returned goods from the buyer. Backspace is automatically created based on the information you have entered. Returns goods supplier Trackback vendor is a document that records and reduces the inventory in stock. This document can be used for the merchandise that was taken on the commission and consignment sales. Internal delivery Internal lading is a document evidencing the transfer of goods when it comes to the same legal entity, that is, from one retail outlet to another.

Stock List Stock List contains a list of all products in sales; together with all necessary information, quantity, price, value is created automatically.

Bussiness Book – Book trade in goods and services

Bussiness book is a form prescribed by the rules in which the financial shows traffic of goods and services. Our sowtware automatically creates bussiness form. Traffic Traffic registers a report that shows the total turnover in the retail store for a given period of time. Receiving device for service Creating service orders Records of received devices. A record of service orders Receiving complaints Resolving complaints A record of the complaint More…

]]>
Pro License Generator - sell any file 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/pro-license-generator-sell-any-file/9374629

Pro License Generator – How works, step by step:

With the help with this software, you can license any software that you want to sell.

1. Open the file (Pro License Generator.exe), press (Select file) and add the file that you wish to license.

2. If you wish to generate an unlimited license on one computer, select only the checkbox (FULL LICENSE FOR ONE COMPUTER), if you want to limit the number of uses, check the box (NUMBER OF USES FOR ONE COMPUTER) and enter the number of runs you want to assign.

3. In the field (ENTER LICENSE KEY) enter code licensing.

You send software (License Generator.exe) to people who want to sell them your file, they have to send your license code to you.

]]>

Pro License Generator – How works, step by step:

With the help with this software, you can license any software that you want to sell.

1. Open the file (Pro License Generator.exe), press (Select file) and add the file that you wish to license.

2. If you wish to generate an unlimited license on one computer, select only the checkbox (FULL LICENSE FOR ONE COMPUTER), if you want to limit the number of uses, check the box (NUMBER OF USES FOR ONE COMPUTER) and enter the number of runs you want to assign.

3. In the field (ENTER LICENSE KEY) enter code licensing.

You send software (License Generator.exe) to people who want to sell them your file, they have to send your license code to you.

]]>
Price Labels 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/price-labels/9353542 You can create price labels or price stickers

http://www.youtube.com/watch?v=AZo07PPo7Ic]]>
You can create price labels or price stickers

http://www.youtube.com/watch?v=AZo07PPo7Ic]]>
CE Compiler 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/ce-compiler/9280061 CE Compiler is a powerful, yet intuitive source code compiler and minification utility that can be used with Javascript, CSS, HTML and XML files on your computer to optimize code and reduce execution time.

Clean and compile source code

Relying on the power of Google’s Closure Compiler, HTML Compressor and Yahoo’s YUI Compressor, this simple tool is capable of removing unnecessary code areas, while also checking syntax and references, all to improve project efficiency.

With the help of CE Compiler you can parse your Javascript and CSS files so as to rewrite them in a compressed form, without additional comments, whitespaces and other unneeded characters, all without affecting the code’s functionality.

Process CSS, Javascript, HTML and XML

The integrated Javascript compiler borrows features from the Closure Compiler and the YUI Compressor, enabling you to minify your code. Additional options allow you to preserve semicolons, disable micro optimizations, set the compilation level and activate debugging options.

The CSS Minifier can be used for processing CSS code, with options for allowing unrecognized functions and properties, create exclusion lists for classes you don’t want renamed and vendor modification possibilities.

There are a wide range of code minification settings that you can choose from for HTML processing. The application enables you to preserve comments, spaces, line breaks or tags, remove certain attributes and values or even define a custom rule using regular expressions.

Effortlessly optimize your source code

CE Compiler comprises the functionality of three powerful open-source utilities into a single application, enabling programmers to compress, obfuscate and compile their source code from a user-friendly working environment. With its help you can clean your source code, with obvious consequences regarding the execution time and application speed.]]>
CE Compiler is a powerful, yet intuitive source code compiler and minification utility that can be used with Javascript, CSS, HTML and XML files on your computer to optimize code and reduce execution time.

Clean and compile source code

Relying on the power of Google’s Closure Compiler, HTML Compressor and Yahoo’s YUI Compressor, this simple tool is capable of removing unnecessary code areas, while also checking syntax and references, all to improve project efficiency.

With the help of CE Compiler you can parse your Javascript and CSS files so as to rewrite them in a compressed form, without additional comments, whitespaces and other unneeded characters, all without affecting the code’s functionality.

Process CSS, Javascript, HTML and XML

The integrated Javascript compiler borrows features from the Closure Compiler and the YUI Compressor, enabling you to minify your code. Additional options allow you to preserve semicolons, disable micro optimizations, set the compilation level and activate debugging options.

The CSS Minifier can be used for processing CSS code, with options for allowing unrecognized functions and properties, create exclusion lists for classes you don’t want renamed and vendor modification possibilities.

There are a wide range of code minification settings that you can choose from for HTML processing. The application enables you to preserve comments, spaces, line breaks or tags, remove certain attributes and values or even define a custom rule using regular expressions.

Effortlessly optimize your source code

CE Compiler comprises the functionality of three powerful open-source utilities into a single application, enabling programmers to compress, obfuscate and compile their source code from a user-friendly working environment. With its help you can clean your source code, with obvious consequences regarding the execution time and application speed.]]>
Find targeted websites & add comments 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/find-targeted-websites-add-comments/9276849

Features

This is a great software for people who have a small business online.

With this software you can find sites, forums, blogs, discussions, who support the comments, so you can add your comments relevant to your business and link to your site or announcement.

Depending on your keywords were added to this software automatically provides the most relevant results from Google, Yahoo and Bind.

The software allows you to add lists of proxies for browsing safer.

Contact

The source code is available for just $80.

Also, if you need customization applications, software, bots, algorithms, do not hesitate to contact me. I work as a freelancer 24/24 at affordable prices.

For any questions or proposals, please contact me by e-mail: radu.programmer@gmail.com

Screenshots


]]>

Features

This is a great software for people who have a small business online.

With this software you can find sites, forums, blogs, discussions, who support the comments, so you can add your comments relevant to your business and link to your site or announcement.

Depending on your keywords were added to this software automatically provides the most relevant results from Google, Yahoo and Bind.

The software allows you to add lists of proxies for browsing safer.

Contact

The source code is available for just $80.

Also, if you need customization applications, software, bots, algorithms, do not hesitate to contact me. I work as a freelancer 24/24 at affordable prices.

For any questions or proposals, please contact me by e-mail: radu.programmer@gmail.com

Screenshots


]]>
Mew: Windows Markdown Editor 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/mew-windows-markdown-editor/924879 Mew is a specialized markdown editor for windows. It comes bundled with a lot of features to make your markdown-editing experience as good as possible. Mew aims to be simple, smart, fast and customizable, allowing you to use it however you want to so you get the best results possible. It was built with an actual user in mind so, it’s feature set is that needed to get the job done. It comes with full auto-complete support, live-as-you-type preview and a theme-able interface.

-Version 1.0.2.0 (11/24/2012)

This new version is mostly a bug fix. It fixes a couple of DLL errors some users were having and a couple of error when open files. It also removes the installer so it is now completely standalone and best of all, fully portable.

]]>
Mew is a specialized markdown editor for windows. It comes bundled with a lot of features to make your markdown-editing experience as good as possible. Mew aims to be simple, smart, fast and customizable, allowing you to use it however you want to so you get the best results possible. It was built with an actual user in mind so, it’s feature set is that needed to get the job done. It comes with full auto-complete support, live-as-you-type preview and a theme-able interface.

-Version 1.0.2.0 (11/24/2012)

This new version is mostly a bug fix. It fixes a couple of DLL errors some users were having and a couple of error when open files. It also removes the installer so it is now completely standalone and best of all, fully portable.

]]>
Advanced Calculator Enginering 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/advanced-calculator-enginering/9134480 +++++++++++++ Advanced Calculator Enginering +++++++++++++

-- Conversion

The Conversions module will convert a given value into a new value using a different unit of measurement.

Conversion Procedure:

- Select a conversion type from the “Select One” drop-down box

-Select a beginning unit from the “Select Entered Unit” drop-down box. This will be the unit for the data you want to convert.

-Select an ending unit from the “Select Unit to Convert to” drop-down box. This will be the unit the data will be converted to.

- Enter your data in the textbox that appears after all three drop-box options are filled.

- Press the Enter key to display conversion.

- You may now enter more data to convert or you may select new units or conversion type.

--- Triangle Solver

The Triangle Solver module computes a solution for unkown angles or sides of a triangle based on data provided for the known dimensions of the triangle.

Triangle Solver Procedure:

- Select a triangle from the top of the page that best describes shape of the triangle you are trying to solve. These triangles are for reference only and an exact match is not necessary.

- Once a general triangle shape has been selected, a reference triangle will appear to to assist solving your triangle. Use the diagram to select which sides and angles you have dimensions for and which sides or angles you need to solve. As with the triangles that were originally selected, this triangle is for reference only and an exact match with your triangle is not necessary.

- Using the reference triangle, select the checkboxes that correspond with the known dimensions of your triangle. Data will be entered in later. The checkboxes are only used to determine which deminsions to prompt for or to determine if there is enough data to solve the triangle.

- Select which dimension you need solved using the buttons under “Select desired solution”. Only one solution can be selected at a time.

- Once you have selected a desired solution and have selected all known dimensions, textboxes will appear on the lower left portion of the page along with labels describing what data must go in each textbox.

Note – If no textboxes appear when you have selected a desired solution, then there is an insufficient number of known deminsions. Try to aquire more data on your triangle in order to solve for your solution.

- Fill in the textboxes with appropriate data prompted by labels above the textboxes. All prompted data must be filled in order to compute a solution.

Note – Angles are entered in Degrees.

- Once all data textboxes are filled click the “Calculate” button to compute the solution.

- The solution will be displayed to the right of the Calculate button. You may now select a different triangle, solve for a different dimension, or simply change data in the textboxes for a different solution.

--- Courtesan Plane

The Courtesan Plane module is intended to give position and dimension data based on two points of a courtesan plane enterd in ( X , Y ) format. The module will compute the linear distance between the two points, the midpoint, slope magnitude, and angles. Slopes and Angles are given in both directions – relative to the X-axis and relative to the Y-axis. Slopes are computed such that the line between the two points can be defined as a functions [ y = (Slope From X-Axis)x ] and [x = (Slope From Y-Axis)y]. If two points are not known, then a solution can be computed using distance, midpoint, slope, or angle in conjunction with a beginning point or the midpoint. A list of entry options are availiable in a drop-box at the top of the Courtesan Plane page.

Courtesan Plane Procedures:

- Select a data entry option from the drop box at the top of the page.

- Enter in the data prompted by the textboxes. Angles are entered in Degrees. Distance can be positive of negetive. Slope must be in decimal format.

- After all position data is entered, click the “Calculate” button to display the solutions at the bottom of the page.

- A solution of “NaN” or “Infinity” indicates there is no solution for that field. Example: Point #1 = ( 30.5 , 42 ) Point #2 = ( 30.5 , 58 )

Slope From X-Axis = -Infinity ; There is an infinite slope. Angle From Y-Axis = NaN ; The line between the two points is parallel with the Y-Axis.

--- Time Calculator

The Time Calculator module has two functions. The left column allows you to enter a beginning time and an ending time, then the elapsed time is solved. A drop-box lets you select what format the solution will be displayed. The right column allows you to enter a beginning time and an elapsed time, then the ending time is solved.

Beginning – to – Ending Time Procedures:

- Using the checkbox at the top of the page, select whether your time data will be in standard time or in military time.

- Enter your beginning time data, using hh:mm:ss format. This can be done two ways; using the up / down arrows in each data field to increment / decrement the value or you can select the data field and type in the value. Value limits are as follows:

Days – 100 Hours – 12 (24 if selected Military Time) Minutes – 60 Seconds – 60 AM / PM selection on valid in Standard Time

- Enter your ending time given the same format as above.

- Click the “Calculate” button to compute the solution

- The output format chosen by the “Solution Format” drop-box can be selected before or after the solution is computed. If “Hours” or “Minutes” are chosen the output will be in decimal form. Decimal accuracy can be set in the Settings page under the “Time” setting.

Beginning – Plus – Elapsed Time Procedures:

- Select Standard or Military time and enter in beginning time data as previously described in “Beginning – to – Ending Time Procedures”

- Enter in the value of elapsed time to be added to your beginning time. As with the beginning time, data can be entered using either the up / down arrows or keyboard entry. The value may be any unit (Day, hour, minute, second) or a combination of units, i.e. 1 Day, 2 Hours, and 15 minutes could be one whole entry. Value limits are as follows:

Days – 100 Hours – 9999 Minutes – 9999 Seconds – 99999

- Click the “Calculate” button to compute the solution.

- The solution will be displayed in time format – Days and then hh:mm:ss. If Military Time is not selected, the solution will also contain AM or PM.

Data

The Data module will convert data types such as Hexidecimal, Binary, Decimal, Binary Code Decimal, and ASCII.

Data Procedures:

- First select which data type will be entered to be converted. Only one may be selected at a time.

- Enter in the data to be converted in the textbox to the right of the Input selection. Hex data input is limited to one word ( 4 characters ). Decimal data input is limited to whole numbers and a value of 65,535 or less. Binary data input is limited to one word ( 16 bits ). BCD data input is limited to 4 digits. ASCII data input is limited to one character.

- Press the Enter key to display the conversion solution at the bottom portion of the page.

- You are then able to enter different data to convert or change the input data type.

]]>
+++++++++++++ Advanced Calculator Enginering +++++++++++++

-- Conversion

The Conversions module will convert a given value into a new value using a different unit of measurement.

Conversion Procedure:

- Select a conversion type from the “Select One” drop-down box

-Select a beginning unit from the “Select Entered Unit” drop-down box. This will be the unit for the data you want to convert.

-Select an ending unit from the “Select Unit to Convert to” drop-down box. This will be the unit the data will be converted to.

- Enter your data in the textbox that appears after all three drop-box options are filled.

- Press the Enter key to display conversion.

- You may now enter more data to convert or you may select new units or conversion type.

--- Triangle Solver

The Triangle Solver module computes a solution for unkown angles or sides of a triangle based on data provided for the known dimensions of the triangle.

Triangle Solver Procedure:

- Select a triangle from the top of the page that best describes shape of the triangle you are trying to solve. These triangles are for reference only and an exact match is not necessary.

- Once a general triangle shape has been selected, a reference triangle will appear to to assist solving your triangle. Use the diagram to select which sides and angles you have dimensions for and which sides or angles you need to solve. As with the triangles that were originally selected, this triangle is for reference only and an exact match with your triangle is not necessary.

- Using the reference triangle, select the checkboxes that correspond with the known dimensions of your triangle. Data will be entered in later. The checkboxes are only used to determine which deminsions to prompt for or to determine if there is enough data to solve the triangle.

- Select which dimension you need solved using the buttons under “Select desired solution”. Only one solution can be selected at a time.

- Once you have selected a desired solution and have selected all known dimensions, textboxes will appear on the lower left portion of the page along with labels describing what data must go in each textbox.

Note – If no textboxes appear when you have selected a desired solution, then there is an insufficient number of known deminsions. Try to aquire more data on your triangle in order to solve for your solution.

- Fill in the textboxes with appropriate data prompted by labels above the textboxes. All prompted data must be filled in order to compute a solution.

Note – Angles are entered in Degrees.

- Once all data textboxes are filled click the “Calculate” button to compute the solution.

- The solution will be displayed to the right of the Calculate button. You may now select a different triangle, solve for a different dimension, or simply change data in the textboxes for a different solution.

--- Courtesan Plane

The Courtesan Plane module is intended to give position and dimension data based on two points of a courtesan plane enterd in ( X , Y ) format. The module will compute the linear distance between the two points, the midpoint, slope magnitude, and angles. Slopes and Angles are given in both directions – relative to the X-axis and relative to the Y-axis. Slopes are computed such that the line between the two points can be defined as a functions [ y = (Slope From X-Axis)x ] and [x = (Slope From Y-Axis)y]. If two points are not known, then a solution can be computed using distance, midpoint, slope, or angle in conjunction with a beginning point or the midpoint. A list of entry options are availiable in a drop-box at the top of the Courtesan Plane page.

Courtesan Plane Procedures:

- Select a data entry option from the drop box at the top of the page.

- Enter in the data prompted by the textboxes. Angles are entered in Degrees. Distance can be positive of negetive. Slope must be in decimal format.

- After all position data is entered, click the “Calculate” button to display the solutions at the bottom of the page.

- A solution of “NaN” or “Infinity” indicates there is no solution for that field. Example: Point #1 = ( 30.5 , 42 ) Point #2 = ( 30.5 , 58 )

Slope From X-Axis = -Infinity ; There is an infinite slope. Angle From Y-Axis = NaN ; The line between the two points is parallel with the Y-Axis.

--- Time Calculator

The Time Calculator module has two functions. The left column allows you to enter a beginning time and an ending time, then the elapsed time is solved. A drop-box lets you select what format the solution will be displayed. The right column allows you to enter a beginning time and an elapsed time, then the ending time is solved.

Beginning – to – Ending Time Procedures:

- Using the checkbox at the top of the page, select whether your time data will be in standard time or in military time.

- Enter your beginning time data, using hh:mm:ss format. This can be done two ways; using the up / down arrows in each data field to increment / decrement the value or you can select the data field and type in the value. Value limits are as follows:

Days – 100 Hours – 12 (24 if selected Military Time) Minutes – 60 Seconds – 60 AM / PM selection on valid in Standard Time

- Enter your ending time given the same format as above.

- Click the “Calculate” button to compute the solution

- The output format chosen by the “Solution Format” drop-box can be selected before or after the solution is computed. If “Hours” or “Minutes” are chosen the output will be in decimal form. Decimal accuracy can be set in the Settings page under the “Time” setting.

