ChrisTWEAK - Improve your TV experience, optimize your capture device settings.While using your favorite capture software or TV application, ChrisTWEAK lets you change any setting in the capture device driver in order to improve TV experience, such as : Image settings, Video standard , Image Prefilter Settings (Dynamic Noise Reduction) available for Hauppauge PVR. Supported capture devices: TV Cards, Graphic Cards with VIVO, Webcams and more...
See also: ChrisTWEAK, Improve your TV experience, Image prefilter, tweak, denoise, HW, encoding, PVR, The PVR that TAKES control OVER your TV Card, best program for viewing TV on your PC, high quality image
ChrisTV Standard 4.95
ChrisTV Standard - The PVR that TAKES control OVER your TV Card - developed by Chris P.C srl for TV Tuners with WDM Drivers installed. Supports all TV Cards based on BT8x8 chipset, Philips SAA713x chipset, Conexant CX2388x. Great Image quality and very easy to use. Has support for 25 languages. Key Features : TimeShifting,Recording AVI and MPEG, Advanced Scheduler, Channel AutoScan,Fine Tuning, Customize each Channel Properties, Zoom,Deinterlace
See also: ChrisTV, The PVR that TAKES control OVER your TV Card, best program for viewing TV on your PC, high quality image, recording, fm radio, WDM Drivers, TV Tuners, BT8x8, Philips SAA713xx, Ciplea
ChrisTV Professional 4.80
ChrisTV Professional - The PVR that TAKES control OVER your TV Card - for any capture device with WDM Drivers installed. Supports TV Cards based on BT8x8 chipset, Philips SAA713x chipset, Conexant CX2388x, TV Cards with MPEG Hardware Encoder (Hauppauge PVR seris, ATI Theater 550 PRO). Great Image quality and very easy to use. Key Features : AVI & MPEG Recording, FFDshow, Timeshift, Advanced Scheduler, Channel AutoScan, customize each channel.
See also: ChrisTV, HW, hauppauge, theater, encoder PVR, The PVR that TAKES control OVER your TV Card, best program for viewing TV on your PC, high quality image, recording, fm radio, WDM Drivers
Quality Window v5.0.667 5.0
An SQC/SPC/Event Analysis tool designed for use on the factory floor. The intuitive presentation of data uses product/customer specifications to help "find and fix" reasons for process/product variation as well as helping in the analysis and understanding of failures such as downtime and defects, tailored to your specific needs. Data collection can be manual or assisted through interfaces to PocketPC's, scales, gauges or even PLC's.
See also: Quality Control, SPC, SQC, Downtime, Defects, Rejects, Six Sigma, PLC, Reliability, Statistics
Inventory Control 2D Barcodes 188.8.131.52
Bar code generator application offers user to simply set bar heights and density lets them to modify shapes, sizes, fonts, styles, dimensions, color setting of created bar code labels. Retail industry bar code labeling application allow you to craft high resolution and multicolor sticker images using enhanced bar code designing view facility including lines, text, pencils, ellipse, rectangle, triangle, stars, circle, images, pictures etc.
See also: Retail, industry, bar, code, designing, application, craft, best, quality, customized, stylish, sticker, coupon, badge, inventory, control, generate, colorful, image, shape, size, linear, 2D, font, standard, track, business, product, information
Inventory Control Barcode Maker 184.108.40.206
Inventory control barcode maker software provides first-class solution to generate and print high resolution attractive, impressive and professional barcode objects in minimal time. Barcode creator tool crafts professional looking barcode tags in linear/2d fonts using impressive image designing tools like pencil, ellipse, arc, star, picture, line and others. Inventory Control Barcode Maker utility includes pretty and impressive GUI interface.
See also: software, tool, setting, print, color, background, sticker, tag, coupons, fonts, dimension, 2d, linear, size, shape, quality, resolution, high, customized, colorful, designed, generator, maker, barcode, business, control, inventory, industry, Retail
KGB Keylogger 2.94
KGB Keylogger is a multifunctional keyboard tracking software that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as the caption of that window.
See also: spy, spies, snoopware, logging, logger, littlesister, Little Sister, law enforcement, keytrapper, keytrap, keystroke, keyspy, keylogwn, keylogger, keylog, keycopy, keyboard, key, government agency, grabber, gathering, internet, investigator, investigative, investigation, investigate, intrusion, interceptor, interception, intercept, intelligence, intercept, inspection, investigator, inspection, internet monitoring, intelligence gathering, industrial espionage, husband, hooking, hook, hardware keystroke recorder, hardware keylogger, hacking, hack, hacker, home security, foreign intelligence, freeware, espionage, equipment, eavsdrop, eavesdropping, eavesdropper, employee monitoring, e-mail monitoring, email, e-mail, economic espionage, desktop monitoring, data interception, desktop, computer, corporate information security policies, computer monitoring, competitor intelligence, competitive intelligence, child monitoring, cheating spouse, control, catch, capture, bugging, bug, bigbrother, Big Brother, business intelligence, audio, background investigation, access control background check, attack, access, accountability, activity monitor, key stroke, keystroke, recording, monitoring, key monitor, recorder, spy on user, keyspy, keyboard capture, keyboard monitoring, key monitor, keystroke monitoring, keystroke recording, keylogwn, keylog, key capture, keystroke capture, keystroke logging, keystroke recorder, keystroke recorder, keycopy, keyboard monitoring, keyboard monitor, keylogger stealth, keyboard logger, invisible keylogger 97, invisible keylogger, keytrap, password, passwords, password grabber, keystroke logger, password recorder, keystroke recorder, hardware keystroke recorder, Hardware KeyLogger, key logger, keylogger, logon, military agency, monitor, monitoring, nonviral malware, nonvirus malicious programs, password, patrol, parental control, personnel security program, police, private investigator, product, program, p.i., PC, pwd, recorder, recording, surf, software, spy kids, screen capture, snapshot, snooper, snooping, spy gadget, spy gear, spy on user, spysoft, spytool, spyware, surveillance, tracking, traffic, trap, trapper, trapware, Trojan, trojan, tool, utilities, video, virus, web, wife, workplace surveillance etc.
Win Control 2004
With Win Control you can not only define the access rights each of your users should have, you can also protect the Windows Desktop from unauthorized manipulation. You can even define access privileges to system functionality for each user. Finally make an end to deleted or moved links, unlicensed copies of programs, unauthorized screensavers and most of the other vandalism to a Windows 2000/NT and Windows XP system users can think of.
See also: Policies, Win Control 2002, Restrictions, Security, Windows, XP, NT, 2000, Vandalism, Lock, Unlock, Power Toys, Teacher, Admins, Poledit, Lock Apps, Group Policies, Parents, Nanny, secure, System, PC, Lock games, No, Downloads, Internet Explorer
Aye Parental Control 2.60
Aye Parental Control helps parents restrict the time that children spend on computer and Internet. It is the utility for home PC that enables a parent regulate When and How-much of children's time that can be spent on the computer whether it be playing games or surfing the Internet. It also has the ability to block access to specified programs and websites.
See also: Parental Control, computer timer
Utility for saving the priority of applications and interface enhancements for the standard Task Manager.Saving the priority of each process.Detecting the full path to the executable file and providing detailed information about it from the name of the process in the list of running processes in Windows Task Manager.Viewing services hosted by processes.Quick access to system services.Analyzing the current TCP/IP connections.
See also: priority, network, tcp, ip, activity, statistics, services, control, panel, task, manager, process, details
Web Padlock 3.2
Web Padlock gives you control over what Web pages can be viewed on your computer. Once installed, it blocks other Web browsers ( Internet Explorer, etc.) from running, leaving Web Padlock as the only Web browser. Only Web sites on the password-protected user-defined authorized list can be visited.
See also: access control, Internet, Web browser, Web security, Internet security
CDRom Watchdog 1.22
You can master the usage of the CDROM/DVDROM by using CDRom Watchdog. So that CDROM/DVDROM will be your loyal subordinate. All the disks or CD-ROM unaccepted by you are forbidden to use. You can prevent such things to happen by CDRom Watchdog, that your children play the games secretly(parent control) or anyone use your CDRom without your approval. If you have this series of software, anyone could not use your CD-ROM unauthorized.
See also: cdrom, watchdog, parent, control, access, children, secret, protect
Apex SQL Edit 2.20
Apex SQL Edit is a complete development, editing and deployment environment for SQL Server Developers. Apex SQL Edit provides Visual Source Safe Integration, Intellisense and powerful features not found on other SQL Editors. Apex SQL Edit offers many new features including object notes, context sensitive options while editing such a What is?and Open of stored procedures as well as results pane that allows grouping and filtering...
See also: sql edit, sql editor, ms sql server, sql tool, microsoft sql, sql editor, sql ide, intellisense, version control
Small Business Security Manager 4.3
The Small Business Security Manager is designed to assist the classified facilities security officer (FSO) with visitor control, employee security training, and document control duties. A user friendly interface, numerous reports, batch employee training and data update capabilities, and visit requests and authorized access list generation significantly reduce administrative time.
See also: Security, Facility Security, Facilities Security, Classified, Visit Request, Document, Document Control
IVOS - Intelligent Voice Operating System 2.0.2.A
IVOS (Intelligent Voice Operating System) is an intelligent agent that offers both Speech Recognition and Text-to-Speech capabilities, allowing you to run your computer via voice commands. You can control the menu and sub menu of any software, including total voice operation of MS Outlook. You can use voice commands to open files, folders or websites and much more.
See also: intelligent, tts, text to speech, voice recognition, speech recognition, voice, speech, command control, dictation
Advanced Security Level 6.1
Secure your PC and restrict access to it with Advanced Security Level. It gives you an excellent administrative support to control the users access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets and to running specific applications; hide desktop icons, local and network drives; disable Start Menu items, DOS, boot keys, Registry editing, taskbar and much more.
See also: computer security, secure Internet, access control, password protection, privacy, restrict access, software, downloads, advanced security level
SMTP/POP3 Email Engine for PowerBASIC 3.7
MarshallSoft SMTP / POP3 PowerBASIC email component library to send, receive and parse mail including HTML and MIME Base64 and quoted-printable encoded attachments from within a PowerBASIC application. Knowledge of Winsock and TCP/IP is not needed. Not dependant on support libraries. Use with any language that can call the Windows AP; works with PB/CC, PB/DLL and PB/WIN. Includes multiple examples. Fully functional evaluation version.
See also: smtp, pop3, email, winsock, component, library, PowerBASIC, PB/CC, PB/DLL, PB/WIN, mime, tcp/ip, control, email component, HTML, MIME, mail component, attachment, Base64, UUENCODE, send mail, ISO-8859, UTF-8, DLL, image, protocol, proxy, thread, authentication, GIF, JPEG, CC, BCC
Windows Std Serial Comm Lib for C/C++ 4.1
Serial communication component C++ library for serial port communications from a C/C++ or Visual C++ program. Controls multiple ports simultaneously, is fully thread safe, includes 16-bit and 32-bit DLL's, also works with C++ .NET and C#, MFC and C++ Builder. Does not depend on support libraries. Use with any language that can call the Windows API (VB,VB.NET..). Includes 32 functions plus modem control, ANSI emulation, ASCII/XMODEM/YMODEM.
See also: serial communication, serial port, component, library, Visual C++, .NET, C#, modem, xmodem, ymodem, serial, communication, communications, libraries, control, port, rs232, rs485, ansi, device, DLL, source code, uart, MFC, C++, XP, 2000, serial communications, serial component
1st Security Agent 6.41
Password-protected security utility for all Windows. Restrict access to Control Panel, disable Start Menu items, hide local, network and USB drives, disable DOS, boot keys, Registry editing, taskbar, task manager, network access, hide desktop icons, apply password protection to Windows, disable running applications. Secure Internet Explorer, disable individual menu items, individual tabs in Internet Options, as well as other settings, etc.
See also: password, security, administrator, access, control, protect, privacy, restrict, lock, screen, free, download
PC James Bond 007 2007 5.2
PC James Bond 007 secrectly records keystrokes, screenshots, websites visited, windows opened, applications run, Skype, MSN IM, ICQ, AIM, Yahoo! IM, clipboard, emails read, docs, passwords and more. In Stealth Mode, it is completely invisible to computer users. You can set hotkey and password to access the program. Receive all logs from a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
See also: aim, icq, msn, camera, spy, pc, monitor, emails, skype, security, sniff, stealth, control, parental, password, keylogger, logger, stroke, key, snapshot, email, shot, screen, record, messenger, yahoo, ie