Sateira Software

CD / DVD burning software

Create App to know how attractive you are

An app to know if you are attractive by analyzing a photo of your face, is it really reliable? Does it have any advantage beyond entertainment?


An app to know how attractive you are is the latest invention to create the woman who really needs a mobile application to measure her attractiveness. It’s LKBL The Beauty Meter, the app that presents itself as the beauty meter, aimed at people between 15 and 40, just by taking a photo of the face. And if you have a partner, the app also measures compatibility based on the face’s photograph.

Smartphone apps have contributed to the revolution in the use of mobile devices, such as innovative and practical applications for health. But within the increasingly broad catalog of apps aimed at women, there are some proposals that should be used as mere entertainment. An app, free, that can arouse curiosity, although we should not forget that it only measures the exterior beauty, the appearance, not the interior that is the most important.

App to measure beauty

The Beauty Meter app

Can an app measure how attractive you are from a photo? In mathematical terms, and from some algorithms, yes, but from the beginning to measure the attractiveness, the photographs must comply with parameters of proximity, posture, and angle.

Beauty, or the attractiveness of a person, is not much of a question of numbers. Beauty is subjective, as science has also endorsed. A study conducted at the University of Wellesley, and published in the journal Current Biology, concludes that beauty is in the eyes of those who look, also influenced by their life experiences.

Image result for Create App to know how attractive you are

The physical features of a person count, but there are other qualities of his personality that can not be measured in a photograph and that make people even more attractive. Being an intelligent person, having empathy, being a smiling person, and even taking care of your health is the best way to enhance beauty and attractiveness. Thus, for example, several studies published in The Journal of Psychology have found that the perception of beauty is superior when the person shows a smiley or happy attitude.

The Beauty Meter, available for Android, is as easy to use as it is to make or upload a photo that the system will scan to give your note. The better the photo or selfie, and above all be well focused, the higher the score.

Family invests everything in “bitcoins” to live in camping in Holland

A Dutch family sold all their properties, including the toys of their three daughters, to invest all the money in the virtual currency “bitcoin” and live a minimalist life at a campsite in Venlo, in the south-east of Holland, while watching their capital increase.

“We are betting on this idea with a double objective: the most important thing is to lead a simple life, in which our happiness does not depend on material things, in the meantime we invest our money in bitcoins and hopefully multiply,” he told Efe the father of this family, Didi Taihuttu.

Image result for Family invests everything in "bitcoins" to live in camping in Holland

The first time Didi heard about this virtual currency was in 2012 when he “had no idea” what it was or where that system would get.

“I started to search and get interested in it. Out of curiosity, I bought some bitcoins, sold them, and I did not do it thinking that it would go much further,” he said.

Bitcoin, invented by a Japanese who uses the pseudonym Satoshi Nakamoto, is an encrypted currency created from a computer code and when it was released in February 2009 it was worth only a few cents.

The value of this criptomoneda already surpasses the US $ 6,100, according to the updated data of the page of exchange of digital currencies “Bitstamp”, with headquarters in Luxembourg.

Neither Didi nor his wife, Romaine, imagined that bitcoins would be so popular over the years, so they did not attach much importance to the subject at first.

After his father fell seriously ill in 2015, Didi spent more time with his family and left out his business, his interests and even his curiosity about the digital currency and the money that had invested in this new system.

“When my father died in January 2016, we all traveled to Bali. I was on the beach, enjoying a wonderful day, when a friend called me and asked to check the application of the bitcoins, because I would have a surprise,” he recalled.

It was at this time that the Dutch realized that digital coins are “the revolution of the monetary system” because by verifying their investment after a year and a half, the money they acquired and marketed in 2013 “had gained several zeros.”

Didi spoke to Romaine and said he was “tired” of working long hours away from family and “how attachment to material matters had killed his dreams” and that the same could happen to his daughters, seven, ten and twelve.

Image result for Family invests everything in "bitcoins" to live in camping in Holland

Since then, he has considered the bitcoins “the perfect opportunity” for a change of life and has convinced his family to sell his home, his company, three cars and a motorcycle in Holland.

“We sold even the clothes we did not wear, the girls’ toys, all the luxury goods we had and we invested everything in bitcoins,” said the father of the family.

The daughters did not understand this project at first, because they left a house with five rooms to live in a bungalow of 50 square meters in a campsite in Venlo.

“They like to sleep together and are happy with our new life,” said Didi.

