Contrasting Methods


Advertisement

32bit Service Monitor

Monitors Internet Services and alerts the user with a variety of methods if down. Always know whether or not your web site or other network services are up or down with 32bit Service Monitor. It will check your site or other services as often as

CryptIt

Most file encryptors use methods that rely on the theory of computational security, that is the difficulty of key factorisation prevents decryption of the file. But this method may not work forever. CryptIt is designed to use XOR encryption on keys that





Advertisement

Daily Bible and Prayer

Daily Bible and Prayer features Bible reading plans, daily devotional, and prayer tracker. The Bible reading plan will get you through the Bible in a year with two different methods, and supports custom reading plans. Also included is the Faith's

A-PDF Merger  v.6.9.3

A-PDF Merger is an utility that lets you combine two or more image files or Acrobat PDF files into a single PDF document. Features include combining bookmarks, merge methods, changing properties and security settings of output PDF document etc.

Xtreeme Search Engine Studio

Search Engine Studio automatically indexes your web site (using 4 methods e.g. HTTP crawler) and then creates a professional, ultra fast search engine for your website or an offline search for CD-ROM / DVD distributions. No installation on server required

First Alert Service Monitor

Monitors Internet Services and alerts the user with a variety of methods if down. Always know if your web site or other network services are up or down with First Alert Service Monitor. It will check your site or other services as often as you

NMath Core

NMath Core contains vector, matrix, and complex number classes, random number generators, numerical integration methods, cubic spline interpolation and other high-performance functions for object-oriented numerics on the .NET platform. NMath Core is

Nsauditor Network Security Auditor  v.3.0.3

Nsauditor Network Security Auditor is the advanced network security scanner for auditing and monitoring network computers for possible vulnerabilities. It checks the network using all potential methods that a cyber attacker might use to attack it.

Backbone.Globalization

The Backbone.Globalization namespace contains classes that provide a list of all countries, search methods and country-related information. The country names and localizations are based on The World Factbook

QNewsLetter

Internet direct marketing via Newsletter - Create and send successful newsletters with Microsoft Outlook and QNewsLetter. Newsletters by email and email marketing are some of the most efficient marketing methods available today - if used right.

OneNote Password

OneNote Password is a password recovery tool for password-protected OneNote notebooks. OneNote password protection is based on strong crypto algorithms, so password recovery is a complex task. OneNote Password uses various recovery methods: Plain

XFunction for Windows

The xFunction library is the universal solution for integration of Java code with code written in other languages, superior in many aspects to Java Native Interface (JNI). With xFunction, you no longer need to implement those ugly native methods. Instead,

Pages : 1 | 2 | Free
Newest Reviews