Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: I :: identify
Display: short descriptions | full descriptions
  • ProbeIT is a comparison tool to help you diagnose the issues related to missing setup, wrong version of program files or database objects discrepancies. It takes only few minutes to setup & execute, otherwise even few days are not enough to identify the issues to fix.
  • Treasure - an exciting game in the genre of Match-3. In addition to the beautiful graphics and nice music, you will find three different game modes: Classic - enjoy the game as much as necessary; At the time - enter the maximum number of points in the allotted time; Arcade mode - time decreases, but getting points, it is restored. Of course, in each mode, you set your records, allowing you to identify your target and compete with your friends.
  • The main difference between UnHackMe and other antirootkit software is its detection method. Precise double-checking for a Windows-based PC, which allows identifying and eliminating any types of malicious software. Instant tracking of malicious code in the system. UnHackMe was initially created as anti-rootkit software, but currently it eliminates all types of malicious software: rootkits, Trojans, worms, viruses and so on.
  • Auditing device configurations against a secure standard like the DISA STIGs is a critical defense against cyberattacks. The SecureVue STIG Profiler automates the profiling of devices on a network in preparation for a DISA STIG audit. Using the STIG Profiler, an IA Manager can quickly identify all of the nodes on the network, scan the devices for detailed asset information and generate a report.
  • Easy Video Logo Remover is a simple tool that enables you to improve the image in a video file, by removing watermark insertions, such as logos, signatures or subtitles. The software allows you to clear the image, in order to enjoy watching the video/movie without being distracted by the logo on the screen. Video Logo Remover is small, lightweight and user-friendly. All you need to do is load the video file into the program, then select the area where the logo is placed. You may preview the frames in the video, by moving the playback slider to the desired moment. This action can help you identify the mark you wish to remove from the image, for example.
  • Lighty is the ideal tool to monitor the performance of your Oracle databases. Save time by quickly identifying problems with these many modules : Activity viewer based on ASH or L-ASH, reports, real time monitoring , awr browser, statspack browser, and much more…
  • Treasure - an exciting game in the genre of Match-3. In addition to the beautiful graphics and nice music, you will find three different game modes: Classic - enjoy the game as much as necessary; At the time - enter the maximum number of points in the allotted time; Arcade mode - time decreases, but getting points, it is restored. Of course, in each mode, you set your records, allowing you to identify your target and compete with your friends.
  • SterJo Wireless Network Scanner is a small tool that scans your network in a few seconds and displays a list of all connected computers or devices. It also could detect a mobile or any other portable device that is already connected to your network. For each device it will show the IP address, Host name, MAC address and it will identify your router and local computer. This is a very useful utility if you suspect that some of your neighbours are connected to your network without your permission.
  • Everything starts with the inventory of installed software. Only if you know for sure what is really installed in your network, you can reach legal certainty. The process of inventory discovery begins with the search for computers. Only the Lan-Inspector combines various mechanisms in order to reach for even the most distant computer of your company.The Lan-Inspector supports your work by identifying software via Registry and file signatures.
  • The Multiple Regression Analysis and Forecasting model provides confidence in identifying value drivers and forecasting business plan and scientific data. While it utilizes a range of commonly employed statistical measures to test the validity of the analysis, results are summarized in text for ease of use. Once relationships have been identified, forecasting can be accomplished based on a range of available methodologies.
  • Quickly and easily generate detailed reports on all of your file links using Link Reporter! Create detailed reports including: 1) Regular Reports -- Do you know how many links are in your files? Do you know what files they point to? Do you know how many of the links within the files are working or are broken? Find out using Link Reporter?s Regular Report! Easily create detailed reports which list each selected "parent" file followed by a list of the links contained within the files, and each of the "child" files that the links point to. Each link is automatically validated to determine if it is working properly or if it is broken. 2) Broken Link Reports -- Do you know which of your files have links that are not working? Do you know how many of these broken links are in your files? Find out using Link Reporter?s Broken Link Report! Easily create detailed reports which lists selected "parent" files followed by a list of any broken links contained wi ...
