The Serial Monitor, with its complete serial control codes support, very precise request timing and very fast work, can be used to test the correct functionality of any third-party software. The filter device driver used by the Serial Monitor is the newest generation of the driver, which sources and logic are described and presented in our article in Windows Developers Journal.
147. Speereo Voice Translator French Edition
About 4,000 most commonly used words, business, technical, medical, and legal terms, conversational phrases, idioms, and some slang are arranged in 16 main categories and 87 sub-categories by subject, such as Travel, Useful, City, Buy food, Shopping, Health and Entertainment. DetailsDownload trialBuy now ($20.00) Find similar
Platform: Win CE / Pocket PC
Vendor: Titan Information Service
The Serial Monitor, with its complete serial control codes support, very precise request timing and very fast work, can be used to test the correct functionality of any third-party software. The filter device driver used by the Serial Monitor is the newest generation of the driver, which sources and logic are described and presented in our article in Windows Developers Journal.
155. Stamp Organizer
Specialized data controls. Support for the direct entries from TWAIN compliant devices (scanners, digital cameras, and other image capturing devices). Organizer is intuitive and easy to use for the beginner, at the same moment feature-rich and powerful enough to satisfy the most advanced users. DetailsDownload trial (Demo: 2.6 MB) Buy now ($43.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: PrimaSoft PC, Inc.
These exploits include the Iframes and rogue ActiveX controls that can be used to attack your computer, and the in-line images that can be used to identify your email address as live to the spammers. Advanced users can access POP3 mailboxes directly, with the ability to browse, read, delete and retrieve individual email messages from the remote mail server.
159. Wine Organizer
Specialized data controls. Support for the direct entries from TWAIN compliant devices (scanners, digital cameras, and other image capturing devices). Organizer is intuitive and easy to use for the beginner, at the same moment feature-rich and powerful enough to satisfy the most advanced users. DetailsDownload trial (Demo: 2.6 MB) Buy now ($43.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: PrimaSoft PC, Inc.
161. Inventory Organizer
Specialized data controls. Support for the direct entries from TWAIN compliant devices (scanners, digital cameras, and other image capturing devices). Organizer is intuitive and easy to use for the beginner, at the same moment feature-rich and powerful enough to satisfy the most advanced users. DetailsDownload trial (Demo: 2.6 MB) Buy now ($43.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: PrimaSoft PC, Inc.
162. Collectibles Organizer
Specialized data controls. Support for the direct entries from TWAIN compliant devices (scanners, digital cameras, and other image capturing devices). Organizer is intuitive and easy to use for the beginner, at the same moment feature-rich and powerful enough to satisfy the most advanced users. DetailsDownload trial (Demo: 2.6 MB) Buy now ($43.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: PrimaSoft PC, Inc.
163. Jammer
It is designed so even novice users can easily control its powerful engines. As a potent protection device, Jammer is like a cyber fortress defending you from attackers. Its unrivaled multi-barrier system blocks every step an intruder takes with sophisticated counter-measures that protect the Registry, monitor applications and inspect both incoming and outgoing connections by using its amended firewall. DetailsDownload trialBuy now ($24.95) Find similar
Vendor: Agnitum Ltd.
AlertMobile can be used by security administrators for control of the corporate security policy, by parents for monitoring of their children computer activity, or by anyone else who wants to ensure that nobody uses his or her computer without permission.