Now boasting a 100% brighter screen, increased processing power, and faster graphics engine, the Tiger Touch II is the most specified Titan console.
The Avolites Tiger Touch II represents the perfect combination of power and portability. This third-generation console is packed with enough power for complex shows, yet small and light enough to fly in standard hold luggage. The console features SMPTE timecode support and a redesigned button layout to match the entire Titan range.
In order to update the console to version 12 of the Titan, it will be necessary to purchase and install a USB dongle called AVOKEY.
Serial 02006 - 03065
You need to order:
- AVOKEYINT
- 1x5 way to USB-A Cable (spare part code 8000-6102)
Once you've received your AVOKEYINT and 1x5 way to USB-A Cable, you will be required to connect the USB-A Cable to the motherboard. This cable will provide an additional USB port for the AvoKey.
Click here to view the installation guide: https://www.avolites.com/Portals/0/Downloads/Manuals/AvoKey/8000-6102 TT2-2-3K AVOKEY upgrade with 1808-0028.pdf
Serial 03066 - 4020
You need to order only AVOKEYINT
Once you've received your AVOKEYINT, you will be required to connect this directly to the available (Blue) USB port inside the console (on the motherboard).
Click here to view the installation guide: https://www.avolites.com/Portals/0/Downloads/Manuals/AvoKey/8000-6101 TT2 AVOKEY no cable.pdf
Serial 04021 - 05001
You need to order only AVOKEYINT
Once you've received your AVOKEYINT, you will be required to connect this directly to the available (Red) USB port inside the console (on the motherboard).
Serial 5001 and above include a factory fitted AvoKey.
Therefore, you do not need to purchase an AvoKey. Nitro.Pro.13.70.0.30.w64 - XYZ.rar
: The specific version and build of the software. Nitro Pro 13 is a legacy version; the latest stable release as of June 2025 is 14.39.0.18 .
: This is a compressed archive file. The suffix "- XYZ" is often used by third-party distributors, often in the context of "cracked" or unauthorized software versions. Security and Usage Risks
: Versions of Nitro PDF Pro before 13.70.8.82 are known to have Local Privilege Escalation issues in the MSI installer.
: Older versions of Nitro Pro, specifically those prior to the latest patches, have documented vulnerabilities. These include Remote Code Execution (RCE) flaws (e.g., CVE-2020-6074) that could allow attackers to compromise a system if a malicious PDF is opened.
: Nitro has begun deactivating older licenses to encourage users to move to current, secure versions like Nitro PDF Pro 14. Recommended Action
: Indicates the software is designed for 64-bit Windows operating systems.
Using legacy versions or files from unofficial sources carries significant risks:
: Files distributed as .rar archives with custom suffixes like "- XYZ" from non-official sites are frequently bundled with malware, such as trojans or info-stealers.
: The specific version and build of the software. Nitro Pro 13 is a legacy version; the latest stable release as of June 2025 is 14.39.0.18 .
: This is a compressed archive file. The suffix "- XYZ" is often used by third-party distributors, often in the context of "cracked" or unauthorized software versions. Security and Usage Risks
: Versions of Nitro PDF Pro before 13.70.8.82 are known to have Local Privilege Escalation issues in the MSI installer.
: Older versions of Nitro Pro, specifically those prior to the latest patches, have documented vulnerabilities. These include Remote Code Execution (RCE) flaws (e.g., CVE-2020-6074) that could allow attackers to compromise a system if a malicious PDF is opened.
: Nitro has begun deactivating older licenses to encourage users to move to current, secure versions like Nitro PDF Pro 14. Recommended Action
: Indicates the software is designed for 64-bit Windows operating systems.
Using legacy versions or files from unofficial sources carries significant risks:
: Files distributed as .rar archives with custom suffixes like "- XYZ" from non-official sites are frequently bundled with malware, such as trojans or info-stealers.
