Tuesday, 9 September 2014

Professional Advantage Blog

Professional Advantage Blog


Collections Management R2.3 Released!

Posted: 08 Sep 2014 04:00 PM PDT

We are proud to announce that Collection Management R2.3 is now live and available for download at the following link:

http://www.profad.com/forms/collections-management-download/

This is the most stable, polished release of Collections yet. Among the fixes and new improvements:

  • Fixed issues with emailing
  • All Word letters and Word Template based invoices can now be sent as a PDF, generated on the fly, without needing Adobe PDF writer
  • Corrected some issues with National Accounts
  • Improved Smartlist for Collections install
  • Added a new Collector Performance window to compare Collectors side by side
  • Days Sales Outstanding now recorded automatically once a day

Over the next few weeks we will be discussing how to make the best use of these new fixes and features. But before you do anything else, run, don't walk, to our newest release page and get this newly honed version today!

http://www.profad.com/forms/collections-management-download/

Tuesday, 8 July 2014

Professional Advantage Blog

Professional Advantage Blog


The aging period requested must be between 1 and 7

Posted: 07 Jul 2014 04:00 PM PDT

One common question users have when creating Collection Letters which utilize the Aging Periods, is how to handle the following warning when generating their letters:

 The aging period requested must be between 1 and 7.

 1

The reason this most often occurs is that we do not yet have all the parameters entered in the Collection Letter Template:

2

If we go to the Collection Letters window (Cards >> Sales >> Collection Letters) and Press F1 on the keyboard, that opens up Collections Help for the window. Click on the Aging Functions value:

3

This gives us the parameters we need to specify which aging period we want to enter.

4

The number of the desired aging period should match that on the RM Receivables Setup window:

5

So at a very minimum we would want to include an aging bucket that we want to display in the function:

@%AgingPeriodName,7%@

If we wanted to include each aging bucket and the amount it holds, us could use a series of functions such as the following:

@%AgingPeriodName,1%@      @%AgingPeriodAmount,1%@  @%AgingPeriodName,2%@      @%AgingPeriodAmount,2%@  @%AgingPeriodName,3%@      @%AgingPeriodAmount,3%@  @%AgingPeriodName,4%@      @%AgingPeriodAmount,4%@  @%AgingPeriodName,5%@      @%AgingPeriodAmount,5%@  @%AgingPeriodName,6%@      @%AgingPeriodAmount,6%@  @%AgingPeriodName,7%@      @%AgingPeriodAmount,7%@

That would end up looking like the below:

Current              $40,074.02  31 - 60 Days         $21.40  61 - 90 Days         $0.00  91 - 120 Days        $0.00  121 - 150 Days       $0.00  151 - 180 Days       $0.00  181 and Over         $19,899.04

Using these function options, we can easily include a short aging report for a customer on all Collection communications!

Wednesday, 2 July 2014

Professional Advantage Blog

Professional Advantage Blog


Automatically Receive Registration Keys from Professional Advantage

Posted: 01 Jul 2014 02:43 PM PDT

Automatically Receive Registration Keys from Professional AdvantagePay your Annual Enhancement Plan (AEP) before the due date and your registration keys are automatically reloaded

For customers using Collections Management and/or Company Data Archive (CDA), obtaining product registration keys is now easier than ever. There is a new automated registration service, and a button on the registration window called "Get Registration Info". These options have been included in the February and March releases of Collections Management and CDA (Click here to see how to check your version).

Process
Provided the AEP fees have been paid to Professional Advantage prior to the due date, Collections Management and CDA installs will automatically update the registration key. There is nothing more to do. AEP is sometimes referred to as for 'Update and Support' or Maintenance plan.

The way it works
7-10 days before the AEP expiration date, provided the client machine has a working internet connection, the system will poll Professional Advantage records to check if fees have been paid. If yes, then new registration keys are automatically sent and updated. This does not require any action from the end-user. Alternatively, the registration service can be manually overridden at any time by clicking the "Get Registration Info" button.

The registration service will continue to search for an updated key (within the 7-10 day period) until the AEP expiration date.

Once a customer has surpassed the AEP expiration date, they will receive a notification similar to this:

Surpassed AEP Expiration Date

 

 

 

 

 

If this message is received please contact your Microsoft Dynamics partner for options going forward as you may need to renew your Professional Advantage AEP plan. Additionally, if a user clicks the "Get Registration Info" button, they may receive this message:

Please contact your Dynamics GP partner

 

 

 

 

 

 

Again, if this message is received please contact your Microsoft Dynamics partner.

Where do I find the registration window?
As pictured below, users can easily navigate to the registration window for Collections Management (screenshot 1) Tools > Utilities > Sales > Collection Installation and Registration. For CDA, Tools > Utilities > System >Company Data Archive Registration.

Screenshot 1. Dynamics GP Navigation to the Installation and Registration Window (Collections Management):

Dynamics GP Navigation to the Installation and Registration WindowScreenshot 2. Installation and Registration Window (Collections Management):

Installation and Registration Window (Collections Management)

 

 

 

 

 

 

 

Which versions include the automatic registration key service?
Please refer to the table below for the versions of Collections Management and Company Data Archive that include this new feature. All newer builds going forward will also include the registration service.

Which versions include the automatic registration key service

 

 

 

 

How do I know what version I am running?
As pictured below, navigate to the 'About' window (screenshot 3) Tools > Setup > Sales > Collection About. For CDA, Tools > Utilities > System >Company Data Archive About. You can locate the version of your product in the lower right of the window (Screenshot 4).

Screenshot 3. Dynamics GP Navigation to the Collections 'About' Window (Collections Management):

GP Navigation

Screenshot 4. Collections About Window (Collections Management):

Collections About Window

 

 

 

 

 

 

 

Where can I download the latest version?
In order to enable this function, please download and install the latest version from the Professional Advantage website:

Collections Management Download        Company Data Archive Download

Wednesday, 18 June 2014

Professional Advantage Blog

Professional Advantage Blog


8 Tips for Collecting Your Cash

Posted: 17 Jun 2014 01:52 PM PDT

How are you managing your past due invoices?

It's an age-old problem: A customer wants to purchase a product or service from your organization, so you start the process of a transaction; money from the customer in exchange for this product or service. However, for one reason or another (I'm sure you've heard them all), the customer fails to meet their end of the bargain (i.e. make payment) either on time or in some cases, never at all.

This creates a need for a method to collect your cash. With several tactics in the business world today, some methods may be more effective than others. Some businesses may need more focus on collections management. Either way, if your organization has Accounts Receivable, at some point you may need to collect.

Professional Advantage has developed a whitepaper entitled 8 Tips for Collecting Your Cash. This simple yet comprehensive guide can help your organization in developing collection strategies that make sense.

8 Tips for Collecting Your Cash

Have a great collection tip? Please share your tips, thoughts and/or comments. 

Tuesday, 3 June 2014

What you need to know about Cryptolocker

What happens when a pc is contaminated with the harmful application, and what should you do to secure your files?

Viruses such as Cryptolocker can be attacked by taking down the servers that control them.
Malware such as Cryptolocker can be assaulted by getting down the web servers that management them. Photograph: imagebroker/Alamy
Cryptolocker is returning in the news, thanks to a synchronized attempt to take down the computer systems and scammers that run the well known "ransomware". But what is it? And how can you battle it?
Cryptolocker is ransomware: harmful application which keeps your details files to ransom

The application is generally distribute through contaminated accessories to e-mails, or as an extra disease on computer systems which are already suffering from viruses which offer a mystery for further strikes.

When a pc is contaminated, it connections a main server for the details it needs to stimulate, and then starts encrypting details files on the contaminated pc with that details. Once all the details files are secured, it content a concept asking for transaction to decrypt the details files – and intends to eliminate the details if it does not get compensated.
The regulators have won customers a two-week screen of safety

The Nationwide Criminal activity Organization (NCA) declared last night that the UK public has got a "unique, two-week probability to rid and safeguard" themselves from Cryptolocker. The company did not go into more details, but it seems likely that at least one of the main web servers which Cryptolocker talks to before encrypting details files has been taken down.

The NCA has also taken down the management system for a relevant application, known as GameOver Zeus, which provides scammers with a entry into users' computer systems. That mystery is one of the ways a pc can be contaminated with Cryptolocker in the first place.

What that indicates is, until the screen is shut – and the viruses periods to new web servers – customers who are contaminated with Cryptolocker won't reduce their details files to protection. As a result, these customers have the opportunity to eliminate the viruses before it damages details, using traditional anti-virus application. In other terms, there has never been a better time to upgrade the protection on your pc.

But watch out – while the web servers that management Cryptolocker are out of action, it's possible to be contaminated with it and not know. If you don't keep your pc clean, then at the end of the two-week period, you could be in for a unpleasant shock.
Cryptolocker only infects PCs, but there are other kinds of ransomware

Cryptolocker is the name of one particular viruses, which only infects Ms windows PCs, operating XP, Windows vista, Ms windows seven or Ms windows 8. So if you use an The apple company pc, it can't impact you. In the same way, mobile phones are protected from cryptolocker.

Although it is the most popular example of ransomware, it's not the only one. Even in the two-week screen, PC customers may be contaminated with other kinds of ransomware, and Android operating system and Mac OS customers should bring on with their regular protection protection measures. Being protected from one type of viruses does not mean you're protected from all of them.
If you've been contaminated by Cryptolocker, your details files really are gone unless you have a backup

Some ransomware is little more than a assurance trickster, introducing a concept asking for transaction without having done anything to the customer's details files. Cryptolocker isn't like that: the application really does secure your details files, to a durability which provides it strong even by the quickest computer systems in the world – even if they had the entire life-time of the galaxy to perform on it.

That indicates you'll have to depend on any back-ups of your details to get it returning. But it's important that you don't try and reinstate your details before you clear your pc of the disease, otherwise you could reduce your back-up, too.
Sometimes spending the ransom will continue to perform, sometimes it won't

Except, of course, there is another probability. Some customers hit with Cryptolocker review that they really did get their details returning after spending the ransom – which is generally around £300. But there's no assurance it will continue to perform, because cybercriminals are not exactly the most reliable people.

What's more, if the NCA really is lowering the control and management web servers, then the scammers may not be able to come back the details, even if the ransom has been compensated. There's also a whole fill of viruses which go out of their way to look like Cryptolocker, and which won't send the details if sufferers pay. Plus, there's the moral issue: spending the ransom resources more crime.
 




United kingdom to closed Rubber Area technical incubator and boost London hub

Company hitting into UK abilities as London, uk xone hub requires on liability for creating cellular technologies

Vodafone to shut Silicon Valley tech incubator and boost London hub
United kingdom Projects will remain in Florida, helping to invest in early-stage technology start-ups. Photograph: PA
Vodafone is to close its analysis service in Rubber Area and increase its London, uk team as the telecoms organization looks for to tap into UK technological innovation skills.

The United kingdom xone hub in London, uk will be accountable for creating cellular technological innovation, with a focus on building and examining model devices and creating applications and solutions designed for the team's greatest marketplaces in European countries, African-american and Indian.

"Establishing a new hub in London, uk will bring our product team nearer to the clients it provides," said Stefano Parisse, Vodafone's customer solutions home. "It will allow us to attract on a wide share of technological innovation skills in the UK and European countries and make simpler our growth process, allowing us to get the very most advanced technological innovation into the hands of our clients as quickly as possible."

The team's investment investment arm, United kingdom Projects, will stay in Florida, helping to invest in early-stage technological innovation start-ups, while United kingdom International Business, which provides cellular solutions to United states companies, will stay in Rubber Area.

But the closing of Vodafone's analysis base in Redwood, Florida, is something of a U-turn for the organization. The workplace was started out in Sept 2011, with a brief to incubate start-ups and speed up their ideas by providing technological skills, company advice and access to the United kingdom lab to ensure products were suitable with its systems.

Fay Arjomandi, a technological innovation business owner who signed up with United kingdom in Jan 2011 and advancing the Redwood function, is to leave the organization. Pratapa Bernard has been hired as the new head of United kingdom xone, confirming to Parisse.

Five staff were employed in Redwood, and the London, uk team is to flourish from 12 to 20 people.

Vodafone has already started out xone angles in Dusseldorf, Milan and Cairo, and on Wednesday the organization released a NZ$50m (£25.2m) analysis function in Christchurch, New Zealand, a increase to small company growth which was set back after quakes broken the city. The workplace will develop between 10 and 20 start-ups at any one time.

Apps already being developed include findxone, a tag that can be connected to purses and purses and baggage to monitor their location, which is on test in the UK. Another, drivexone, joins vehicles to their owners' mobile phones, allowing motorists to find their vehicle in a multistorey carpark; it also lets them determine usage motivated and map places frequented.

A spokesperson said the decision to quit Florida was not connected to last year's sale of Vodafone's 45% in The united state's greatest cell phone network, Verizon wi-fi Wireless, which was the English firm's only share in an working organization on the United states region.

• This article was revised on 3 July 2014. It initially mentioned that Christchurch was the investment of New Zealand. The investment is Wellington. It also wrongly mentioned that Microsof company is located in Redwood, Florida. These mistakes have been fixed.


Recruiting via public networks: perform for the connected, rich, wealthy and savvy

As recruiting shifts to closed networks online, many Americans without easy access or social media skills are at a disadvantage

Social media smes
Organizations are depending on, and even developing, public networking sites, for the reasons of finding and choosing. Photograph: Anatolii Babii / Alamy
Here's an exciting paradox: more managers like to use public networking, like LinkedIn and Tweets to seek the services of. It appears to be great: free, start, launching a extensive net. But here's the catch: what if it boundaries the good tasks to people who have excellent relationships on public networking, rather than just excellent skills?

One thing is indisputable: the job-search process is an unholy technical blunder. With 287,000 People in america currently jobless and currently looking for a job, interviewers are filled with emails; job visitors dig through limitless posts on culturally linked systems like Tweets, LinkedIn, company sites and various other job forums.

“We junk them, they junk us back,” Eileen Bailen, head of abilities purchase at Zappos informed the Walls Road Publication a couple weeks ago. According to him, Zappos employed about 1.5% of the 31,000 candidates whose programs were analyzed in 2013.

And so the impressive online footwear and outfits store has made a strong decision: no more job posts.

Twitter blocked in Turkey following premier's threats
Internet connection, not available at home to many, is progressively becoming a benefit of category as well as a requirement to finding a job. Photograph: Tolga Bozoglu/EPA
That’s right. Zappos has made the decision that to discover the best suitable candidates, it didn’t need heaps and heaps of continues. After all, job results just got in the way of what choosing really was about: developing connections, Stacy Donovan Zapar, who is in cost of Applicant encounter and involvement at Zappos, had written in a publish on LinkedIn.
 
Job posts are a discussion fantastic. A job publishing is that shiny bright item in the space that annoys from the actual discussion and public networking to be had. It's a dead-end street, a choosing dark gap where candidates go to die or keep with a damaging encounter and impact of your organization. They're one-way discussions where your candidates don't really have a speech. They're that painful thumbs protruding as we make this progress back to old-school, relationship-based choosing."

What Zappos does need, according to Zapar, is connections with its prospective workers. A opportunity to get to know each other.

Sounds comfortable and relaxing. Yet it won’t actually be that much of an old-school connections – as much of this connection will take position on Zappos new profession website, where the fascinated candidates will still have to make a information and publish a continue.

The organization will also make use of its “active public social networking existence on Tweets, Facebook or myspace, LinkedIn,Instagram, Pinterest and provides people an within look into lifestyle at Zappos,” Zapar had written in a second publish describing Zappos' new strategy to choosing. The “get to know us” aspect of the procedure is, however, not a need or need.

US money internet phones gadgets
Online and our various gadgets have already penetrated the most individual sides of our lifestyles, such as the bed room. Photograph: Alamy
 If you're over 39, you're moving your sight right about now. As the candidate selection procedure advances to consist of not just customized profession websites and job forums, but also communications on wide range of public networking systems, there are certain census that have a unique benefits – the pc smart millennials.
Who is remaining behind?

By choosing applicants depending on their pc knowledge or their interest for the organization, Zappos isn’t actually doing anything incorrect, says Eric B She, associate in the work and profession team at the Philadelphia-based Dilworth Paxson LLP.

"Ostensibly anyone with a web based access could link with Zappos this way. And Zappos is an internet-based shoes organization, so you really have to be at the very least online smart, I would think, in order to be regarded there," he describes. 

Rittenhouse Square, Philadelphia, Pennsylvania, USA
Rittenhouse Square, Chicago, is among the wealthy segments of a city in which 55% of households lack internet connection. Photograph: Alamy


In Chicago, where he methods, about 82% of individuals had accessibility on the internet in 2013, according to Pew Analysis. Yet, with about 55% of Chicago houses missing accessibility on the internet this year, most Philadelphians likely rely on their mobile phones to stay linked, determined Julia Reyes of Technological.ly Philadelphia.

Furthermore, it would be difficult to confirm elegance against “one specific secured class” of individuals, says She, since nearly everyone has some on the internet connection today, even if not at house.

Everyone has a smartphone now. Everyone can generally get to the world wide web through a smartphone. You can set up a Tweets account on your smartphone. You can set up a Facebook or myspace information on your smartphone. You can tap into a LinkedIn on your smartphone.

It's not as if you are without other means to learn about roles that are being promoted on these public press systems. I discover it difficult to believe that any particular secured category would be deliberately omitted from these job opportunities.”

And while many of these public press systems have a particular market that they entice – for example, LinkedIn draws older users than Tweets – "we all have the ability to sign up" for these solutions, says She.
Technology Adopting by Lower Earnings Areas from Pew Analysis Center's Internet & American Life Project

Not exactly. Accessibility to on the internet is still a category difference.

Overall, about 15% of People in america do not accessibility on the internet at all. Another 15% do go on the internet, but do not have accessibility at house. These numbers get higher as the gains falls, found Pew. About 30% of those creating less than $20,000 a year are not on the internet at all. Another 30% accessibility on the internet outside their house, most often at the collection.

Many of those using collections solutions are using them to implement for tasks. In a 2013 Pew study targeted on collection solutions, 47% of job hunters exposed that collection solutions that help them discover or implement for a job are “very important” to them and their loved ones.

“Employers are moving [online]. Candidates are going to have to evolve. It's not that difficult to ask an candidate to evolve and search for roles through this way, rather than delivering in a continue through send," said She.

Twitter Wall Road flotation Organizations want to get in touch with potential workers without creating eye-contact. Photograph: Kacper Pempel/Reuters

It's also not just a matter of on the internet accessibility. It's a well-known pattern in education that deprived community learners are difficult to recognize and tend to get lost at famous colleges simply because they don't have the advice and public facilities to know where to go.

Those who are middle-class and college-educated, living in city facilities with successful friends, may know the energy of LinkedIn or which companies have their own job forums. That does remove possibly experienced applicants, however, who don't fit that information, such as more experienced workers in their 50s and many who don't have the money or relationships to be smart on public press.

The shift of choosing for experienced tasks to shut public systems especially won't help those in certain income supports, where 10% of the growth in the job industry comes from short-term tasks rather than full-time and the job industry is filled with the spirits of the long-term jobless.

Yet, ask any administrator with the energy to hire people: after years of HR tsunamis, it's difficult to agree to a change from the shift towards smaller, more chosen choosing systems. The frustrating concept is that the progress of choosing will middle around being well-connected. Apply on the internet or stay jobless. Adjust or be left behind.


'Vengeance porn' sufferers get boost from In german courtroom ruling

 'Vengeance porn' sufferers get boost from In german courtroom ruling

Koblenz judge purchases man to remove naked pictures of ex-partner, even though he had proven no objective of posting them

A man checks Facebook on his smartphone
In an previously case a In german judge requested a man to remove romantic pictures of his ex-wife from his Facebook or myspace page. Photograph: Gemstone Samad/AFP/Getty Images

Intimate images should be removed at the end of a connection if one of the associates demands it, a judge in Malaysia has decided.
The judgment by the Koblenz greater local judge has resonated throughout a electronic world wrestling with the balance between independence of appearance and comfort. It was accepted by professionals who said it would encourage sufferers of "revenge porn" to be more practical when looking for the removal of limiting images.

In the case involved, a man from the Lahn-Dill area in Hesse had taken several sexual images of his women associate, to which she had agreed at time. After the end of their connection, the lady had required the removal of the images, looking for legal help when the man rejected.

The Koblenz judge decided in her favor on Wednesday even though her ex-partner had to date proven no objective of recreating the images or putting them on the internet. Approval to use and own independently documented naked images, the judge mentioned, could in this example be removed on the reasons of individual privileges, which are respected greater than the possession privileges of the photographer.

The judge did specify that the lady could only search for the removal of naked or sexual images, not those displaying the several fully dressed. The man may still attraction against the choice.

The judgment has been accepted by both legal professionals and organizations for sufferers of on the internet violence. Michaela Brauburger, who teaches adolescents about accountable use of social networking in Malaysia, informed the Guardian: "Increasingly, adolescents discuss and publish images without giving it much thought. We regularly try to inform area in particular to think about what may happen to romantic images after they are taken. Hopefully this choice will encourage them to bring up the issue with their associates before it is too delayed."

Lawyer Tim Geissler, who specializes in "revenge porn" situations, said that while there were ways in which individuals who had had limiting images of themselves released on the internet could search for their removal, they could only do so after the damage had been done. He mentioned the example of a several from Düsseldorf in their early 30's. She was a part-time design, he was a activity photographer and they liked taking photographs of each other: on vacations, at home, and sometimes in the bed room.

The several separated truly – the man had served strongly towards his spouse and defeated her several times. A few months later, the lady found he had distributed romantic images of her on Facebook or myspace, claiming she had started doing adult launches since their separating.

She desired legal help and gradually a judge requested her ex-husband to remove the images from his Facebook or myspace account. But, Geissler said, had he released the images anonymously, it may have been difficult to get a legal hold on the perpetrator.

By time the sufferer desired legal help, the offence had been dedicated but if the Koblenz judgment were to set a precedent, she could have requested for the images to be removed directly after the separation and divorce.

Viktor Mayer-Schönberger, a lecturer of internet government and control at Oxford School, cautioned against seeing the Koblenz choice as being the immediate result of this month's Western judge of Rights judgment against Google, which some say could help set up a pan-European "right to be forgotten".

"The Koblenz choice was not about information protection but the 'right for one's own image', which is a special development of navigator Western jurisprudence," said Mayer-Schönberger. "But what can be said is that is that these two rulings may make more and more individuals aware of their individual privileges in the electronic area. At the very least, it should embolden upcoming persons who pro-actively want to avoid vengeance adult."

"We can identify a broader pattern here," said Religious Solmecke, a In german attorney who has proved helpful on a number of "revenge porn" situations. "In the long run we may progressively find that images or information whose book was legal at time may have to be removed as conditions change".


Tuesday, 27 May 2014

Battlefield 3 Game Download For Pc Full Version

  • Summary: Battlefield 3: End Game is a digital expansion pack for Battlefield 3 that brings four distinct maps, a new dirt bike, new lightweight AA vehicles, and two classic Battlefield game modes - Capture the Flag and Air Superiority.
End Game is a well-made ending of the DLC cycle for Battlefield 3 that is still fun as hell. Once more it offers four maps, however, this time in the outdoors. Moreover it adds two new modes expanding on its own large variety of things you can do in the game. On top of that it gives you a "nimble" motorbike.

End Game DLC will appeal to fans of battles that feature all kinds of units, where every soldier has a role to play. Capture the Flag makes a return, and even it is sometimes frustrating, it demands the team's cooperation, rewards crazy runs and offers tons of excitement. New maps go well with old game modes, and new vehicles provide variety. All in all, End Game is a worthy closure to BF3's series of add-ons.



Crack and Patch Free Magic ISO Maker - Free Download Softwares

Magic ISO Maker v5.5 Build 281

Magic ISO Maker is a powerful and easy CD/DVD image file edit tool. It can open, create, edit, and extract CD/DVD image files, and convert bin to iso and back. Make image files from CD-ROM or hard disk, and handle bootable information at meanwhile. It also can convert BIN or any other format file created by CD burning software or virtual CD-ROM driver software to standard ISO format. It has the ability to create ISO image file. You can directly add, delete, and rename files or folder in CD image file(s). It can handle up to 10G large sizes so that user can extract, edit, and open DVD image files
in ease.
MagicISO is CD/DVD image utility that can extract, edit, create and burn ISO files. ISO file are images (duplicates) of complete CD/DVD disc. containing exact binary copies of the original CDs. Usually, you have to burn an ISO file on a CD to extract its contents, but now you can simply open an ISO file in MagicISO. It can also convert BIN or any other format file created by CD burning software (Such as Nero-Burning ROM, Easy CD Create) or virtual DVD/CD-ROM driver software (such as Daemon-tools) to standard ISO format. MagicISO has ability to create ISO image file. You can directly add/delete/rename files or folder in CD image file(s) with MagicISO. MagicISO can handle up to 10GB large sizes so that user can extract / edit / open DVD image files in ease.
Features: 

  1. Process almost all CD-ROM image file(s) including ISO and BIN.
  2.  Ability to directly add/delete/rename/extract file(s) within image files.
  3.  Convert image files to the standard ISO format.
  4.  Supports ISO 9660 Level1/2/3 and Joliet extension
  5.  Duplicate disc to ISO file from CD-ROM.
  6.  MagicISO embed with Windows Explorer.
  7.  You can convert almost all image file formats, including BIN, and save it as a standard ISO format file.
  8.  Edit ISO file in many format(such as Nero burning ROM, Easy CD Creator, CDRWin, CloneCD, BlindWrite, etc).
  9.  Select some files or directories, and then create the ISO based on these files.
  10.  Make bootable ISO file.
  11.  Because of its file associations, you can simply double click an ISO file in Windows Explorer to open it.
  12.  Very easy to use interface but powerful enough for an expert.
  13.  Backup CD to your hard disk.


Source: http://www.softwarebbc.com/magic-iso-maker-free-download/