Advanced Outlook Repair 1.0
Advanced Outlook Repair is a powerful Microsoft outlook recovery tool for Outlook 97, 98, 2000, 2002 and 2003. It can scan the corrupt or damaged personal folder files(.pst) and recover your mail messages, folders, posts, appointments, meeting requests, contacts, distribution lists, tasks, task requests, journals, notes in them. Moreover, it can recover deleted items, split oversized PST files, and recover encrypted PST files.
See also: contact, password, unerase, undelete, deleted, disaster, files, rescue, error, damaged, corrupted, corrupt, restore, contacts, oversized, notes, message, mailbox, mail, lost, key, file, microsoft, email, data, inbox, fix, recover, recovery, repair, pst, outlook
Active Keyboard 3.1
HotKey Program, Launch applications, documents, and URLs, and over 80 other actions to hot keys
- Control your Winamp player
- Hide application windows
- Open, Play and close your CD-ROM
- Change the volume, mute
- Logon and Power management
- Open dialup connections
- Empty recycle bin
- Create New Folder
- Lock/Unlock Desktop
- Show/Hide Windows
- Show/Hide Icons from Desktop
- Restart Explorer
- Lock/Unlock Mouse
See also: Hotkey Manager Keyboard macro utility Hot Key manager control CD-ROM Winamp Window shortcut manager for windows
DevSolutions Crypt 1.0.1
DevSolutionsCrypt library is a powerful and easy to use cryptographic ActiveX and DLL component for Windows developers that allows applications to encrypt/decrypt data or files using the latest industry standard strong encryption algorithms.It can be used to encrypt/decrypt strings,memory buffers,Blobs,Files and streaming data.
See also: Mars, TDES, AES, Blowfish, Security, Components, Cyphertext, Decryption, Encryption, Cryptography, DES, RSA, PKI, Certificate, Security, Symmetric key, File, Crypt, DevSolutions Crypt, Serpent, security, encryption
CharProbe allows you to easily find and automatically copy: ASCII Codes, HTML Codes, Virtual Key Codes. You can also export custom tables to TXT or HTML.
Includes tool used to convert between decimal, hexadecimal, octal and binary numbers.
You can get ASCII code of any character and virtual key code of any key you press.
It's possible to copy Virtual Key Code constant declaration ready to use in various programming languages.
See also: ascii code html code virual key code vk table tables codes constant constants copy find search, ascii, code, html, virual, key, table, tables, codes, constant, constants, copy, find, search
Keyword Fisher 2.0.0
Keyword Fisher is the ultimate keyword suggestion tool. Keyword Fisher puts your competition's web pages to work for you by compiling reports of the keywords your top competitors are using on their pages. After your new keyword reports are compiled, easily export them to other keyword analysis utilities and sites via the Keyword Fisher export function. Provides a saturation analysis to help you determine which phrases have less competition.
See also: keyword suggestion, Key phrase, Search Engine Optimization, SEO, Keyword Analysis, meta tag
Taskbar Hide - hide windows program 1.28
With Taskbar Hide you can fully control the taskbar.Hide windows program (hide applications) or close them completely through a hotkey,or minimize them to system tray.Hide some less used icons from system tray.Reorder the windows on taskbar based on your choice.Change the icon and title of any window.Automatically maximize all new windows or only new IE windows.Set any application window always on top or show it's property.
See also: hide windows tool, minimize to tray, stay on top window, hide task, game hide, hide icons, hide windows taskbar, hide applications, hide program, hide window, boss key, hide windows, maximize windows, max ie second window, maximize ie window
WinSyslog is an enhanced syslog server for Windows. It works much like a Unix syslog daemon but offers enhanced features. Among others, it writes syslog messages to a flat file, database or sends them as email-alerts. Runs as a background service or Windows GUI application. Basic features are free to use, enhanced features require a registration. The enhanced features can be tried for free for 30 days.
See also: logging, network, security, events, syslog, monitoring
1 Click Encrypt File Folder Encryption 1.4.1
1 Click Encrypt is the encryption utility that brings military strength encryption power at your fingertips, assuring that your files are secured and protected from intruders and spies. It can encrypt or securely hide any type of file, allowing you to relax a bit knowing that it is practically impossible to break the algorithms that where used in our application. Decryption methods are within the same utility that brings the encryption solution.
See also: blow fish, wipe, easy, cryptographic, secure, encryption software, data security, cypher key, protect documents, protection, file security, email security, file encryption, encrypt email, encryption, algorithm, disk, transparent, secret, Safe, File, Filesystem, encrypt, privacy, encrypt files, cryptographic library, email encryption, AES, gamma, ghost, cipher key, crypto
Secure Password Manager 2.2.1.0525
Secure Password Manager is a desktop utility that spares you the trouble of filling in your logins, passwords, and other personal data manually. You can automatically fill in password in ANY application (IE, Netscape, Opera, ICQ, MSN...) .
See also: random key generator, auto completion, Auto login, Passwords Management
EnergyKey is a new personal productivity tool. Whether you are working, or just having fun, EnergyKey helps you make computer tasks faster. EnergyKey is the premier application to use for all of your hotkey making needs. No other program is as feature-rich, yet as easy to set up and use as EnergyKey. Save yourself from repetitive tasks. Make your personal hotkeys to improve your task's performance.
See also: energykey, energy, key, hotkey, hot key, hot, key, keyboard, hot keyboard, hotkeys, keyboard hotkeys, windows hotkeys, hotkey keyboard, shortcut keys, shortcut, shortcut key, keyboard shortcuts, keystrokes
Tick Tracer 126.96.36.199
Tick Tracer is a tool to trace and monitor user activities on keyboard which can be recorded and analyzed, also you can do shortcuts for opening files, pasting text and other system operations by typing a shortcut name anywhere on screen. With this tool no need to fill your Desktop or Program Files with shortcuts or going through MyComputer to open files.
