Find the software you're looking for at Download.endcenter.com


Latest Webscripts.


Ninja Forms 2.9.56.2
A WordPress plugin for creating and embedding forms in a page or post, complete with an easy to use visual contact form builder

Zenphoto 1.4.13
A PHP online image gallery solution

React 15.3.1
A JavaScript library developed by the Facebook and Instagram dev teams for building custom user interfaces using a XML-like syntax

Meteor 1.4.1
A JavaScript platform for developing modern Web applications, created specifically to cut down development time and help out new developers

PHP 7.0.10 / 5.6.25 / 5.5.38
A world famous, general-purpose scripting language that is especially suited for the creation and development of dynamic Web applications

phpMyAdmin 4.6.4
The most used and the most powerful Web interface for managing MySQL databases, a must-have tool for every developer and Web hosting company

WordPress 4.6
A state-of-the-art blogging platform, which also doubles as a CMS when needed, currently the World's most used technology for building websites

Node.js 6.4.0 / 4.5.0
A platform for running a server-side JavaScript runtime and easily building fast, scalable Web applications. One of the world's most used technologies.

Ruby on Rails 5.0.0.1 / 4.2.7.1
An open source, full-stack Web development framework for the Ruby language, an unofficial standard in the world MVC development

Slate 0.11.9
A JavaScript framework for building customizable WYSIWYG editors that will fit into any project a developer may be working on at a specific time

AngularJS 1.5.8 / 2.0.0-RC5
A powerful JavaScript MVC framework developed by Google for building modern Web applications, for both desktop and mobile environments

Django 1.10
The world's most used Python framework, a powerful toolkit for building clean, powerful and versatile MVC-based Web applications

vBulletin 5.2.3 / 4.2.2
A PHP platform that makes it easy to add a forum or even a complete CMS solution, ideal for building online communities and meeting places

CiviCRM 4.7.10
An open source and freely downloadable constituent relationship management solution

Dada Mail 9.6.0
An intuitive, Web-based mailing list management system, which runs on any hosting account that can execute custom Perl CGI scripts

Magnolia 5.4.8
A market-leading open-source Java content management system, designed to help webmasters build beautiful, professional websites

Softaculous 4.7.9
An auto-installer for Web hosting accounts, used to automate the installation of various Web scripts, CMSs, portals, forums, and more

Dolphin 7.3.2
A portal builder application written in PHP and MySQL

Kunena 5.0.0
A forum component for the famous Joomla CMS, a simple tool to add a fully-customizable and fully-controllable discussion board to your site

BuddyPress 2.6.2
A plugin that can help webmasters transform their regular WordPress installation into a fully-blown online community and social networking


Latest News.

Sony Xperia X Compact Leaks in Images Online
Sony is apparently working on an upcoming smartphone that could possibly be announced during IFA Berlin, which is scheduled in early September. The image of the smartphone, leaked online, thanks to Evan Blass. The Xperia X Compact seems to resemble the Xperia XR, another smartphone that Sony could announce during the event to be held in Berlin next month. The image of the Xperia X Compact isn’t accompanied by any information on its specs, but considering that it will bear the Compact moniker, it will probably resemble other Sony smartphones that have a similar name. Such phones are the Z3 Compact and Z5 Compact, which have a smaller screen compared to other smartphones in the series, namely 4.6 inches and 720p resolution. They’re offerings with more modest specs compared to ...

Google Duo Hits 5 Million Android Downloads in Just One Week
About one week ago, Google released one of the most anticipated applications that it had been working on, Duo. The video messaging app was first announced during Google I/O, alongside Allo messaging app, which has yet to be released. A few days after it was released to Android and iOS, Duo quickly climbed to the first position in the Play Store, surpassing big names in the industry, like Facebook, WhatsApp, Facebook Messenger and Snapchat. Sundar Pichai announced that Duo managed to gather over 5 million downloads on Android smartphones in about a week since its release. It's quite an impressive performance considering that the application only offers a few basic features. However, the application's appeal comes from its simplistic interface and the fact tha...

Security Firm Releases Decrypter for Alma Locker Ransomware
Malware analysts from PhishLabs have released a decrypter for a newly spotted ransomware family called Alma Locker. Discovered by Proofpoint researcher Darien Huss, and first analyzed by Lawrence Abrams, Alma Locker is more advanced than all the other recent ransomware variants released in the past month, who've been more like "testing" versions, and not full-on threats. As a testament to Alma Locker's more advanced state of development, the crooks behind this malware have already moved to a mass distribution stage using the RIG exploit kit. It is unknown how crooks are sending hijacked traffic to the RIG exploit kit landing page at the moment. This can be from hacked websites, or from malvertising on legitimate sites. Alma Locker can be defeated via network...

SWEET32 Attack: 3DES and Blowfish Ciphers Considered Insecure
Two scientists from the French Institute for Research in Computer Science and Automation (INRIA) have published new research that details an attack that recovers data from TLS (HTTPS) traffic that was encrypted with 64-bit ciphers, more precisely with Triple DES (3DES) and Blowfish algorithms. Encryption is a complicated subject, and not everyone understands what happens when someone breaks some of its smaller parts. Encryption schemes don't work by encrypting each bit at a time, but encrypt data in blocks. The bigger the block, the better the encryption. A block cipher algorithm (ciphersuite) takes an encryption key (randomly generated strings) and the user's text (in this case a 64-bit block) and converts it to ciphertext (the encrypted data). Two of the algorithms created to work with 64-bit block ciphers are 3DES and Blowfish. 3DES is mostly used for TLS/SSL to encrypt HTTPS and SSH traffic, while Blowfish is used more with VPN clients. Improperly se...

Apple Releases iOS 9.3.5 to Fix Important Security Issues for iPhone and iPad
Today, August 25, 2016, Apple has released the fifth maintenance update to its iOS 9 mobile operating system, version 9.3.5, for supported iPhone, iPad, and iPod touch devices. iOS 9.3.5 is here approximately three weeks after the launch of the fourth maintenance update, iOS 9.3.4, and it promises to fix yet another important security issue that could be used to jailbreak iPhone, iPad, and iPod touch devices running iOS 9.2 to iOS 9.3.4. According to Apple, the iOS 9.3.5 update addresses to kernel bugs, one that could allow an app to disclose kernel memory, and another one that might let certain apps execute arbitrary code with kernel privileges, and a WebKit issue that allowed for arbitrary code execution when accessing a maliciously crafted website. U...

Sony Adds Two-Step Verification to PlayStation Network
Sony announced today that it finalized the implementation of two-step verification (2SV) for the PlayStation Network (PSN). Users that want to protect their PSN accounts with an extra layer of security can enable 2SV, often incorrectly referred to as two-factor authentication (2FA), by visiting playstation.com/en-us/account-security/2-step-verification/. 2SV is voluntary. After users turn this setting on, they'll be required to enter a code they receive via SMS on their phone every time they want to log into their PSN accounts, regardless of device. Most of today's big tech companies deploy 2SV, including Google, Microsoft, Facebook, Twitter, Yahoo, LinkedIn and many more. Main rival Valve has implemented Steam Guard, a similar system, years before. Hijacking gaming accounts has become a favorite sport for hackers, who trade them on underground hacking forums for small amounts o...

WhatsApp to Share User Phone Number with Facebook For Advertising
In a blog post, WhatsApp announced that it will be sharing user phone numbers with Facebook, including separate numbers. The measure was taken in order to enable more targeted advertising on the network and fight spam. The blog post explains how WhatsApp will go about this new measure. Specifically, if both Facebook and WhatsApp are installed on the same device, then Facebook will be granted permission to pull up phone numbers associated with WhatsApp through the device identifier. Because this measure would pose some security and privacy concerns, WhatsApp also announced that it updated its term and privacy policy. This is the first update that the terms and privacy policy gets in four years. WhatsApp will soon export data to Facebook, so that it could capitalize on some revenue that would advertise to users. With this measure, WhatsApp would avoid third-party banner ads...

Upcoming iPhones Could Collect Fingerprints and Photos of Thieves
Apple is working on new features to introduce to its iPhones and iPads, so that it can enhance device capabilities. Apparently, one of the upcoming features will record videos, snap pictures and collect fingerprints of smartphone thieves. Apple filed a patent application for a method of storing biometric information of an unauthorized user, so that smartphone security would be enhanced. The patent surfaced over at Patently Apple and it will apparently make it very easy for authorities to identify thieves. iPhones will be able to capture pictures and record videos of thieves, as well as collect their fingerprints. The patent states that the feature could be triggered by repeated failed ...

"Hacking" Suspected Behind Theft of India's Submarine Plans
French and Indian authorities have started investigations into the theft of sensitive files from French submarine maker DCNS. The leak includes 22,400 pages of documents detailing plans for a Scorpene class combat submarine. The Indian Navy had contracted DCNS to build six new Scorpene boats to add to its existing fleet of 13 aging submarines. Chile, Malaysia, and (soon) Brazil are also deploying the same Scorpene class submarines. The Australian newspaper announced the data breach. Australia has awarded a 12-submarine $38 billion contract to DCNS in April this year, but for a Barracuda class submarine model. DCNS suffered cyber-attacks last year as well Last year, during the contract bidding process,

iPhones and iPads Fail More Often Than Android Smartphones – Study
The main question when picking a new phone is whether to choose an iOS smartphone or an Android one. A new study coming from Blancco Technology Group sheds some light on which devices are the most reliable, based on reliability. The study also provides an analysis on key trends and insights in the market. The study entitled State of Mobile Device Performance and Health focuses on the second quarter of 2016. It reveals the device failure rates by operating systems, manufacturers, models and regions, as well as the most common types of performance issues. The report reveals that in Q2 2016, iOS devices had a 58% failure rate, marking the first time that Apple's devices have a lower performance rate compared to Android. It seems that the iPhone 6 had the highest failure rate of 29%, followed by iPhone 6s and iPhone 6S Plus. Android smartphones had an overall...