Beginning – Plus – Elapsed Time Procedures:

- Select Standard or Military time and enter in beginning time data as previously described in “Beginning – to – Ending Time Procedures”

- Enter in the value of elapsed time to be added to your beginning time. As with the beginning time, data can be entered using either the up / down arrows or keyboard entry. The value may be any unit (Day, hour, minute, second) or a combination of units, i.e. 1 Day, 2 Hours, and 15 minutes could be one whole entry. Value limits are as follows:

Days – 100 Hours – 9999 Minutes – 9999 Seconds – 99999

- Click the “Calculate” button to compute the solution.

- The solution will be displayed in time format – Days and then hh:mm:ss. If Military Time is not selected, the solution will also contain AM or PM.

Data

The Data module will convert data types such as Hexidecimal, Binary, Decimal, Binary Code Decimal, and ASCII.

Data Procedures:

- First select which data type will be entered to be converted. Only one may be selected at a time.

- Enter in the data to be converted in the textbox to the right of the Input selection. Hex data input is limited to one word ( 4 characters ). Decimal data input is limited to whole numbers and a value of 65,535 or less. Binary data input is limited to one word ( 16 bits ). BCD data input is limited to 4 digits. ASCII data input is limited to one character.

- Press the Enter key to display the conversion solution at the bottom portion of the page.

- You are then able to enter different data to convert or change the input data type.

]]>
Web Presenter 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/web-presenter/8932596 The Web Presenter performs conversion from PowerPoint and Impress presentations to interactive HTML5 presentations for any modern browser as well for iPhone, iPad and other mobile devices. Because we carefully preserves animations (currently just ‘Fade’ – more coming soon), internal Hyperlinks, embedded audio and video in HTML5, you can enjoy the original look of your presentations on almost any modern browser and devices. Web Presenter supports internal Hyperlinks which allow to create interactive presentations. The results comes with a great presenter jquery plugin to easy incooperate the presentations into any website, WordPress site or as well as stand-alone web player.

Note: The Web Presenter require installed Microsoft PowerPoint 2007 and up.

]]>
The Web Presenter performs conversion from PowerPoint and Impress presentations to interactive HTML5 presentations for any modern browser as well for iPhone, iPad and other mobile devices. Because we carefully preserves animations (currently just ‘Fade’ – more coming soon), internal Hyperlinks, embedded audio and video in HTML5, you can enjoy the original look of your presentations on almost any modern browser and devices. Web Presenter supports internal Hyperlinks which allow to create interactive presentations. The results comes with a great presenter jquery plugin to easy incooperate the presentations into any website, WordPress site or as well as stand-alone web player.

Note: The Web Presenter require installed Microsoft PowerPoint 2007 and up.

]]>
Google Analytics - Real Traffic 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/google-analytics-real-traffic/8911936 Google Analytics – Real Traffic / Bot Traffic


TRAFFIC BOTS:


Do You Need Organic Traffic For Your Website?
Below I have attached you the best traffic tools:
Traffic Bots Official Website: Traffic Bots
Best Traffic Bots In 2018:
Pro Advanced Bot Traffic Traffic Bots – Pro Advanced Bot Traffic
Chaos Proxy Traffic Traffic Bots – Chaos Proxy Traffic
All In One Bot Traffic Traffic Bots – All In One Bot Traffic]]>
Google Analytics – Real Traffic / Bot Traffic


TRAFFIC BOTS:


Do You Need Organic Traffic For Your Website?
Below I have attached you the best traffic tools:
Traffic Bots Official Website: Traffic Bots
Best Traffic Bots In 2018:
Pro Advanced Bot Traffic Traffic Bots – Pro Advanced Bot Traffic
Chaos Proxy Traffic Traffic Bots – Chaos Proxy Traffic
All In One Bot Traffic Traffic Bots – All In One Bot Traffic]]>
Professional BOT Traffic - With VPN 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/professional-bot-traffic-vpn/8825481 Professional BOT Traffic – Use VPN
  • This bot navigates as a human operator, at every page navigation the bot uses a new IP from VPN
  • This bot generates organic traffic recognized in Google Analytics
  • Also the bot has the following features:

  • -it offers the possibility to select a google region
  • -you have the possibility to select the number of traffic every day
  • -changes automatically the ip adress using a comand line in VPN
  • -clears cookies
  • -uses a random new user agent
  • -detects your multi-link on your website, and navigates random page
  • -random scroll on page
  • -random waiting time on page

  • Step by step:
  • 1 Open HMA! Pro VPN.exe and login with username and password.
  • 2 Open bot “Professional Traffic BOT” not “auto.exe”.
  • 3 Complete:
  • -Your website
  • -Your keyword
  • -Google (for example: www.google.it)
  • -Number of repetitions (for example: 1000)
  • -Waiting time until next navigation (for example: 30 for 30 seconds.)
  • After That, press the green triangle,RUN.



  • TRAFFIC BOTS:


    Do You Need Organic Traffic For Your Website?
    Below I have attached you the best traffic tools:
    Traffic Bots Official Website: Traffic Bots
    Best Traffic Bots In 2018:
    Pro Advanced Bot Traffic Traffic Bots – Pro Advanced Bot Traffic
    Chaos Proxy Traffic Traffic Bots – Chaos Proxy Traffic
    All In One Bot Traffic Traffic Bots – All In One Bot Traffic]]>
    Professional BOT Traffic – Use VPN
  • This bot navigates as a human operator, at every page navigation the bot uses a new IP from VPN
  • This bot generates organic traffic recognized in Google Analytics
  • Also the bot has the following features:

  • -it offers the possibility to select a google region
  • -you have the possibility to select the number of traffic every day
  • -changes automatically the ip adress using a comand line in VPN
  • -clears cookies
  • -uses a random new user agent
  • -detects your multi-link on your website, and navigates random page
  • -random scroll on page
  • -random waiting time on page

  • Step by step:
  • 1 Open HMA! Pro VPN.exe and login with username and password.
  • 2 Open bot “Professional Traffic BOT” not “auto.exe”.
  • 3 Complete:
  • -Your website
  • -Your keyword
  • -Google (for example: www.google.it)
  • -Number of repetitions (for example: 1000)
  • -Waiting time until next navigation (for example: 30 for 30 seconds.)
  • After That, press the green triangle,RUN.



  • TRAFFIC BOTS:


    Do You Need Organic Traffic For Your Website?
    Below I have attached you the best traffic tools:
    Traffic Bots Official Website: Traffic Bots
    Best Traffic Bots In 2018:
    Pro Advanced Bot Traffic Traffic Bots – Pro Advanced Bot Traffic
    Chaos Proxy Traffic Traffic Bots – Chaos Proxy Traffic
    All In One Bot Traffic Traffic Bots – All In One Bot Traffic]]>
    NapTime - Anti RSI 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/naptime-anti-rsi/8763081 NapTime helps you to avoid gettings RSI when you’re working at your Windows computer.
    You can set up a maximum of 120 minutes before the pause starts. The maximum duration of a pause is 60 minutes.
    NapTime also supports the use of your ESC button (at your keyboard) to immediatly stop the pause when you need access to your PC.

    Main features.

    And a few shots from the features.

    And even more..

    All Features:
  • Multi-language: English and Dutch supported, and help us translating via this link.
  • Set timer to countdown for next pause.
  • Set pause duration.
  • See the current date and time.
  • Enable/disable Emergency ESC key.
  • Enable/disable debug-mode.
  • Enable/disable to start at Windows boot.
  • See the status (how long it takes for the next pause, and how often you pressed the ESC key to stop the pause).
  • Start/stop the timer.
  • Check for updates.
  • Go to our support website.
  • Start the pause immediatly in debug-mode.


  • Requirements:
  • Microsoft .NET Framework 4.0 Client Profile.
  • At least 128MB RAM
  • An active internet connection to check for updates.
  • ]]>
    NapTime helps you to avoid gettings RSI when you’re working at your Windows computer.
    You can set up a maximum of 120 minutes before the pause starts. The maximum duration of a pause is 60 minutes.
    NapTime also supports the use of your ESC button (at your keyboard) to immediatly stop the pause when you need access to your PC.

    Main features.

    And a few shots from the features.

    And even more..

    All Features:
  • Multi-language: English and Dutch supported, and help us translating via this link.
  • Set timer to countdown for next pause.
  • Set pause duration.
  • See the current date and time.
  • Enable/disable Emergency ESC key.
  • Enable/disable debug-mode.
  • Enable/disable to start at Windows boot.
  • See the status (how long it takes for the next pause, and how often you pressed the ESC key to stop the pause).
  • Start/stop the timer.
  • Check for updates.
  • Go to our support website.
  • Start the pause immediatly in debug-mode.


  • Requirements:
  • Microsoft .NET Framework 4.0 Client Profile.
  • At least 128MB RAM
  • An active internet connection to check for updates.
  • ]]>
    Folder Mount PRO 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/folder-mount-pro/8620109 ABOUT

    Folder Mount PRO is a software that links (binds/mounts) source folder to the specified destination folder.

    Folder Mount PRO is also tested to work with dropbox so you dont have to copy & paste folder which will end up having two copies of the file, just like creating a shortcut files.

    Practical Uses of Folder Mount PRO

    You can use Folder Mount PRO to link your saved game data, project sources, images, music, and any folders you want to link to your dropbox folder (or any related sharing software).

    After mounting your folders, the files and folders will appear on both source and destination. This is normal as the files that you see in destination folder are actually located on the source folder.

    DO NOT MOVE, REMOVE OR DELETE THE SOURCE FOLDER. YOU SHOULD ONLY DELETE THE DESTINATION FOLDER AND NOT THE SOURCE ITSELF.

    THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

    HOW TO CREATE MOUNTED FOLDERS

    • Click New button
    • Fill in the name to identify your linked folder
    • Select s source folder your want to be linked
    • Select the destination folder. This can be a dropbox folder or a shared folder location.
    • Click OK button, and linked folders will now be created.

    After mounting your folders, the files and folders will appear on both source and destination. This is normal as the files that you see in destination folder are actually located on the source folder.

    DO NOT MOVE, REMOVE OR DELETE THE SOURCE FOLDER. YOU SHOULD ONLY DELETE THE DESTINATION FOLDER AND NOT THE SOURCE ITSELF

    HOW TO REMOVE MOUNTED FOLDERS

    You can remove linked (mounted) folder by deleting the destination folder manually or by deleting it using Folder Mount PRO.

    NOTES: DO NOT MOVE, REMOVE OR DELETE THE SOURCE FOLDER. YOU SHOULD ONLY DELETE THE DESTINATION FOLDER AND NOT THE SOURCE ITSELF.

    To remove linked folder:

    • Open Folder Mount PRO
    • Select linked folder on the list
    • Click Delete button and thats it.

    HOW TO EDIT

    The only way to edit a linked folder is removing the linked folder first. Please refer the “HOW TO REMOVE MOUNTED FOLDERS” and “HOW TO CREATE MOUNTED FOLDERS” folders above.

    SYSTEM REQUIREMENTS

    TECHNICAL SUPPORT

    For questions and suggestion you can contact me here:
    http://codecanyon.net/user/walking_deadGAC

    ACKNOWLEDGEMENT

    • Folder Mount Pro, Copyright© 2014 SilentProject™ Softwares
    • Fatcow Icons, Copyright© 2014 fatcow.com

    VERSION HISTORY

    1.0 08.17.2014

    • First release
    ]]>
    ABOUT

    Folder Mount PRO is a software that links (binds/mounts) source folder to the specified destination folder.

    Folder Mount PRO is also tested to work with dropbox so you dont have to copy & paste folder which will end up having two copies of the file, just like creating a shortcut files.

    Practical Uses of Folder Mount PRO

    You can use Folder Mount PRO to link your saved game data, project sources, images, music, and any folders you want to link to your dropbox folder (or any related sharing software).

    After mounting your folders, the files and folders will appear on both source and destination. This is normal as the files that you see in destination folder are actually located on the source folder.

    DO NOT MOVE, REMOVE OR DELETE THE SOURCE FOLDER. YOU SHOULD ONLY DELETE THE DESTINATION FOLDER AND NOT THE SOURCE ITSELF.

    THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

    HOW TO CREATE MOUNTED FOLDERS

    • Click New button
    • Fill in the name to identify your linked folder
    • Select s source folder your want to be linked
    • Select the destination folder. This can be a dropbox folder or a shared folder location.
    • Click OK button, and linked folders will now be created.

    After mounting your folders, the files and folders will appear on both source and destination. This is normal as the files that you see in destination folder are actually located on the source folder.

    DO NOT MOVE, REMOVE OR DELETE THE SOURCE FOLDER. YOU SHOULD ONLY DELETE THE DESTINATION FOLDER AND NOT THE SOURCE ITSELF

    HOW TO REMOVE MOUNTED FOLDERS

    You can remove linked (mounted) folder by deleting the destination folder manually or by deleting it using Folder Mount PRO.

    NOTES: DO NOT MOVE, REMOVE OR DELETE THE SOURCE FOLDER. YOU SHOULD ONLY DELETE THE DESTINATION FOLDER AND NOT THE SOURCE ITSELF.

    To remove linked folder:

    • Open Folder Mount PRO
    • Select linked folder on the list
    • Click Delete button and thats it.

    HOW TO EDIT

    The only way to edit a linked folder is removing the linked folder first. Please refer the “HOW TO REMOVE MOUNTED FOLDERS” and “HOW TO CREATE MOUNTED FOLDERS” folders above.

    SYSTEM REQUIREMENTS

    TECHNICAL SUPPORT

    For questions and suggestion you can contact me here:
    http://codecanyon.net/user/walking_deadGAC

    ACKNOWLEDGEMENT

    • Folder Mount Pro, Copyright© 2014 SilentProject™ Softwares
    • Fatcow Icons, Copyright© 2014 fatcow.com

    VERSION HISTORY

    1.0 08.17.2014

    • First release
    ]]>
    Easy Help Desk 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/easy-help-desk/8485853 Easy Help Desk is designed to make customer service and technical support as efficient as possible. It enables a support staff to streamline the support process. It also permits history of prior service, inventory, and other useful information to be displayed while working with a caller. The main features of the Easy Help Desk are pointed below.

    Features

    • User Friendly Interface
    • Quick implementation
    • Full Tracking Ability
    • Assign Priorities
    • Support Contract
    • Full text searching
    • History at Single Click
    • Problem Management
    • Dashboard and Analytic
    • Notification
    • Detailed reports to improve service performance

    To Do

    • Email and chat functionality

    Suggestions & Error Report

    Open for any suggestion, Please report any error or suggestions.

    Version History

    Existing customers will be notified for the latest update.

    2.1 – 28/July/2017

    • Now with MySQL
    • User Activity Log
    • User Permission

    Runtime Requirement : .NET 4. 0

    ]]>
    Easy Help Desk is designed to make customer service and technical support as efficient as possible. It enables a support staff to streamline the support process. It also permits history of prior service, inventory, and other useful information to be displayed while working with a caller. The main features of the Easy Help Desk are pointed below.

    Features

    • User Friendly Interface
    • Quick implementation
    • Full Tracking Ability
    • Assign Priorities
    • Support Contract
    • Full text searching
    • History at Single Click
    • Problem Management
    • Dashboard and Analytic
    • Notification
    • Detailed reports to improve service performance

    To Do

    • Email and chat functionality

    Suggestions & Error Report

    Open for any suggestion, Please report any error or suggestions.

    Version History

    Existing customers will be notified for the latest update.

    2.1 – 28/July/2017

    • Now with MySQL
    • User Activity Log
    • User Permission

    Runtime Requirement : .NET 4. 0

    ]]>
    Professional EDisk Partitioner 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/professional-edisk-partitioner/8408532

    Professional EDisk Partitioner


  • Professional EDisk Partitioner is necessary if you have a hard drive with a large capacity.
  • It is always ideal to split the hard drive into partitions (such as the C and D drive) so you can assign the operating system and other software in a particular drive while you can keep the other documents into the other.
  • This will help protect your important files in case the OS fails or gets infected by a virus.
  • On top of the safety and secure feature, you will also be able to resize, create, format, split, copy and delete partitions as well as convert to several file systems.

  • ]]>

    Professional EDisk Partitioner


  • Professional EDisk Partitioner is necessary if you have a hard drive with a large capacity.
  • It is always ideal to split the hard drive into partitions (such as the C and D drive) so you can assign the operating system and other software in a particular drive while you can keep the other documents into the other.
  • This will help protect your important files in case the OS fails or gets infected by a virus.
  • On top of the safety and secure feature, you will also be able to resize, create, format, split, copy and delete partitions as well as convert to several file systems.

  • ]]>
    Bootstrap Code Generator 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/bootstrap-code-generator/7860471 What is this app?

    Bootstrap Code Generator is a simple application to generate markup codes for your html project. It uses bootstrap 3 framework in generating required markup codes.

    Easily add html element with just a click of a button so no more typing of lengthy markup just to create a full navigation bar.

    Easily use bootswatch themes by selecting the desired theme on Starter Templates button.

    \\

    Technical Support

    For questions or suggestion, you can post it on the comment box or you can go to my profile and send me a personal message.

    Limitations

    This application is only use to generate markup codes for your html project.

    Arranging and finalizing html elements is your responsibility, use this tool to generate markup codes only.

    Version History

    Existing customers will be notified for the latest update.

    1.3 11.27.2014

    • (NEW) New Themes Paper and Yeti
    • (NEW) Tabs on Elements
    • (NEW) Confirmation Screen when closing the app
    • (UPDATE) Bootstrap source and Themes to 3.3.0
    • (UPDATE) Minor Bug fixed

    1.2 08.02.2014

    • (NEW) Multiple Document Support (MDI)
    • (NEW) Drag and Drop Support
    • (NEW) Syntax Highlight Support (HTML Files Only)
    • (NEW) Added Find & Replace on Edit Menu
    • (NEW) Window Menu (for arranging child windows)
    • (NEW) Form Builder
    • (NEW) Form Element: Textbox
    • (NEW) Form Element: TextArea
    • (NEW) Form Element: Radio Button
    • (NEW) Form Element: Check box
    • (NEW) Form Element: Combo Box / List Box
    • (NEW) Form Element: Submit Button
    • (NEW) Form Element: Hidded
    • (NEW) Easy Installer/Uninstaller
    • (UPDATE) Updated Templates to Bootstrap Version 3.2
    • (UPDATE) Updated Templates to Bootswatch Version 3.2
    • (UPDATE) You can now preview your html project without saving it
    • (FIXED) Cut, Copy, Paste
    • (FIXED) File Extension on Save, Save As, and Open

    1.1 06.08.2014

    • Added new element ‘page footer’
    • Added new dummy object ‘page footer sample’
    • Minor fix on some markup elements

    1.0 06.03.2014

    • First release

    Future Updates

    Carousel Builder using slick, still not sure if it will look good with bootstrap.

