Search results for 'program user run'.
4394 products found. Showing 121-131 in 10 groups sorted by relevance.
121. Email Spy
To install and configure program you simply have to run setup file and enter your secret email address at the end of install. So you have complete control of all outgoing emails of monitored user and can make decision: will real recipients get emails sent by monitored user or not?). DetailsDownload trialBuy now ($59.95) Find similar
Vendor: Spydex Inc. (owned by Edison Commerce Corp.)
Network Eagle Network Eagle is a network monitor program. It runs checks at regular intervals and activates predefined alerts on given condition. It can be a sound alert, sending e-mail (icq, pager or mobile via mail gate), execute external program or execute user-written Java, VB script.
Network Eagle Network Eagle is a network monitor program. It runs checks at regular intervals and activates predefined alerts on given condition. It can be a sound alert, sending e-mail (icq, pager or mobile via mail gate), execute external program or execute user-written Java, VB script.
DetailsBuy now ($699.00) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows Server 2003
Language: English Included
Vendor: Effective Systems Ltd.
124. Txt2dir
C) Hit RUN button. It is especially made for professional users who can win a lot of time and money using this technique. It is a program, with which you can create a lot of folders automatically, rather than manually, one by one. DetailsDownload trialBuy now ($48.00) Find similar
Vendor: Shareware Hangvogel
125. Visible Worlds
Visible Worlds is a programmers tool to help speed up 3D Games and 3D Applications. Allowing your program to run faster and function even better on low spec'd computers. Visible Triggers (user defined). Giving your program a huge performance boost. DetailsDownload trialBuy now ($12.95) Find similar
Language: English, english
Vendor: Underware Design
126. The World of Henri de Toulouse-Lautrec Screensaver
If such materials offend you, do not download, do not install and do not run. Additional features: - Optional Transitional Effects Between Each Work of Art - Selection From Twenty-Three (23) Transitional Effects - User Determined Delay Between Each Work of Art - Optional Password Protection - Microsoft Plus! DetailsDownload trialBuy now ($8.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Cyber Artists Studios
127. Network Configuration Management
As you may know, many Trojans and malicious programs will open port in your compter when they run, so this utility can help you detect them in your system. IP Manager: create different TCP/IP settings profiles, and switch between them instantly without reboot, it is especially designed for mobile comuter users who always change their working place. DetailsDownload trialBuy now ($29.95) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003, Windows 98/ME/NT/2000/XP/Server 2003
Vendor: Missilesoft
128. TsiLang Components Suite Site License
TsiLang component will help you to translate your Delphi and C++ Builder projects in one-two minutes. TsiLang works good and fast both in design-time and run-time, since you don't have to execute your program for testing multilanguage interface. Store user defined strings and translate them. DetailsDownload trialBuy now ($2,499.00) Find similar
Platform: Windows 95, Unix / Linux, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: SiComponents
After clicking on the button Run the search of the Internet will begin with reading of initial web-page address that user have to print (paste) in the WEB URL edit control. It means that you need to buy a password to run it on your computer.
Fully compatible with ACPI features, allowing you to bring the computer to standby/hibernate mode while running Serial Monitor. After running the software (with Serial Monitor attached to it) for a period of time and recording the log, the log can later be used to test the correctness of the protocol implementation.