|
Top Software - Data Mining Algorithms
|
IQ Game 1.3
|
IQ Game is a famous logic puzzle that will increase your IQ level. It is quick to play, much to think, and think in advance. You will play against computer in two modes: "Pinky" or "Brain". The... |
|
|
|
|
Trace Zapper WinCleaner N Optimizer 2.6.1.1
|
TraceZapp WinCleaner N' Optimizer like a professional cleaner, the program knows exactly what kind of dirt to look for, where to find it & how to get rid of it efficiently and safely. |
|
|
|
|
Trace Remover WinCleaner N Optimizer 2.6.1.1
|
TraceRemover WinCleaner N' Optimizer like a professional cleaner, the program knows exactly what kind of dirt to look for, where to find it & how to get rid of it efficiently and safely. |
|
|
|
|
CDX ESafeFile 5.0.1
|
Secure your email and files with CDX ESafeFile. ESafeFile creates encrypted, password protected self extracting files. With ESafeFile sensitive information can be transferred safely and securely... |
|
|
|
|
File identifier 0.6.1
|
Command line tool that permits identification of different files, as well as extracting the metadata associated with those files. Furthermore, the identification part of the software is a text... |
|
|
|
|
VectorEye 3.0
|
VectorEye is a great raster to vector converter that exports to SVG, Ps Eps, Flash and xaml vista. It recognizes all major raster formats (BMP, JPEG, PNG, TIFF) .Compatible with Adobe, Corel, Jasc,... |
|
|
|
|
CryptoCrat 2005 4.61
|
CryptoCrat 2005 compresses multiple files into one single encrypted file using strong encryption. It transforms files data into gabberish undecipherable by others. Original file can only be... |
|
|
|
|
O&O UnErase 4
|
O&O UnErase 4 makes the restoration of deleted data as easy as “a walk in the parkâ€. With the help of a new and one-of-a-kind algorithm, more files can be restored than ever before.... |
|
|
|
|
Arovax TraySafe 4.3
|
TraySafe password manager allows you to forget passwords! It will save and protect them for you: encryption and hashing algorithms, autoinsert and autofill, hardware ID, USB drive support.
You... |
|
|
|
|
I of the Enemy: RilCerat 2.25
|
I of the Enemy: Ril'Cerat is a totally free, stand alone, science fiction real-time starategy game, that is the first chapter in the "I of the Enemy" saga. The player is a Lokob (luh-kobe) officer... |
|
|
|
|
Calendarscope 3.5
|
Calendarscope is a full-featured calendar program for planning, managing, and scheduling any events and tasks. Standard calendar views are available. color-coded reminders, Web calendars, Printing,... |
|
|
|
|
Chilkat Zip Compression C++ Library 12.4.0
|
An affordable, advanced, feature-rich Zip Compression Visual C++ Library that can satisfy your application's file and data compression needs. Includes file and in-memory Zip and Unzip, AES... |
|
|
|
|
ViPNet Safe Disk Mobile 1.2
|
ViPNet Safe Disk for Pocket PC provides your PDA with a totally encrypted and password-protected environment for your files. In case your PDA is stolen or lost, no one will be able to compromise... |
|
|
|
|
Ultimate Delete 2.0.1.5
|
Ultimate delete software wipe data files wiper tool erase private records offline online activity utility delete typed URLs recent visited documents internet cache history hard disk eraser tool... |
|
|
|
|
Password Saver Pro 5.8.3.2134
|
Password Saver (Business) (5 licenses)This powerful, software lets you store all your passwords in a secure, centralized database on your hard drive or a removable media disk. Your password... |
|
|
|
|
Top Invisible Secrets 4.0
|
Invisible Secrets 4 is now a powerful security suite that helps you solve these problems. You can hide files, encrypt files, destroy your Internet traces, shred files, make secure IP to IP password... |
|
|
|
|
EncodingSleuth 1.0
|
EncodingSleuth Text is a distributable Java library that examines streams of bytes to determine whether they represent encoded text, and to detect the character set used to encode the original text... |
|
|
|
|
MITCalc - Buckling Calculation 1.14
|
Calculation of the optimum cross-section of slender struts strained for buckling and strength check calculation
according to Johnson, Tetmajer, Euler and Secant method. Simple definition of the... |
|
|
|
Software: 141 to 160 of 200 | Pages: 1 ... 4 5 6 7 8 9 10 All | Freeware
|