    Additional Addons on Navbar Editor like;

    • NavBar Buttons
    • NavBar Form
    • NavBar Text/Link
    ]]>
    What is this app?

    Bootstrap Code Generator is a simple application to generate markup codes for your html project. It uses bootstrap 3 framework in generating required markup codes.

    Easily add html element with just a click of a button so no more typing of lengthy markup just to create a full navigation bar.

    Easily use bootswatch themes by selecting the desired theme on Starter Templates button.

    \\

    Technical Support

    For questions or suggestion, you can post it on the comment box or you can go to my profile and send me a personal message.

    Limitations

    This application is only use to generate markup codes for your html project.

    Arranging and finalizing html elements is your responsibility, use this tool to generate markup codes only.

    Version History

    Existing customers will be notified for the latest update.

    1.3 11.27.2014

    • (NEW) New Themes Paper and Yeti
    • (NEW) Tabs on Elements
    • (NEW) Confirmation Screen when closing the app
    • (UPDATE) Bootstrap source and Themes to 3.3.0
    • (UPDATE) Minor Bug fixed

    1.2 08.02.2014

    • (NEW) Multiple Document Support (MDI)
    • (NEW) Drag and Drop Support
    • (NEW) Syntax Highlight Support (HTML Files Only)
    • (NEW) Added Find & Replace on Edit Menu
    • (NEW) Window Menu (for arranging child windows)
    • (NEW) Form Builder
    • (NEW) Form Element: Textbox
    • (NEW) Form Element: TextArea
    • (NEW) Form Element: Radio Button
    • (NEW) Form Element: Check box
    • (NEW) Form Element: Combo Box / List Box
    • (NEW) Form Element: Submit Button
    • (NEW) Form Element: Hidded
    • (NEW) Easy Installer/Uninstaller
    • (UPDATE) Updated Templates to Bootstrap Version 3.2
    • (UPDATE) Updated Templates to Bootswatch Version 3.2
    • (UPDATE) You can now preview your html project without saving it
    • (FIXED) Cut, Copy, Paste
    • (FIXED) File Extension on Save, Save As, and Open

    1.1 06.08.2014

    • Added new element ‘page footer’
    • Added new dummy object ‘page footer sample’
    • Minor fix on some markup elements

    1.0 06.03.2014

    • First release

    Future Updates

    Carousel Builder using slick, still not sure if it will look good with bootstrap.

    Additional Addons on Navbar Editor like;

    • NavBar Buttons
    • NavBar Form
    • NavBar Text/Link
    ]]>
    Mass PDF WaterMark Studio 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/mass-pdf-watermark-studio/7769653 Mass PDF WaterMark Studio

    As the name suggests you MPWS or Mass PDF WaterMark Studio is bulk PDF water marking app that can watermark your existing pdf files with image or text. Well that’s not all – you can rotate the text, change it’s font size, change it’s opacity, colour, font family and many more…

    Features :

    + Bulk Processing

    + Complete unattended process.

    + add text watermark.

    + add image watermark.

    + choose different text colours.

    + rotate the text.

    + change the opacity of the text

    + change the font size of the text.

    + add image in the background.

    + drag drop support.

    + Fast process.

    + Portable, Secure and Easy to use

    View the screenshots to know more…

    ]]>
    Mass PDF WaterMark Studio

    As the name suggests you MPWS or Mass PDF WaterMark Studio is bulk PDF water marking app that can watermark your existing pdf files with image or text. Well that’s not all – you can rotate the text, change it’s font size, change it’s opacity, colour, font family and many more…

    Features :

    + Bulk Processing

    + Complete unattended process.

    + add text watermark.

    + add image watermark.

    + choose different text colours.

    + rotate the text.

    + change the opacity of the text

    + change the font size of the text.

    + add image in the background.

    + drag drop support.

    + Fast process.

    + Portable, Secure and Easy to use

    View the screenshots to know more…

    ]]>
    Paypal QR generator 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/paypal-qr-generator/7650456 Follow me on Codecanyon Subscribe to RSS Feed

    QR code is a type of matrix barcode. QR codes have become common in consumer advertising, tipically a smartphone is used as a QR-code scanner, displaying the code and converting it to some useful form (such as a standard URL for a website, thereby obviating the need for a user to type it manually into a web browser).

    Paypal QR generator is a simple application to generate Qr codes, when qr codes are scanned with a smarthpone or a tablet they will automatically redirect customers to a PayPal payment page.

    Supported in all countries attended for PayPal. Users only have to “scan and pay”.

    Developed with Visual Studio 2013 (Visual Basic.NET 2013).
    Full and updated source code is available to purchase: 20$

    V1.3

    * Little bugfix

    V1.2

    * You can select between MOBILE and STANDARD paypal flow * Added a top menu with options * You can set window as always visible * Added "Visit us" menu option * Added GUI Mouse-over help 

    V1.1

    * Added items quantity (nº items * item price = total amount) * You can set a custom value (key=value) like "Color=Blue"  * You can set the QR code correction level * You can change the QR background color * You can change the QR fore color * Changed the main icon * Changed the main GUI * Fixed random application crash

    V1.0

    * Initial release

    page visitor counter

    ]]>
    Follow me on Codecanyon Subscribe to RSS Feed

    QR code is a type of matrix barcode. QR codes have become common in consumer advertising, tipically a smartphone is used as a QR-code scanner, displaying the code and converting it to some useful form (such as a standard URL for a website, thereby obviating the need for a user to type it manually into a web browser).

    Paypal QR generator is a simple application to generate Qr codes, when qr codes are scanned with a smarthpone or a tablet they will automatically redirect customers to a PayPal payment page.

    Supported in all countries attended for PayPal. Users only have to “scan and pay”.

    Developed with Visual Studio 2013 (Visual Basic.NET 2013).
    Full and updated source code is available to purchase: 20$

    V1.3

    * Little bugfix

    V1.2

    * You can select between MOBILE and STANDARD paypal flow * Added a top menu with options * You can set window as always visible * Added "Visit us" menu option * Added GUI Mouse-over help 

    V1.1

    * Added items quantity (nº items * item price = total amount) * You can set a custom value (key=value) like "Color=Blue"  * You can set the QR code correction level * You can change the QR background color * You can change the QR fore color * Changed the main icon * Changed the main GUI * Fixed random application crash

    V1.0

    * Initial release

    page visitor counter

    ]]>
    RapidFormFiller - Fill Any Web Forms ! 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/rapidformfiller-fill-any-web-forms/759024 Description Fill Any Web Forms With Your Customs Fields Templates
    For Blogs comment, Forums profile, Guestbooks, Web2.0, Authority sites, ...

    Watch screenshots to understand what RapidFormFiller is.
    Help and quick start guide includes.

    TRIAL VERSION : http://bit.ly/sJYElH

    How it works

    1. In one click load a list of URLs. Tons of plateforms are supported : forums (phpBB, SMF , vBulletin, ...), blogs (WordPress, BlogEngine, ...), guestbooks, and many more.

    2. To fill a form, you can create your own template, or load an existing profile. Profile files are very simple, they contain the field name and its value. All fields type are supported (input, checkbox, radiobutton, textarea, ...).

    3. One click on Fill it ! button and the web form will be completed (don’t forget the captcha !). The working is very simple and very effective. No limits !

    Counter

    ]]>
    Description Fill Any Web Forms With Your Customs Fields Templates
    For Blogs comment, Forums profile, Guestbooks, Web2.0, Authority sites, ...

    Watch screenshots to understand what RapidFormFiller is.
    Help and quick start guide includes.

    TRIAL VERSION : http://bit.ly/sJYElH

    How it works

    1. In one click load a list of URLs. Tons of plateforms are supported : forums (phpBB, SMF , vBulletin, ...), blogs (WordPress, BlogEngine, ...), guestbooks, and many more.

    2. To fill a form, you can create your own template, or load an existing profile. Profile files are very simple, they contain the field name and its value. All fields type are supported (input, checkbox, radiobutton, textarea, ...).

    3. One click on Fill it ! button and the web form will be completed (don’t forget the captcha !). The working is very simple and very effective. No limits !

    Counter

    ]]>
    SMTP Professional E-mail Sender 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/smtp-professional-e-mail-sender/7511072






    SMTP Professional E-mail Sender ?


  • SMTP Professional E-mail Sender is an application that allows you to send messages through an SMTP server. It lets you send messages if you do not have a mail application installed, or need to send from an account that is only used for sending messages without worrying about responses. It also runs from a USB thumb drive, so you can send emails from anywhere you have access to a computer with Internet access.
  • Graphical user interface (GUI) instead of the run of the mill command line applications Built in address book saves you time typing email addresses, guesses and auto-completes addresses already in the address book.
  • Send messages using a SMTP server from any Internet connected computer from a thumb drive.
  • Supports attaching an unlimited amount of files to the message before sending.
  • Sends plain text messages to minimize bandwidth used for processing the messages as they travel across the Internet.
  • Send messages automatically from a script using command line parameters.
  • ]]>






    SMTP Professional E-mail Sender ?


  • SMTP Professional E-mail Sender is an application that allows you to send messages through an SMTP server. It lets you send messages if you do not have a mail application installed, or need to send from an account that is only used for sending messages without worrying about responses. It also runs from a USB thumb drive, so you can send emails from anywhere you have access to a computer with Internet access.
  • Graphical user interface (GUI) instead of the run of the mill command line applications Built in address book saves you time typing email addresses, guesses and auto-completes addresses already in the address book.
  • Send messages using a SMTP server from any Internet connected computer from a thumb drive.
  • Supports attaching an unlimited amount of files to the message before sending.
  • Sends plain text messages to minimize bandwidth used for processing the messages as they travel across the Internet.
  • Send messages automatically from a script using command line parameters.
  • ]]>
    ID3 tag manager 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/id3-tag-manager/7461022 ID3 tag manager

