Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: I :: identify
Display: short descriptions | full descriptions
  • Software programs on your computer rely on important data stored in your Windows registry to perform a variety of tasks. But over time, as you add, remove, and modify the files and settings of these programs, your registry begins to lose its shape. This can leave you with a variety of obsolete, corrupt, and even harmful registry entries. When left unchecked, your system can become increasingly unstable, running slower and crashing more frequently. That's where Registry Washer an award-winning registry repair program comes in and saves the day! Registry Washer gives you a robust registry scan engine that allows you to safely scan your entire Windows registry for errors and other problems that can interfere with your computer's performance. After identifying the problems that require action, Registry Washer helps you resolve those issues and get your computer back to running efficiently. But that's not all Registry Washer can do! Registry Washer also includes a variety of other ...
  • JiJi Password Expiration Notification notifies Password expiration.Password Expiration notifier set Password Expire Notification period and configure Password Expire warning and Password Expiration.Password Expiration Notification tool checks AD, to identify the password expiry dates.Provides scheduler facility for Password Expiry notification.Send password expiry warning email to users,Password Expiration Notification to Manager
  • Media Monitoring Tool enables content owners and advertising agencies to monitor TV broadcast and automatically identify the playback of a specific video like a TV commercial. To monitor broadcast, the program relies on an intellectual video fingerprint algorithm that analyzes recorded broadcast files, and then displays the names of files that contain a specified commercial along with the time when its playback starts in each dump file.
  • WebWatchBot 6 makes it easy to implement website and web-based application monitoring for response time, downtime and error conditions. View performance from the end user perspective and identify the impact of individual infrastructure components on response time. WebWatchBot uses an agent-less protocol, which means that nothing is installed on the server or network component being monitored. Powerful historical reports and real-time charts
  • Use Deduper for Outlook to clean up your Outlook from duplicate items of any type in no time. Search and remove all types of duplicates (appointments, contacts, emails (messages), journal, notes and tasks) with this outlook duplicate remover. Deduper search is customizable to accurately identify all duplicates. It can search across different folders. Find duplicates quickly - start searching with just one mouse click!
  • Password Expiration Notification notifies Password expiration.Password Expiration notifier set Password Expire Notification period and configure Password Expire warning and Password Expiration.Password Expiration Notification tool checks AD, to identify the password expiry dates.
  • Chronos eStockCard v3 Mobile Edition is flexible and mobile that users can bring around their mobile computer barcode scanner to record the incoming and outgoing stock inventory in the warehouse via the IN and OUT easily either by scanning on the barcode label or just enter the quantity into the screen. Further to that, users would be able to perform Stock Transfer and Cycle Count easily from the mobile computer. The users also able to identify the respective item from the Stock Info screen by scanning or entering the serial nos (which is auto generated by the eStockCard for tracking purposes) into the Serial Nos column and item info?s will then be listed. Chronos eStockCard v3 Mobile comes with 5 main modules which are the IN, Stock Transfer, Cycle Count, OUT and Stock Info. Details information for this Mobile Edition can be checked out here: http://www.estockcard.com/mobile-inventory-software-features.html The Chronos eStockCard v3 Mobile Edition is available in 30-day Trial Version and it's ...
  • CodePorting C#2Java is a web-based tool for converting C# applications, projects and source code into Java. Its powerful porting engine has all the capability to parse and transform millions of lines of code to Java in few seconds. C# to Java code porting add-in for C# converts source code right from Visual Studio 2005, 2008 or 2010. This functionality is provided purely using CodePorting Web APIs (Snippet Porting API, Code Analyser API, Library Management APIs, Projects Management APIs). CodePorting C#2Java code analyzer also helps you identify .NET language constructs, which are not portable to Java and helps you fix your small changes instantly by editing your code using source code editor. Built-in source code viewer with syntax highlighter makes your code more readable and accessible anywhere everywhere. CodePorting C#2Java APIs make it possible for you to convert your .NET code directly from your local environment and favorite IDEs.
