|
||||||
|
||
|
Home > Crosswords software |
Related keywords: create crosswords, free crosswords puzzle |
|
|
621. | NN50.DLL 5.0 (rgsoftware.com) | ||
by the advent of large scale computers in the late 1950's. Conventional computers rely on programs that solve a problem using a pre-determined series of steps, called algorithms. These programs are controlled by a single, complex central processing unit, and store information at specific locations in memory. Artificial Neural Networks use highly distributed representations | |||
Updated: 9, 2005 | Rating: 42 | Author: Richard Gardner | Size: 50000 kb | Demo Go to category: Development > Other Similar programs | |||
622. | psSendMail 1.1 (prestwood.com) | ||
psSendMail™ is a Windows™ DLL that provides the ability to send e-mail messages. The purpose of this DLL is to make e-mail capability possible for those development environments that are capable of communicating with a DLL but cannot send e-mail directly. There are two interfaces to the DLL. The first | |||
Updated: 9, 2005 | Rating: 0 | Author: Mike Prestwood | Size: 1077 kb | Demo Go to category: Development > Other Similar programs | |||
623. | Serial Port Monitor 1.1.1.1 (retisoft.com) | ||
Captures and displays time-tagged text and binary data across a PC serial port, from COM1 to COM12. Supports simultaneous capture to screen, with optional output to file and printer. Display & file/printer capture in three modes: single character, line (terminated by LF or CR), or string (terminated by | |||
Updated: 9, 2005 | Rating: 280 | Author: John Ellis | Size: 3573 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
624. | SignetSure 1.0 (SignetSure.com) | ||
to your subscribers. You have installed a program on the subscriber's machine that receives your files. This program must be able to authenticate files even against a hacker who has reverse-engineered your program. Scenario Two: You distribute registered software with a datafile that identifies | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Serwer | Size: 696 kb | Shareware Go to category: Development > Delphi Similar programs | |||
625. | HTTP Interceptor 1.4M (siliconwold.com) | ||
A pseudo Proxy server that lets you see the two way communication between your browser and the Internet. See Cookies being sent and received - control whether they get sent or not. See what the JavaScript on a web page is actually doing. Browse anonymously by withholding your Referer tag, and user agent | |||
Updated: 9, 2005 | Rating: 51 | Author: Silicon Wold | Size: 357 kb | Shareware Go to category: Development > Other Similar programs | |||
626. | Alkonost ContraCopy 3.00 (contracopy.com) | ||
Alkonost ContraCopy is a professional software system, that can create diskettes for a copy protected software distribution. It is a tool for programmers for C, C++, VB.NET, Visual Basic, Borland Delphi and C++ Builder. Alkonost ContraCopy enables you to prepare key diskettes using an ordinary 1.44 MB floppy No other hardware or software can make correct copies of ContraCopy diskettes, which can be used under Windows 95/98/Me/NT/2k/XP/2003 | |||
Updated: 9, 2005 | Rating: 36 | Author: Alexander Turin | Size: 1060 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
627. | Aurigma Graphics Mill 2.0 (aurigma.com) | ||
Graphics Mill 2.0 is a "must have" imaging component. It supplies the most important features: load/save popular formats, apply effects, draw text/shapes, use color management, etc. It provides a solid basis to build professional imaging software. When other imaging component vendors left ActiveX platform | |||
Updated: 9, 2005 | Rating: 16 | Author: Fedor Skvortsov | Size: 5386 kb | Shareware Go to category: Development > Other Similar programs | |||
628. | Chilkat Create Self-Extracting EXE from Zip 8.1.0 (zip-compression.com) | ||
is regarded by security experts as being unsecure. Chilkat's streaming compression and encryption technology allows the ChilkatZip Self-Extractor to create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your end-user's computer, even if that computer has very little | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 300 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
629. | SQL Toast 2.0 (aidsoft.com) | ||
SQL Toast is a development tool that provides a complete development environment written to work with Sybase Adaptive Sever. Everything is contained in one executable that can be installed in any directory on the client machine. The only requirement is the user must have Sybase client software installed. SQL | |||
Updated: 9, 2005 | Rating: 48 | Author: Rodney Moore | Size: 1440 kb Go to category: Home & Hobby > Personal Finance Similar programs | |||
630. | The Patentstein Browser 1.3.0.1 (patent.info) | ||
and manage online patent information, thereby increasing a company's return on its intellectual property | |||
Updated: 9, 2005 | Rating: 0 | Author: John Moetteli | Size: 3358 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
|
Home > Crosswords software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|