See also: tick, tracer, trace, monitor, shortcut, system, analyze, key, keyboard, anywhere, operation
Advanced Log Monitor 2.1.18
Advanced Log Monitor is a log management solution that monitors log files from any program, database or device and notifies you by email when a specific event occurs (Warning, Firewall attack, Hardware failure or anything else), can quickly and cost-effectively monitor your mission-critical servers, databases and applications and notify you of any problematic or unusual activity.
See also: log, logging, monitor, warning
Hide Folder HiBit 7.2.8
1)-Protect any folder or file by : Hide, Lock, Encrypt or make a folder as a recycle Bin. (2)-The protected folders or files still protected even in other computers. (3)-The protect Operation just take 1 second at any computer. (4)-You can undelete the folder or file by Locking it.(5)-Works with NTFS, FAT32, FAT16, FAT12 and FAT and all windows versions.
See also: hide, folder, hide, file, lock, folder, lock, file, directory, make, recycle, bin, unhide, unlock, recyclebin, undelete, delete, file, system, filesystem, even, other, computers, Encrypt, encrypt, editor, crypt, Encryption, Encryptor, Encrypter, decrypt, decrypt, password, key
Kaspersky Anti-Virus Review 1.2
Kaspersky Anti-Virus Review brings you consumer ratings on Kaspersky Anti-Virus. Thus, here we share
important facts, relevant points as well as unfiltered consumer-comments.
See also: Kaspersky, Kaspersky anti virus, Kaspersky antivirus, Kaspersky antivirus system, Kaspersky download, Kaspersky free download, Kaspersky vista Kaspersky, kaspersky antivirus review, key antivirus, the best antivirus
MySQL To MS SQL DB Converter Tool 188.8.131.52
MySQL to MSSQL DB converter tool migrate database records of MySQL server into MSSQL server in quick and secure way. Database converter software is fully capable to convert large volume of database or selected particular table, record easily and efficiently. Tool provides full support to MySQL attributes and data types and compatible with all major versions of MySQL and MSSQL DB server. Convertor tool is compatible with all version of windows OS.
See also: Download, free, MySQL server, Microsoft SQL server, database, conversion, converts, tables, records, attributes, rows, columns, primary key, unique key, foreign key, indexes, supports, data types, maintain, data integrity, null values
Alligator Data Guard 1.1.060
Alligator Data Guard is a tool for protecting your confidential information, using AES algorithm with 256-bit key and Haval 256-bit Hash Message Authentication Code (HMAC) to simultaneously verify the data integrity and the authenticity for better security. You can encrypt all your data (file, folder, disk). It is also possible to combine folders and disks into one crypto-file. The encryption process is faster than other encryption software.
See also: encryption software, protect data, encrypt file, encrypt folder, encrypt disk, encrypt data, AES-256 bit key, Haval HMAC 256, best encryption tool, best encryption program, fastest encryption tool, fastest encryption software, best security
Secure Terminal Emulator, FTP Client and Batch FTP. Connection: SSH, SSL, TLS, Telnet, RS232. Authentication: Password, Keyboard-Interactive, Public Key, Kerberos, PKCS#11, X.509, NTLM. CryptoTerm provides accurate terminal emulations: XTERM, ANSI, SCOANSI, VT100, VT220, VT220-8, VT320, VT320-8, WYSE60 (WYSE60 COLOR), LINUX, HP and TN3270 (3278-2, 3278-3, 3278-4, 3278-5, printer 3287-1 and IND$FILE transfer protocol). ----] Free for personal use.
See also: ssh, ssl, xterm, vt100, vt220, vt320, wyse, wyse60, tn3270, 3270, 3278, 3287, ansi, ibm, mainframe, terminal, emulator, emulation, ftp, batch, pkcs, pkcs#11, kerberos, ssh2, ntlm, x509, x.509, codepage, indfile, ind$file, cisco, break key
Memory Card Picture Recovery Software 184.108.40.206
Install Memory Card Picture Recovery Software from www.flashdriverepair.org for retrieving deleted images, snapshots, screensaver from your USB media removable device. Micro drive photo recovery tool recoup crashed audio, video, photograph, screensaver etc from memory stick.
See also: Memory, Card, Picture, Recovery, retrieve, regain, missing, file, folder, audio, video, image, wallpaper, photo, install, memory key, flash, media, download, user, drive, device, digital, storage, computer, USB, removable
Database Migration Tool For MS Access 220.127.116.11
MS Access to MySQL conversion program provides facility to convert MS Access database files into MySQL table structure with their functionality and architecture remains unchanged. Database migration software supports all available versions of MS Access and MySQL server. MS Access database converter program supports null value, default value, data types, entities, attributes or key constraints like primary, foreign key, candidate key etc.
See also: Microsoft, Access, database, MySQL, server, migration, convert, rows, column, integrity, primary, key, constraint, null, value, index, application, schema, view, attribute, transform, Unicode, multibyte, table, data, type
Migrate MS Access Database 18.104.22.168
MS Access to MySQL database transformation program migrate database tables, rows, columns, indexes from MS Access to MySQL database server. MS Access to MySQL database conversion software translates password protected MS Access database file into MySQL database. MS Access to MySQL database migration utility maintains database integrity and support database attributes like data types, default values, primary key, entities, table constraints etc.
See also: Access, MySQL, database, convertor, table, row, columns, primary, key, data, types, attributes, indexes, entities, default, null, values, files, folders, records, transform, password, protected, constraints, server