  • Use Dupe Remover to clean up your Outlook Express or Windows Mail from duplicate emails in no time. Search and remove email duplicates with this duplicate remover. Dupe Remover search is customizable to accurately identify all duplicates. Find duplicates quickly - start searching with just one mouse click! And it's FREE!
  • Key logger software captures all types of computer activities like typed documents, text chats, user name, password, emails and secures your PC. Key logger software does not appear as desktop icons and other users can not identify about system monitoring. Easy graphical user interface of the software allows user to easily operate and understand all features of the software. Brilliant key logger software is capable of monitoring all user activities to protect your computer. Amazing key logger monitoring software produce all records in text or html files format & allows sending via email. Company offers best Key logger software that allows monitoring computer system by recording all keystrokes of PC. Easy to download key logger software is more popular among parents, cyber cafe, school and college for monitoring computer systems. Innovative key logger software is very easy to install and gives much protected solution to monitor computer system in effective manner. Website www.passwordrecovery.in provide ...
  • Identify unknown devices in your system especially after you reinstall your system and cannot figure out what all those yellow question mark labeled devices really are. Help you search for workable drivers on the Internet. Driver backup is optional, if you have all your device drivers installed. USB, IEEE 1394, ISA Plug and Play, AGP Bus, PCI, PCI-E, eSATA Device can all be identified. Driver backup is optional.
  • SpeedUpMyPC boasts a professional range of tools built to boost your computer's performance. The program will first run a thorough scan of your system to identify unused processes and invalid registry entries that are causing data bottlenecks, slowdowns and other performance troubles. Once the issues have been resolved, SpeedUpMyPC will apply a variety of special Uniblue tools and tweaks designed to sharpen up overall system performance.
  • If you need to find and remove duplicate files from your computer then +A Duplicate File Finder will help you to identify and delete those files. It's extremely accurate and it will guide you through the entire process. You can easily add different paths and folders to search for files such as Video, Pictures, Audio or whatever you may need. Afterwards you can chose to recycle them or delete the files permanently. You can even try it for free.
  • * Find Your Computer Using Geo Location Tracking * Securely Backup Your Important Data and Files * Your Personal Data & Identity is Safe With Snuko's Heavy-Duty Data Encryption * Identify Thieves With Your Webcam * Internet Protocol address (IP address) Tracking * What Has The Unauthorised User Been Looking At on Your Computer? * Computer Lockscreen * Reporting With so much information stored on computers and laptops it is crazy not to have a secure backup and anti-theft solution. Anti-Theft software by Snuko is the perfect way to protect your data and help you recover lost or stolen equipment. Key Features * Find Computer Feature * Spy Camera * IP Address Lookup * Screenshots * Automatic secure data backup stored in the cloud * Data Recovery * Data Encryption * Lock Screen Feature * Report Generator * Wifi Hotspots Wireless Connection * User friendly mobile control panel * Finders Contact Details * Device Alert Notifications * Tamper Proof
  • The main aim of Niche Market Finder is to identify niches that you can easily dominate with your sites. Niche Market Finder is very simple to use as it has only one function: identifying niches that are easy to dominate. The software uses an intuitive interface, so that you can get a visual idea of strength of the competition in the chosen niche.
  • SysAdminAssist from Osirium is a free application which allows Security and System Administrators to quickly identify and access infrastructure devices and applications through it's console launcher. It supports any infrastructure device or application that has an SSH, HTTP, HTTPs, Telnet, RDP or VNC interface.
  • This program is designed to help anyone suffering from chronic pain. The user friendly interface allows you to record your medication, pain levels, symptoms, side effects, and activities thus, eliminating the guesswork of what is affecting your pain. Understanding your activities and medication over time using our charts and reporting feature gives you more power to identify what works and what doesn't work when it comes to decreasing your pain.
