Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: I :: identify
Display: short descriptions | full descriptions
  • Treasure - an exciting game in the genre of Match-3. In addition to the beautiful graphics and nice music, you will find three different game modes: Classic - enjoy the game as much as necessary; At the time - enter the maximum number of points in the allotted time; Arcade mode - time decreases, but getting points, it is restored. Of course, in each mode, you set your records, allowing you to identify your target and compete with your friends.
  • The main difference between UnHackMe and other antirootkit software is its detection method. Precise double-checking for a Windows-based PC, which allows identifying and eliminating any types of malicious software. Instant tracking of malicious code in the system. UnHackMe was initially created as anti-rootkit software, but currently it eliminates all types of malicious software: rootkits, Trojans, worms, viruses and so on.
  • Bitrot Detector is a utility that... - Periodically scans your computer's folders (all of them or the ones you select) - Generates fingerprints for each file's contents - Detects changes made to your files since the last scan - Lets you review changed files, and take note of changes that need to be dealt with - Helps you identify and recover from hard-to-notice data loss Bitrot Detector works best as a complement to your backup system of choice.
  • Dont know how to make your site visible in the search engines? Grab SEO PowerSuite: a pack of leading-edge SEO tools that let you quickly get to the top in Google. Identify profitable keywords, optimize your sites content and architecture for higher rankings, learn your competitors backlink secrets, keep track of links to your domain, monitor SE rankings, analyze your traffic & bounce rates, and more! Try it for Free today!
  • PhotoMaster can manage your photos and organize them at one place by creating virtual albums. Tag photos with custom keywords to identify them easily. Smart photo importer of this software lets you import images from anywhere including photos and videos from digital camera and also supports Raw images. you can create photo calendars, collages, photo mixes and a lot more. Make slide-shows with photos and share your files easily through email.
  • Astrallis offers high quality Primary Directions calculations and the auxiliary tools to identify the times at which each particular direction will be effective, namely: Secondary Directions, Progressions, Solar Returns, Transits and Ingresses. All of them calculated in the same way they were taught by Ptolemy and Placidus. Some of the available techniques used by Astrallis are not found elsewhere (i.e. Mundo Rapt Parallels rectifications).
  • Treasure - an exciting game in the genre of Match-3. In addition to the beautiful graphics and nice music, you will find three different game modes: Classic - enjoy the game as much as necessary; At the time - enter the maximum number of points in the allotted time; Arcade mode - time decreases, but getting points, it is restored. Of course, in each mode, you set your records, allowing you to identify your target and compete with your friends.
  • Whenever you face any data loss situation from Mac volumes then do not get panic instead download and install SFWare Partition Recovery Mac software in your Mac system. This recovery tool has the ability to recover data from deleted, lost or formatted data. It is developed with high technology algorithm which will easily restore data without any modification. No matter how severe is your data loss situation, this tool has the ability to sort all issues associated with data stored in Mac volumes. This tool has many inbuilt features that makes very unique tool as compared to others. It can recover data that was emptied from trash without any difficulties. Data can also be found from missing or deleted volumes. This tool has the ability to identify around 300 types of files and recovers it on the basis of its unique signature. It has the capability to recover files from hard drives, memory cards, USB drives and many more. You can also add or edit new signature of files that are not listed. Why SFWare Partitio ...
  • After a fresh install of Windows, there is no internet and no drivers. How can you get the internet connection? No worries! Driver Talent for Network Card is designed to help you in these 'no internet and no drivers' cases. With a big driver library integrated inside, Driver Talent for Network Card will help to download and install network (both wired and wireless network adapters are applied) drivers without internet connection. When you are installing Driver Talent for Network Card, it will scan your computer and identify the network adapter, then install the best-matched driver for the adapter. All major network drivers are included in Driver Talent for Network Card's driver library. Any cases when internet is not available and network card driver is missing, broken or malfunctioning, Driver Talent for Network Card is your best helper. After the installation, the interface and all other features is the same as Driver Talent, the popular driver updater and management s ...
  • ProbeIT is a comparison tool to help you diagnose the issues related to missing setup, wrong version of program files or database objects discrepancies. It takes only few minutes to setup & execute, otherwise even few days are not enough to identify the issues to fix.
  • Auditing device configurations against a secure standard like the DISA STIGs is a critical defense against cyberattacks. The SecureVue STIG Profiler automates the profiling of devices on a network in preparation for a DISA STIG audit. Using the STIG Profiler, an IA Manager can quickly identify all of the nodes on the network, scan the devices for detailed asset information and generate a report.
  • Easy Video Logo Remover is a simple tool that enables you to improve the image in a video file, by removing watermark insertions, such as logos, signatures or subtitles. The software allows you to clear the image, in order to enjoy watching the video/movie without being distracted by the logo on the screen. Video Logo Remover is small, lightweight and user-friendly. All you need to do is load the video file into the program, then select the area where the logo is placed. You may preview the frames in the video, by moving the playback slider to the desired moment. This action can help you identify the mark you wish to remove from the image, for example.
  • Lighty is the ideal tool to monitor the performance of your Oracle databases. Save time by quickly identifying problems with these many modules : Activity viewer based on ASH or L-ASH, reports, real time monitoring , awr browser, statspack browser, and much more…
  • SterJo Wireless Network Scanner is a small tool that scans your network in a few seconds and displays a list of all connected computers or devices. It also could detect a mobile or any other portable device that is already connected to your network. For each device it will show the IP address, Host name, MAC address and it will identify your router and local computer. This is a very useful utility if you suspect that some of your neighbours are connected to your network without your permission.