    This document is an informal standard and replaces the ID3 tag manager.3.0 standard [ID3 tag manager]. A formal standard will use another revision number even if the content is identical to document. The contents in this document may change for clarifications but never for added or altered functionallity. Distribution of this document is unlimited. Abstract This document describes the main structure of ID3v, which is a revised version of the ID3 tag manager informal standard [ID3 tag manager] version 2.3.0. The ID3 tag manager offers a flexible way of storing audio meta information within the audio file itself. The information may be technical information, such as equalisation curves, as well as title, performer, copyright etc. ID3v is meant to be as close as possible to ID3 tag manager.3.0 in order to allow for implementations to be revised as easily as possible. 1. Table of contents Status of this document Abstract 1. Table of contents 2. Conventions in this document 2. Standard overview 3. ID3 tag manager overview 3.1. ID3 tag manager header 3.2. ID3 tag manager extended header 3.3. Padding 3.4. ID3 tag manager footer 4. ID3 tag manager frames overview 4.1. Frame header flags 4.1.1. Frame status flags 4.1.2. Frame format flags 5. Tag location 6. Unsynchronisation 6.1. The unsynchronisation scheme 6.2. Synchsafe integers 2. Conventions in this document Text within ”” is a text string exactly as it appears in a tag. Numbers preceded with $ are hexadecimal and numbers preceded with % are binary. $xx is used to indicate a byte with unknown content. %x is used to indicate a bit with unknown content. The most significant bit (MSB) of a byte is called ‘bit 7’ and the least significant bit (LSB) is called ‘bit 0’. A tag is the whole tag described in this document. A frame is a block of information in the tag. The tag consists of a header, frames and optional padding. A field is a piece of information; one value, a string etc. A numeric string is a string that consists of the characters “0123456789” only. The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in RFC 2119 [KEYWORDS]. 3. ID3 tag manager overview ID3 tag manager is a general tagging format for audio, which makes it possible to store meta data about the audio inside the audio file itself. The ID3 tag described in this document is mainly targeted at files encoded with MPEG-1/2 layer I, MPEG-1/2 layer II, MPEG-1/2 layer III and MPEG-2.5, but may work with other types of encoded audio or as a stand alone format for audio meta data. ID3 tag manager is designed to be as flexible and expandable as possible to meet new meta information needs that might arise. To achieve that ID3 tag manager is constructed as a container for several information blocks, called frames, whose format need not be known to the software that encounters them. At the start of every frame is an unique and predefined identifier, a size descriptor that allows software to skip unknown frames and a flags field. The flags describes encoding details and if the frame should remain in the tag, should it be unknown to the software, if the file is altered. The bitorder in ID3 tag manager is most significant bit first (MSB). The byteorder in multibyte numbers is most significant byte first (e.g. $12345678 would be encoded $12 34 56 78), also known as big endian and network byte order. Overall tag structure: ----- | Header (10 bytes) | ----- | Extended Header | | (variable length, OPTIONAL) | ----- | Frames (variable length) | ----- | Padding | | (variable length, OPTIONAL) | ----- | Footer (10 bytes, OPTIONAL) | ----- In general, padding and footer are mutually exclusive. See details in sections 3.3, 3.4 and 5. 3.1. ID3 tag manager header The first part of the ID3 tag manager tag is the 10 byte tag header, laid out as follows: ID3 tag manager/file identifier “ID3” ID3 tag manager version $04 00 ID3 tag manager flags %abcd0000 ID3 tag manager size 4 * %0xxxxxxx The first three bytes of the tag are always “ID3”, to indicate that this is an ID3 tag manager tag, directly followed by the two version bytes. The first byte of ID3 tag manager version is its major version, while the second byte is its revision number. In this case this is ID3v. All revisions are backwards compatible while major versions are not. If software with ID3v and below support should encounter version five or higher it should simply ignore the whole tag. Version or revision will never be $FF. The version is followed by the ID3 tag manager flags field, of which currently four flags are used. a – Unsynchronisation Bit 7 in the ‘ID3 tag manager flags’ indicates whether or not unsynchronisation is applied on all frames (see section 6.1 for details); a set bit indicates usage. b – Extended header The second bit (bit 6) indicates whether or not the header is followed by an extended header. The extended header is described in section 3.2. A set bit indicates the presence of an extended header. c – Experimental indicator The third bit (bit 5) is used as an ‘experimental indicator’. This flag SHALL always be set when the tag is in an experimental stage. d – Footer present Bit 4 indicates that a footer (section 3.4) is present at the very end of the tag. A set bit indicates the presence of a footer. All the other flags MUST be cleared. If one of these undefined flags are set, the tag might not be readable for a parser that does not know the flags function. The ID3 tag manager tag size is stored as a 32 bit synchsafe integer (section 6.2), making a total of 28 effective bits (representing up to 256MB). The ID3 tag manager tag size is the sum of the byte length of the extended header, the padding and the frames after unsynchronisation. If a footer is present this equals to (‘total size’ – 20) bytes, otherwise (‘total size’ – 10) bytes. An ID3 tag manager tag can be detected with the following pattern: $49 44 33 yy yy xx zz zz zz zz Where yy is less than $FF, xx is the ‘flags’ byte and zz is less than $80. 3.2. Extended header The extended header contains information that can provide further insight in the structure of the tag, but is not vital to the correct parsing of the tag information; hence the extended header is optional. Extended header size 4 * %0xxxxxxx Number of flag bytes $01 Extended Flags $xx Where the ‘Extended header size’ is the size of the whole extended header, stored as a 32 bit synchsafe integer. An extended header can thus never have a size of fewer than six bytes. The extended flags field, with its size described by ‘number of flag bytes’, is defined as: %0bcd0000 Each flag that is set in the extended header has data attached, which comes in the order in which the flags are encountered (i.e. the data for flag ‘b’ comes before the data for flag ‘c’). Unset flags cannot have any attached data. All unknown flags MUST be unset and their corresponding data removed when a tag is modified. Every set flag’s data starts with a length byte, which contains a value between 0 and 128 ($00 – $7f), followed by data that has the field length indicated by the length byte. If a flag has no attached data, the value $00 is used as length byte. b – Tag is an update If this flag is set, the present tag is an update of a tag found earlier in the present file or stream. If frames defined as unique are found in the present tag, they are to override any corresponding ones found in the earlier tag. This flag has no corresponding data. Flag data length $00 c – CRC data present If this flag is set, a CRC-32 [ISO-3309] data is included in the extended header. The CRC is calculated on all the data between the header and footer as indicated by the header’s tag length field, minus the extended header. Note that this includes the padding (if there is any), but excludes the footer. The CRC-32 is stored as an 35 bit synchsafe integer, leaving the upper four bits always zeroed. Flag data length $05 Total frame CRC 5 * %0xxxxxxx d – Tag restrictions For some applications it might be desired to restrict a tag in more ways than imposed by the ID3 tag manager specification. Note that the presence of these restrictions does not affect how the tag is decoded, merely how it was restricted before encoding. If this flag is set the tag is restricted as follows: Flag data length $01 Restrictions %ppqrrstt p – Tag size restrictions 00 No more than 128 frames and 1 MB total tag size. 01 No more than 64 frames and 128 KB total tag size. 10 No more than 32 frames and 40 KB total tag size. 11 No more than 32 frames and 4 KB total tag size. q – Text encoding restrictions 0 No restrictions 1 Strings are only encoded with ISO-8859-1 [ISO-8859-1] or UTF-8 [UTF-8]. r – Text fields size restrictions 00 No restrictions 01 No string is longer than 1024 characters. 10 No string is longer than 128 characters. 11 No string is longer than 30 characters. Note that nothing is said about how many bytes is used to represent those characters, since it is encoding dependent. If a text frame consists of more than one string, the sum of the strungs is restricted as stated. s – Image encoding restrictions 0 No restrictions 1 Images are encoded only with PNG [PNG] or JPEG [JFIF]. t – Image size restrictions 00 No restrictions 01 All images are 256×256 pixels or smaller. 10 All images are 64×64 pixels or smaller. 11 All images are exactly 64×64 pixels, unless required otherwise. 3.3. Padding It is OPTIONAL to include padding after the final frame (at the end of the ID3 tag), making the size of all the frames together smaller than the size given in the tag header. A possible purpose of this padding is to allow for adding a few additional frames or enlarge existing frames within the tag without having to rewrite the entire file. The value of the padding bytes must be $00. A tag MUST NOT have any padding between the frames or between the tag header and the frames. Furthermore it MUST NOT have any padding when a tag footer is added to the tag. 3.4. ID3 tag manager footer To speed up the process of locating an ID3 tag manager tag when searching from the end of a file, a footer can be added to the tag. It is REQUIRED to add a footer to an appended tag, i.e. a tag located after all audio data. The footer is a copy of the header, but with a different identifier. ID3 tag manager identifier “3DI” ID3 tag manager version $04 00 ID3 tag manager flags %abcd0000 ID3 tag manager size 4 * %0xxxxxxx 4. ID3 tag manager frame overview All ID3 tag manager frames consists of one frame header followed by one or more fields containing the actual information. The header is always 10 bytes and laid out as follows: Frame ID $xx xx xx xx (four characters) Size 4 * %0xxxxxxx Flags $xx xx The frame ID is made out of the characters capital A-Z and 0-9. Identifiers beginning with “X”, “Y” and “Z” are for experimental frames and free for everyone to use, without the need to set the experimental bit in the tag header. Bear in mind that someone else might have used the same identifier as you. All other identifiers are either used or reserved for future use. The frame ID is followed by a size descriptor containing the size of the data in the final frame, after encryption, compression and unsynchronisation. The size is excluding the frame header (‘total frame size’ – 10 bytes) and stored as a 32 bit synchsafe integer. In the frame header the size descriptor is followed by two flag bytes. These flags are described in section 4.1. There is no fixed order of the frames’ appearance in the tag, although it is desired that the frames are arranged in order of significance concerning the recognition of the file. An example of such order: UFID, TIT2, MCDI, TRCK … A tag MUST contain at least one frame. A frame must be at least 1 byte big, excluding the header. If nothing else is said, strings, including numeric strings and URLs are represented as ISO-8859-1 [ISO-8859-1] characters in the range $20 – $FF. Such strings are represented in frame descriptions as <text string>, or <full text string> if newlines are allowed. If nothing else is said newline character is forbidden. In ISO-8859-1 a newline is represented, when allowed, with $0A only. Frames that allow different types of text encoding contains a text encoding description byte. Possible encodings: $00 ISO-8859-1 [ISO-8859-1]. Terminated with $00. $01 UTF-16 [UTF-16] encoded Unicode [UNICODE] with BOM. All strings in the same frame SHALL have the same byteorder. Terminated with $00 00. $02 UTF-16BE [UTF-16] encoded Unicode [UNICODE] without BOM. Terminated with $00 00. $03 UTF-8 [UTF-8] encoded Unicode [UNICODE]. Terminated with $00. Strings dependent on encoding are represented in frame descriptions as <text string according to encoding>, or <full text string according to encoding> if newlines are allowed. Any empty strings of type $01 which are NULL-terminated may have the Unicode BOM followed by a Unicode NULL ($FF FE 00 00 or $FE FF 00 00). The timestamp fields are based on a subset of ISO 8601. When being as precise as possible the format of a time string is yyyy-MM-ddTHH:mm:ss (year, “”, month, “”, day, “T, hour (out of 24),, minutes, ”:”, seconds), but the precision may be reduced by removing as many time indicators as wanted. Hence valid timestamps are yyyy, yyyy-MM, yyyy-MM-dd, yyyy-MM-ddTHH, yyyy-MM-ddTHH:mm and yyyy-MM-ddTHH:mm:ss. All time stamps are UTC. For durations, use the slash character as described in 8601, and for multiple noncontiguous dates, use multiple strings, if allowed by the frame definition. The three byte language field, present in several frames, is used to describe the language of the frame’s content, according to ISO-639-2 The language should be represented in lower case. If the language is not known the string “XXX” should be used. All URLs [URL] MAY be relative, e.g. “picture.png”, ”../doc.txt”. If a frame is longer than it should be, e.g. having more fields than specified in this document, that indicates that additions to the frame have been made in a later version of the ID3 tag manager standard. This is reflected by the revision number in the header of the tag. 4.1. Frame header flags In the frame header the size descriptor is followed by two flag bytes. All unused flags MUST be cleared. The first byte is for ‘status messages’ and the second byte is a format description. If an unknown flag is set in the first byte the frame MUST NOT be changed without that bit cleared. If an unknown flag is set in the second byte the frame is likely to not be readable. Some flags in the second byte indicates that extra information is added to the header. These fields of extra information is ordered as the flags that indicates them. The flags field is defined as follows (l and o left out because ther resemblence to one and zero): %0abc0000 %0h00kmnp Some frame format flags indicate that additional information fields are added to the frame. This information is added after the frame header and before the frame data in the same order as the flags that indicates them. I.e. the four bytes of decompressed size will precede the encryption method byte. These additions affects the ‘frame size’ field, but are not subject to encryption or compression. The default status flags setting for a frame is, unless stated otherwise, ‘preserved if tag is altered’ and ‘preserved if file is altered’, i.e. %00000000. 4.1.1. Frame status flags a – Tag alter preservation This flag tells the tag parser what to do with this frame if it is unknown and the tag is altered in any way. This applies to all kinds of alterations, including adding more padding and reordering the frames. 0 Frame should be preserved. 1 Frame should be discarded. b – File alter preservation This flag tells the tag parser what to do with this frame if it is unknown and the file, excluding the tag, is altered. This does not apply when the audio is completely replaced with other audio data. 0 Frame should be preserved. 1 Frame should be discarded. c – Read only This flag, if set, tells the software that the contents of this frame are intended to be read only. Changing the contents might break something, e.g. a signature. If the contents are changed, without knowledge of why the frame was flagged read only and without taking the proper means to compensate, e.g. recalculating the signature, the bit MUST be cleared. 4.1.2. Frame format flags h – Grouping identity This flag indicates whether or not this frame belongs in a group with other frames. If set, a group identifier byte is added to the frame. Every frame with the same group identifier belongs to the same group. 0 Frame does not contain group information 1 Frame contains group information k – Compression This flag indicates whether or not the frame is compressed. A ‘Data Length Indicator’ byte MUST be included in the frame. 0 Frame is not compressed. 1 Frame is compressed using zlib [zlib] deflate method. If set, this requires the ‘Data Length Indicator’ bit to be set as well. m – Encryption This flag indicates whether or not the frame is encrypted. If set, one byte indicating with which method it was encrypted will be added to the frame. See description of the ENCR frame for more information about encryption method registration. Encryption should be done after compression. Whether or not setting this flag requires the presence of a ‘Data Length Indicator’ depends on the specific algorithm used. 0 Frame is not encrypted. 1 Frame is encrypted. n – Unsynchronisation This flag indicates whether or not unsynchronisation was applied to this frame. See section 6 for details on unsynchronisation. If this flag is set all data from the end of this header to the end of this frame has been unsynchronised. Although desirable, the presence of a ‘Data Length Indicator’ is not made mandatory by unsynchronisation. 0 Frame has not been unsynchronised. 1 Frame has been unsyrchronised. p – Data length indicator This flag indicates that a data length indicator has been added to the frame. The data length indicator is the value one would write as the ‘Frame length’ if all of the frame format flags were zeroed, represented as a 32 bit synchsafe integer. 0 There is no Data Length Indicator. 1 A data length Indicator has been added to the frame. 5. Tag location The default location of an ID3 tag manager tag is prepended to the audio so that players can benefit from the information when the data is streamed. It is however possible to append the tag, or make a prepend/append combination. When deciding upon where an unembedded tag should be located, the following order of preference SHOULD be considered. 1. Prepend the tag. 2. Prepend a tag with all vital information and add a second tag at the end of the file, before tags from other tagging systems. The first tag is required to have a SEEK frame. 3. Add a tag at the end of the file, before tags from other tagging systems. In case 2 and 3 the tag can simply be appended if no other known tags are present. The suggested method to find ID3 tag manager tags are: 1. Look for a prepended tag using the pattern found in section 3.1. 2. If a SEEK frame was found, use its values to guide further searching. 3. Look for a tag footer, scanning from the back of the file. For every new tag that is found, the old tag should be discarded unless the update flag in the extended header (section 3.2) is set. 6. Unsynchronisation The only purpose of unsynchronisation is to make the ID3 tag manager tag as compatible as possible with existing software and hardware. There is no use in ‘unsynchronising’ tags if the file is only to be processed only by ID3 tag manager aware software and hardware. Unsynchronisation is only useful with tags in MPEG 1/2 layer I, II and III, MPEG 2.5 and AAC files. 6.1. The unsynchronisation scheme Whenever a false synchronisation is found within the tag, one zeroed byte is inserted after the first false synchronisation byte. The format of synchronisations that should be altered by ID3 encoders is as follows: %11111111 111xxxxx and should be replaced with: %11111111 00000000 111xxxxx This has the side effect that all $FF 00 combinations have to be altered, so they will not be affected by the decoding process. Therefore all the $FF 00 combinations have to be replaced with the $FF 00 00 combination during the unsynchronisation. To indicate usage of the unsynchronisation, the unsynchronisation flag in the frame header should be set. This bit MUST be set if the frame was altered by the unsynchronisation and SHOULD NOT be set if unaltered. If all frames in the tag are unsynchronised the unsynchronisation flag in the tag header SHOULD be set. It MUST NOT be set if the tag has a frame which is not unsynchronised. Assume the first byte of the audio to be $FF. The special case when the last byte of the last frame is $FF and no padding nor footer is used will then introduce a false synchronisation. This can be solved by adding a footer, adding padding or unsynchronising the frame and add $00 to the end of the frame data, thus adding more byte to the frame size than a normal unsynchronisation would. Although not preferred, it is allowed to apply the last method on all frames ending with $FF. It is preferred that the tag is either completely unsynchronised or not unsynchronised at all. A completely unsynchronised tag has no false synchonisations in it, as defined above, and does not end with $FF. A completely non-unsynchronised tag contains no unsynchronised frames, and thus the unsynchronisation flag in the header is cleared. Do bear in mind, that if compression or encryption is used, the unsynchronisation scheme MUST be applied afterwards. When decoding an unsynchronised frame, the unsynchronisation scheme MUST be reversed first, encryption and decompression afterwards. 6.2. Synchsafe integers In some parts of the tag it is inconvenient to use the unsychronisation scheme because the size of unsynchronised data is not known in advance, which is particularly problematic with size descriptors. The solution in ID3 tag manager is to use synchsafe integers, in which there can never be any false synchs. Synchsafe integers are integers that keep its highest bit (bit 7) zeroed, making seven bits out of eight available. Thus a 32 bit synchsafe integer can store 28 bits of information. Example: 255 (%11111111) encoded as a 16 bit synchsafe integer is 383 (%00000001 01111111).

