|
||||||
|
||
|
Home > Examination software |
|
|
341. | wodSSH.NET 2.1.9.0 (weonlydo.com) | ||
for response, and just disconnect. And all of it fully automated. It's suitable for many environments, such as ASPx. When you're unsure when to send actual command, wodSSH.NET may help also. Using it's unique Prompt property, it can fire event for you whenever remote server sent command | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1076 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
342. | wodSFTP.NET 2.1.1.0 (weonlydo.com) | ||
The Secure File Transfer Protocol provides secure file transfer functionality over any reliable data stream, SSH in this case. It is the standard file transfer protocol for use with the SSH2 protocol. wodSFTP.NET is a dotnet implemenation of client side of this protocol which is reliable and easy to use | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 959 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
343. | wodSFTPdll 3.0.0.0 (weonlydo.com) | ||
***This is win32 dynamic dll library, provided only for VC (and similar) customers that prefer to use win32 dynamic library over ActiveX version. Only limited support is available for this product. Customers using other programming environment should try using ActiveX instead*** The Secure File Transfer | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1187 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
344. | wodTelnetDLX 2.1.8.0 (weonlydo.com) | ||
wodTelnetDLX is a telnet client component ready to connect to various terminal based clients, most commonly to UNIX telnet daemon. Besides supported Telnet protocol, it also supports secured communication (through encryption) using well known SSH (SSH1 and SSH2 are supported), as well as SSL/TLS (Secure | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1850 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
345. | wodSSH 2.3.7.0 (weonlydo.com) | ||
It also supports blocking and non-blocking operations, thus it's suitable for many environments, such as ASP. Using WaitFor and Execute methods, it will behave just like expect command known from UNIX systems. When you're unsure when to send actual command, wodSSH may help also. Using it's unique Prompt property, it can fire event for you whenever remote server sent | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
346. | wodSSHServer 1.3.0.0 (weonlydo.com) | ||
will show you, step by step, how to manually respond to client's actions. You can make an interface that will talk to the clients (like an BBS system), they will enter commands and different type of values in your program where you can evaluate them. This is ideal for making restricted access area | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1368 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
347. | CPUSpy 1.044 (SinnerComputing.com) | ||
Most x86 processors support the CPUID instruction which returns data describing the make and model of the CPU. Later processors also support extended features such as cache details, processor features, design speed and processor name. CPUSpy interrogates your processor and displays this data (if supported) in | |||
Updated: 2, 2006 | Rating: 42 | Author: Andrew Glina | Size: 51 kb | Shareware Go to category: System Utilities > Benchmarking Similar programs | |||
348. | Note Studio for Windows 3.1.1 (dogmelon.com.au) | ||
say you make a note of something - a fact, a figure, anything. Regardless of where it is stored, if that information is not available to you when you absolutely need it, it may as well not exist. Note Studio aims squarely at addressing this issue. It is a powerful note-taking system which brings all your information together in one location. With Note Studio, the priority is on | |||
Updated: 2, 2006 | Rating: 0 | Author: Ant Wiese | Size: 10105 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
349. | Silver Key 3.3 (filecryption.com) | ||
If you need to send sensitive data over the Internet you should encrypt it first. Anybody knows this. Right, but what about the other side? You correspondent will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
350. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Examination software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|