  • The Recovery Report provides a full range of Debt Recovery Management functionality. It can handle an unlimited number of Cases & Clients. Our Recovery Software is ideal for Collection Agencies, Banks and Insurance Companies. Maintain case and recovery details in a single location. Identify noteworthy items for quick retrieval or search by events and individuals to view perspectives and relationships that might otherwise go unnoticed. Track Vital Information - When the number of Cases increases, chances are you don't know the cases status completely. The Recovery Report will help you to: Maintain and print case details, debts, recovery totals, people, property, letters and comments.
  • XML is intolerant of errors. This program will automatically salvage XML files by finding the first XML error, then truncating a configurable number of characters before the error and finally using the great xmllint to recover the xml file by automatically adding the correct end tags. The program starts with a default of 50 characters truncation. This truncation value may need to be changed if the truncation happens in the middle of a complex tag as xmllint may not know how to recover the file correctly. The extra truncation is needed in the first place because the XML validator used is not able to perfectly identify where the XML corruption begins and will often not flag the corruption for several characters after it begins.
  • IT asset management software are deployed in organizations so as to identify the available software assets and segregate the licensed for the over-licensed or under-licensed software. This process helps in the process of internal and external audits.
  • "The Tracer" will help you with to find out where a website or a person is really located and other very useful information about them. The Tracer combines in a single freeware software app different networking tools: traceroute, whois, port scanner. Traceroute is useful for displaying the route (path) and measuring transit delays of packets across the Internet. "The Tracer" shows different diagnostic information about the single hops and their geografical locations. Whois is used for querying the databases that store the registered users or assignees of a domain name or an IP address. The port scanner probes a server or host for open ports to verify security policies identifying running services. The Tracer is freeware so don't wait anymore and start using it. The Tracer: the ultimate trace route app. Requirements: .NET Framework 4 It uses the OpenStreetMap (http://www.openstreetmap.org ) database for the graphical representation of the hope's loc ...
  • Windows Service Commander is a tool for quick control of Windows Services. Windows Service Commander allows fast access to all Windows Services. You can inspect their properties, start, stop, pause and delete them. It shows list of non-legitimate services which allows the administrator to quickly identify and remove the additional services, most of these are installed by spyware to monitor the user activities.
  • Software to recover files deleted from Mac OS and other storage device. It has the ability to recover files which were deleted or lost during formatting / re-formatting / partitioning / re-partitioning from Mac system. It has the ability to identify and recover more than 300 file types which include documents, images, audio files, video file and RAW photo files. It can recover files from HFS+, HFSX, FAT16 and FAT32 volumes.
  • Aiseesoft iPhone 4S Ringtone Maker provides users with the best solution to make iPhone 4S M4R ringtone with most popular DVD, video and audio files, including MPG, MPEG, MPEG-2, VOB, DAT, MP4, M4V, TS, RM, RMVB, WMV, ASF, MKV, AVI, 3GP, 3G2, FLV, SWF, MPV, MOD, TOD, QT, DV, MOV, DIF, MJPG, MJPEG, HD video and MP3, MP2, AAC, AC3, WAV, WMA, M4A, RM, RAM, AU, OGG, AIF, AIFF, APE, FLAC, NUT audio, then export it to PC, iTunes and other iPhone devices. Also it allows you to customize the output iPhone 4S ringtones, you can cut off any segment from source files. Moreover, it is highly compatible with iOS 5 and iTunes 10.5.1 now after upgraded. Key Features 1. Manage ringtones on iPhone devices You can manage the existing iPhone 4S ringtones. For instance, users can delete and rename the ringtones. 2. Preview the ringtone effect You can pre-listen the source video/audio effect and the ringtones effect. 3. Add fade-in and fade-out effect You could add the fade-in and fade-out effect to the output r ...
  • Software tool to recover lost / deleted files from Mac OS or other storage device. It has the ability to recover formatted / re formatted / partitioned / repartitioned Mac volumes. It has the ability to identify more than 300 file types and recover them. Supports recovery of documents, audio files, video files and RAW photo files. Supports of files from HFS+, HFSX, FAT16 and FAT32 volumes / partitions.

Page 3 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware