VB Software Builder is a utility that compile large number of Visual basic projects belong to an application in a batch order. This utility will determine the compile order and compile the projects according to correct compile order.Also this tool can be used to query VB projects.
43. TGraphLink Delphi component
The TGraphLink component is designed to represent and display graph edge for both directed and undirected graphs in a Borland Delphi or C++Builder program. At run-time you can determine if the point is on the graph edge. DetailsDownload trial (Demo: 600 KB) Buy now ($55.00) Find similar
Platform: Windows 3.1x, Windows 95, Windows NT, Windows 2000, Windows 98, Windows ME
Vendor: Tarkvara Inc.
45. MailList Express
Once you have a targeted email list, Maillist Express lets you create e-mail message templates. Also program allow to determine which of addresses in mail list are unavailable. DetailsDownload trial (Full version: 1 MB) Buy now ($29.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: InternetSoft Corporation
46. U.S. Navy: Guardian of the Seas, Vol. II Screensaver
The sequel to the award-winning and immensely popular first volume. Additional features: - Selection From 23 Optional Transitional Effects - User Determined Delay Between Each Image - Desktop Screensaver Quick Start Control - System Tray Screensaver Control - Optional Password Protection - Microsoft Plus! DetailsDownload trialBuy now ($8.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Cyber Artists Studios
Users are afforded the opportunity to determine how data is converted into ciphertext, the un-readable text that is viewed on the device's screen before it is unlocked by an authorized user, by choosing from a variety of encryption algorithms.
Users are afforded the opportunity to determine how data is converted into ciphertext, the un-readable text that is viewed on the device's screen before it is unlocked by an authorized user, by choosing from a variety of encryption algorithms.