Create and print listings of files from selected directories on hard disks, cd-roms, dvd-roms, floppys, usb storages and network shares. Listing can be in HTML, text, CSV or database format. Print standard information like file name, extension, type, owner and attributes as well as EXE, DLL, OCX information like file version, description, company, MP3, DOC, XLS, PPT, AVI, WAV properties like track, title, album, FPS and CRC32, MD5, SHA1 hashes.
Serial communications Delphi library for RS232 and multi-drop RS485 and RS422 serial ports. Provides capability to easily develop Delphi and Delphi .NET applications that access data from any serial port device. Supports 256 ports, control multiple ports simultaneously, modem control, virtual serial ports (USB to serial, Bluetooth serial), port re-entrant, hardware/software flow control, serial line status & control. etc. Royalty free.
Serial communications Visual Basic library for RS232 and multi-drop RS485 and RS422 serial ports. Provides capability to easily develop Visual Basic and .NET applications that access data from any serial port device. Supports 256 ports, control multiple ports simultaneously, modem control, virtual serial ports (USB to serial, Bluetooth serial), port re-entrant, hardware/software flow control, serial line status & control. etc. Royalty free.
IPHost Network Monitor is a stable distributed network and server monitoring software for tracking of performance and availability of mail & DB servers, sites/apps, network bandwidth and equipment via SNMP (UNIX/Linux/Mac) and WMI (Windows), more than 20 other protocols. Free version with 50 monitors. Custom scripts as monitors, supports 4000 Nagios plugins. SNMP MIB browser. Admin tools. Regular reports by email. Alerts by email, sms, sound...
The Web is what you make of it, with the most secure and versatile Internet browser! Comodo IceDragon - Fast, Reliable, Easy to Use, Superior Security and Privacy, Social Friendly and also FREE! Now you can shop and do business safely on the Internet. Comodo IceDragon is absolutely FREE. Much like many of the other innovative Internet solutions offered by Comodo.
VBConversions has the most accurate VB.Net to C# Converter money can buy. The VBConversions VB to C# Converter won Visual Studio Magazine Reader's Choice Award, 2006. Free download and no registration is requred.
Recoveryfix provides one solution for all OST corruption issues ? Recoveryfix for OST to PST software. It?s programmed specifically to deal with all kinds of OST corruption issues effectively. It recovers emails, drafts, contacts and other mailbox items from corrupt OST files and makes them accessible in MS Outlook by converting them to PST format. The smartly programmed tool is capable of recovering severely corrupted, highly encrypted and password-protected OST files. Interestingly, it can recover multiple OST files simultaneously without making any data loss. The advanced tool operates in dual recovery mode ? Standard mode and Advanced mode. The first mode deals with minor OST corruptions and delivers very quick results. However, Advanced mode takes its time and deals effectively with severely corrupt OST files.
The OST recovery software displays recovered OST files for preview so that you can check their content for accuracy purpose. Apart from PST, the tool provides option to convert recovered OST fi ...
From AKick Antivirus Total Security: Cybercrime has to skyrocket. Every day millions of PC users suffer due to hijacking and fraudulent online habits such as shopping and banking. Even your works may not complete without using the internet with surefire protection. However, online criminals easily swindle money from bank account; even they often misusing your credit card, finally they may crash down of your brand new system without any warnings. Introducing Akick antivirus total security for complete protection against viruses. Features: Comprehensive device control: Set write/read/execute easy access to external devices. Prevents malicious autorun: While using computer even lot of malicious features secretly comes in your computer, installed without your little information or permission, it is capable of blocking all of them effectively. Vulnerability Scanner: It detects and quickly informs the computer user for vulnerable applications that can be exploited to infect their PC. Email Security: This software w ...
Page 7 of 10
1 2 3 4 5 6 7 8 9 10