|
||||||
|
||
|
Home > Built in database software |
Related keywords: database, Database, DATABASE, web database, database management, music database, zip code database, Document Database, database utility, free form database |
|
|
191. | CalculatorX 1. 2 (xoyosoft.com) | ||
time. You can use Arithmetic, Logic, Bitwise and Relation operations in your expression. And many system constants and built-in functions can also be used in the expression. CalculatorX even supports the custom variables, custom functions and note-line. You can use Binary, Octal, Decimal and HEXadecimal numbers in one expression to evaluate as well | |||
Updated: 2, 2006 | Rating: 0 | Author: XoYo Li | Size: 1311 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
192. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
social interaction of this century. Many people now rely on chatting in the hopes of finding their soul-mate. Unfortunately, there is no easy way to keep track of your chat partners. Most online chat software includes just the 'politically correct' information about chart partners/buddies | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
193. | Email Audit 3.2 (km-vision.com) | ||
Audit is a powerful add-in utility for Microsoft Outlook 2000/XP/2003.As the new mail arrives,it filters and clusters Spam mails, Junk mails, Bounce mails into their respective folders. The email audit utility comes with a host of built in spam control filters and flexible user defined filters. You can now create Whitelist of email IDs belonging to your friends | |||
Updated: 9, 2005 | Rating: 0 | Author: Shama Hegde | Size: 8172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
194. | EZ Password Secure 1.2 (esmarttools.com) | ||
your passwords and usernames, as well as the URLs and descriptions, in different groups. Further more, EZ Password Secure can store all other personal information, e.g. bank accounts. Built-in Password Generator provides custom passwords. With the 1-Click function, you can paste the username&password to the clipboard, and also launch the associated web site. Key | |||
Updated: 9, 2005 | Rating: 0 | Author: Yunqing Feng | Size: 628 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
195. | Find In Context 2.00 (inetprivacy.com) | ||
In Context shows all relevant fragments of your files together in a single report, where you can read them straight away, and the built-in context viewer allows you to browse through bigger fragments of the original files instantly, without having to open them in other programs. The fast and flexible proximity search algorithm and the file access engine of | |||
Updated: 9, 2005 | Rating: 0 | Author: iNetPrivacy Software | Size: 343 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
196. | DreamCalc Graphing Calculator 3.4.0 (dreamcalc.net) | ||
really feel like you're using a real calculator. Because of this in-built familiarity, you'll find it easy and convenient to use. DreamCalc Supports: Algebraic & RPN Inputs, Function Graphing, Statistics & Statistical Charts, Complex Numbers, Base-n Calculations (inc. 64bit integer & floating point), Conversions & Constants, Date Calculations, Multiple Memories, and | |||
Updated: 2, 2006 | Rating: 133 | Author: See Support Page for Contact | Size: 3276 kb | Shareware Go to category: Business > Math & Scientific Tools Similar programs | |||
197. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios and SNMP | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
198. | Message Pattern Extractor 2.10 (xyz3.com) | ||
input from stored emails (via MAPI) and/or files. It can generate database tables (via ODBC) and/or files. It can be configured to parse emails (header fields, text bodies) or perform transformations on files. MPX can perform a wide variety of tasks because its design recognizes that many transformation tasks (parsing/extraction/conversion/searches etc.) involve the same basic | |||
Updated: 8, 2004 | Rating: 0 | Author: Jim Miller | Size: 1751 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
199. | Kickstart 1.02 (westfaro.com) | ||
you write scripts using a simple Basic like language to generate database objects for every table in a Database schema. For example, you might have developed a robust Oracle stored procedure that inserts rows into a particular database as well as handling security, audit trails and locking. If you want to use that stored procedure as a standard template then you | |||
Updated: 9, 2005 | Rating: 298 | Size: 7069 kb | Commercial Go to category: Development > Other Similar programs | |||
200. | Biz Mail 1.00 (axolot.se) | ||
has e-mail as a part of your daily work. Here are some of Biz Mail's features: * Receive mail from POP3, IMAP or Hotmail accounts. * Full support for formatted (Html) mails. You can view, send receive and reply on formatted mails. * Biz Mail uses standard EML files for storing mails. Each mail is | |||
Updated: 9, 2005 | Rating: 0 | Author: Lars Arvidsson | Size: 4924 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Built in database software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|