  • An easy to view graphical representation of fragmentation levels across your SQL Servers shows index type, fragmentation percentages, size and fill-factor so users can spot immediately what given area needs attention. An easy to view graphical representation of fragmentation levels across your SQL Servers shows index type, fragmentation percentages, size and fill-factor so users can spot immediately what given area needs attention.
  • Undoubtedly, OST files are very important and any minor or major issue can affect their integrity and make them inaccessible. While working with corrupt, inaccessible or damaged OST file, users come across various error messages. Most of them try Scanost.exe tool to get rid of OST file issues. But, Scanost.exe is much capable to fix all OST file issues. Now, you can try RecoveryFix for OST to PST tool which is much powerful and trustworthy tool to fix all OST file issues and convert OST file to PST. RecoveryFix for OST to PST tool has been developed to repair and recover all OST data items. RecoveryFix for OST to PST tool is equipped with advanced algorithms which help in performing thorough scanning of infected OST file and recover entire OST file data. Just after completing the scanning process, it displays all the recovered OST data items in the tree like structure with preview. You can select any file and easily identify your OST file items. Key features of the tool: Recovers all OST file items lik ...
  • Free report on invalid CTL-ITL files. Free fully working part of UPLINX Remote Phone Control Tool for Cisco Unified Communications. Identify not valid ITL files on phones which causes issues and erase these invalid CTL files efficiently. For Cisco deployment or support engineers. Phone Control Tool also includes: Bulk Extension Mobility (Cisco Device Profile) login/logout, background images, Erase CTL files.
  • 3D Face Recognition System V 4.3: A Hypride And Effective Source Code For 3D Face Recognition System (Last Update).This method uses 3-D sensors to capture information about the shape of a face. This information is then used to identify distinctive features on the face, such as the contour of eye sockets, nose and chin. The advantages of 3-D facial recognition are that it is not affected by changes in lighting, and it can identify a face
  • Ax3soft Sax2 is a professional intrusion detection and prevention software (NIDS) used to detect intrusion and attacks, analyze and manage your network which excels at real-time packet capture, 24/7 network monitor, advanced protocol analysis and automatic expert detection. With insight into all operations in your network, Sax2 makes it easy to isolate and solve your network security problems - detect network vulnerabilities, identify network security threats, catch actions against of security strategy and signs of been attacked. Finally, intercept and stop these connections. Sax2 offers many kinds of intrusion analysis reports, such as events, type, source address and destination address of attacks, and many crossover reports and compositive reports. Furthermore, sax2 allows customize the time range which administrator will flexible monitor and evaluate the network security. Sax2, enhanced detection, analysis, response and management features, supports almost all common used protocols, self-conta ...
  • Ax3soft Scout process activity monitor is a professional monitoring tool for Windows, it can monitor a process all-sidedly in real time, including process/thread, file system, Registry and network activity whit its powerful features. To create a detail report for process, Ax3soft Scout makes it easy to find and solve your computer problems, e.g. malware, troubleshooting. Key Features Real-time monitor and analyze Ax3soft Scout can monitor process/thread, file system, Registry and network activity (includes: IP, ICMP, TCP and UDP conversations, HTTP visit, Email transfer and FTP transfer) real-time and analyze these activities to identify security threats with different colors. Detail reports Ax3soft Scout can analyze numerous activities to create a detail report for process, the report?s content is very clear, it includes all the threats found and some key activities events. You can find and solve computer problems quickly and easily with the report, even if you don?t have extensive computer knowled ...
  • HTC Android Recovery is the safest and secure application, which is specially designed to recover data from Android phones. This application is mostly preferred by experienced industry experts and satisfied users because it scans both the internal and external phone memory. By which this tool is capable to identify lost or deleted files, including Android application package files (APK), and regain them for reuse. This fast and effective software is capable to take a preview of all recoverable files such as video, image, music files including .apk files. However, this tool has ability to scans SD cards and creates SD card replica image files to perform recovery at a later stage. Apart from it this application retrieves data from improperly mounted SD cards and corrupt file systems also. One of the important features of this tool is that it allows users to create recovery session that can be used to minimize the recovery process for the next time and after that to take preview of files that are to be recovered ...
  • SECURECY Anti-Virus with Internet Security is a Complete Anti-Virus Security System that can check ALL files within your computer system in real time detecting viruses and other malicious programs. SECURECY can also ensure a safe work environment, filter and check ALL email messages for viruses, provide you with three types of scanning and identify new viruses with our Heuristic Analyzer.
  • Bersoft Sampling Analyzer (BSA) is intended for simulating and analyzing samplings from experimental data, using both infinite and finite populations. BSA allows to filtering the population for identifying and generating subpopulations or choosing the best set of data range the population. BSA supports basic statistics, frequency and graphics that are available for both the population data and simulated samples data. Calculating the sample size BSA provides several formulas for getting the sample size. The population size will affect the sample size especially if the population is not too large.
  • Macgo Free iPhone Explorer for Mac is a free iOS file explore software, it is designed to access, explore and manage your iOS file system. With the freeware, you can easily add and delete all types of file saved on your iOS devices. Moreover, it allows you to copy all types of files between your Mac and iOS devices, it is also an easy and safe software to operate with. Features Overview 1.Free access, explore and manage iOS devices iPhone Explorer for Mac is a free and safe iPhone browser software which can give you a full command of file system on iPhone, iPad and iPod touch. It helps to easily access and manage multiple iOS files. No matter it is an iPhone 5s, iPad mini or iPod touch5, they are all instantly accessible with this freeware. 2.Enable to manage your files in iOS devices The iPhone Explorer gives you the power to add or delete whatever files you need to modify, so you can make your own decisions about how to manage a file or a video as the way you want it to be. 3.Easy and safe to operate With i ...
  • docBird CrossReferencer allows you to automatically find similar references between two data tables. This tool is ideal for analyzing large volumes of data and for analyzing information that you frequently use: customer records, product catalogs, lists of bills, classification tables, etc ... Tasks that seemed binding and even impossible before, will now be handled in a few clicks with docBird CrossReferencer.
  • AD Password Expiration Notification Tool notifies Password expiration.Password Expiration Notification Pro Active Alert Tool to set Password Expire Notification period and configure Password Expire warning and Password Expiration.Password Expiration Alert Tool checks Active Ddirectory, to identify the password expiry dates.Provides scheduler facility for Password Expiry notification.Send password expiry warning email to users,Password Expiration Notification to Manager Password and account expiration auditing solution for Active Directory. Useful for VPN users, Outlook Web Access(OWA) users, Mac/Linux Users, File share users, Service accounts. Automatically checks the AD daily and send password and account expiry status message and report. Send Custom Email Notifications to Users,Managers and Admins Send password expiry warning message to users Send Password Expiration Notification to Manager Send Password Expiration Summary Report to Admins Daily Calculates Password Expiry Date of Users depends on the Domain ...
  • Use Deduper for Outlook to clean up your Outlook from duplicate items of any type in no time. Search and remove all types of duplicates (appointments, contacts, emails (messages), journal, notes and tasks) with this outlook duplicate remover. Deduper search is customizable to accurately identify all duplicates. It can search across different folders. Find duplicates quickly - start searching with just one mouse click!
  • The FXMCSM application is used with the Metatrader 4 trading application to perform Forex strength and weakness analysis for the eight AUD, CAD, CHF, EUR, GBP, JPY, NZD and USD currencies which comprises of 28 currency pairs; AUDCAD, AUDCHF, AUDJPY, AUDNZD, AUDUSD, CADCHF, CADJPY, CHFJPY, EURAUD, EURCAD, EURCHF, EURGBP, EURJPY, EURNZD, EURUSD, GBPAUD, GBPCAD, GBPCHF, GBPJPY, GBPNZD, GBPUSD, NZDCAD, NZDCHF, NZDJPY, NZDUSD, USDCAD, USDCHF and USDJPY. The FXMCSM consistently calculates and adjusts for currency strengths and weaknesses to display strengths as easy to understand bar charts, with currency strength/direction values and current up/down trend indicators. To notify when individual currencies are moving up from low positions there is also an alert option for the eight currencies to signal the best time to go long or short to assist with currency trading decisions. The FXMCSM trading system, takes all the hard work out of looking at more than 28 charts to see which currencies are weak and strong, i ...

Page 1 of 10
1 2 3 4 5 6 7 8 9 10

Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware