Inspection Mirrors

RiskWise  v.4.0.3.7602

RISKWISE is an advanced Risk Based Inspection (RBI) software program designed for optimising plant inspection and maintenance. The identification of damage mechanisms allows inspection techniques to be focused. Safe inspection periods are derived so inspection ...

EZ-Forms-Contractor TestDrive  v.5 5

Unlimited prints, no copy count!

Specifically designed for Contractors, Construction and Real Estate Inspection Professionals.

The Filler/Typer allows you to load up a form then fill it out by simply selecting the text tool, clicking ...

NetworkShield Firewall  v.3.0.363

This program uses a reliable, rule-based Firewall embedded with up-to-date SPI (Stateful Packet Inspection) technology. High-performance NAT and DHCP server makes local network management easy and smooth.

Information Properties Monitoring
Integrated ...

Balony October for Mac OS X  v.17.2012

Balony is a small, simple, easy to use application, specially designed to offer you an image analysis and data inspection for agar plates generated in high-throughput yeast genetics and genomics experiments. Basically all that you have to do is select ...

Advanced Administrative Tools

It performs an inspection on everything vital to network security as it pertains to the protection of your computer, including the utilization of tools to check open ports, proxies, email lists, Internet applications, and general system information.

PE Explorer

PE Explorer provides software engineers the necessary tools for disassembly and inspection of unknown binaries, modifying the properties of executable files and customizing and translating their resources. With PE Explorer, you can apply a professional ...

Aargon BlackBox

The black box contains mirrors, prisms, splitters and other laser tweaking tools. Color also plays a part as filters and prisms split and merge different colored beams. Great graphics and sound, and many clever puzzles as well as random puzzles and more.

Building

Your past is a jumble of dimly-lit mirrors, reflecting disassociated images: desolate parking lots; whispering distant trees; a sense of sorrow and suspended time; a night without end. You know that there is more, but what? Who are you? Where are you? ...

WinLexic Microsoft Glossaries

WinLexic already contains built-in FTP client configured to access
the Microsoft public FTP server or its mirrors. It automatically unpacks and installs Microsoft glossaries and
WinLexic owners will be able to browse a nice dictionaries instead ...

The Unscrambler

The Unscrambler helps you discover patterns and relationships in your data that traditional statistical methods and visual inspection cannot reveal. The Unscrambler`s Multivariate Curve Resolution (MCR), Derivatives, Principal Components Analysis (PCA), ...

MostFun Lumen - Unlimited Play Version

Strategically align emitters, laser beams, and mirrors to solve complex and challenging online puzzles. Once you get the hang of Lumen, take the next step and create your own mind-boggling puzzles for other online gamers to solve!

PDA Forensic Program

Mobile phone data inspection application is used to fetch all details including manufacturer name, memory status, battery status, mobile model number, phonebook contact numbers, OS version, registry records, type, Mobile IMEI number, SIM IMSI number, ...

Louisville Adoptions

Louisville adoption records database - Access Louisville adoption records database now! In nearly all States,
adoption records are sealed and withheld from public inspection after the adoption is finalized. Most States have
instituted procedures ...

WinLexic

WinLexic already contains built-in FTP client configured to access the Microsoft public FTP server or its mirrors. It automatically unpacks and installs Microsoft glossaries. Quick and efficient search through multiple glossaries at once. A number of ...

Crococrypt Portable  v.0.9b

Crococrypt is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool ...

Pages : < 1 | 2
Newest Reviews