Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: algorithm
Display: short descriptions | full descriptions
  • Digital Media Doctor works with Digital Cameras and Camcorders, Palm Pilots, MP3 players and more. This utility performs diagnostic tests, using innovative algorithms, to determine device integrity. Benchmark tests, with various read and write modes, are included. Reports on how well the media is functioning are created upon analysis completion. Customize the number of blocks per read, test time length and even fix logical read errors.
  • Recover deleted database with MySQL Recovery. Even if your hard disk is damaged and inaccessible, MySQL Recovery will restore databases in InnoDB and MyISAM formats. Full automatic and manual operating modes help to solve various recovery problems. Smart recovery algorithms fix tables and system information records, extract necessary data from database parts and fill missing structural components with it, to make pieces work as a solid database.
  • NTFS Partition Recovery utility helps to retrieve lost data from NTFS partitions on Windows PC. It supports to rescue deleted or lost documents, photos, compressed files, RAR files, audio files and video files etc. It can easily recover data that is accidentally deleted, damaged or corrupted and formatted. It recovers missing or deleted files from various storage drives such as pen drives, memory cards, flash cards, hard drives and HDD etc. Common scenarios leads to partitions data loses are virus or malware attack, accidental deletion of partitions, formatting errors, third party applications, while resizing partitions, power outages and improper system shutdown etc. You can use this deleted partition recovery software to retrieve back all the data from formatted partitions. Best features in NTFS partition recovery tool are 1) It was recommended by many of the experts to recover missing files on hard drive after formatting or re formatting. 2) It has fastest and secure built in scanning algorithm that wou ...
  • WinBall 2 is the sequel to WinBall, and features 50 new levels. A new twist is the magnesium that randomly changes the trajectory of the ball which is knocked out of bricks for two new added bonuses. In addition, a loss of algorithm bonuses makes the game more interesting. Now the game two modes, normal and complicated with its increased speed and doubling of scores. The simple and intuitive interface remains however, with the configuration and a
  • Notepad for safe storage of records. Store passwords from websites or notes without worrying about their safety. The program uses the most popular and powerful encryption algorithm AES. Securepad is lightweight and can be run from a flash drive. The program works with text files.
  • Notes to Outlook 2013 conversion are quite easy with the proficient conversion software Notes to Outlook Converter. A magnificent conversion tool for NSF to PST files from a renowned company which has global existence since last decade. The product is designed with advance heuristic algorithm which is able to search data from depth of the root. It is designed with GUI effect, in order to provide a solution for technical and non-technical both. You are almost done with conversion process only by clicking on the next button. It is available on the internet, with an affordable price as compare to other available conversion products from different providers. To ensure about the product potential and credibility, try our demo edition or you can take a trial of our trial version which is fully enabled with the functionality as provided with the real product, but it has certain limitation over the storage option, save option is disabled with trial version. So in order to store your data on your preferred location, i ...
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Visual FoxPro applications. Uses the latest 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, key generation from and password phrases. Implements buffer padding and does random byte data generation. Works with 32-bit Visual FoxPro. Win32/Win64
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Visual dBase applications. Uses the latest 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, key generation from and password phrases. Implements buffer padding and does random byte data generation. Works with 32-bit dBASE 7.0, 7.5 and dBASE Plus. Win32/Win64.
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Xbase++ applications. Uses the 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, SHA-256 cryptographic hash algorithm, key generation from text and password phrases. Implements buffer padding and does random byte data generation. Works with 32-bit Xbase++. Win32/Win64.
  • DriverBoost (R) software's unique matching algorithm detects all drivers on your PC and matches them with the latest, most up to date version available. It's guaranteed to find the correct and most updated driver for each and every device driver on your system. After extensive user testing, we've developed a simple user friendly interface which shows you exactly what you need to do to update your drivers in just a few clicks.
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Visual Basic applications. Uses the latest 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, key generation from and password phrases. Implements buffer padding and does random byte data generation. Works with Visual Basic, VB.NET, VBA and PowerBuilder. Win32/Win64.
  • Finds lost password to RAR/WinRAR 3.x-5.x archives. Uses optimized algorithms for maximum performance on Intel and AMD CPUs. Uses GPU computations on modern AMD and NVIDIA video cards supporting ATI Stream and NVIDIA CUDA. Offers effective features for more flexible and high-quality password recovery: automatic password search, a macro language for creating password mutation rules for a dictionary-based attack.
  • Xeno Vault have built in compressor so that you do not have to worry about Disk Space. Xeno Vault Can lock any file of any size on every Devices. Xeno Vault is Small, Light, Fast and does not slow down your PC like other locking software. Xeno Vault uses advance Algorithms so that no one can Seek & Search your Data. Xeno Vault has many Functions & Themes too and they are easy to use. Xeno Vault can hide any file from everyone and encrypt them.
  • Undoubtedly, OST files are very important and any minor or major issue can affect their integrity and make them inaccessible. While working with corrupt, inaccessible or damaged OST file, users come across various error messages. Most of them try Scanost.exe tool to get rid of OST file issues. But, Scanost.exe is much capable to fix all OST file issues. Now, you can try RecoveryFix for OST to PST tool which is much powerful and trustworthy tool to fix all OST file issues and convert OST file to PST. RecoveryFix for OST to PST tool has been developed to repair and recover all OST data items. RecoveryFix for OST to PST tool is equipped with advanced algorithms which help in performing thorough scanning of infected OST file and recover entire OST file data. Just after completing the scanning process, it displays all the recovered OST data items in the tree like structure with preview. You can select any file and easily identify your OST file items. Key features of the tool: Recovers all OST file items lik ...
  • Switching from one email client to another is now very frequently required by individuals, professionals and organizations. Likewise, many Lotus Notes users are looking to migrate their email client to MS Outlook which is more popular and trustworthy email application. Due file incompatibility of NSF and PST to each other, users get fail to perform successful email migration. In fact, use of a reliable NSF to PST converter is necessary for Lotus Notes to Outlook email migration. You can try RecoveryFix for Lotus Notes to Outlook tool which is a powerful and professional NSF to PST converter software available in the market. It simplifies entire NSF to PST conversion process and enables you to perform it in a hassle free environment without any technical assistance. You don?t need any technical knowledge to use this outstanding tool as it is developed with a GUI and easy to use interface. Outstanding features of the tool: * Quick advanced and easy to use NSF to PST converter software * Converts all Lotu ...
  • Exclusive! 64-bit Compression Reduce the size of your setups and download packages by up to 90% with the LZMA compression algorithm and BCJ2 compression pre-processors. Only InstallAware provides advanced compression for Windows Installer setups. New 64-bit compression saves up to 30% more on large setup packages, in addition to your 32-bit compression savings!
  • Provides you a simple way to convert DVD movies to VCD/SVCD (MPEG1, MPEG2), AVI (DivX, MPEG4, xDiv etc.), MP3, WAV formats. The software detects your CPU type and selects the most effective algorithm. You can convert a specific time segment or chapter of DVD if you do not need to convert the whole movie. The flexible options allow to enjoy the excellent resulting quality. And... it is absolutelly free!
  • Get Back Data From is the latest most popular software that helps you to bring back accidentally deleted data from any storage devices. It supports recovering data from different type of storage devices such as hard drives (internal, external), memory cards, external USB drives, flash drives, camcorders, iPods, etc. It has powerful algorithm to find and restore deleted data from deleted partition, formatted hard drives, corrupted flash drives, etc. It is able to restore more than 300 types of file formats including digital RAW images such as photos, audios, video files, documents, compressed files (ZIP and RAR files), spreadsheets, etc. Common scenarios to data loss from your storage devices, 1. By mistakenly data deleted. 2. Accidentally format a disk partition or memory card or any storage device. 3. Virus attacked to your computer or flash drive. 4. Re-partitioning failure leads to data loss. 5. Improper knowledge on changing file system (Ex: FAT to NTFS). 6. Accidentally disk partition deleted on Wi ...
  • Cortex7 enables you to chart and trade bitcoins on various popular bitcoin exchanges. The charts show live prices at 1 minute resolution and you have a variety of technical analysis overlays to choose from. Also includes a live talking ticker with a clock and multiple currency option. Subscribed users can perform in chart trading, the trades appearing right in the chart. They can also tweak, back test and deploy robotic trade algorithms.
  • Modified-CSharp Clustering Algorithm is presented for the purpose of finding clusters of arbitrary shapes and arbitrary densities in high dimensional feature spaces. It can find clusters of varying shapes, sizes and densities; even in the presence of noise.
  • CSHARP Clustering Algorithm is presented for the purpose of finding clusters of arbitrary shapes and arbitrary densities in high dimensional feature spaces. It can find clusters of varying shapes, sizes and densities; even in the presence of noise and outliers and in high dimensional spaces as well. It is based on the idea of letting each data point vote for its K-nearest neighbors and adopting the points with the highest votes as clusters' seed
  • CMune is an enhanced version of Modified Sharp. Specifically, the number of parameters has been reduced from three to only two parameters to reduce the effort needed to select the best parameters. Also new validation indices; as well as new data sets; have been adopted for the purpose of comparing the proposed algorithm with the previous techniques.
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Delphi applications. Uses the latest 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, key generation from and password phrases. Implements buffer padding and does random byte data generation. Works with all 32-bit and 64-bit versions of Delphi (2.0-XE7). Win32/Win64.
  • Passwords Base will keep all your passwords in a secure database, so you only have to remember one single master password. The database is encrypted using the best and most secure encryption algorithms. A user-friendly and intuitive interface makes it easy to manage your passwords.
  • This program retrieves the data from damaged archives and fixes download errors and other issues as well. It is a great way of minimize possible losses during the corruption of compressed files. Recovery Toolbox for RAR is completely different from similar tools and it uses several file repair algorithms to restore the source data from affected documents. Besides, it is cheaper and much faster than other services for RAR repair, try it now.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware