|
||||||
|
||
|
Home > Serial line software |
Related keywords: serial, line, command line, on line, virual serial ports driver, serial streams, fake serial ports driver, emulation serial streams, Serial Port functions, serial port |
|
|
231. | HSLAB Force Down 2.5 (hs-lab.com) | ||
- Accelerate shutdown automatically; - Start shutdown from command line; - Using "Hot Keys"; - Hook and execute a Windows shutdown; - Eject Removable media (if inserted). Also, some different external events can be processed: - Shutdown at selected day and time; - Shutdown when selected file | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Golub | Size: 1666 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
232. | IdentaFone Pro 2.50 (identafone.com) | ||
is a caller identification system that monitors the phone line for incoming calls and offers many ways to keep you informed about your caller's identity. Once the caller information is obtained, this virtual telephone assistant can speak the caller's name through your PC speakers, screen pop the callers name, send the information to a pager or cell phone, submit an | |||
Updated: 9, 2005 | Rating: 35 | Author: IdentaFone Software | Size: 2945 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
233. | Identity Knight 1.3 (fspro.net) | ||
on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature, allowing you to enter your credentials once and let the program do the rest. On the other hand, though, Internet Explorer stores this information in an unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
234. | JvCrypt 1.0 (vandaveer.com) | ||
using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one step. You have the option of creating a single encrypted zip file for each file selected or combining all of your selected files to a | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
235. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
236. | Email Extractor 1.21 (bysoft.se) | ||
Email Extractor is a command line tool that allows you to extract e-mail addresses from any file (Microsoft Word, Microsoft Excel, Outlook Express, executables and so on). The Email Extractor is a command line tool that allows you to extract e-mail addresses from any file (Microsoft Word, Microsoft Excel, Outlook Express, executables and so | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Karlsson | Size: 110 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
237. | ezKEYS 1.0 (hitecharts.com) | ||
left/right of cursor, delete left/right of cursor, select word/line, or normal shift key functions. Runs in the background of applications with text editing. Spacebar functions automatically as both spacebar and shift key. Handy new functions for the shift keys. Works in background of most | |||
Updated: 9, 2005 | Rating: 0 | Author: Warren Furman | Size: 904 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
238. | FastSum 1.9 (fastsum.com) | ||
for easy processing of a huge files count and has usable command-line interface. To make the work easier FastSum MD5 utility for Windows provides special filters, which allow selecting only specific file types. It is an analogue of a famous md5sum software for Unix platform, it is convenient and | |||
Updated: 9, 2005 | Rating: 42 | Author: Kirill Zinov | Size: 424 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
239. | File Recover 4.15d (filerecover.com) | ||
for example by the Shift-Delete function, deleted from the command line, from within an application, deleted from Windows® Explorer or files that are not stored in the Recycle Bin due to large file size. File Recover for Windows® is a non-destructive read-only application and will not write or make | |||
Updated: 9, 2005 | Rating: 83 | Author: Nils Rognerud | Size: 669 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
240. | File Spy 3.0 (soft9000.com) | ||
he had several competitive job offers pending, he exclaimed: "It's not fair, I've worked on my time for them, but they will no longer let me work on their time, for me!" So I wrote File Spy: File Spy allows you to scour your disks and change file time stamps. For example, if you work from 8 AM to 5 PM, you can program File Spy to change the date and time of any files that it | |||
Updated: 9, 2005 | Rating: 0 | Author: R. Nagy | Size: 1484 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Serial line software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|