Web content and Usenet mass downloader, file share, web search tool, autoposter.
Publisher: |
ALTom Soft |
|
Downloads: |
4809 |
Software Type: |
Shareware, 49.95 |
File Size: |
1.94M |
OS: |
Windows All |
Update Date: |
17 October, 2010 |
Automated and fully customizable Internet search tool, Web sites content and Usenet binaries mass downloader designed for total privacy and unattended operations. Eqipped with image viewer capable of URL tracking, image browser, file splitter, duplicate files scanner, text search, Usenet Autopost and Site copier tools. Private file sharing and hidden web sites content download modes. It also may encrypt files and hide them inside one another. Before uploading files to Usenet or WWW you may encrypt them and hide inside one another. For example, you can hide a single file or bunch of files in another file, such as JPEG picture, mp3 audio or mpeg video clip. You do not need to create, keep and transmit any password. Each file has it is own secret password and is decoded on-the-fly while being downloaded from WWW or Usenet. Images and other files containing hidden data are fully functional and are identical to the originals. You may still view the images with any conventional image viewer, listen for music or play video clips in your favorite media player. Nobody knows that they contain hidden data. Special tags saved with downloaded files make AmiPic Sharemaster image viewer and image browser capable of URL tracking. It means you are one click away from visiting a web site actually containing pictures you are viewing. Duplicate Files scanner is used to clean up your PC from unwanted duplicate files. This works not only with images, but also with any other kind of files. Automated Usenet binaries downloader supports UUencode, Base64 and yEncoding, automatic multipart files reconstruction, multiple news servers with simultaneous connections to each server. Usenet Autoposter, like other tasks, can run unattended. For total privacy it may save downloaded files encrypted, keeps confidential information encrypted on disk and in memory, may connect to Internet through totally anonymous SOCKS proxy servers and supports automatic BestCrypt containers mounting on start-up.
|