    ]]>
    ID3 tag manager

    This document is an informal standard and replaces the ID3 tag manager.3.0 standard [ID3 tag manager]. A formal standard will use another revision number even if the content is identical to document. The contents in this document may change for clarifications but never for added or altered functionallity. Distribution of this document is unlimited. Abstract This document describes the main structure of ID3v, which is a revised version of the ID3 tag manager informal standard [ID3 tag manager] version 2.3.0. The ID3 tag manager offers a flexible way of storing audio meta information within the audio file itself. The information may be technical information, such as equalisation curves, as well as title, performer, copyright etc. ID3v is meant to be as close as possible to ID3 tag manager.3.0 in order to allow for implementations to be revised as easily as possible. 1. Table of contents Status of this document Abstract 1. Table of contents 2. Conventions in this document 2. Standard overview 3. ID3 tag manager overview 3.1. ID3 tag manager header 3.2. ID3 tag manager extended header 3.3. Padding 3.4. ID3 tag manager footer 4. ID3 tag manager frames overview 4.1. Frame header flags 4.1.1. Frame status flags 4.1.2. Frame format flags 5. Tag location 6. Unsynchronisation 6.1. The unsynchronisation scheme 6.2. Synchsafe integers 2. Conventions in this document Text within ”” is a text string exactly as it appears in a tag. Numbers preceded with $ are hexadecimal and numbers preceded with % are binary. $xx is used to indicate a byte with unknown content. %x is used to indicate a bit with unknown content. The most significant bit (MSB) of a byte is called ‘bit 7’ and the least significant bit (LSB) is called ‘bit 0’. A tag is the whole tag described in this document. A frame is a block of information in the tag. The tag consists of a header, frames and optional padding. A field is a piece of information; one value, a string etc. A numeric string is a string that consists of the characters “0123456789” only. The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in RFC 2119 [KEYWORDS]. 3. ID3 tag manager overview ID3 tag manager is a general tagging format for audio, which makes it possible to store meta data about the audio inside the audio file itself. The ID3 tag described in this document is mainly targeted at files encoded with MPEG-1/2 layer I, MPEG-1/2 layer II, MPEG-1/2 layer III and MPEG-2.5, but may work with other types of encoded audio or as a stand alone format for audio meta data. ID3 tag manager is designed to be as flexible and expandable as possible to meet new meta information needs that might arise. To achieve that ID3 tag manager is constructed as a container for several information blocks, called frames, whose format need not be known to the software that encounters them. At the start of every frame is an unique and predefined identifier, a size descriptor that allows software to skip unknown frames and a flags field. The flags describes encoding details and if the frame should remain in the tag, should it be unknown to the software, if the file is altered. The bitorder in ID3 tag manager is most significant bit first (MSB). The byteorder in multibyte numbers is most significant byte first (e.g. $12345678 would be encoded $12 34 56 78), also known as big endian and network byte order. Overall tag structure: ----- | Header (10 bytes) | ----- | Extended Header | | (variable length, OPTIONAL) | ----- | Frames (variable length) | ----- | Padding | | (variable length, OPTIONAL) | ----- | Footer (10 bytes, OPTIONAL) | ----- In general, padding and footer are mutually exclusive. See details in sections 3.3, 3.4 and 5. 3.1. ID3 tag manager header The first part of the ID3 tag manager tag is the 10 byte tag header, laid out as follows: ID3 tag manager/file identifier “ID3” ID3 tag manager version $04 00 ID3 tag manager flags %abcd0000 ID3 tag manager size 4 * %0xxxxxxx The first three bytes of the tag are always “ID3”, to indicate that this is an ID3 tag manager tag, directly followed by the two version bytes. The first byte of ID3 tag manager version is its major version, while the second byte is its revision number. In this case this is ID3v. All revisions are backwards compatible while major versions are not. If software with ID3v and below support should encounter version five or higher it should simply ignore the whole tag. Version or revision will never be $FF. The version is followed by the ID3 tag manager flags field, of which currently four flags are used. a – Unsynchronisation Bit 7 in the ‘ID3 tag manager flags’ indicates whether or not unsynchronisation is applied on all frames (see section 6.1 for details); a set bit indicates usage. b – Extended header The second bit (bit 6) indicates whether or not the header is followed by an extended header. The extended header is described in section 3.2. A set bit indicates the presence of an extended header. c – Experimental indicator The third bit (bit 5) is used as an ‘experimental indicator’. This flag SHALL always be set when the tag is in an experimental stage. d – Footer present Bit 4 indicates that a footer (section 3.4) is present at the very end of the tag. A set bit indicates the presence of a footer. All the other flags MUST be cleared. If one of these undefined flags are set, the tag might not be readable for a parser that does not know the flags function. The ID3 tag manager tag size is stored as a 32 bit synchsafe integer (section 6.2), making a total of 28 effective bits (representing up to 256MB). The ID3 tag manager tag size is the sum of the byte length of the extended header, the padding and the frames after unsynchronisation. If a footer is present this equals to (‘total size’ – 20) bytes, otherwise (‘total size’ – 10) bytes. An ID3 tag manager tag can be detected with the following pattern: $49 44 33 yy yy xx zz zz zz zz Where yy is less than $FF, xx is the ‘flags’ byte and zz is less than $80. 3.2. Extended header The extended header contains information that can provide further insight in the structure of the tag, but is not vital to the correct parsing of the tag information; hence the extended header is optional. Extended header size 4 * %0xxxxxxx Number of flag bytes $01 Extended Flags $xx Where the ‘Extended header size’ is the size of the whole extended header, stored as a 32 bit synchsafe integer. An extended header can thus never have a size of fewer than six bytes. The extended flags field, with its size described by ‘number of flag bytes’, is defined as: %0bcd0000 Each flag that is set in the extended header has data attached, which comes in the order in which the flags are encountered (i.e. the data for flag ‘b’ comes before the data for flag ‘c’). Unset flags cannot have any attached data. All unknown flags MUST be unset and their corresponding data removed when a tag is modified. Every set flag’s data starts with a length byte, which contains a value between 0 and 128 ($00 – $7f), followed by data that has the field length indicated by the length byte. If a flag has no attached data, the value $00 is used as length byte. b – Tag is an update If this flag is set, the present tag is an update of a tag found earlier in the present file or stream. If frames defined as unique are found in the present tag, they are to override any corresponding ones found in the earlier tag. This flag has no corresponding data. Flag data length $00 c – CRC data present If this flag is set, a CRC-32 [ISO-3309] data is included in the extended header. The CRC is calculated on all the data between the header and footer as indicated by the header’s tag length field, minus the extended header. Note that this includes the padding (if there is any), but excludes the footer. The CRC-32 is stored as an 35 bit synchsafe integer, leaving the upper four bits always zeroed. Flag data length $05 Total frame CRC 5 * %0xxxxxxx d – Tag restrictions For some applications it might be desired to restrict a tag in more ways than imposed by the ID3 tag manager specification. Note that the presence of these restrictions does not affect how the tag is decoded, merely how it was restricted before encoding. If this flag is set the tag is restricted as follows: Flag data length $01 Restrictions %ppqrrstt p – Tag size restrictions 00 No more than 128 frames and 1 MB total tag size. 01 No more than 64 frames and 128 KB total tag size. 10 No more than 32 frames and 40 KB total tag size. 11 No more than 32 frames and 4 KB total tag size. q – Text encoding restrictions 0 No restrictions 1 Strings are only encoded with ISO-8859-1 [ISO-8859-1] or UTF-8 [UTF-8]. r – Text fields size restrictions 00 No restrictions 01 No string is longer than 1024 characters. 10 No string is longer than 128 characters. 11 No string is longer than 30 characters. Note that nothing is said about how many bytes is used to represent those characters, since it is encoding dependent. If a text frame consists of more than one string, the sum of the strungs is restricted as stated. s – Image encoding restrictions 0 No restrictions 1 Images are encoded only with PNG [PNG] or JPEG [JFIF]. t – Image size restrictions 00 No restrictions 01 All images are 256×256 pixels or smaller. 10 All images are 64×64 pixels or smaller. 11 All images are exactly 64×64 pixels, unless required otherwise. 3.3. Padding It is OPTIONAL to include padding after the final frame (at the end of the ID3 tag), making the size of all the frames together smaller than the size given in the tag header. A possible purpose of this padding is to allow for adding a few additional frames or enlarge existing frames within the tag without having to rewrite the entire file. The value of the padding bytes must be $00. A tag MUST NOT have any padding between the frames or between the tag header and the frames. Furthermore it MUST NOT have any padding when a tag footer is added to the tag. 3.4. ID3 tag manager footer To speed up the process of locating an ID3 tag manager tag when searching from the end of a file, a footer can be added to the tag. It is REQUIRED to add a footer to an appended tag, i.e. a tag located after all audio data. The footer is a copy of the header, but with a different identifier. ID3 tag manager identifier “3DI” ID3 tag manager version $04 00 ID3 tag manager flags %abcd0000 ID3 tag manager size 4 * %0xxxxxxx 4. ID3 tag manager frame overview All ID3 tag manager frames consists of one frame header followed by one or more fields containing the actual information. The header is always 10 bytes and laid out as follows: Frame ID $xx xx xx xx (four characters) Size 4 * %0xxxxxxx Flags $xx xx The frame ID is made out of the characters capital A-Z and 0-9. Identifiers beginning with “X”, “Y” and “Z” are for experimental frames and free for everyone to use, without the need to set the experimental bit in the tag header. Bear in mind that someone else might have used the same identifier as you. All other identifiers are either used or reserved for future use. The frame ID is followed by a size descriptor containing the size of the data in the final frame, after encryption, compression and unsynchronisation. The size is excluding the frame header (‘total frame size’ – 10 bytes) and stored as a 32 bit synchsafe integer. In the frame header the size descriptor is followed by two flag bytes. These flags are described in section 4.1. There is no fixed order of the frames’ appearance in the tag, although it is desired that the frames are arranged in order of significance concerning the recognition of the file. An example of such order: UFID, TIT2, MCDI, TRCK … A tag MUST contain at least one frame. A frame must be at least 1 byte big, excluding the header. If nothing else is said, strings, including numeric strings and URLs are represented as ISO-8859-1 [ISO-8859-1] characters in the range $20 – $FF. Such strings are represented in frame descriptions as <text string>, or <full text string> if newlines are allowed. If nothing else is said newline character is forbidden. In ISO-8859-1 a newline is represented, when allowed, with $0A only. Frames that allow different types of text encoding contains a text encoding description byte. Possible encodings: $00 ISO-8859-1 [ISO-8859-1]. Terminated with $00. $01 UTF-16 [UTF-16] encoded Unicode [UNICODE] with BOM. All strings in the same frame SHALL have the same byteorder. Terminated with $00 00. $02 UTF-16BE [UTF-16] encoded Unicode [UNICODE] without BOM. Terminated with $00 00. $03 UTF-8 [UTF-8] encoded Unicode [UNICODE]. Terminated with $00. Strings dependent on encoding are represented in frame descriptions as <text string according to encoding>, or <full text string according to encoding> if newlines are allowed. Any empty strings of type $01 which are NULL-terminated may have the Unicode BOM followed by a Unicode NULL ($FF FE 00 00 or $FE FF 00 00). The timestamp fields are based on a subset of ISO 8601. When being as precise as possible the format of a time string is yyyy-MM-ddTHH:mm:ss (year, “”, month, “”, day, “T, hour (out of 24),, minutes, ”:”, seconds), but the precision may be reduced by removing as many time indicators as wanted. Hence valid timestamps are yyyy, yyyy-MM, yyyy-MM-dd, yyyy-MM-ddTHH, yyyy-MM-ddTHH:mm and yyyy-MM-ddTHH:mm:ss. All time stamps are UTC. For durations, use the slash character as described in 8601, and for multiple noncontiguous dates, use multiple strings, if allowed by the frame definition. The three byte language field, present in several frames, is used to describe the language of the frame’s content, according to ISO-639-2 The language should be represented in lower case. If the language is not known the string “XXX” should be used. All URLs [URL] MAY be relative, e.g. “picture.png”, ”../doc.txt”. If a frame is longer than it should be, e.g. having more fields than specified in this document, that indicates that additions to the frame have been made in a later version of the ID3 tag manager standard. This is reflected by the revision number in the header of the tag. 4.1. Frame header flags In the frame header the size descriptor is followed by two flag bytes. All unused flags MUST be cleared. The first byte is for ‘status messages’ and the second byte is a format description. If an unknown flag is set in the first byte the frame MUST NOT be changed without that bit cleared. If an unknown flag is set in the second byte the frame is likely to not be readable. Some flags in the second byte indicates that extra information is added to the header. These fields of extra information is ordered as the flags that indicates them. The flags field is defined as follows (l and o left out because ther resemblence to one and zero): %0abc0000 %0h00kmnp Some frame format flags indicate that additional information fields are added to the frame. This information is added after the frame header and before the frame data in the same order as the flags that indicates them. I.e. the four bytes of decompressed size will precede the encryption method byte. These additions affects the ‘frame size’ field, but are not subject to encryption or compression. The default status flags setting for a frame is, unless stated otherwise, ‘preserved if tag is altered’ and ‘preserved if file is altered’, i.e. %00000000. 4.1.1. Frame status flags a – Tag alter preservation This flag tells the tag parser what to do with this frame if it is unknown and the tag is altered in any way. This applies to all kinds of alterations, including adding more padding and reordering the frames. 0 Frame should be preserved. 1 Frame should be discarded. b – File alter preservation This flag tells the tag parser what to do with this frame if it is unknown and the file, excluding the tag, is altered. This does not apply when the audio is completely replaced with other audio data. 0 Frame should be preserved. 1 Frame should be discarded. c – Read only This flag, if set, tells the software that the contents of this frame are intended to be read only. Changing the contents might break something, e.g. a signature. If the contents are changed, without knowledge of why the frame was flagged read only and without taking the proper means to compensate, e.g. recalculating the signature, the bit MUST be cleared. 4.1.2. Frame format flags h – Grouping identity This flag indicates whether or not this frame belongs in a group with other frames. If set, a group identifier byte is added to the frame. Every frame with the same group identifier belongs to the same group. 0 Frame does not contain group information 1 Frame contains group information k – Compression This flag indicates whether or not the frame is compressed. A ‘Data Length Indicator’ byte MUST be included in the frame. 0 Frame is not compressed. 1 Frame is compressed using zlib [zlib] deflate method. If set, this requires the ‘Data Length Indicator’ bit to be set as well. m – Encryption This flag indicates whether or not the frame is encrypted. If set, one byte indicating with which method it was encrypted will be added to the frame. See description of the ENCR frame for more information about encryption method registration. Encryption should be done after compression. Whether or not setting this flag requires the presence of a ‘Data Length Indicator’ depends on the specific algorithm used. 0 Frame is not encrypted. 1 Frame is encrypted. n – Unsynchronisation This flag indicates whether or not unsynchronisation was applied to this frame. See section 6 for details on unsynchronisation. If this flag is set all data from the end of this header to the end of this frame has been unsynchronised. Although desirable, the presence of a ‘Data Length Indicator’ is not made mandatory by unsynchronisation. 0 Frame has not been unsynchronised. 1 Frame has been unsyrchronised. p – Data length indicator This flag indicates that a data length indicator has been added to the frame. The data length indicator is the value one would write as the ‘Frame length’ if all of the frame format flags were zeroed, represented as a 32 bit synchsafe integer. 0 There is no Data Length Indicator. 1 A data length Indicator has been added to the frame. 5. Tag location The default location of an ID3 tag manager tag is prepended to the audio so that players can benefit from the information when the data is streamed. It is however possible to append the tag, or make a prepend/append combination. When deciding upon where an unembedded tag should be located, the following order of preference SHOULD be considered. 1. Prepend the tag. 2. Prepend a tag with all vital information and add a second tag at the end of the file, before tags from other tagging systems. The first tag is required to have a SEEK frame. 3. Add a tag at the end of the file, before tags from other tagging systems. In case 2 and 3 the tag can simply be appended if no other known tags are present. The suggested method to find ID3 tag manager tags are: 1. Look for a prepended tag using the pattern found in section 3.1. 2. If a SEEK frame was found, use its values to guide further searching. 3. Look for a tag footer, scanning from the back of the file. For every new tag that is found, the old tag should be discarded unless the update flag in the extended header (section 3.2) is set. 6. Unsynchronisation The only purpose of unsynchronisation is to make the ID3 tag manager tag as compatible as possible with existing software and hardware. There is no use in ‘unsynchronising’ tags if the file is only to be processed only by ID3 tag manager aware software and hardware. Unsynchronisation is only useful with tags in MPEG 1/2 layer I, II and III, MPEG 2.5 and AAC files. 6.1. The unsynchronisation scheme Whenever a false synchronisation is found within the tag, one zeroed byte is inserted after the first false synchronisation byte. The format of synchronisations that should be altered by ID3 encoders is as follows: %11111111 111xxxxx and should be replaced with: %11111111 00000000 111xxxxx This has the side effect that all $FF 00 combinations have to be altered, so they will not be affected by the decoding process. Therefore all the $FF 00 combinations have to be replaced with the $FF 00 00 combination during the unsynchronisation. To indicate usage of the unsynchronisation, the unsynchronisation flag in the frame header should be set. This bit MUST be set if the frame was altered by the unsynchronisation and SHOULD NOT be set if unaltered. If all frames in the tag are unsynchronised the unsynchronisation flag in the tag header SHOULD be set. It MUST NOT be set if the tag has a frame which is not unsynchronised. Assume the first byte of the audio to be $FF. The special case when the last byte of the last frame is $FF and no padding nor footer is used will then introduce a false synchronisation. This can be solved by adding a footer, adding padding or unsynchronising the frame and add $00 to the end of the frame data, thus adding more byte to the frame size than a normal unsynchronisation would. Although not preferred, it is allowed to apply the last method on all frames ending with $FF. It is preferred that the tag is either completely unsynchronised or not unsynchronised at all. A completely unsynchronised tag has no false synchonisations in it, as defined above, and does not end with $FF. A completely non-unsynchronised tag contains no unsynchronised frames, and thus the unsynchronisation flag in the header is cleared. Do bear in mind, that if compression or encryption is used, the unsynchronisation scheme MUST be applied afterwards. When decoding an unsynchronised frame, the unsynchronisation scheme MUST be reversed first, encryption and decompression afterwards. 6.2. Synchsafe integers In some parts of the tag it is inconvenient to use the unsychronisation scheme because the size of unsynchronised data is not known in advance, which is particularly problematic with size descriptors. The solution in ID3 tag manager is to use synchsafe integers, in which there can never be any false synchs. Synchsafe integers are integers that keep its highest bit (bit 7) zeroed, making seven bits out of eight available. Thus a 32 bit synchsafe integer can store 28 bits of information. Example: 255 (%11111111) encoded as a 16 bit synchsafe integer is 383 (%00000001 01111111).

    ]]>
    WoW PHP Encoder PRO 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/wow-php-encoder-pro/7368788

    WoW PHP Encoder PRO


    WoW PHP Encoder is a advanced php script encrypter that will encode your php files into hard coded scripts that will be very very hard to understand and cannot be easily decrypted. The aim of this tool is simple to protect your hosted script’s source for unauthorized viewing. Most people inject attacks and easily download the original files from your host and you cannot do anything… so WoW PHP Encoder encodes files in such a extent that even if your file is easily downloaded the user cannot view your source.



    This is how it looks :



    So ? what do you think are your scripts protected ? View the video preview or screen shots to know more…


    Features at a glance


    + Encode php files in bulk.


    + Dual layered protection.


    + Does not modified your original code execution.


    + Preserves all important function, constructors, strings, methods and etc..


    + Fast. Secure. Portable.


    + Auto save files while encoding.


    + Lifetime support via email and ticket.



    Well that’s not all. Try it out today and enjoy the benefits forever!

    ]]>

    WoW PHP Encoder PRO


    WoW PHP Encoder is a advanced php script encrypter that will encode your php files into hard coded scripts that will be very very hard to understand and cannot be easily decrypted. The aim of this tool is simple to protect your hosted script’s source for unauthorized viewing. Most people inject attacks and easily download the original files from your host and you cannot do anything… so WoW PHP Encoder encodes files in such a extent that even if your file is easily downloaded the user cannot view your source.



    This is how it looks :



    So ? what do you think are your scripts protected ? View the video preview or screen shots to know more…


    Features at a glance


    + Encode php files in bulk.


    + Dual layered protection.


    + Does not modified your original code execution.


    + Preserves all important function, constructors, strings, methods and etc..


    + Fast. Secure. Portable.


    + Auto save files while encoding.


    + Lifetime support via email and ticket.



    Well that’s not all. Try it out today and enjoy the benefits forever!

    ]]>
    Secure Notes Keeper 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/secure-notes-keeper/7326725 Secure Notes Keeper

    As the name suggest you it’s a protection tool that will protect your notes or text from unauthorized opening. As a standard tool it will be protected using a password. Your note will be encrypted using our own modified MD5, 3DES, Rijandel, Stairs, Blowfish and many more.

    Why Secure Notes Keeper ?


    In a world where privacy really matters we all have thing that we don’t want othere to know or see so we put a cover in front of ourselves to hide this importnat datas but hiding is not a a good method and one day or the other somebody usually discovers it… So I have made Secure Notes Keeper or SiNK to help protect a part of your life. Using SiNK you can protect important notes, password or whatever text you want to. SiNK is a advanced tool and using various new encryption methods unlike traditional tool’s that uses only one or two. SiNK uses more than 5 encryption methods, so i guess you have a roufgh idea about what i am talking about.


    This is how SiNK works :



    Features at a Glance :


    + Fast. Secure. Portable.
    + Easy to use.
    + Uses modern multiple encryption systems like : Modified – MD5, RiJandel, Stairs, BlowFish, 3DES, Polymorphism and many more…
    + One click opening(Open secured notes in one click)
    + Encrypt any text based stuff.
    + Lifetime support via email and Ticket system.
    and many more….

    If you like then please rate it and please make a purchase! :)

    ]]>
    Secure Notes Keeper

    As the name suggest you it’s a protection tool that will protect your notes or text from unauthorized opening. As a standard tool it will be protected using a password. Your note will be encrypted using our own modified MD5, 3DES, Rijandel, Stairs, Blowfish and many more.

    Why Secure Notes Keeper ?


    In a world where privacy really matters we all have thing that we don’t want othere to know or see so we put a cover in front of ourselves to hide this importnat datas but hiding is not a a good method and one day or the other somebody usually discovers it… So I have made Secure Notes Keeper or SiNK to help protect a part of your life. Using SiNK you can protect important notes, password or whatever text you want to. SiNK is a advanced tool and using various new encryption methods unlike traditional tool’s that uses only one or two. SiNK uses more than 5 encryption methods, so i guess you have a roufgh idea about what i am talking about.


    This is how SiNK works :



    Features at a Glance :


    + Fast. Secure. Portable.
    + Easy to use.
    + Uses modern multiple encryption systems like : Modified – MD5, RiJandel, Stairs, BlowFish, 3DES, Polymorphism and many more…
    + One click opening(Open secured notes in one click)
    + Encrypt any text based stuff.
    + Lifetime support via email and Ticket system.
    and many more….

    If you like then please rate it and please make a purchase! :)

    ]]>
    Bulk Website ScreenShot Tool 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/bulk-website-screenshot-tool/7287590 Bulk Website ScreenShot Tool

    Bulk Website ScreenShot Tool or Website ScreenShot Guru is an advanced tool that will help you to capture bulk screenshot of webpages very fast and efficiently.


    Bulk Website ScreenShot Tool is know for it’s speed, portability and simplicity.


    Features at a glance :


    > Fast, flexible and portable.

    > High Quality ScreenShots.

    > Capture Bulk ScreenShot in one click.

    > Capture screen shots from a list of url’s.

    > Save to various formats such as JPEG, BMP, PNG, GIF and TIFF.

    > Automatically detects the size of the screenshot and the file name.

    > Resize Images on the Fly with aspect ratio.

    > Completely unattended screenshot tool.

    > Lifetime support via Email and Tickets.

    Packed with Many more features….

    Want to know how it works…?


    Watch the video preview or the screenshots to know how AWESOME is this tool.

    PLEASE NOTE : Some sites like namecheap.com produce unwanted results where as envato’s or name.com’s worked fine.

    PLEASE NOTE THAT THIS TOOL DOESN’T WORK WITH RESPONSIVE SITES. IF YOU LIKE IT THEN PLEASE RATE IT !!!!!!!!!!]]>
    Bulk Website ScreenShot Tool

    Bulk Website ScreenShot Tool or Website ScreenShot Guru is an advanced tool that will help you to capture bulk screenshot of webpages very fast and efficiently.