According to the Dutch research institute Kantar TNS, about 135,000 families in the country have currencies currently encrypted, twice as much as last year.

Many people invest a small amount: 43% of households spent no more than 100 euros and more than half got “modest profits” from their investment.

“We are aware that this is a gamble and we can lose everything. It would be a disaster because we invested everything, but we can always go back to the routine of having a salary and working,” explained Didi.

Cryptographic expert Kijn Soeteman was surprised by the decision of the family and told the public radio and television network “NOS” that “there are still many technical obstacles that can cause strong oscillations” in this digital currency.

The system, global and decentralized, allows direct transactions between users, without intermediaries, that are registered in a public database.

Didi, who reports on her daily life at, considers herself “an example to others who want to seek freedom” and shows her confidence in bitcoins as the currency of the future.

“Even if we are millionaires, we will continue to live a simple life. The Netherlands is a very expensive country, so our plan is to go to another place, like Spain, the country of our dreams, where we will survive thanks to the bitcoins trade” , Didi concluded.

The Mobile World Congress threatens to leave Barcelona in 2019

John Hoffman, the CEO of the GSMA, organizer of the Congress of Mobile, has once again expressed concern about the situation in Catalonia and warned that the event needs “security and political stability” , so it would consider changing its seat 2019 if it could not be guaranteed in the future.

Image result for The Mobile World Congress threatens to leave Barcelona in 2019

Hoffman launched this message on Wednesday during the meeting of the board of the Barcelona Mobile World Capital Foundation (MWC), which met in the Catalan capital coinciding with the general strike that collapsed the road and rail network. The executive of the association that organizes the Mobile insisted that the next edition of the MWC, which will take place between February 26 and March 1, 2018, is completely guaranteed and that the preparations are going at a good pace, but that the event it needs “security and political stability” for future editions.

 Image result for The Mobile World Congress threatens to leave Barcelona in 2019

These same sources have pointed out that Hoffman launched “a warning”, another one, since last October the GSMA said in a brief statement that it is “monitoring the situation in Spain and Catalonia and evaluating any potential impact for the Mobile World Capital and the Mobile World Congress ». In the Board of the Mobile World Capital are, among others, the public administrations, the Fira, the GSMA and some of the main companies in the sector.

The association that groups the telephone operators has an agreement with the partners of the event in Barcelona so that the headquarters of the Mobile will stay in the Catalan capital until the year 2023.  Last year, the Mobile World Congress registered a new record of visitors , with 108,000 professionals, and it is estimated that its economic impact was around 465 million euros.

This is an event that last year generated 13,200 temporary jobs and that boosts the economy of Barcelona and its metropolitan area during the days in which it is celebrated. The organization of the GSMA is always attentive to any type of conflict that affects this event, and in recent years the strikes in the metro service have caused the discomfort of the organization of the congress.

Bitcoin exceeds $ 5 mil mark for the first time

The value of bitcoin surpassed the $ 5,000 barrier for the first time on Thursday and set its new record high, according to the Financial Times.

At 12:05 AM, the digital currency was worth US $ 5,345.38 (equivalent to R $ 16,909.04), an increase of 10.73% during the day, according to data from the Bitstamp page.

The price of bitcoin in dollars rose more than 750% last year. Some experts warn that the digital currency is immersed in a bubble that can explode at any time, while others consider that it is still possible to increase this value.

Recent weeks have shown episodes of volatility in the price of bitcoin. In mid-September, the value dropped to about $ 3,000, after China announced an investigation into local companies working with the currency.

Despite the warnings about a possible bubble, the use of bitcoin has continued to expand in many areas. In September, London real estate The Collective announced that it will allow tenants to pay rent on bitcoins, while Japan has taken various measures to regulate its use.

Bitcoin is based on a technology created by an engineer known by the pseudonym Satoshi Nakamoto, whose real identity is unknown. The system, global and decentralized, allows direct transactions between users, without intermediaries, that are registered in a public database.

Delete browsing history? And EVERYWHERE can see her!

Anonymity on the web for most people is limited to clearing the history of web pages viewed from the web browser. It turns out, however, that there is still a way for others to see your browsing history.

Image result for Delete browsing history

The entire history of your browsing, even pages you visit in incognito mode, can be recovered by third parties. Two security experts in the network Svea Eckert and Andreas Dewes managed to gather data on the network from 3 million Germans, and they used only their own knowledge.

