Non Visible


Advertisement

Barcode Scanner ASCII String Decoder  v.2013

This is a free software application that reveals hidden, non-visible commands in addition to ASCII characters from keyboard emulation devices, such as a USB Barcode Scanner. This barcode decoder application is especially helpful in determining if non-printable ...

ShellBrowser Components for Delphi /  v.7.0.3

The non-visible TShellBrowser component provides an easy interface to the Windows Shell API. All components support the properties page, correct icons, OLE drag-and-drop , the Explorer context menu and merge with your Delphi popup menus. A thumbnail ...





Advertisement

Marxio Login Logger  v.1.0

Marxio Login Logger is a non-visible application that allows you to see who was using your computer when you were out. What time someone logged into computer and when he logged out.
It can work at home computer or in Active Directory environment or ...

Multipurpose DirectShow Encoder SDK  v.1.1.2

This named pipe is taken as input by the transcoder, that is invoked as a child process in a non-visible background process from the command line.

There is no binding or C++ linking between the filter and the transcoder, all the settings are ...

Convert Non Unicode to Unicode  v.2.5

Q: How to convert Non Unicode to Unicode PST format? A: Invest in Upgrade MS Outlook tool to convert PST to Unicode PST and to manage Outlook mailbox size limit (from 2GB to 20GB). Outlook PST conversion tool easily convert Outlook PST file to 2007, 2003 ...

Prime, Non-Prime Numbers  v.1.0.0

Calculate Prime and Non-Prime numbers easily.

Remove Non-ASCII Characters Software  v.7.0

This software offers a solution to users who want to remove non-ASCII text from text-based files. Unicode characters such as Â, ý, ê will be removed. This software will save you time by allowing you to manipulate several files at once in batch.

Non-State Pension Fund Agent

The program allows creating documents (application, contract and questionnaire) by non-state pension fund agent to transfer state pension from Russian State Pension Fund (PFR) into non-state pension funds. Software supports data export and import, mass ...

NetWrix Non-owner Mailbox Access Reporter for Exchange

NetWrix Non-owner Mailbox Access Reporter for Exchange is a free tool to audit all unauthorized and accidental access to mailboxes by non-owners. The tool tracks access to confiential information of company executives and can be used to create reports ...

NeoAxis Engine Non-Commercial SDK  v.1.0

The NeoAxis Engine Non-Commercial License intended for non-commercial applications and for learning NeoAxis Engine.

This SDK includes NeoAxis Engine Demo, which showcases practically all features of the NeoAxis. Also demo contains the Resource ...

NetWrix Non-owner Mailbox Access  v.2. 2. 1979

Auditing of non-owner mailbox access is also a cornerstone of major regulatory compliance standards (e.g. SOX, GLBA, and HIPAA). Microsoft Exchange doesn't have built-in reporting mechanisms to report on this type of access.

The Non-owner ...

Non IM Riches Review Dylan  v.1.0

Non IM riches review by dylan loh is the best way to make money online without touching the internet marketing niche. Most people feel that selling to internet marketers is the only way to make money online. That is false and Dylan Loh is going to prove ...

Non IM Riches Bonus Dylan-Loh  v.1.0

Non IM riches bonus by dylan loh is the best way to make money online without touching the internet marketing niche. Most people feel that selling to internet marketers is the only way to make money online. That is false and Dylan Loh is going to prove ...

Non-Newtonian Orbit Model  v.1.0

Non-Newtonian Orbit model displays the dynamics of a mass orbiting a much larger mass subject to non-Newtonian gravity. The simulation displays the motion of the smaller mass and the impactful potential energy diagram. The initial energy of the system ...

Non-owner Mailbox Access Reporter for Exchange  v.2.2.77

Non-owner Mailbox Access Reporter for Exchange - Detects all situations when administrators and other users have gained access to another user's mailbox.Non owner mailbox access is a security pitfall in enterprise networks. On the one hand, it is often ...

Pages : 1 | 2 >
Newest Reviews