sequence » Developer.Team

Northwoods GoJS 1.8.21

Northwoods GoJS 1.8.21
Northwoods GoJS 1.8.21


GoJS is a feature-rich jаvascript library for implementing custom interactive diagrams and complex visualizations across modern web browsers and platforms. GoJS makes constructing jаvascript diagrams of complex nodes, links, and groups easy with customizable templates and layouts.
Read more

Better File Rename 6.10 Final

Better File Rename 6.10 Final
Better File Rename 6.10 Final


Better File Rename is the most comprehensive file renamer on the market. You get an industrial strength utility that's fast, flexible, reliable and easy to use. That's why since 1999, thousands of hobbyists, professionals and businesses depend on Better File Rename to organize and maintain their files.
Read more

Fix File Encoding v1.3.1

Fix File Encoding v1.3.1
Fix File Encoding v1.3.1


The free Fix File Encoding extension prevents Visual Studio 2017/2015/2013/2012 from adding BOM to UTF-8 files.

Normally, when you edit a UTF-8 file in Visual Studio, it adds the byte order mark (BOM) sequence 0xEF, 0xBB, 0xBF to the beginning of the file. Sometimes it confuses other applications further processing the file. You can select an encoding manually (File - Advanced Save Options... or File - Save As... - Save with Encoding...), but you need to do it each time you reopen the file.
Read more

Better File Rename 6.05

Better File Rename 6.05
Better File Rename 6.05


Better File Rename is the most comprehensive file renamer on the market. You get an industrial strength utility that's fast, flexible, reliable and easy to use. That's why since 1999, thousands of hobbyists, professionals and businesses depend on Better File Rename to organize and maintain their files.
Read more

StarUML 2.8.0

StarUML 2.8.0
StarUML 2.8.0 | 47 Mb


A sophisticated software modeler. StarUML 2 is compatible with UML 2.x standard and supports totally 11 kinds of UML diagrams: Class, Object, Use Case, Component, Deployment, Composite Structure, Sequence, Communication, Statechart, Activity and Profile Diagram. You can create Entity-Relationship Diagrams (ERD). ERD is one of the most frequently used diagram for database modeling. Our ERD is based on crow’s foot notation which is much easier and readable than Chan’s notation. Creating elements and connecting them are somewhat tedious tasks. StarUML 2 supports many shorthands in Quick Edit to create elements and relationships at once such as sub-classes, supporting interfaces, etc.
Read more

Acunetix Web Vulnerability Scanner 10.5

Acunetix Web Vulnerability Scanner 10.5
Acunetix Web Vulnerability Scanner 10.5 | 43 Mb


Website security must be a priority in any organization but remains overlooked. Hackers continue to concentrate on web-based applications – shopping carts, forms, login pages, dynamic content, etc. Web applications are accessible 24/7 and control valuable data since they often have direct access to back-end data. Any defense at network security level will provide no protection against web application attacks since they are launched on port 80 – which has to remain open. In addition, web applications are often tailor-made therefore tested less than off-the-shelf software and are more likely to have undiscovered vulnerabilities.
Read more

Acunetix Web Vulnerability Scanner v10.0 Build 20150921

Acunetix Web Vulnerability Scanner v10.0 Build 20150921
Acunetix Web Vulnerability Scanner v10.0 Build 20150921 | 44 Mb


Website security must be a priority in any organization but remains overlooked. Hackers continue to concentrate on web-based applications – shopping carts, forms, login pages, dynamic content, etc. Web applications are accessible 24/7 and control valuable data since they often have direct access to back-end data. Any defense at network security level will provide no protection against web application attacks since they are launched on port 80 – which has to remain open. In addition, web applications are often tailor-made therefore tested less than off-the-shelf software and are more likely to have undiscovered vulnerabilities.
Read more