|
Your download link is at the very bottom of the page... always. |
Processed through Paypal No account required. Donate Bitcoin to this wallet: 1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm Donate Ethereum to this wallet: 0x40E56922F43637224935CDC35e2c96E0392A8505 Donate Litecoin to this wallet: LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL |
Files | ||||
File Name | Rating | Downloads | ||
lame_enc.dll (3.99.5) modified to use INI File Setup: lame_enc.dll (3.99.5) modified to use INI File Setup: This dll uses an '.ini' file to set up the encoder. This is designed for use with applications that use the dll but do not provide full preset support. This version provides support for VBR, ABR and CBR presets and an expanded set of options compared to the previous version. Dual Channel and Stereo modes added to this new compile. See the included ini file for usage. ICL12.1 compile. |
8,888 | Dec 09, 2012 LAME |
||
Recently Created or Modified Executables Search v2.1.0.2 Recently Created or Modified Executables Search v2.1.0.2 Free tool for incident response. Inspect executable modules created or modified on your computer during a recent time window (cybersecurity incident time) you select. Returns each module's metadata along with the file's SHA-256 value. Helps discover file artifacts from malware incidents. More info: This application may be used at no cost after reading and accepting the built-in EULA. Write access to the Application's working directory is required for the product license file. Uniquely identify executable modules, file artifacts, deposited by System processes and unsafe user activity during a Cybersecurity incident time. Helps associate modules with unsafe or risky applications. Intended target audience: Cybersecurity, Network, Systems Analysts, and similar technical users. SHA-256: 239fbc57cafdadeec735bf12aa1453b5c8858af16286c8606c8a7d2c7340bc22 Supported operating systems: Windows 10/11 64bit Important Notes: 1) This program will not function unless you install Microsoft .NET 6.0. Get it HERE. 2) This program will not function unless you right-click the file and choose to run as an administrator. 3) Once launched, allow the program to finish it's scan operation. This may take a few minutes. |
2,942 | May 07, 2024 Steve Chaison Software |
Showing rows 1 to 2 of 2 | Showing Page 1 of 1 | 1 |
OlderGeeks.com Copyright (c) 2024