FolderView ActiveX control
A FolderView control provides functionality identical to the tree pane in Explorer. It displays a list of folders (and files) and allows browsing of the shell's entire namespace.
|
OpenzUp
OpenzUp is an easy-to-use file opener that opens your favorite files quickly.
|
ConceptDraw Project
Use ConceptDraw Project to organize and manage projects with clear, attractive Gantt charts, WBS charts Recommended to:
- Project Leaders
- Projects team managers
- Business specialists
- Educators
- Anyone keen on planning and management
|
Advanced MP3 Search
Advanced MP3 Search helps you to search for music and retrieve MP3 and WAV files on the World Wide Web. Simply type in a music search term, such as a song title or an artist name, and Advanced MP3 Search will search more than 10 major search engines.
|
ParseRat File Parser Converter Restructurer
NEVER AGAIN RE-KEY LEGACY DATA: Reads most files including XML, page image print files from other processes, fixed format, delimited, dBase, structured binary etc. ASCII or EBCDIC. Exports as various formats. Parse from/to clipboard.
|
Alf's Quest
Travel over glamouring forests, magic springs and creepy castles, give your brain a challenge by entering this surreal universe. This game has been AWARDED 5 STARS by Softpicks.net and 4 STARS by ShareUp.com.
|
DiveVisions
DiveVisions is a 3D animated ocean screen saver. Follow a moving camera as you travel around a living deep sea reef. Each creature seems alive and has been recreated in true 3D animation. See why DiveVisions has won numerous 5 star awards.
|
AccessFIX Data Recovery
AccessFIX is an Access data recovery software for databases created using Ms Access 95, 97, 2000, XP, and 2003. AccessFIX extracts the structure and the tables' contents from damaged database files, creating new trouble free files. AccessFIX recovers Access 95, 97, 2000, and 2003.
|
KFSensor
KFSensor is a host based Intrusion Detection System (IDS).
It acts as a honeypot to attract and detect hackers by simulating vulnerable system services and trojans. The system is highly configurable and features detailed logging, analysis of attacks
|
Страницы:
Назад
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
Дальше
|