Localization versions
5 Star Feedback
All Time Download
Countries
The SurPad 4.2 is designed for assisting professionals to work efficiently for all types of land surveying and road engineering projects in the field. By utilizing the SurPad app on your Android smartphone or tablet, you can access a comprehensive range of professional-grade features for your GNSS receiver without the need for costly controllers.
The SurPad 4.2 is a powerful software for data collection. Its versatile design and powerful functions allow you to complete almost any surveying task quickly and easily. You can choose the display style you prefer, including list, grid, and customized style. SurPad 4.2 provides easy operation with graphic interaction including COGO calculation, QR code scanning, FTP transmission etc. SurPAD 4.2 has localizations in English, Ukrainian, Portuguese, Polish, Spanish, Turkish, Russian, Italian, Magyar, Swedish, Serbian, Greek, French, Bulgarian, Slovak, German, Finnish, Lithuanian, Czech, Norsk, Simplified Chinese, Traditional Chinese, Korean, Japanese, Vietnamese.
Download and Install in 2 clicks
Get the latest version of SurPad 4.2
Quick connection
Can connect to GNSS by Bluetooth & WiFi. Can search and connect the device automatically, using wireless connections.
Better visualization
Supports online and offline layers with DXF, SHP, DWG and XML files. The CAD function allows you to draw graphics directly in field work.
Quick Calculations
It has a complete professional road design and stakeout feature, so you can calculate complex road stakeout data easily.
Better Perception
Important operations is accompanied by voice alerts: instrument connection, fixed GPS positioning solution and stakeout.
: Permanently delete the file from your system and empty the trash/recycle bin.
: If the file was executed, it is highly recommended to change all sensitive passwords (email, banking, and work accounts) from a different, uninfected device. gästebuch : zeilen von dir - tanja-in-benins Jimdo-Page!
: Use an updated antivirus or EDR (Endpoint Detection and Response) tool to perform a full system scan, specifically looking for recent unauthorized registry changes or outgoing network connections to unknown IPs.
: Upon execution, similar malware in this category typically attempts to: Exfiltrate browser credentials and cookies. Install backdoors for remote access. Deploy ransomware or crypto-miners. Security Recommendations
: Likely contains disguised executables ( .exe , .scr , or .lnk files) that masquerade as video files or game installers.
: If you have downloaded this file, do not extract its contents.
: Security researchers categorize filenames of this nature as typical for trojans or infostealers . These files are designed to appear as desirable media content but contain executable scripts or programs that compromise the user's system upon extraction.
: The naming convention targets specific niches (interactive adult media/simulators) to exploit the privacy concerns of users, making them less likely to report the file or seek official support when their system is infected. Technical Assessment Format : ZIP archive.
: Permanently delete the file from your system and empty the trash/recycle bin.
: If the file was executed, it is highly recommended to change all sensitive passwords (email, banking, and work accounts) from a different, uninfected device. gästebuch : zeilen von dir - tanja-in-benins Jimdo-Page!
: Use an updated antivirus or EDR (Endpoint Detection and Response) tool to perform a full system scan, specifically looking for recent unauthorized registry changes or outgoing network connections to unknown IPs.
: Upon execution, similar malware in this category typically attempts to: Exfiltrate browser credentials and cookies. Install backdoors for remote access. Deploy ransomware or crypto-miners. Security Recommendations
: Likely contains disguised executables ( .exe , .scr , or .lnk files) that masquerade as video files or game installers.
: If you have downloaded this file, do not extract its contents.
: Security researchers categorize filenames of this nature as typical for trojans or infostealers . These files are designed to appear as desirable media content but contain executable scripts or programs that compromise the user's system upon extraction.
: The naming convention targets specific niches (interactive adult media/simulators) to exploit the privacy concerns of users, making them less likely to report the file or seek official support when their system is infected. Technical Assessment Format : ZIP archive.