|
||||||
|
||
|
Home > Portraits software |
Related keywords: enhancing portraits |
|
|
511. | EasyMap VCL 2.2 (microolap.com) | ||
EasyMap VCL is a Delphi/C++Builder components set for creating your own GIS-related solutions without MapInfo, MapX, MapObjects, WinGIS and so on. EasyMap VCL allows to add following functionalities in Delphi/C++Builder application: - MIF/MID vector maps displaying in Longitude/Lantitude projection; | |||
Updated: 9, 2005 | Rating: 0 | Author: microOLAP Technologies | Size: 2358 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
512. | EasySec Firewall SDK 1.10b (effectmatrix.com) | ||
EasySec Firewall SDK is a professional software kit for developing network firewall, sniffer or analyzer applications for Microsoft Windows. Simple APIs of EasySec Firewall SDK include powerful functions: Double layer packet filter (application layer and kernel layer) can manage and control data packets of | |||
Updated: 9, 2005 | Rating: 48 | Author: Hanse wu | Size: 1055 kb | Shareware Go to category: Development > Other Similar programs | |||
513. | Engineers Edition 3.2 (solarwinds.net) | ||
The Engineers Edition contains 36 Network Discovery, Monitoring and Management tools. Build a DB of your network with NETWORK SONAR, or use IP NETWORK BROWSER to quickly discover an entire subnet. With the NETWORK PERFORMANCE MONITOR you can not only monitor traffic and bandwidth utilization but set alert | |||
Updated: 9, 2005 | Rating: 82 | Author: Doug Rogers | Size: 51286 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
514. | Inactive Shut Down Control for MS Access 2.0 (peterssoftware.com) | ||
Inactive Shut Down Control is a hidden MS Access form that can be opened in your application to keep track of periods of user inactivity. When the period of inactivity exceeds a specified limit, a warning message appears, and the application shuts down. It is easy to use, just import a form into your | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 347 kb | Freeware Go to category: Development > Other Similar programs | |||
515. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type versions of your MS Access application where some functionality is locked and is only unlocked when the user enters a valid key. When using the Installation Serial Number and Unlock Code | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
516. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
certain controls, filter certain records, all based on a user’s assigned Security Level. LASsie includes a friendly user sign-on form that prompts for a login user name and password. Users can change their own passwords via the included "change password" form. Optionally, the sign-on form can be bypassed and the user's network login username can be used. Once the user | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
517. | CRC .NET control 5.0 (home.peterstar.ru) | ||
CRC .NET control is the checksum library for .NET developers.The library, especially written on .NET framework, provides exact and fast calculations of checksums. The library has an easy to use interface, fast and reliable infrastructure and provides calculation of CRC32, CRC16 and CRC8 polynomial checksums | |||
Updated: 9, 2005 | Rating: 656 | Author: Andrey Khrenov | Size: 99 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
518. | cryptlib 3.0 (download.componentspot.com) | ||
MD4, MD5 · RIPEMD-160 · SHA It offers services such as: · S/MIME · SSL/TLS · ssh It features various hashed message authentication code algorithms: · HMAC-MD5, HMAC-SHA, HMAC-RIPEMD-160 Finally, asymmetric (public/private key) encryption algorithms such as the following are | |||
Updated: 9, 2005 | Rating: 0 | Author: ComponentSpot | Size: 1347 kb | Freeware Go to category: Development > Active X Similar programs | |||
519. | Cub Editor for MS Access 2000 2002 and 2003 2000.2.2 (peterssoftware.com) | ||
Editor looks and behaves like the MS Access report wizard, only it’s better because it gives you more control over the report formatting process, and because it allows you to change the layout of existing reports. Inserting a field into a report with Cub Editor is a simple matter of dragging and dropping a field name from one list box to another. Cub Editor adds the appropriate | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 518 kb | Shareware Go to category: Development > Other Similar programs | |||
520. | Cub Editor for MS Access 97 97.20 (peterssoftware.com) | ||
Editor looks and behaves like the MS Access report wizard, only it’s better because it gives you more control over the report formatting process, and because it allows you to change the layout of existing reports. Inserting a field into a report with Cub Editor is a simple matter of dragging and dropping a field name from one list box to another. Cub Editor adds the appropriate | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 595 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Portraits software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|