|
||||||
|
||
|
Home > Detecting software |
Related keywords: metal detecting software |
|
|
81. | Form1 Builder Software 30 (softswot.com) | ||
Auto Responder feature. Handles user Cookies and Variables. Detects Required variables. Includes email validity checks. Capacity to include an Email Copy. Processes all form fields automatically. From Email can be set as Form User in the form delivery email enabling email reply function. Verification Code can be automatically added to the form delivery email and used with an | |||
Updated: 2, 2006 | Rating: 0 | Author: David Morcom | Size: 104 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
82. | GPS.NET 2.1.3 (gpsdotnet.com) | ||
1.0 & 2.0! Automatically discovers GPS devices NEW: Automatically detects sudden loss of data due to power loss, suspend/resume, or out-of-range devices! Includes GPS Device Emulation framework for build your own virtual GPS devices! Open plug-in architecture provides easy support for future GPS data protocols. Automatically converts coordinates from latitude/longitude to UTM | |||
Updated: 2, 2006 | Rating: 45 | Author: Jon Person | Size: 4755 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
83. | GVH Logging and Debug Library 3.0 (gvh-maatwerk.nl) | ||
the debug info REAL-TIME to a scrollable window. Suspend/resume, detect memory leaks, log function-call stack, disable/enable all logging or specific types from any point in your app, hex-dumps, more than one log file, system-generated error messages, exact #CPU-cycles between a function's entry | |||
Updated: 3, 2005 | Rating: 0 | Author: Eric Goldstein | Size: 77 kb | Demo Go to category: Development > Debugging Similar programs | |||
84. | ICE License 2.01 (aidsoft.com) | ||
LAN Control Protection by TCP/IP Protocol (in Trial or Full Mode) - Detects backdating or demo reinstallation to gain additional usageICE License Protection can help you prevent key generator. ICE License Protection is providing a high barrier against illegal copy using the power of Elliptic Curvesl Asymmetric Encryption to protect your application. Elliptic Curves encryption system | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 439 kb | Shareware Go to category: Development > Delphi Similar programs | |||
85. | JCavaj Java Decompiler 1.10 (bysoft.se) | ||
JCavaj Java Decompiler is a free Java-based Java Decompiler. It reconstructs the original source code from a compiled binary CLASS file. You can decompile java applets, jar and zip files producing accurate java source code. JCavaj runs on any platform with Java Runtime Environment 1.4 or higher installed | |||
Updated: 9, 2005 | Rating: 15727 | Author: Roger Karlsson | Size: 800 kb | Freeware Go to category: Web Development > Java & JavaScript Similar programs | |||
86. | JEXECreator 1.9 (ucware.com) | ||
Create a native Windows EXE to launch your Java application! The native launcher finds a suitable Javaâ„¢ Runtime Environment and starts your Java application using the found JRE. JEXECreator features: Java Runtime Environment auto detection, Errors handling, Fully localizable messages of the executable | |||
Updated: 9, 2005 | Rating: 0 | Author: Artem Kuroptev | Size: 1316 kb | Shareware Go to category: Development > Other Similar programs | |||
87. | NetConnect OCX 1 (april-16.co.uk) | ||
etc via the internet. The NetConnect OCX does the following: Detects whether an internet connection is available. Opens the default internet connection as the user default settings. Opens the default internet connection overriding the user default settings. Closes the default internet connection. Detects whether and reports when a connection to the internet is made | |||
Updated: 9, 2005 | Rating: 0 | Author: April16 | Size: 10 kb | Shareware Go to category: Development > Active X Similar programs | |||
88. | NSNetworkToolsXP 3.0 (nightshift.co.za) | ||
ComptSoft's WakeupOnLan wil provide you with the right tools for detecting the MAC and the IP address. After the boot process completed you can detect and identify open ports, trace the route to the machine, etc. You will also be able to manupulate a remote machine's print queue, services, processes, shares, etc. A program designed for the LAN / WAN that can wake up remote | |||
Updated: 3, 2005 | Rating: 236 | Size: 5222 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
89. | OpenSSL 0.9.7c (download.componentspot.com) | ||
can be implemented: · Data integrity: An application can detect if data has been modified during transmission. · Authenticity: An application can verify the identity of the sender using certificates. · Privacy: An application can ensure that no intermediary between the sender and the recipient can understand the data. Transport Layer Security is an extension of SSL. It | |||
Updated: 9, 2005 | Rating: 0 | Author: Component Spot | Size: 2879 kb | Freeware Go to category: Development > C / C++ / C-sharp Similar programs | |||
90. | PBBalloon 1.7 (aidsoft.com) | ||
to display icons in the System Tray, that includes the ability to detect the Icon position in the Screen, and if the icon it's Hidden under Windows XP+. PBTray Integrates with PBBalloon to display Balloons over the System Tray Icons!.Download it now to see how easy is to create Balloons Messages using PBBalloon! If you want to add a Professional Style to your Application without the | |||
Updated: 9, 2005 | Rating: 0 | Author: Pablo Barvo | Size: 1933 kb | Shareware Go to category: Development > Active X Similar programs | |||
|
Home > Detecting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|