|
||||||
|
||
|
Home > Usa software |
|
|
71. | xFunction for Windows 2.16 (excelsior-usa.com) | ||
The xFunction library is the universal solution for integration of Java code with code written in other languages, superior in many aspects to Java Native Interface (JNI). With xFunction, you no longer need to implement those ugly native methods. Instead, you extend and instantiate xFunction classes to create | |||
Updated: 9, 2005 | Rating: 0 | Size: 176 kb | Shareware Go to category: Web Development > Java & JavaScript Similar programs | |||
72. | Caterpillar 1.00 (vega.math.spbu.ru) | ||
developed in Russia (St. Petersburg, Moscow) and also in UK and USA (under the name of SSA; that is, Singular Spectrum Analysis). The new book "Analysis of Time Series Structure: SSA and Related Techniques", authors are N. Golyandina, V. Nekrutkin and A. Zhigljavsky, provides a careful, lucid description of SSA general theory and methodology (in English, Chapman&Hall/CRC, see | |||
Updated: 3, 2005 | Rating: 42 | Author: Nina Golyandina | Size: 348 kb | Freeware Go to category: Business > Other Similar programs | |||
73. | CaterpillarSSA 3.30 (gistatgroup.com) | ||
developed in Russia (St. Petersburg, Moscow) and also in UK and USA (under the name of SSA; that is, Singular Spectrum Analysis). The new book "Analysis of Time Series Structure: SSA and Related Techniques", authors are N. Golyandina, V. Nekrutkin and A. Zhigljavsky, provides a careful, lucid description of SSA general theory and methodology (in English, Chapman&Hall/CRC, see | |||
Updated: 9, 2005 | Rating: 42 | Author: Nina Golyandina | Size: 840 kb | Shareware Go to category: Education > Mathematics Similar programs | |||
74. | CryptIt 1.301 (SinnerComputing.com) | ||
was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
75. | Polyphonic Ringtone Wizard 4 (polyphonicwizard.com) | ||
and models of phone are supported, on most networks worldwide (the USA Nextel network is not supported at present). Supported manufacturers include Audiovox, Alcatel, Kyocera, LG, Motorola, NEC, Nokia, Panasonic, Sagem, Samsung, Sendo, Sharp, Sony Ericsson and Siemens, with more added every week | |||
Updated: 9, 2005 | Rating: 0 | Author: Coding Workshop | Size: 5153 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
76. | PBX Call Tarifficator Pro 2.1 (dcslab.net) | ||
more than 2500 country and city codes, including detailed codes for USA and most European countries. All data can be easily modified. PBX Call Tarifficator Pro is a call accounting and billing system, which helps you to manage all the telephone traffic via your office switching system. Free | |||
Updated: 9, 2005 | Rating: 0 | Author: Vyacheslav Ogirenko | Size: 710 kb | Demo Go to category: System Utilities > Other Similar programs | |||
77. | Logan's fight 3.00 (yildun.com) | ||
down under superior aliens tehnical power and now the target is USA. Before total destruction of town only two man succeeded to escap and one of them was: LOGAN, PROFESSION: MUJAHADEEN He must go deep in Amazon jungle and find an aliens spacecraft with which can move to motherboard spaceship who is in orbit around the Earth. On this ship Logan need to find an alien leader | |||
Updated: 3, 2006 | Rating: 39 | Author: Samir Alicehajic | Size: 3239 kb | Shareware Go to category: Games & Entertainment > Action Similar programs | |||
78. | SSH client for windows SSHPro 2.9 (labtam-inc.com) | ||
Furthermore, SSHPro has been developed entirely outside of the USA, and can be sold anywhere in the world (apart from places where people aren't allowed to own cryptographic software). Features include: Compatible with SSH protocol version 2 Ciphers: 3DES, IDEA, Blowfish, DES, RC4 Authentication using password Compression support Connection forwarding, including full | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
79. | InterBack 1.80 (interback.net) | ||
can then be encrypted using DES encryption (sales are subject to USA export regulations). The files can then be transfered to any Internet ftp site that the user has an account on.Events are automated to run at any pre-selected time. At the end of the file transfer, the user can be notified by email on the success of the event. InterBack automatically transfers your files off-site to | |||
Updated: 9, 2005 | Rating: 0 | Author: David Councill | Size: 3831 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
80. | SecureWord 1.5 (cezeo.com) | ||
Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends on | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Usa software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|