    Bulk Website ScreenShot Tool is know for it’s speed, portability and simplicity.


    Features at a glance :


    > Fast, flexible and portable.

    > High Quality ScreenShots.

    > Capture Bulk ScreenShot in one click.

    > Capture screen shots from a list of url’s.

    > Save to various formats such as JPEG, BMP, PNG, GIF and TIFF.

    > Automatically detects the size of the screenshot and the file name.

    > Resize Images on the Fly with aspect ratio.

    > Completely unattended screenshot tool.

    > Lifetime support via Email and Tickets.

    Packed with Many more features….

    Want to know how it works…?


    Watch the video preview or the screenshots to know how AWESOME is this tool.

    PLEASE NOTE : Some sites like namecheap.com produce unwanted results where as envato’s or name.com’s worked fine.

    PLEASE NOTE THAT THIS TOOL DOESN’T WORK WITH RESPONSIVE SITES. IF YOU LIKE IT THEN PLEASE RATE IT !!!!!!!!!!]]>
    Mac App Flappy Style Game + SpriteKit + Gamecenter 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/mac-app-flappy-style-game-spritekit-gamecenter/7263382 This complete “Space Debris” Mac App (Flappy Style Game) utilizes customizable graphics, audio, easy customization for every aspect of the game. GameCenter Integration!! (Leaderboards and Achievements).

    Develop your “Flappy” style Mac App game, you just have to change some graphics files:

    - ‘Bird’ (in this app is an Astronaut) – Background image ( in this app is the Space Image) – Obstacle ( in this app is debris.. different type!) – App Icon.

    Customization Preferences:
    // Gameplay – astronaut movement static const float kGravity = -1500.0; static const float kImpulse = 400.0;

    // Gameplay – ground speed static const float kGroundSpeed = 150.0f;

    // Gameplay – obstacles positioning static const float kGapMultiplier = 2.0; static const float kBottomObstacleMinFraction = 0.1; static const float kBottomObstacleMaxFraction = 0.6;

    // Gameplay – obstacles timing static const float kFirstSpawnDelay = 0.2; static const float kEverySpawnDelay = 1.9;

    // Looks static const int kNumForegrounds = 2; static const float kMargin = 20; static const float kAnimDelay = 0.3; static NSString *const kFontName = @”PressStart2P”;

    // Leaderboard ID #warning Your Leaderboard ID here static NSString *const LEADERBOARD_ID = @”com.yourDomain.TOPSCORE”;

    If you have an idea for a new “flappy bird” style, with this app you will realize in a short time!

    The app includes integration with Game Center Guide – Leaderboards (top score) – Achievements (nine elements). Made with Xcode 5, Deployment Target 10.8.

    You can find this app on Mac App Store : search “Space Debris” !

    ]]>
    This complete “Space Debris” Mac App (Flappy Style Game) utilizes customizable graphics, audio, easy customization for every aspect of the game. GameCenter Integration!! (Leaderboards and Achievements).

    Develop your “Flappy” style Mac App game, you just have to change some graphics files:

    - ‘Bird’ (in this app is an Astronaut) – Background image ( in this app is the Space Image) – Obstacle ( in this app is debris.. different type!) – App Icon.

    Customization Preferences:
    // Gameplay – astronaut movement static const float kGravity = -1500.0; static const float kImpulse = 400.0;

    // Gameplay – ground speed static const float kGroundSpeed = 150.0f;

    // Gameplay – obstacles positioning static const float kGapMultiplier = 2.0; static const float kBottomObstacleMinFraction = 0.1; static const float kBottomObstacleMaxFraction = 0.6;

    // Gameplay – obstacles timing static const float kFirstSpawnDelay = 0.2; static const float kEverySpawnDelay = 1.9;

    // Looks static const int kNumForegrounds = 2; static const float kMargin = 20; static const float kAnimDelay = 0.3; static NSString *const kFontName = @”PressStart2P”;

    // Leaderboard ID #warning Your Leaderboard ID here static NSString *const LEADERBOARD_ID = @”com.yourDomain.TOPSCORE”;

    If you have an idea for a new “flappy bird” style, with this app you will realize in a short time!

    The app includes integration with Game Center Guide – Leaderboards (top score) – Achievements (nine elements). Made with Xcode 5, Deployment Target 10.8.

    You can find this app on Mac App Store : search “Space Debris” !

    ]]>
    Remote Pc Super-Controller 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/remote-pc-super-controller/7132482 What is Remote Pc Super-Controller ?
    Remote Pc Super-Controller is made to control other PCs and/or interact with the user using the PC that is beeing controlled. Remote Pc Super-Controller – SOURCE CODE AVAILABLE !

    The application consists of two main programs: 1. The Server (Pc Super-Controller Server.exe) and 2. The Client (Pc Super-Controller.exe). The client is the program that will controll the PC. The server is the program that will recieve the instructions from the client and execute them.

    This means that the program you will need to install on your computer is the client. And you will install the server on the computer you want to controll.

    The program is using TCP so you will have to add an exception in some firewalls to let the commands go through.

    ]]>
    What is Remote Pc Super-Controller ?
    Remote Pc Super-Controller is made to control other PCs and/or interact with the user using the PC that is beeing controlled. Remote Pc Super-Controller – SOURCE CODE AVAILABLE !

    The application consists of two main programs: 1. The Server (Pc Super-Controller Server.exe) and 2. The Client (Pc Super-Controller.exe). The client is the program that will controll the PC. The server is the program that will recieve the instructions from the client and execute them.

    This means that the program you will need to install on your computer is the client. And you will install the server on the computer you want to controll.

    The program is using TCP so you will have to add an exception in some firewalls to let the commands go through.

    ]]>
    VectorTransformar 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/vectortransformar/7086560

    ]]>


    ]]>
    Magma Icon Maker 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/magma-icon-maker/7083962 Magma Icon To Text. Quickly create icons from text.




    Ten different icons created in 4 minutes using only Magma!

    The images above are just thumbnails download the original images in the links below:
    Icon 01 Icon 02 Icon 03 Icon 04 Icon 05 Icon 06 Icon 07Icon 08 Icon 09 Icon 10

    See the first 600 icons!

    Part 1 Part 2 Part 3 Part 4

    Please do not forget to rate it!

    ]]>
    Magma Icon To Text. Quickly create icons from text.




    Ten different icons created in 4 minutes using only Magma!

    The images above are just thumbnails download the original images in the links below:
    Icon 01 Icon 02 Icon 03 Icon 04 Icon 05 Icon 06 Icon 07Icon 08 Icon 09 Icon 10

    See the first 600 icons!

    Part 1 Part 2 Part 3 Part 4

    Please do not forget to rate it!

    ]]>
    Daily cashbook and ledger management system 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/daily-cashbook-and-ledger-management-system/7062053 This app is windows based ledger and cashbook system where a user can manage its daily expenses and also can track its all expenses.

    ]]>
    This app is windows based ledger and cashbook system where a user can manage its daily expenses and also can track its all expenses.

    ]]>
    PBhost - Host Monitoring Tool 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/pbhost-host-monitoring-tool/7060537

    Description:

    The PBhost tool is a small and fully portable utility which is running under Windows XP/Vista/7 (Windows 8/8.1 still has to be tested some more time…) and can be used to monitor different webhosts (webpages). The PBhost tool detects if the webpages change in size and can alert the owner. There are visual, audio and e-mail alerts. The PBhost tool also detects if there is no Internet connection available and will try later.

    During the monitoring process, the PBhost tool can write all the gathered information into a logfile. Different data will be collected like date/time, status (OK/fail), load time, page size in bytes, difference between the specified page size and the actual page size in percent, status of the internet connection (OK/fail), used reference server and the URL of the monitored host. If the option is enabled, PBhost can export all the load times into a CSV file. The data can later be used to generate a chart with the help of a spreadsheet application like Microsoft Excel.

    It is possible to run the tool with the user interface (normal mode) or without the user interface (hidden mode). In the hidden mode, the PBhost tool will monitor all the hosts and generate a logfile but only an icon in the taskbar will be displayed. The tray menu provides all functions to the user.

    There is a trial version of PBhost available (PBhostFree) and a well written User Manual of 26 pages (1.4 MB – PDF format).

    This script is for everyone who wants to monitor some websites and wants to be informed if the size of the webpage (content) changes. Please try the trial-version BEFORE you buy the PBhost tool here at Codecanyon! The trial-version called PBhostFree can only monitor one host and this only all 15 minutes. The full version can monitor a lot of hosts and the time between the checks can be reduced down to 1 minute.

    Please check the User Manual and the Screenshots and of course the Trial Version for more information!

    I hope you like this tool!

    Features in Version 2.0:

    • Monitors different webhosts (webpages).
    • Detects changes in the size of the webpages.
    • Creates detailed monitoring logfiles.
    • Exports page loading times to a CSV file.
    • Visual, audio and e-mail alerts.
    • Normal mode with GUI and hidden mode with only a tray icon.
    • Tray menu provides all necessary functions.
    • Highly configurable (customizable).
    • Trial Version available (PBhostFree).
    • The detailed user manual covers the installation, configuration and use.
    • Runs on Windows XP/Vista/7.
    • Small size of the tool: Full installation with user manual: 5.5 MB, download archive 2.5 MB.
    • The PBhost tool is fully portable.
    • No dependency from the .Net or other frameworks.
    • Easy installation (just one double click).
    • Easy configuration (edit the configuration files).
    • Low hard- and software requirements.

    Hardware Requirements:

    • Client computer (x86 / x64)
    • Pentium 4 or better processor
    • 128 MB or more RAM
    • 10 MB free harddisk space
    • Internet access (for monitoring the hosts)

    Software Requirements:

    • Windows operating system (XP, Vista, 7)
    • ZIP-Tool to unpack the download archive (like 7-Zip)
    • PDF-Viewer for reading the user manual (like Sumatra)

    Trial Version:

    Here you can download a PBhost Trial Version. This version is exactly the same like the version on Codecanyon, but you can only monitor one host and all 15 minutes. You can test it and if you like it you can get the full version here at Codecanyon!

    Screenshots:

    Here you can check the screenshots: Screenshots

    Documentation:

    Here you can read the user manual (1.4 MB – PDF format): User Manual

    Support:

    If you need support, please use the Contact Form on my Author Page and we are glad to help!

    You can also use the Comments Page to submit a question!

    Feedback:

    If you like the script we would like to get your feedback on the Comments Page and maybe you could rate the script :-)

    Versions (Updates):

    • 08.04.2014 – Version 2.0 – Initial release on Codecanyon
    ]]>

    Description:

    The PBhost tool is a small and fully portable utility which is running under Windows XP/Vista/7 (Windows 8/8.1 still has to be tested some more time…) and can be used to monitor different webhosts (webpages). The PBhost tool detects if the webpages change in size and can alert the owner. There are visual, audio and e-mail alerts. The PBhost tool also detects if there is no Internet connection available and will try later.

    During the monitoring process, the PBhost tool can write all the gathered information into a logfile. Different data will be collected like date/time, status (OK/fail), load time, page size in bytes, difference between the specified page size and the actual page size in percent, status of the internet connection (OK/fail), used reference server and the URL of the monitored host. If the option is enabled, PBhost can export all the load times into a CSV file. The data can later be used to generate a chart with the help of a spreadsheet application like Microsoft Excel.

    It is possible to run the tool with the user interface (normal mode) or without the user interface (hidden mode). In the hidden mode, the PBhost tool will monitor all the hosts and generate a logfile but only an icon in the taskbar will be displayed. The tray menu provides all functions to the user.

    There is a trial version of PBhost available (PBhostFree) and a well written User Manual of 26 pages (1.4 MB – PDF format).

    This script is for everyone who wants to monitor some websites and wants to be informed if the size of the webpage (content) changes. Please try the trial-version BEFORE you buy the PBhost tool here at Codecanyon! The trial-version called PBhostFree can only monitor one host and this only all 15 minutes. The full version can monitor a lot of hosts and the time between the checks can be reduced down to 1 minute.

    Please check the User Manual and the Screenshots and of course the Trial Version for more information!

    I hope you like this tool!

    Features in Version 2.0:

    • Monitors different webhosts (webpages).
    • Detects changes in the size of the webpages.
    • Creates detailed monitoring logfiles.
    • Exports page loading times to a CSV file.
    • Visual, audio and e-mail alerts.
    • Normal mode with GUI and hidden mode with only a tray icon.
    • Tray menu provides all necessary functions.
    • Highly configurable (customizable).
    • Trial Version available (PBhostFree).
    • The detailed user manual covers the installation, configuration and use.
    • Runs on Windows XP/Vista/7.
    • Small size of the tool: Full installation with user manual: 5.5 MB, download archive 2.5 MB.
    • The PBhost tool is fully portable.
    • No dependency from the .Net or other frameworks.
    • Easy installation (just one double click).
    • Easy configuration (edit the configuration files).
    • Low hard- and software requirements.

    Hardware Requirements:

    • Client computer (x86 / x64)
    • Pentium 4 or better processor
    • 128 MB or more RAM
    • 10 MB free harddisk space
    • Internet access (for monitoring the hosts)

    Software Requirements:

    • Windows operating system (XP, Vista, 7)
    • ZIP-Tool to unpack the download archive (like 7-Zip)
    • PDF-Viewer for reading the user manual (like Sumatra)

    Trial Version:

    Here you can download a PBhost Trial Version. This version is exactly the same like the version on Codecanyon, but you can only monitor one host and all 15 minutes. You can test it and if you like it you can get the full version here at Codecanyon!

    Screenshots:

    Here you can check the screenshots: Screenshots

    Documentation:

    Here you can read the user manual (1.4 MB – PDF format): User Manual

    Support:

    If you need support, please use the Contact Form on my Author Page and we are glad to help!

    You can also use the Comments Page to submit a question!

    Feedback:

    If you like the script we would like to get your feedback on the Comments Page and maybe you could rate the script :-)

    Versions (Updates):

    • 08.04.2014 – Version 2.0 – Initial release on Codecanyon
    ]]>
    Gamepad Mouse Mapper 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/gamepad-mouse-mapper/7002620 This is a simple application that maps input from a gamepad to the mouse. It allows the user to move the cursor using the gamepad. Gamepad buttons are mapped to different mouse and keyboard functions, while analog control and arrows are mapped to cursor movement.

    The program automatically detects present game controllers.

    The mapping may vary depending on the controller.

    ]]>
    This is a simple application that maps input from a gamepad to the mouse. It allows the user to move the cursor using the gamepad. Gamepad buttons are mapped to different mouse and keyboard functions, while analog control and arrows are mapped to cursor movement.

    The program automatically detects present game controllers.

    The mapping may vary depending on the controller.

    ]]>
    Advanced Skype Bot 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/advanced-skype-bot/6980481 Advanced Skype Bot

    The ultimate and handy bot for commercial use or personal use. You can call it an Advanced Tool, Bot, Manager, Control, Manager, Program, Software, anything you want.

    It does anything you want, no need to have any extra knowledge, it’s easy to use! Help your customers through skype or simply automate your skype. This application is a good Skype marketing method which can make your customers/contacts satisfied.

    This bot has many different features, such as.

    • Skype Bulk Contact Adder
    • Fake quote generator
    • Auto decline calls
    • AFK Message sender
    • Message Schedule (Send a message to all contacts or specific contacts on a specific date/time)
    • Auto Responder (Respond on specific words or sentences people say with your custom text)
    • E-mail to Skype ID (Import e-mails, checks if those e-mails have an skype ID)
    • Broadcast to all online users, or everyone
    • Mood changer with interval
    • Block/Unblock contacts
    • Change your skype status
    • Chatlogs
    • And more to come…!

    Customization Service
    Do you want to have your own custom and unique command?
    Do you want to have this Skype Bot fully customized?
    Just send me a message to discuss about the possibilities and the price!

    Suggestions & Bug Report
    Do you miss something in this application or did you find a bug?
    Then please don’t hesitate and contact me, i would love to help you out.

    Runtime: .NET

    Read the FAQ here if you have any questions regarding this tool

    ]]>
    Advanced Skype Bot

    The ultimate and handy bot for commercial use or personal use. You can call it an Advanced Tool, Bot, Manager, Control, Manager, Program, Software, anything you want.

    It does anything you want, no need to have any extra knowledge, it’s easy to use! Help your customers through skype or simply automate your skype. This application is a good Skype marketing method which can make your customers/contacts satisfied.

    This bot has many different features, such as.

    • Skype Bulk Contact Adder
    • Fake quote generator
    • Auto decline calls
    • AFK Message sender
    • Message Schedule (Send a message to all contacts or specific contacts on a specific date/time)
    • Auto Responder (Respond on specific words or sentences people say with your custom text)
    • E-mail to Skype ID (Import e-mails, checks if those e-mails have an skype ID)
    • Broadcast to all online users, or everyone
    • Mood changer with interval
    • Block/Unblock contacts
    • Change your skype status
    • Chatlogs
    • And more to come…!

    Customization Service
    Do you want to have your own custom and unique command?
    Do you want to have this Skype Bot fully customized?
    Just send me a message to discuss about the possibilities and the price!

    Suggestions & Bug Report
    Do you miss something in this application or did you find a bug?
    Then please don’t hesitate and contact me, i would love to help you out.