Eckert and Dewes also managed to get into the private history of public figures such as judges and politicians. About their way of using data “Clickstream” they spoke at the Def Con industry event in Las Vegas.

“Clickstream” is a virtual trace that leaves every user on the Internet. It records all activity on the web, including every page, subpage you visit and the time it spent on it, as well as accurate information about what the user clicked on. These data should be anonymous, which would exclude the possibility of their being deciphered by an unauthorized person.

Eckert and Dewes said they managed to bypass security and get to the vast amounts of sensitive data millions of Internet users have. According to experts, this was achieved through 10 popular browser extensions. The two “hackers” identified users by means of links in the Clickstream data that were posted by specific people on Twitter or other social media.

Image result for Delete browsing history

This allowed them to accurately identify people whose data is stored in Clickstream. German politicians whose interest in pornography and other habits have revealed their interest in the subject matter. This knowledge would be ideal for later blackmailing them.

Asked about the government’s plans to collect and secure these data, Eckert and Dewes said that firstly, it is important to consider how long the data will be stored.

“If someone is strong on the subject of data protection, then they should not be allowed at all, but for security reasons, such data may be kept for some time,” she said in an interview with BBC Eckert.

Charging the mobile in seconds is possible

Use your phone whenever you want thanks to the electrode developed by a group of researchers

At present we can not live without our mobile phone. However, the short battery life of smartphones is a problem for all those who need to be connected at all times.

For years, numerous technological investigations have focused their studies on obtaining batteries more durable and efficient. A group of researchers from the University of Drexel College of Engineering in Pennsylvania (USA) has developed a new type of electrode that charges the battery in just seconds:

Do not run out of battery

The electrode developed by this group of researchers uses MXene, a highly conductive material of electricity that allows the speed of the load to increase vertiginously. Thus, our smartphone’s battery, composed of a positive charge electrode and a negative charge electrode, stores energy during charging and then releases it to power the devices.

“This paves the way for the development of ultra-powerful power storage devices that can be loaded and unloaded in seconds, but storing much more energy than conventional supercapacitors,” said study director Yury Gogotsi.

Eight antivirus to protect your Android smartphone

The threat of viruses also affects our smartphones, which makes it imperative to protect them

There are bad times for internet security. We do not stop to know cases of massive attacks where the protagonist is usually a malware whose name we rarely hear until when we are going to buy bread.On May 12, Wannacry was the one that put in check nothing more and nothing less than companies from 166 countries ; At the beginning of this month that has taken the headlines is Fireball, a malware created in China that has affected 250 million computers worldwide and is present in one of every five business networks.

Most troubling of all this is that no one can promise us that next week, or within a month or three, for example, no further attack will occur. As of April this year, 247 cybercrime-related incidents have been detected in Spain, or more than half of all incidents that occurred on the Web last year, according to data provided by the Secretary of State for Security , José Antonio Nieto, during the II Congress of Security and Telecommunications held in Toledo.

It is clear that these attacks are unpredictable and that is why we must be prepared, because the next time maybe we can be affected – if at the moment, we have been lucky to get rid of. Precisely to put all possible obstacles to cybercriminals and try to prevent any malware from leaking into our devices, one of the experts’ recommendations is to use a good antivirus .

It is not a matter of downloading three antivirus, we will not be more protected that way – we will simply occupy space in our device -, it is to install a program that works for us, that we are going to use and that will serve us for it That we really need it.

And, of course, just as we usually use antivirus on our laptop or desktop computer, it is essential to install an antivirus on our mobile , because it can also be affected by malware. Here are eight options with which you can protect your Android terminal from any danger. Surely one suits you.

Virus Cleaner Antivirus

Virus Cleaner Antivirus is an application developed with the support of McAfee , one of the best-known antivirus brands. As promised by its creators, the ‘app’ protects your Android phone from any attack by viruses, wifi spies or anyone who tries to invade your privacy.

Among its most outstanding options are the ability to protect all the applications that you have in the device with a PIN code , pattern or fingerprint so that nobody can open them and view their contents, as well as being able to block unwanted calls and delete the history of Navigation and the clipboard. In addition, this antivirus protects your security when you are connected to an insecure public Wi-Fi.

360 Security Antivirus

360 Security is, perhaps, one of the most complete . In addition to protecting your terminal from viruses and threats, it also cleans the device by identifying junk files and freeing up space for better performance ; Has an anti-theft service that locates and locks the device remotely when a user has lost or stolen it (this option can be activated from its website); You can block applications so that no one executes them without your permission and also has an unwanted call blocker and SMS.

