Google
 
Web www.FreewareBox.com
 Advertisements

Freeware search result for 'buffer'Pages : 1 2 3 . . . 6

Resort by : Name - Release date - Added date - Points - Rating - DownloadsCurrent sorting : Points

Caché MonitorVer.: 2.03

categ.: >

...tabase Cache. It supports developers with features, like: Advanced SQL Query Editor,Cache-...vanced SQL Query Editor,Cache-SQL Syntax highlighting,SQL Code completion,SQL History buffer for executed SQL commands,SQL Code formatting,Graphical...story buffer for executed SQL commands,SQL Code formatting,Graphical SQL execution plan and more. You see the process ID (PID) from your connection on the Tabpane on every Query Analyzer. Code completion allows you to type a ...de completion allows you to type a few characters and then display a list of context-sensitive possibilities to complete the text you are typing. Editor code completion brings up a list of Tables or Columns (also known as Intellisense). Code completion can be triggered by pressing [CTRL+SPACE] or by typing a hotchar or keyword, such as `.` or `,` in an SELECT list. After typing the keyword ON in a JOIN clause, ...

Download size: 4400 kBytes

StringMasterVer.: 1.3

categ.: >

...o or more files in accordance with the chosen filter: masks or sub-strings. Main applicati...or sub-strings. Main application areas of the software are the search of the required entries in the database, forum and web log dumps, text files ...uired entries in the database, forum and web log dumps, text files of large volume. The main idea behind this product is that it doesn`t have any size limits, it may process files of any size! String Master reads the source...ze! String Master reads the source file information string by string, verifies its compliance with the specified substrings or mask before putting in buffer. As the buffer fills the sorted data is stored in files, the names of which duplicate the name of the initial file with the addition of the sorting numbers of masks in the program list. Strings that do not match any of the user-defined masks are recorded i...

Download size: 2206 kBytes

Comodo Memory FirewallVer.: 2.0.4.20

categ.: >

...ion tool which provides the ultimate defense against one of the most serious and common at...the most serious and common attack types on the Internet - the buffer overflow attack. Free Comodo Memory Firewall detects most buffer overflow atta...ttack. Free Comodo Memory Firewall detects most buffer overflow attack attempts such as attacks on STACK memory, HEAP memory, ret2libc attacks and of corrupted/bad SEH Chains, Comodo Memory Firewall protects against data thef...Firewall protects against data theft, computer crashes and system damage by preventing most types of buffer overflow attacks. The product is aimed for system administrators as well as desktop users to protect their systems and detects suspicious code executions in the stack or the heap portions of the memory. To attack a computer, a malicious program or script deliberately sends more data to its memory buffer th...

Download size: 3346 kBytes

BladeBox Iron EditionVer.: 1.1

categ.: >

...les which can be mounted as if they were disk drives (with a DOS drive letter too). Virtua... DOS drive letter too). Virtual Encrypted Volumes (VEV) are seen and considered by the operating system as if they were actual volumes (drives), the...by the operating system as if they were actual volumes (drives), they have a drive letter, a volume name, and you can see them inside your My Computer resources and inside the Windows Explorer.BUT actually they are transparen...er.BUT actually they are transparently encrypted files on disk. Every time you write or read data to those volumes, the data buffer is transparently encrypted/decrypted on-the-fly. The key concept for security is that data on disk ALWAYS remain encrypted. BladeBox gives System Administrators full control over network deployment of Virtual Encrypted Volumes by providing support for an administrative master passwo...

Download size: 2256 kBytes

Free Random Password GeneratorVer.: 13

categ.: >

...rating random passwords. Free Random Password Generator allows generate passwords accordin...ws generate passwords according to the criteria you specify with one mouse click. Using Free Random Password Generator you do not have to think abou.... Using Free Random Password Generator you do not have to think about new passwords. Free Random Password Generator will do it instead of you. Free Random Password Generator is very easy to use free password generator softwar...use free password generator software. Just click the "Generate Password" button and the program will generate a random password according to the criteria you specify. Free Random Password Generator generates random passwords of any length. Randomness of generated passwords makes them hard to guess. Ability to select what characters will be used for generating passwords - you can generate passwords using letters ...