    Runtime: .NET

    Read the FAQ here if you have any questions regarding this tool

    ]]>
    YMSG Remote Control 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/ymsg-remote-control/6969601

    YMSG Protocol Details


    The Yahoo! Messenger Protocol (YMSG) is the underlying network protocol used by the Yahoo! Messenger instant messaging client. Yahoo! Instant Messager supports many features beyond just messaging, including off-line messaging, file transfer, chat, conferencing, voice chat, webcams and avatars.
    The YMSG protocol provides a language and series of conventions for software communicating with Yahoo!’s Instant Messaging service. In essence, YMSG performs the same role for Yahoo!’s IM as HTTP does for the World Wide Web. Unlike HTTP, however, YMSG is a proprietary protocol, a closed standard aligned only with the Yahoo! messaging service. Rival messaging services have their own protocols, some based on open standards, others proprietary, each effectively fulfilling the same role with different mechanics. One of the fundamental tenets of instant messaging is the notion that users can see when someone is connected to the network—known in the industry as ‘presence’. The YMSG protocol uses the mechanics of a standard internet connection to achieve presence—the same connection it uses to send and receive data. In order for each user to remain ‘visible’ to other users on the service, and thereby signaling their availability, their Yahoo! IM client software must maintain a functional, open, network connection linking the client to Yahoo!’s IM servers. As some organizations block communication on the port used by Yahoo! IM, either because they choose to whitelist certain types of internet usage (only web surfing and email, for example) or because they seek to blacklist instant messaging services, Yahoo! provides an alternative route for connecting to their service which mimics the HTTP protocol used by the World Wide Web. However, because HTTP has no inherent sense of a persistent connection, Yahoo! instead relies on the client frequently contacting the server in order to approximate the sense of a connection required to give each user presence on the IM network. Originally the YMSG login procedure suffered from a security flaw known as a replay attack, in which a given password (or other authentication information) is always identically scrambled when sent across the network. This allowed any attacker who witnesses the transmission to merely reproduce the message verbatim in order to successfully log in, without actually needing to know the original password (or other details) which generated it. But some time around 2000 or 2001, Yahoo! upgraded its service to introduce a random element to each login attempt, defeating any further potential for replay attacks. With the exception of the login authentication details, data sent over a YMSG connection is not encrypted. YMSG uses a binary format in which the text portions of the data are transmitted in plain view. Therefore, while it is difficult for an attacker to seize control of a Yahoo! IM account, it is quite easy for them to read all messages sent to and from the account holder, along with other details such as the list of friends, if the attacker has control of one of the computers through which the data is routed.
    The login process is a multi-step process that spans two protocols. The client, after successfully establishing a TCP connection to a ymsg server, sends an authentication packet that contains the user name that the user wishes to log in with to the YMSG server. The YMSG server then responds with an authentication packet containing a challenge string in key/value field 96. The HTTPS process then starts, connecting to login.yahoo.com, and sending the token_get string that is constructed with the username and password of the account the client is trying to log in with. The HTTPS response to the token login if successful will contain a token string. Then another HTTPS request is sent to login.yahoo.com with the token_login that is constructed with the token. If successful, the response will contain three strings: a crumb, Tcookie, and YCookie. The client then combines the crumb and challenge strings and performs an md5 hash on the combined string, then converts the resulting 16-byte value to a base64 string, and performs a very negligible amount of manipulation on the resulting base64 string by making three character replacements ( ’+’ with ’.’, ’=’ with ’-’, and ’/’ with ’_’ ). The resultant base64 string is then used in building the AuthenticationResponse packet, whose key 307 contains the resultant base64 string value. The client then sends the AuthenticationResponse packet. If the AuthenticationRepsonse packet is successful, the client then will receive the List, ListV15, StatusV15, NewMail, Ping, and any number of Y7 Buddy Authorization and Message packets (for offline messages, and buddy requests). The List packet contains all the aliases to the user accounts YahooID, the ListV15 contains the users friends, groups, and ignored user list. The StatusV15 packet contains the users from the listV15 that are online, busy, or idle, as well as any status messages those users may have, and potentially a string that represents the resource on another http server that is that user’s display image.]]>


    YMSG Protocol Details


    The Yahoo! Messenger Protocol (YMSG) is the underlying network protocol used by the Yahoo! Messenger instant messaging client. Yahoo! Instant Messager supports many features beyond just messaging, including off-line messaging, file transfer, chat, conferencing, voice chat, webcams and avatars.
    The YMSG protocol provides a language and series of conventions for software communicating with Yahoo!’s Instant Messaging service. In essence, YMSG performs the same role for Yahoo!’s IM as HTTP does for the World Wide Web. Unlike HTTP, however, YMSG is a proprietary protocol, a closed standard aligned only with the Yahoo! messaging service. Rival messaging services have their own protocols, some based on open standards, others proprietary, each effectively fulfilling the same role with different mechanics. One of the fundamental tenets of instant messaging is the notion that users can see when someone is connected to the network—known in the industry as ‘presence’. The YMSG protocol uses the mechanics of a standard internet connection to achieve presence—the same connection it uses to send and receive data. In order for each user to remain ‘visible’ to other users on the service, and thereby signaling their availability, their Yahoo! IM client software must maintain a functional, open, network connection linking the client to Yahoo!’s IM servers. As some organizations block communication on the port used by Yahoo! IM, either because they choose to whitelist certain types of internet usage (only web surfing and email, for example) or because they seek to blacklist instant messaging services, Yahoo! provides an alternative route for connecting to their service which mimics the HTTP protocol used by the World Wide Web. However, because HTTP has no inherent sense of a persistent connection, Yahoo! instead relies on the client frequently contacting the server in order to approximate the sense of a connection required to give each user presence on the IM network. Originally the YMSG login procedure suffered from a security flaw known as a replay attack, in which a given password (or other authentication information) is always identically scrambled when sent across the network. This allowed any attacker who witnesses the transmission to merely reproduce the message verbatim in order to successfully log in, without actually needing to know the original password (or other details) which generated it. But some time around 2000 or 2001, Yahoo! upgraded its service to introduce a random element to each login attempt, defeating any further potential for replay attacks. With the exception of the login authentication details, data sent over a YMSG connection is not encrypted. YMSG uses a binary format in which the text portions of the data are transmitted in plain view. Therefore, while it is difficult for an attacker to seize control of a Yahoo! IM account, it is quite easy for them to read all messages sent to and from the account holder, along with other details such as the list of friends, if the attacker has control of one of the computers through which the data is routed.
    The login process is a multi-step process that spans two protocols. The client, after successfully establishing a TCP connection to a ymsg server, sends an authentication packet that contains the user name that the user wishes to log in with to the YMSG server. The YMSG server then responds with an authentication packet containing a challenge string in key/value field 96. The HTTPS process then starts, connecting to login.yahoo.com, and sending the token_get string that is constructed with the username and password of the account the client is trying to log in with. The HTTPS response to the token login if successful will contain a token string. Then another HTTPS request is sent to login.yahoo.com with the token_login that is constructed with the token. If successful, the response will contain three strings: a crumb, Tcookie, and YCookie. The client then combines the crumb and challenge strings and performs an md5 hash on the combined string, then converts the resulting 16-byte value to a base64 string, and performs a very negligible amount of manipulation on the resulting base64 string by making three character replacements ( ’+’ with ’.’, ’=’ with ’-’, and ’/’ with ’_’ ). The resultant base64 string is then used in building the AuthenticationResponse packet, whose key 307 contains the resultant base64 string value. The client then sends the AuthenticationResponse packet. If the AuthenticationRepsonse packet is successful, the client then will receive the List, ListV15, StatusV15, NewMail, Ping, and any number of Y7 Buddy Authorization and Message packets (for offline messages, and buddy requests). The List packet contains all the aliases to the user accounts YahooID, the ListV15 contains the users friends, groups, and ignored user list. The StatusV15 packet contains the users from the listV15 that are online, busy, or idle, as well as any status messages those users may have, and potentially a string that represents the resource on another http server that is that user’s display image.]]>
    Easy Backup Scheduler 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/easy-backup-scheduler/6865670 Easy Backup Scheduler is an easy tool to take backup of your important data to local PC, Network or FTP server. Schedule backup hourly, daily, customized time.

    Features

    • Easy user interface, Drag & Drop support
    • Add multiple source – files and folder
    • Add multiple destination
    • Backup as zip or mirror copy
    • Integrated compression and encryption of ZIP file
    • Incremental and Differential backup support
    • FTP Backup

    To Do

    • SFTP support
    • Database backup (MySQL,SQL-all edition)
    • Cloud Storage

    Suggestions & Error Report

    Please report any error or suggestions.

    Version History

    Existing customers will be notified for the latest update.

    1.6 – 18/Dec/2015

    • More advanced scheduling i.e. at each regular interval.
    • Include/Exclude filter support added for source selection

    1.5 – 17/Dec/2014

    • User interface changed
    • Zip encryption added with password protection
    • FTP backup with incremental-differential support

    Runtime Requirement : .NET 4. 0

    ]]>
    Easy Backup Scheduler is an easy tool to take backup of your important data to local PC, Network or FTP server. Schedule backup hourly, daily, customized time.

    Features

    • Easy user interface, Drag & Drop support
    • Add multiple source – files and folder
    • Add multiple destination
    • Backup as zip or mirror copy
    • Integrated compression and encryption of ZIP file
    • Incremental and Differential backup support
    • FTP Backup

    To Do

    • SFTP support
    • Database backup (MySQL,SQL-all edition)
    • Cloud Storage

    Suggestions & Error Report

    Please report any error or suggestions.

    Version History

    Existing customers will be notified for the latest update.

    1.6 – 18/Dec/2015

    • More advanced scheduling i.e. at each regular interval.
    • Include/Exclude filter support added for source selection

    1.5 – 17/Dec/2014

    • User interface changed
    • Zip encryption added with password protection
    • FTP backup with incremental-differential support

    Runtime Requirement : .NET 4. 0

    ]]>
    w3c remote site validator 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/w3c-remote-site-validator/686458 This program will validate an entire site online. You can enter an url, and the program will start searching url’s on this page matching a search string. These pages will be validated one by one.

    It is also possible to validate websites using their xml sitemap. Just link the program to the xml file and check the checkbox.

    ofcourse, this program validates php, asp and any other server sided pages. It will even validate your blog.

    I refer to the video and screenshots for more information. Still got more questions? Ask them, I will help you as fast as possible.

    This program has been debugged allot, but ofcourse it is still possible to find bugs, please tell me if you find one!

    ]]>
    This program will validate an entire site online. You can enter an url, and the program will start searching url’s on this page matching a search string. These pages will be validated one by one.

    It is also possible to validate websites using their xml sitemap. Just link the program to the xml file and check the checkbox.

    ofcourse, this program validates php, asp and any other server sided pages. It will even validate your blog.

    I refer to the video and screenshots for more information. Still got more questions? Ask them, I will help you as fast as possible.

    This program has been debugged allot, but ofcourse it is still possible to find bugs, please tell me if you find one!

    ]]>
    Image Retouch and Converter 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/image-retouch-and-converter/6848306 Image Retouch and Converter – is the easiest image retouching, optimizing and converting tool for you. It’s fast, portable and user friendly. Now you don’t need to open photoshop every time you need to make a image look awesome because now you can do it in one click only.

    Image Retouch and converter includes two versions, the first one is for those who want to easily optimize their images with just one click and the second one is for those who want to add more effects to their images. Image Retouch and Converter also includes image converter which support various formats even .psd !

    Features at a glance :

    > Optimize your images in Just one click.

    > More than 100+ effects and filters to use.

    > Filters such as Oil paint and etc (All kinds of popular effects).

    > Easily crop selected region.

    > Flip, rotate and many more…

    > Transform images into lens, rectangle and etc.

    > Add effects such as Auto Levels, Levels, Cooler, warmer, color magic, correction, multiply, Portrait, Shadow boost, Skin tones, Gradient to make your images awesome in one click.

    > Convert Batch images to various formats.

    > Supports PSD, PNG, BMP, JPG, GIF TIFF, PDF and etc.

    > Easy to use – No Imaging knowledge required.

    > Open image from local disk or via url.

    > Save to lossless formats.

    > Print on the fly.

    > Edit EXIT and IPTC data.

    > See a basic histogram of the opened image.

    > Cost effective.

    > Portable and Pre-enabled self VIRUS protection.

    > Fast image processing.(Avg. time : 2.0025 sec)

    > Save to FTP.

    > Lifetime support via email and tickets.

    List of effects and Filters :

    Image settings :

    File menu :

    Histogram e.g. :

    Some Examples… optimized with Image Retouch and converter :

    Want to know more? then watch the Video preview and get to know more.

    If you have seen what Image Retouch and converter can do then what are you waiting for? Get yourself a license of Image Retouch and converter today.

    ]]>
    Image Retouch and Converter – is the easiest image retouching, optimizing and converting tool for you. It’s fast, portable and user friendly. Now you don’t need to open photoshop every time you need to make a image look awesome because now you can do it in one click only.

    Image Retouch and converter includes two versions, the first one is for those who want to easily optimize their images with just one click and the second one is for those who want to add more effects to their images. Image Retouch and Converter also includes image converter which support various formats even .psd !

    Features at a glance :

    > Optimize your images in Just one click.

    > More than 100+ effects and filters to use.

    > Filters such as Oil paint and etc (All kinds of popular effects).

    > Easily crop selected region.

    > Flip, rotate and many more…

    > Transform images into lens, rectangle and etc.

    > Add effects such as Auto Levels, Levels, Cooler, warmer, color magic, correction, multiply, Portrait, Shadow boost, Skin tones, Gradient to make your images awesome in one click.

    > Convert Batch images to various formats.

    > Supports PSD, PNG, BMP, JPG, GIF TIFF, PDF and etc.

    > Easy to use – No Imaging knowledge required.

    > Open image from local disk or via url.

    > Save to lossless formats.

    > Print on the fly.

    > Edit EXIT and IPTC data.

    > See a basic histogram of the opened image.

    > Cost effective.

    > Portable and Pre-enabled self VIRUS protection.

    > Fast image processing.(Avg. time : 2.0025 sec)

    > Save to FTP.

    > Lifetime support via email and tickets.

    List of effects and Filters :

    Image settings :

    File menu :

    Histogram e.g. :

    Some Examples… optimized with Image Retouch and converter :

    Want to know more? then watch the Video preview and get to know more.

    If you have seen what Image Retouch and converter can do then what are you waiting for? Get yourself a license of Image Retouch and converter today.

    ]]>
    NicheURLFilter - Version 1.0 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/nicheurlfilter-version-10/681808 NicheURLFilter – Version 1.1

    Update 1.1 :
    - Bug fix : Checking large lists
    - Add : Proxy support
    - Stability and performances improvements

    With NicheURLFilter you can extract only related websites from a list of URLs with filtering via keywords list. Filtering results of the content of page, not the text of URL .

    For example, if you have a list of various YouTube videos and you want to keep only videos about “makeup”, NicheURLFilter will do this job for you.

    Simplify tasks for SEO !

    Counter

    ]]>
    NicheURLFilter – Version 1.1

    Update 1.1 :
    - Bug fix : Checking large lists
    - Add : Proxy support
    - Stability and performances improvements

    With NicheURLFilter you can extract only related websites from a list of URLs with filtering via keywords list. Filtering results of the content of page, not the text of URL .

    For example, if you have a list of various YouTube videos and you want to keep only videos about “makeup”, NicheURLFilter will do this job for you.

    Simplify tasks for SEO !

    Counter

    ]]>
    SimpleProxyScraper - Get Tons Of Fresh Proxies 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/simpleproxyscraper-get-tons-fresh-proxies/675032 SimpleProxyScraper – Version 1.1

    UPDATE : 10 news good sources daily updated
    NOTE : Screenshots are not up to date

    In one click get tons of fresh public proxies everyday.
    If you need proxies for anonymous or for SEO softwares like ScrapeBox, XRumer, Hrefer, SimpleProxyScraper will help you. Help file include.

    INCLUDE : 20 good sources daily updated (you can add your own URLs sources)

    Please, don’t forget to rate this product :)

    Counter

    ]]>
    SimpleProxyScraper – Version 1.1

    UPDATE : 10 news good sources daily updated
    NOTE : Screenshots are not up to date

    In one click get tons of fresh public proxies everyday.
    If you need proxies for anonymous or for SEO softwares like ScrapeBox, XRumer, Hrefer, SimpleProxyScraper will help you. Help file include.

    INCLUDE : 20 good sources daily updated (you can add your own URLs sources)

    Please, don’t forget to rate this product :)

    Counter

    ]]>
    Social Network Analytics 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/social-network-analytics/6715967 What Is Use Of Social Network Analytics ?

    Count social networking shares & likes for any webpage, and know about your link social status. Also we build an We use official api resources for building our API.

    Social Network Analytics is the analysis of social networks. Social network analysis views social relationships in terms of network theory, consisting of nodes (representing individual actors within the network) and ties (which represent relationships between the individuals, such as friendship, kinship, organizations, sexual relationships, etc.) These networks are often depicted in a social network diagram, where nodes are represented as points and ties are represented as lines.

    ]]>
    What Is Use Of Social Network Analytics ?

    Count social networking shares & likes for any webpage, and know about your link social status. Also we build an We use official api resources for building our API.

    Social Network Analytics is the analysis of social networks. Social network analysis views social relationships in terms of network theory, consisting of nodes (representing individual actors within the network) and ties (which represent relationships between the individuals, such as friendship, kinship, organizations, sexual relationships, etc.) These networks are often depicted in a social network diagram, where nodes are represented as points and ties are represented as lines.

    ]]>
    Redsnip Snippets Manager 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/redsnip-snippets-manager/6633579 RedSnip is a Desktop Snippet Manager which helps you store your Code Snippets and Other Notes to Help Speedup the Development Process. It Works on Both Windows and Mac OS. RedSnip includes Code Editor with syntax highlighting and themes.

    Features:
    • Accelerate Your Code.
    • Multiple Themes.
    • Multi-Language Support (Programming Language).
    • Desktop Application (Mac & Windows).
    • Easy To Use.
    • Attractive Design.
    • Documentations Link


      Update 1.3:
      • Added message box when snippet is saved.
      • Categories Overflow layout bug fixed.
    ]]>
    RedSnip is a Desktop Snippet Manager which helps you store your Code Snippets and Other Notes to Help Speedup the Development Process. It Works on Both Windows and Mac OS. RedSnip includes Code Editor with syntax highlighting and themes.

    Features:
    • Accelerate Your Code.
    • Multiple Themes.
    • Multi-Language Support (Programming Language).
    • Desktop Application (Mac & Windows).
    • Easy To Use.
    • Attractive Design.
    • Documentations Link


      Update 1.3:
      • Added message box when snippet is saved.
      • Categories Overflow layout bug fixed.
    ]]>
    Seo Tools - Website Comparative Analyst 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/seo-tools-website-comparative-analyst/6588170 Meta element used in search engine optimization

    Meta elements provide information about the web page, which can be used by search engines to help categorize the page correctly.

    Major search engine robots look at many factors when determining how to rank a page of which meta tags will only form a portion. Furthermore, most search engines change their ranking rules frequently. Google have stated they update their ranking rules every 48 hours. Under such circumstances, a definitive understanding of the role of meta tags in SEO is unlikely. The keywords attribute

    Unlike the keywords attribute, the description attribute is supported by most major search engines, like Yahoo! and Bing, while Google will fall back on this tag when information about the page itself is requested (e.g. using the related: query). The description attribute provides a concise explanation of a Web page’s content. This allows the Web page authors to give a more meaningful description for listings than might be displayed if the search engine was unable to automatically create its own description based on the page content. The description is often, but not always, displayed on search engine results pages, so it can affect click-through rates. Industry commentators have suggested that major search engines also consider keywords located in the description attribute when ranking pages. W3C doesn’t specify the size of this description meta tag, but almost all search engines recommend it to be shorter than 155 characters of plain text. The language attribute

    The robots attribute, supported by several major search engines, controls whether search engine spiders are allowed to index a page, or not, and whether they should follow links from a page, or not. The attribute can contain one or more comma-separate values. The noindex value prevents a page from being indexed, and nofollow prevents links from being crawled. Other values recognized by one or more search engines can influence how the engine indexes pages, and how those pages appear on the search results. These include noarchive, which instructs a search engine not to store an archived copy of the page, and nosnippet, which asks that the search engine not include a snippet from the page along with the page’s listing in search results.

    Meta tags are one of the best options for preventing search engines from indexing content of a website. Additional attributes for search engines

    The syntax is the same for all search engines who support the tag.

    <meta name=”robots” content=”noodp” >

    Webmasters can decide if they want to disallow the use of their ODP listing on a per search engine basis

    Google:

    <meta name=”googlebot” content=”noodp” >

    Yahoo!

    <meta name=”Slurp” content=”noodp” >

    MSN and Live Search (via bingbot, previously msnbot):

    <meta name=”bingbot” content=”noodp” >

    NOYDIR

    If you add the NOYDIR tag to a page, Yahoo! won’t display the Yahoo! Directory titles and abstracts.

    <meta name=”robots” content=”noydir” > <meta name=”Slurp” content=”noydir” >

    Robots-NoContent

    Yahoo! also introduced in May 2007 the attribute value: class=”robots-nocontent”. This is not a meta tag, but an attribute and value, which can be used throughout Web page tags where needed. Content of the page where this attribute is being used will be ignored by the Yahoo! crawler and not included in the search engine’s index.

    Examples for the use of the robots-nocontent tag:

    excluded content excluded content

    excluded content

    Google does, however, use meta tag elements for displaying site links. The title tags are used to create the link in search results:

    <title>Site name – Page title – Keyword description</title>

    The meta description often appears in Google search results to describe the link:

    <meta name=”description” content=”A blurb to describe the content of the page appears here” >

    ]]>
    Meta element used in search engine optimization

    Meta elements provide information about the web page, which can be used by search engines to help categorize the page correctly.

    Major search engine robots look at many factors when determining how to rank a page of which meta tags will only form a portion. Furthermore, most search engines change their ranking rules frequently. Google have stated they update their ranking rules every 48 hours. Under such circumstances, a definitive understanding of the role of meta tags in SEO is unlikely. The keywords attribute

    Unlike the keywords attribute, the description attribute is supported by most major search engines, like Yahoo! and Bing, while Google will fall back on this tag when information about the page itself is requested (e.g. using the related: query). The description attribute provides a concise explanation of a Web page’s content. This allows the Web page authors to give a more meaningful description for listings than might be displayed if the search engine was unable to automatically create its own description based on the page content. The description is often, but not always, displayed on search engine results pages, so it can affect click-through rates. Industry commentators have suggested that major search engines also consider keywords located in the description attribute when ranking pages. W3C doesn’t specify the size of this description meta tag, but almost all search engines recommend it to be shorter than 155 characters of plain text. The language attribute

    The robots attribute, supported by several major search engines, controls whether search engine spiders are allowed to index a page, or not, and whether they should follow links from a page, or not. The attribute can contain one or more comma-separate values. The noindex value prevents a page from being indexed, and nofollow prevents links from being crawled. Other values recognized by one or more search engines can influence how the engine indexes pages, and how those pages appear on the search results. These include noarchive, which instructs a search engine not to store an archived copy of the page, and nosnippet, which asks that the search engine not include a snippet from the page along with the page’s listing in search results.

    Meta tags are one of the best options for preventing search engines from indexing content of a website. Additional attributes for search engines

    The syntax is the same for all search engines who support the tag.

    <meta name=”robots” content=”noodp” >

    Webmasters can decide if they want to disallow the use of their ODP listing on a per search engine basis

    Google:

    <meta name=”googlebot” content=”noodp” >

    Yahoo!

    <meta name=”Slurp” content=”noodp” >

    MSN and Live Search (via bingbot, previously msnbot):

    <meta name=”bingbot” content=”noodp” >

    NOYDIR

    If you add the NOYDIR tag to a page, Yahoo! won’t display the Yahoo! Directory titles and abstracts.

    <meta name=”robots” content=”noydir” > <meta name=”Slurp” content=”noydir” >

    Robots-NoContent

    Yahoo! also introduced in May 2007 the attribute value: class=”robots-nocontent”. This is not a meta tag, but an attribute and value, which can be used throughout Web page tags where needed. Content of the page where this attribute is being used will be ignored by the Yahoo! crawler and not included in the search engine’s index.

    Examples for the use of the robots-nocontent tag:

    excluded content excluded content

    excluded content

    Google does, however, use meta tag elements for displaying site links. The title tags are used to create the link in search results:

    <title>Site name – Page title – Keyword description</title>

    The meta description often appears in Google search results to describe the link:

    <meta name=”description” content=”A blurb to describe the content of the page appears here” >

    ]]>
    Super Screen Capture Guru 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/super-screen-capture-guru/6568195 Screen Capture Guru is here, so why should you worry about taking advanced screen shots of your desktop as well as webpages ?

    Want to know more ?

    Screen Capture Guru is a awesome tool that let’s you take full screen, active region, manual screen shots and also screen shots of webpages. Taking Screen shots was never so easy before.

    Features at a glance :

    Capture Full screen shots.

    Capture Active region screen shots.

    Capture custom Region/Manual screen shots.

    Capture Screen shots of web pages.

    Save to various formats such as Jpg, Bmp, Png and Gif.

    Fast, Flexible and Portable

    Upload captured screenshot directly to FTP without saving!

    Copy the captured screenshot to Clipboard in one click!

    Capture Bulk/Batch Screenshots of webpages from a list of url’s and save them automatically to your desktop.

    Capture Unattended Full Screen shots while playing games in just one button press(Auto save to your my docs).

    Life time support through email and tickets.

    Still thinking ?

    Then just view the screen shots and purchase it if you like it and pleaseeeee rate it !

    PLEASE NOTE THAT THIS TOOL DOESN’T WORK WITH RESPONSIVE SITES. “The Best little tool that you WILL need!”

    ]]>
    Screen Capture Guru is here, so why should you worry about taking advanced screen shots of your desktop as well as webpages ?

    Want to know more ?

    Screen Capture Guru is a awesome tool that let’s you take full screen, active region, manual screen shots and also screen shots of webpages. Taking Screen shots was never so easy before.

    Features at a glance :

    Capture Full screen shots.

    Capture Active region screen shots.

    Capture custom Region/Manual screen shots.

    Capture Screen shots of web pages.

    Save to various formats such as Jpg, Bmp, Png and Gif.

    Fast, Flexible and Portable

    Upload captured screenshot directly to FTP without saving!

    Copy the captured screenshot to Clipboard in one click!

    Capture Bulk/Batch Screenshots of webpages from a list of url’s and save them automatically to your desktop.

    Capture Unattended Full Screen shots while playing games in just one button press(Auto save to your my docs).

    Life time support through email and tickets.

    Still thinking ?

    Then just view the screen shots and purchase it if you like it and pleaseeeee rate it !

    PLEASE NOTE THAT THIS TOOL DOESN’T WORK WITH RESPONSIVE SITES. “The Best little tool that you WILL need!”

    ]]>
    Web Submitter 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/web-submitter/6548337 Web Submitter

    Our advanced social media article submission software for SEO automatically submit your different and unique article to all the major social media sites at a click of a button!

    It will Automatically log you into each of the social media sites. Then enter the title, keywords, article abstract and the author information before posting one of the spun versions of your article, and Automatically repeats the process for each social media site at the click of a few buttons.

    Now you can save massive amounts of time while getting hundreds of quality back links to your website!

    ]]>
    Web Submitter

    Our advanced social media article submission software for SEO automatically submit your different and unique article to all the major social media sites at a click of a button!

    It will Automatically log you into each of the social media sites. Then enter the title, keywords, article abstract and the author information before posting one of the spun versions of your article, and Automatically repeats the process for each social media site at the click of a few buttons.

    Now you can save massive amounts of time while getting hundreds of quality back links to your website!

    ]]>
    ProEasy - Remote Desktop Control 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/proeasy-remote-desktop-control/6425696 Remote access can also be explained as remote control of a computer by using another device connected via the internet or another network. This is widely used by many computer manufacturers and large businesses’ help desks for technical troubleshooting of their customers’ problems. There are various professional first-party, third-party, open source, and freeware remote desktop applications, some of which are cross-platform across various versions of Windows, Mac OS X, UNIX, and Linux.

    How it works Remote desktop virtualization implementations operate as client/server computing environments. The controlling computer (referred to in this context as the client) displays a copy of the image received from the controlled computer’s (in this context the server) display screen. The copy is updated on a timed interval, or when a change on screen is noticed by the remote control software. The software on the controlling computer transmits its own keyboard and mouse activity to the controlled computer, where the remote control software implements these actions. The controlled computer then behaves as if the actions were performed directly at that computer. In many cases the local display and input devices can be disabled so that the remote session cannot be viewed or interfered with.

    The quality, speed and functions of any remote desktop protocol are based on the system layer where the graphical desktop is redirected and the efficiency of the remote display protocol. Software such as VNC and others use the top software layer to extract and compress the graphic interface images for transmission. Other implementations such as Microsoft’s RDP use a kernel driver level to construct the remote desktop for transmission of data. Uses

    A main use of remote desktop software is remote administration. It can also be used for “headless computers”: instead of each computer having its own monitor, keyboard, and mouse, or using a KVM switch, a monitor, keyboard and mouse can be attached to one computer with remote control software, and headless computers controlled by it. The duplicate desktop mode is useful for user support and education. Remote control software combined with telephone communication can be nearly as helpful for novice computer-users as if the support staff were actually there.

    Since the advent of cloud computing remote desktop software can be housed on USB hardware devices, allowing users to connect the device to any PC connected to their network or the Internet and recreate their desktop via a connection to the cloud. This model avoids one problem with remote desktop software, which requires the local computer to be switched on at the time when the user wishes to access it remotely. (It is possible with a router with C2S VPN support, and Wake on LAN equipment, to establish a virtual private network (VPN) connection with the router over the Internet if not connected to the LAN, switch on a computer connected to the router, then connect to it.)

    ]]>
    Remote access can also be explained as remote control of a computer by using another device connected via the internet or another network. This is widely used by many computer manufacturers and large businesses’ help desks for technical troubleshooting of their customers’ problems. There are various professional first-party, third-party, open source, and freeware remote desktop applications, some of which are cross-platform across various versions of Windows, Mac OS X, UNIX, and Linux.

    How it works Remote desktop virtualization implementations operate as client/server computing environments. The controlling computer (referred to in this context as the client) displays a copy of the image received from the controlled computer’s (in this context the server) display screen. The copy is updated on a timed interval, or when a change on screen is noticed by the remote control software. The software on the controlling computer transmits its own keyboard and mouse activity to the controlled computer, where the remote control software implements these actions. The controlled computer then behaves as if the actions were performed directly at that computer. In many cases the local display and input devices can be disabled so that the remote session cannot be viewed or interfered with.

    The quality, speed and functions of any remote desktop protocol are based on the system layer where the graphical desktop is redirected and the efficiency of the remote display protocol. Software such as VNC and others use the top software layer to extract and compress the graphic interface images for transmission. Other implementations such as Microsoft’s RDP use a kernel driver level to construct the remote desktop for transmission of data. Uses

    A main use of remote desktop software is remote administration. It can also be used for “headless computers”: instead of each computer having its own monitor, keyboard, and mouse, or using a KVM switch, a monitor, keyboard and mouse can be attached to one computer with remote control software, and headless computers controlled by it. The duplicate desktop mode is useful for user support and education. Remote control software combined with telephone communication can be nearly as helpful for novice computer-users as if the support staff were actually there.

    Since the advent of cloud computing remote desktop software can be housed on USB hardware devices, allowing users to connect the device to any PC connected to their network or the Internet and recreate their desktop via a connection to the cloud. This model avoids one problem with remote desktop software, which requires the local computer to be switched on at the time when the user wishes to access it remotely. (It is possible with a router with C2S VPN support, and Wake on LAN equipment, to establish a virtual private network (VPN) connection with the router over the Internet if not connected to the LAN, switch on a computer connected to the router, then connect to it.)

    ]]>
    Scribodroid Writer's Software 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/scribodroid-writers-software/6376197 About Scribodroid

    Scribodroid is a program for writers, translators and regular users of writing software such as Microsoft Office Word. This program is meant to simplify dictionary and thesaurus research for writers. It features a unique user interface that allows users to quickly and efficiently find relevant data.

    Scribodroid enables users to search for synonyms, rhymes, collocations, definitions and much more by a simple few clicks.

    It isn’t uncommon for writers and word enthusiasts to get carried away by searching the Internet for a suitable translation or a synonym for a word. Scribodroid searches the Internet for you. Looks up several different dictionaries very quickly. This way, the author can focus on his work, rather than having to lose time by searching the Internet.

    Searching the Internet is not the only thing Scribodroid does. Scribodroid memorizes the words you searched for and can show you the information about that word (definitions, synonyms, collocations, rhymes etc.) later, even if you’re not connected to the Internet.

    Scribodroid is adaptive. It can let you work with any word processing or writing software. It can even work if you are on Internet, talking with your friends on Skype, Facebook or Google+. If Scribodroid is running, you can tell it to search for you.

    Envato Version Limitations

    This is a special version of Scribodroid software available only on the Envato marketplace for a significantly lower price. However, some features available in the full version are not available in the Envato version. These features include listing additional definitions and phrasal verbs, idioms and portmanteaus. However, the base features are fully functional and available indefinitely.

    YouTube Video Preview

    For all those who cannot view the demo, here is a YouTube link.

    Installation

    Installation instructions are available with the installation files.

    Scribodroid relies on Microsoft’s .NET Framework (either version 4 with the latest update or the version 4.5). These are available on Microsoft’s site.

    For any issues regarding the installation or operation of the Scribodroid software, feel free to contact me via email or in comments. There is also a FAQ page available.

    ]]>
    About Scribodroid

    Scribodroid is a program for writers, translators and regular users of writing software such as Microsoft Office Word. This program is meant to simplify dictionary and thesaurus research for writers. It features a unique user interface that allows users to quickly and efficiently find relevant data.

    Scribodroid enables users to search for synonyms, rhymes, collocations, definitions and much more by a simple few clicks.

    It isn’t uncommon for writers and word enthusiasts to get carried away by searching the Internet for a suitable translation or a synonym for a word. Scribodroid searches the Internet for you. Looks up several different dictionaries very quickly. This way, the author can focus on his work, rather than having to lose time by searching the Internet.

    Searching the Internet is not the only thing Scribodroid does. Scribodroid memorizes the words you searched for and can show you the information about that word (definitions, synonyms, collocations, rhymes etc.) later, even if you’re not connected to the Internet.

    Scribodroid is adaptive. It can let you work with any word processing or writing software. It can even work if you are on Internet, talking with your friends on Skype, Facebook or Google+. If Scribodroid is running, you can tell it to search for you.

    Envato Version Limitations

    This is a special version of Scribodroid software available only on the Envato marketplace for a significantly lower price. However, some features available in the full version are not available in the Envato version. These features include listing additional definitions and phrasal verbs, idioms and portmanteaus. However, the base features are fully functional and available indefinitely.

    YouTube Video Preview

    For all those who cannot view the demo, here is a YouTube link.

    Installation

    Installation instructions are available with the installation files.

    Scribodroid relies on Microsoft’s .NET Framework (either version 4 with the latest update or the version 4.5). These are available on Microsoft’s site.

    For any issues regarding the installation or operation of the Scribodroid software, feel free to contact me via email or in comments. There is also a FAQ page available.

    ]]>
    Desktop Locker - Secure With Password 2018-05-26T10:23:36+00:00 2018-05-26T10:23:36+00:00 /item/desktop-locker-secure-password/6372789 Desktop Locker – Secure With Password This program allows you to set a password quickly.

    The software runs after turning off the computer, even if it came from another user. Beauty and the interface is simple to use.

    At first you just need to set the password and rolling elements.

    This software is designed to be secured in a safe and fast computer at home or at work.

    For the interface to be more elegant, you can set security panel and invisibility, between 1 and 100. Panel desktop security is full, is black and displays the number of wrong passwords entered.

    Simple, elegant and useful for those who truly needs.

    ]]>
    Desktop Locker – Secure With Password This program allows you to set a password quickly.

    The software runs after turning off the computer, even if it came from another user. Beauty and the interface is simple to use.

    At first you just need to set the password and rolling elements.

    This software is designed to be secured in a safe and fast computer at home or at work.

    For the interface to be more elegant, you can set security panel and invisibility, between 1 and 100. Panel desktop security is full, is black and displays the number of wrong passwords entered.

    Simple, elegant and useful for those who truly needs.

    ]]>