Outpost can place your computer into stealth mode, making it invisible to hackers. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox.
256. FusionCharts 2.2 Developer Edition
FusionCharts 2.2. It makes full use of the fluid beauty of Macromedia Flash to create compact, interactive and visually-arresting charts. Imagine your data being morphed into beautiful shapes un-bounded by the limits of time, space and the web. DetailsDownload trial (Full version: 2.7 MB) Buy now ($149.00) Find similar
Vendor: InfoSoft Global
It made possible to catch exceptions, user actions and a debug trace over network with different applications. So you can save all data, which are necessary for debugging in one database. For advanced debugging you can save the trace data containing name of the computer, date and time, application name, source file, method name, line number and the description in the database.
258. My CSV to XML Converter
Tool tips and a an intuitive user interface make working with the converter program easy! This is a handy tool for converting XML data to HTML table format for use in a simple web page. Once your data is converted to an XML file, My CSV to XML Converter allows you to perform an XSL transform. DetailsDownload trialBuy now ($29.00) Find similar
Platform: Windows 3.1x, Windows 95, Other systems, Platform independent, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: David Benfield
Proxy Collector is an extension that is available separately, and makes you independant. You to determine what data may be sent and how this data should appear. data as you specify. Stealth removes dangerous components from the data stream - even before they are.
Outpost can place your computer into stealth mode, making it invisible to hackers. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox.
263. PhotoFit Harmony
TEKMATE PhotoFit Harmony. Anti-distortion algorithm makes straight line straight. You can make big signboard by printing separately and pasting. No lens data file, nor manual input. DetailsDownload trial (Full version: 7.6 MB) Buy now ($52.00) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: TEKMATE, Inc
Backups larger than 2GB will be automatically split into more individual zip files, making them compatible with both WinZip and PKZip. The application is feature rich and offers an intuitive interface making all features easily accessible for both beginners and professionals.
The TFlyTreeView control is an advanced interface for displaying and editing hierarchical data. · Data Validation All Data after editing retrieeved by tree through OnValidateNodeData, on this event user can process data for validation, translation and storing.
Zilch Professional gives you the most powerful tool set available for developing rapid debt repayment plans. Only Zilch Professional combines ease of use, the flexibility of unlimited payoff scenarios, and custom crafted reports that are sure to make a lasting impression. Data Entry Worksheet.