Download size: 800 kBytes

ImgBurnVer.: 2.4.0.0

categ.: >

No icon available

...on that everyone should have in their toolkit! ImgBurn supports a wide range of image f...pports a wide range of image file formats - including BIN, CUE, DI, DVD, GI, IMG, ISO, MDS, NRG and PDI. It supports Unicode folder/file names, s..., ISO, MDS, NRG and PDI. It supports Unicode folder/file names, so you shouldn`t run in to any problems if you`re using an international character set. ImgBurn supports all the Windows OS`s - Windows 95, 98, Me, NT4, 20... OS`s - Windows 95, 98, Me, NT4, 2000, XP, 2003, Vista and 2008 (including all the 64-bit versions). If you use Wine, it should also run on Linux and other x86-based Unixes. It`s a very flexible application with several advanced features that are often lacking in other tools, especially when it comes to burning DVD Video discs. It supports all the latest drives without the need for updates (including booktype...

Download size: 1872 kBytes

Heap/Stack Buffer Overflow MonitorVer.: 1.0

categ.: >

No icon available

...ve anti-virus technology for PCs and servers. It monitors heap/stack buffer overflow of ma...ap/stack buffer overflow of malicious software such as network worms in real time, extends coverage for unknown security risks, and reduces the cos...e, extends coverage for unknown security risks, and reduces the cost of managing an outbreak response. Buffer overflow vulnerabilities are the result of poor input validation, they enable an attacker to run his input as cod...an attacker to run his input as code in the victim. Buffer overflows are a favorite exploit for hackers. A vast majority of applications suffer unchecked buffer problems. Features: 1. Automatic monitor all applications, provide the real-time protection from the viruses or hackers that carries on the attack using the buffer overflow problems. 2. Prevents the attacks that arise from buffer overflow problems ...

Download size: 562 kBytes

Net Booster LiteVer.: 3.2.0.5

categ.: >

...nnections. Add more speeds greater than 115200 to your modem settings. Speed up your conne... settings. Speed up your connection without any networking or communication background requirements. Detect your OS to indicate the best settings fo...ground requirements. Detect your OS to indicate the best settings for your system. Adjusts MTU (Maximum Transmission Unit), MSS (Maximum Segment Size). Automatically detect the MTU for all networks along the path to a remote ...etworks along the path to a remote host (MTU discovery procedure), thus avoid packet fragmentation, performance problems. Detecting bad routers ( Black hole routers) that may prevent MTU discovery procedure to be completed correctly. Adjusts RWIN to the best size settings for your system. Configure the TTL (Time To Live) value that defines how long a packet can stay active before being discarded. Configure Keep ...

Download size: 3791 kBytes

Free DVD Ripper and BurnerVer.: 1.1.0.0

categ.: >

...and ISO-images as well as multi-session, bootable. Audio Burner - create, burn audio CDs e...ner - create, burn audio CDs easily from WAV, MP3, WMA, OGG, RAW, VOX, etc files, burn CUE-images to disc directly. Features - Record Discs by Drag,..., burn CUE-images to disc directly. Features - Record Discs by Drag, Drop data or audio information contained in files onto icons on the desktop, start automatically with windows start up, Create Discs from a DVD, best Audio ...reate Discs from a DVD, best Audio or Data Discs that can be read with any PC, Supports most IDE, USB, IEEE1384, SCSI DVD+R/RW, CD recorders, Records DVD+R/RW, CD discs On-the-Fly, erases re-writable discs, Supports Buffer Protection systems, Burn Proof, others error free recording types, Creates fully compatible ISO9660 Level 1, 2, Joliet data CDs, DVDs, Imports multi-session CDs, DVDs, merges new files with an...

Download size: 11755 kBytes

Free Net Booster LiteVer.: 1.1.0.0

categ.: >

...nnections. Add more speeds greater than 115200 to your modem settings. Speed up your conne... settings. Speed up your connection without any networking or communication background requirements. Detect your OS to indicate the best settings fo...ground requirements. Detect your OS to indicate the best settings for your system. Adjusts MTU (Maximum Transmission Unit), MSS (Maximum Segment Size). Automatically detect the MTU for all networks along the path to a remote ...etworks along the path to a remote host (MTU discovery procedure), thus avoid packet fragmentation, performance problems. Detecting bad routers ( Black hole routers) that may prevent MTU discovery procedure to be completed correctly. Adjusts RWIN to the best size settings for your system. Configure the TTL (Time To Live) value that defines how long a packet can stay active before being discarded. Configure Keep ...

Download size: 3791 kBytes

Find others 'buffer' freeware Pages : 1 2 3 . . . 6
 Sponsored Links:
Google
 
Web www.FreewareBox.com