Avira Antivirus free

Avira Antivirus is for many one of the best antivirus that exist – also for computers. It offers you not only protection against any type of virus or malicious software, but also analysis of the system, the storage of your phone and your microSD card; Be able to find your phone or tablet in case you have lost or stolen it; Protection of private data such as photographs or SMS in case of theft; Can block access to applications installed on the device and also helps you to save battery power a.

One of the highlights of this application with respect to the rest is that it is also able to prevent the manipulation of your email address or that of your contacts , coming to warn if it happens.

Panda Antivirus

Like Avira, Panda Antivirus is one of the few that scans your microSD card for malware. Protect your mobile phone from viruses, malware or spyware, block applications that access your confidential data without permission, find the thief who stole your phone with the anti-theft feature and can also be downloaded for Android Wear.

Panda Mobile Security also promises to optimize the battery and performance of your mobile or tablet by analyzing in real time the consumption of the applications you are using, as well as improve the speed, performance and memory usage of the terminal.

If you pay for the premium version the application offers you to take photos of the thief, which will be sent to your email, an application blocker, a motion alert in case someone picks up your phone without your permission and, for example, a remote alarm that Will ring in your device from your smartwatch in case of theft or loss.

ESET Mobile Security & Antivirus

ESET Mobile Security & Antivirus has a trial version of 30 days and during that time offers you features such as blocking calls and SMS, sending the last location before the battery runs out and, in case of theft, photos of Thieves made with the back and front camera.

If after 30 days you stay with the free version you will keep some functions like the anti-theft service that allows you to locate the phone, remotely block it and delete its content, but others will lose.


It is one of the best known antivirus. Avast! Was born as a protection for laptops and computers, but for years has its version for mobile devices. Like most, it offers an anti-theft service that blocks the device from a distance , allows applications to be blocked by PIN so that nobody can access them without your permission, analyzes the Wi-Fi for safe browsing, blocks unwanted calls, has A junk file cleaner and allows you to do tests of wifi speed.

Kaspersky Antivirus & Security

Another option available on the market is the Kaspersky Antivirus & Security application. What stands out from this antivirus is its protection of financial data while you browse the internet and make purchases online, in addition to filtering links and dangerous sites to protect your phone or tablet.

And like other options we have seen, it analyzes your device for malware, spyware and Trojans, protects your personal data and privacy (calls, SMS, contacts), find your Android device in case of loss or theft, block calls and Unwanted SMS and can be controlled with Android Wear by voice commands.

AVG antivirus

The last antivirus on the list is AVG Antivirus. According to its developers, if you download this antivirus you will get an effective antivirus and antimalware protection and easy to use, in addition to a phone locator, a task eliminator, an application blocker, a call blocker, an analyzer and Wi-Fi connections and an image store to help protect you from threats to your privacy. This is another old acquaintance in the world of antivirus, so probably many of you already know it.

Google’s Top 8 Failures

Google is that multimillionaire company with a worldwide presence that everyone is aware of. When it presents a new service, it improves an existing one or it goes awry and something disappears, the alarms are turned on and put in the mouth of the whole sector, the public and the specialized press.

 Speaking of failures, there have been few cases of Alphabet services that have gone missing over the years that the company has been standing. Some of them have passed without pain or glory; Others, on the other hand, were well received at the time, and some even continued to use them until one day they found that they could not do it anymore. And not counting those who have not seen them from the outside. Because it is clear that such an innovative company, will try and experiment with new formulas continuously, and it is natural that not all of them figure. To succeed, the most normal thing in the world is to need several attempts.

Then a little tour of the years to bring to light some of those projects that Google brought to light and, later, buried in the drawer of forgotten things. Surely you were a user of more than one.

Google Spaces

Google Spaces was a social network that, unfortunately, was doomed to failure by its objective: to create groups with whom to initiate a conversation and to share content. The competition in this sector is fierce, but it is that within the ecosystem of the company had competitors , such as Google Allo, Google+ or YouTube chat, posts to choose.

The application did not have much acceptance by the users (and let’s face it, Google did not do much of its part in what concerns promotion) and social software is already very rooted: few people will try new things And it will leave Facebook, Instagram, WhatsApp or YouTube aside if nothing new and extraordinary is offered. Google Spaces was closed on April 17, 2017.

Google Reader

Google Reader has been one of the closures most touted by the number of users it affected . It was an RSS reader to organize and quickly and efficiently access the news pages added on it.

The Google move was clear: the company took advantage of the drop in users to explain the low profitability of the service, close it and boost the social network in which it was putting all its efforts, Google +. The tool disappeared on July 1, 2013.


IGoogle, originally referred to as Google Personaliced Homepage – we know whose idea it was to use rival Apple’s terminology – had a very simple yet striking feature: it was a home page that could be fully customized and modified, adding All types of extensions or ‘gadgets’ of the company (time, YouTube, mail, news, etc.) and ordering them to the taste of the consumer.

In spite of being so interesting and to have a good reception, Google gradually took away options to refer them to other services or to make them more exclusive. It lasted from 2005 to 2013.


Surely Picasa is one of the services that you remember most, as it was quite useful and something that many have used in our day to day. It blocks an application to manage the photos from the desktop of your computer, allowing options such as creating albums, editing photos or a function to share them.

Most of the features it integrates have ended up being part of Google Photos, so not everything is lost in this case. Picasa disappeared in 2016.

Google Answers

We all have in mind Yahoo! Answers when we have some doubt (in general, simple and / or absurd) that we want to solve. Well, those in Mountain View also had their own answering service called Google Answers. In it, people could earn money : a user asked a question and offered a reward; If someone answered coherently and formulated a good argument could be carried from 2 to 200 dollars.

The service had its end in 2006 and although we will always be the one of Yahoo !, the truth is that is missed enough.

Google Labs

Google Labs was one of those services that have not gone unnoticed by the technology sector, either by the company itself (and by the competition) or by users of different Google tools.

It was a platform where the company aired its projects in development , most of them rare as well as flashy. In this way, the company put them as a kind of phase “beta”: users could try them and Google had a referent of their reaction, supposed reception, etc.

The project ended up closing in 2011 to focus on more things on a large scale, although many of its projects have ended up reaching the public, such as Google Reader, Google Maps, Google Calendar or Google Docs.

Google Wave

Google Wave passed without pain or glory for its short life of two years. It was a different e-mail service, as it brought together in a single space the traditional email with other more booming services, such as instant messaging, a forum and document collaboration between people, as well as serving as a social network.

This whole innovative project had a clear problem: people were getting out of their minds . It was not well known how to use it effectively, so as time went by it was left aside. Google Wave existed between 2010 and 2012.

Google Health

Google Health was one of the most curious Google applications with more social future prospects. The service, focused on health as indicated by its name, allowed users to record their medical history to receive certain information in exchange, such as possible contraindications between medications and allergies, a detailed record of health at hand and a long etcetera Of options.

The service was involved in controversies from the first minute because of aspects such as the possible violation of the privacy of users or because it “encouraged” people not to go to the doctor and just trust their data. Finally, Google decided to close the service in 2013 arguing a low number of interested users.

This is how you should clean your computer inside

Dust and lint accumulate everywhere, you just have to look around. At home, however clean you are, this type of dirt is constantly flowing, it is inevitable, but you have to be very careful with electronic devices , especially with computers .

Many people think that cleaning a PC is simply keeping your junk files away from your storage and software or wiping it occasionally to the screen , but the rest of the peripherals and especially the inside of the computer itself suffer greatly with The accumulation of dust – and you with it if you are allergic.

As time passes, any laptop or desktop PC tends to suffer small (and not so small) problems from the accumulation of dust. Although you may not notice it with the naked eye, it is true that the heat sinks or fans are working worse because the dust from the grids prevents it, causing the temperatures of the appliance to rise and its performance goes down. Dust filters on casings, housings, or components help to reduce that accumulation, but it is not enough to prevent components from wearing down unnecessarily.

In terms of peripherals, screens, keyboards, mice or loudspeakers , the dust is more noticeable because you have it in front and annoying to the eye, so it is usually cleaned more. Even so, if only a superficial cleaning is performed is not enough; It is necessary to clean it in detail so that the lint does not remain in the corners or in the most inaccessible spaces.

Since dusting is vital for your computer and its components to be maintained as the first day, here are a number of tips to be carried out each periodically to avoid possible problems.

The screens

Cleaning the computer screen, whether portable or desktop, is a real art. Here it is necessary to remove dirt and dust, yes, but also bacteria and disinfect the monitor because we tend to touch it more with dirty hands than we think.

All in all, a dry or slightly damp cloth should be used to clean the dust ; To remove the bacteria you have to clean the screen with alcohol and some distilled water .

Keyboards and mouse

As with screens, the keyboard and mouse are not only exposed to dust and lint, but also to the fat and bacteria we accumulate in our hands or around us.

How to clean your computer
Eating in front of the computer can fill the keyboard with grease. Getty Images

As a general rule, both aspects need to be cleaned here. The idea is to use a slightly damp cloth to remove surface dust and, later and very carefully, a suede with some alcohol before passing a dry cloth to remove any residual water or disinfectant that remain on the surface.

In the case of desktop computer keyboards, these are larger and often have more nooks and crannies between the keys by which the dust is constantly being shed. Ideally, if you can, remove the keys to clean them one by one along with the inside , but as we know that this does not usually happen, there are a couple of extra tricks to get hold of.

First of all, with a ‘post-it’ you can easily and inexpensively remove dirt, although it is tedious in time and resources (you will have to use several); Take one and use the sticky part to go past the keys until you remove all lint. The second option is to use a bottle of compressed air: this bottle comes with a head the size of a straw that expels cold air under pressure , so that the dust comes out of the last corner of the keyboard with ease – yes, beware of the cold ; Do not keep the button pressed all the time, just a few seconds, and move the bottle assiduously so as not to have problems -.

The inside of the computer

The interior of a computer is the most complicated part of the list, but not for that something impossible or only suitable for experts. Of course, if you think that you are not going to get well or are afraid, do not hesitate to take your computer to a specialized center to do the cleaning: they will charge you what corresponds, but leave it in the hands of professionals. If you do it at home, remember to do it with the computer off and unplugged from the power (on a desktop PC turn off the power switch as well).

How to clean your computer
It is easier to clean a desktop computer inside than a laptop. Getty Images

What does it take to clean a computer inside? A fine, medium-soft hair brush that can be inserted in any recess, and a vacuum cleaner with a tube head to make it easier to handle. If you want to get a little more punctilious or detailed, the bottle of compressed air, having the head so small and expel the air under pressure , can help you very well to reach corners where the rest of the utensils have not just arrived very well.

On a laptop the subject is slightly more difficult to perform. What you have to do is turn it around and remove the screws on the back cover to open it – some computers lose the warranty with this action; Take a look at yours first -. Once opened, very carefully (the components are smaller and many come soldered) removes the surface dust and help the brush to try to clean as much of the zones as possible between the components (the bottle in this case is very useful , But use it at a certain distance and without keeping the air long at the same point, with short pulsations). When you finish, screw it again to make it look like new.

On a desktop computer you have to start by unscrewing the side cover of the device to access its interior. If you look capable, it is best to remove all the heat sinks, fans and graphics card to clean the dust that is there embedded conscientiously; If you do not know how or if you dare, use the vacuum cleaner and the brush to go little by little, cleaning very well the fan blades, dust filters and grooves you are encountering. When you finish, put the lid back in place.

Also, do not forget that slots for memory cards, floppy disks or USBs also accumulate dust, as do the connections you have outdoors and do not use. Also clean these corners to be as effective as possible to remove accumulated dirt.

Sateira CD&DVD Burner

 is a full-featured package for audio and data CD / DVD burning. With this program, you can create and burn audio and data CD / DVD, CUE / ISO images, multisession and bootable CD / DVD, extract session from the multisession disc and more…

Sateira CD&DVD Burner is a very powerful burning package with small size and low resource usage. This is the optimal solution for notebooks and laptops. Program records: CDR/W, DVD-R/W, DVD+R/W, DVDRAM. It has a very flexible interface and all required functions for recording. This is one of the best solutions for beginners and professionals.

Features and Benefits:

    • Supports CD-R / CD-RW / DVD-R / DVD-RW / DVD+R / DVD+RW / DVD-RAM


  • Tested with SCSI, IDE / EIDE, USB CD / DVD recorders
  • On the fly burning. No need to build ISO image first. No temporary files
  • Small package size, fast work, and easy-to-use interface
  • Supports long filenames (max 127 characters) and folder names (max 107 characters)
  • Burn up to 100000 files and 15000 folders
  • Create multisession CD / DVD. Import any of the available previous session
  • Doesn’t use any DLLs or OC xs. Built-in ASPI layer
  • Professional disc layout editor
  • Displays necessary information about recorder and disc
  • Fast ISO image building speed
  • Supports ISO9660 / Joliet files systems, burning simulation, OPC, BURNProof


Download Now