  • Everything starts with the inventory of installed software. Only if you know for sure what is really installed in your network, you can reach legal certainty. The process of inventory discovery begins with the search for computers. Only the Lan-Inspector combines various mechanisms in order to reach for even the most distant computer of your company.The Lan-Inspector supports your work by identifying software via Registry and file signatures.
  • The Multiple Regression Analysis and Forecasting model provides confidence in identifying value drivers and forecasting business plan and scientific data. While it utilizes a range of commonly employed statistical measures to test the validity of the analysis, results are summarized in text for ease of use. Once relationships have been identified, forecasting can be accomplished based on a range of available methodologies.
  • Quickly and easily generate detailed reports on all of your file links using Link Reporter! Create detailed reports including: 1) Regular Reports -- Do you know how many links are in your files? Do you know what files they point to? Do you know how many of the links within the files are working or are broken? Find out using Link Reporter?s Regular Report! Easily create detailed reports which list each selected "parent" file followed by a list of the links contained within the files, and each of the "child" files that the links point to. Each link is automatically validated to determine if it is working properly or if it is broken. 2) Broken Link Reports -- Do you know which of your files have links that are not working? Do you know how many of these broken links are in your files? Find out using Link Reporter?s Broken Link Report! Easily create detailed reports which lists selected "parent" files followed by a list of any broken links contained wi ...
  • An easy to view graphical representation of fragmentation levels across your SQL Servers shows index type, fragmentation percentages, size and fill-factor so users can spot immediately what given area needs attention. An easy to view graphical representation of fragmentation levels across your SQL Servers shows index type, fragmentation percentages, size and fill-factor so users can spot immediately what given area needs attention.
  • Undoubtedly, OST files are very important and any minor or major issue can affect their integrity and make them inaccessible. While working with corrupt, inaccessible or damaged OST file, users come across various error messages. Most of them try Scanost.exe tool to get rid of OST file issues. But, Scanost.exe is much capable to fix all OST file issues. Now, you can try RecoveryFix for OST to PST tool which is much powerful and trustworthy tool to fix all OST file issues and convert OST file to PST. RecoveryFix for OST to PST tool has been developed to repair and recover all OST data items. RecoveryFix for OST to PST tool is equipped with advanced algorithms which help in performing thorough scanning of infected OST file and recover entire OST file data. Just after completing the scanning process, it displays all the recovered OST data items in the tree like structure with preview. You can select any file and easily identify your OST file items. Key features of the tool: Recovers all OST file items lik ...
  • Free report on invalid CTL-ITL files. Free fully working part of UPLINX Remote Phone Control Tool for Cisco Unified Communications. Identify not valid ITL files on phones which causes issues and erase these invalid CTL files efficiently. For Cisco deployment or support engineers. Phone Control Tool also includes: Bulk Extension Mobility (Cisco Device Profile) login/logout, background images, Erase CTL files.
  • 3D Face Recognition System V 4.3: A Hypride And Effective Source Code For 3D Face Recognition System (Last Update).This method uses 3-D sensors to capture information about the shape of a face. This information is then used to identify distinctive features on the face, such as the contour of eye sockets, nose and chin. The advantages of 3-D facial recognition are that it is not affected by changes in lighting, and it can identify a face
  • Ax3soft Sax2 is a professional intrusion detection and prevention software (NIDS) used to detect intrusion and attacks, analyze and manage your network which excels at real-time packet capture, 24/7 network monitor, advanced protocol analysis and automatic expert detection. With insight into all operations in your network, Sax2 makes it easy to isolate and solve your network security problems - detect network vulnerabilities, identify network security threats, catch actions against of security strategy and signs of been attacked. Finally, intercept and stop these connections. Sax2 offers many kinds of intrusion analysis reports, such as events, type, source address and destination address of attacks, and many crossover reports and compositive reports. Furthermore, sax2 allows customize the time range which administrator will flexible monitor and evaluate the network security. Sax2, enhanced detection, analysis, response and management features, supports almost all common used protocols, self-conta ...
  • Ax3soft Scout process activity monitor is a professional monitoring tool for Windows, it can monitor a process all-sidedly in real time, including process/thread, file system, Registry and network activity whit its powerful features. To create a detail report for process, Ax3soft Scout makes it easy to find and solve your computer problems, e.g. malware, troubleshooting. Key Features Real-time monitor and analyze Ax3soft Scout can monitor process/thread, file system, Registry and network activity (includes: IP, ICMP, TCP and UDP conversations, HTTP visit, Email transfer and FTP transfer) real-time and analyze these activities to identify security threats with different colors. Detail reports Ax3soft Scout can analyze numerous activities to create a detail report for process, the report?s content is very clear, it includes all the threats found and some key activities events. You can find and solve computer problems quickly and easily with the report, even if you don?t have extensive computer knowled ...
  • HTC Android Recovery is the safest and secure application, which is specially designed to recover data from Android phones. This application is mostly preferred by experienced industry experts and satisfied users because it scans both the internal and external phone memory. By which this tool is capable to identify lost or deleted files, including Android application package files (APK), and regain them for reuse. This fast and effective software is capable to take a preview of all recoverable files such as video, image, music files including .apk files. However, this tool has ability to scans SD cards and creates SD card replica image files to perform recovery at a later stage. Apart from it this application retrieves data from improperly mounted SD cards and corrupt file systems also. One of the important features of this tool is that it allows users to create recovery session that can be used to minimize the recovery process for the next time and after that to take preview of files that are to be recovered ...
  • SECURECY Anti-Virus with Internet Security is a Complete Anti-Virus Security System that can check ALL files within your computer system in real time detecting viruses and other malicious programs. SECURECY can also ensure a safe work environment, filter and check ALL email messages for viruses, provide you with three types of scanning and identify new viruses with our Heuristic Analyzer.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10

Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware