|
||||||
|
||
|
Home > Identify software |
|
|
231. | JumpKeys Pro 1.21 (brucegraham.net) | ||
key, Windows key, or even with the numbers alone. Tagged windows are identified based on full or partial title. Repeating the same window selection hot key (e.g. Alt+1) will cycle through multiple instances of a tagged window. Also, you can assign a hot key to minimize windows, and assign a hot key to | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruce Graham | Size: 2418 kb | Shareware Go to category: Development > Basic / VB / VB DotNet Similar programs | |||
232. | Language Identifier 1.5 (lextek.com) | ||
Language Identifier is capable of automatically identifying that language that a document is written in. Supporting over 260 different languages and encoding modules, the Lextek Language Identifier is capable of recognizing more languages and more character encodings than any other language identifier available by a large margin. Furthermore, new languages and | |||
Updated: 9, 2005 | Rating: 0 | Size: 2148 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
233. | DWG2PDF PDF Converter 3.0 (webtech360.com) | ||
displays a file tree showing the contents of the users computer; identification of selected files by name, size, type, date, and time; and conversion radio button and checkbox selections. Select files for a variety of situations Create a single merged PDF file from several DWG files or create an individual PDF file for each DWG file selected. Users can select all files from the | |||
Updated: 9, 2005 | Rating: 16 | Author: Jeff Lin | Size: 11737 kb | Demo Go to category: System Utilities > Other Similar programs | |||
234. | Find Protected 2.0 (aks-labs.com) | ||
organizations. Find Protected was designed to search for and identify password protected files. With version 2.0 you can search for the following files: 1) Popular password protected archives, such as zip and rar. 2) Microsoft Office documents, including Word, Excel and Access files. 3) Secure file stores, such as PGP disk. Use Find Protected to inspect local or remote | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
235. | Fast Cleaner Gold 1.61 (eshinesoft.com) | ||
Disk Cleanup and Online Privacy Cleanup 3.Engine Technology to identify garbage files and ignore important files 4.Supervise your kids by using Clean Assistant to list up the websites they have browsed 5.Scan and clean up Internet Cache,Cookies,History to Protect Your Internet Privacy Awarded 5 | |||
Updated: 9, 2005 | Rating: 0 | Author: Haitao Zhao | Size: 2312 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
236. | FingerPoint 1.4 (neurotechnologija.com) | ||
is an end user software package for person identification using his/her fingerprints as a unique ID. The system has integrated support for DigitalPersona U.are.U fingerprint scanners, and is intended for application in enterprises where frequent and reliable check-ups of personal identity are needed. It allows to avoid using of paper documents or magnetic cards, which can be | |||
Updated: 9, 2005 | Rating: 16 | Size: 8012 kb | Demo Go to category: System Utilities > Other Similar programs | |||
237. | ConversionTool 4.2.2 (keper.com) | ||
converts everything it can automatically. All remaining items are identified, the problem is shown clearly to the user, and an interactive mechanism is provided. If, for example, a record could not be inserted due to a constraint violation (a wrongfully inserted date like 1/1/199), this insert instruction is logged in a separate error log, and can be edited and executed. When a | |||
Updated: 9, 2005 | Rating: 6616 | Author: Burkhard Lau | Size: 3151 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
238. | DIRlist 2.6 (WindowsUtilities.com) | ||
descriptions of files and subdirectories. It can be difficult to identify a files purpose and content with just the filename, especially when the file is old or shared between users. DIRlist provides free text descriptions to supplement the file name for project documentation, instruction manuals, and general identification of directory contents. Files and subdirectories are | |||
Updated: 9, 2005 | Rating: 42 | Author: Frank Snyder | Size: 1597 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
239. | Alparysoft VideoLock for Webcam 1.0 (bestsoftorder.com) | ||
surveillance security system based on the webcam aided facial image identification technology adapted for PC use. The product is designed to protect your computer and space around from unauthorized access and inform computer owner about the events happening at the workplace or home during his/her | |||
Updated: 9, 2005 | Rating: 0 | Author: Alparysoft R&D | Size: 1272 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
240. | AnswerMyPhone 2.7 (pppindia.com) | ||
oldest last. Extra settings for configuring BAD modems that cannot identify proper disconnect tone. AnswerMyPhone lets you use your PC as an Answering Machine for your telephone. It supports multiple voice mail box and creation of simple IVR. Records all incoming calls in real time, stores them as wave files for voicemail access & notify via | |||
Updated: 9, 2005 | Rating: 357 | Author: Parameshwar Babu | Size: 1190 kb | Shareware Go to category: Communications > Telephony Similar programs | |||
|
Home > Identify software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|