Google
 
Web www.FreewareBox.com
 Advertisements

Freeware search result for 'information'Pages : 1 2 3 . . . 217

Resort by : Name - Release date - Added date - Points - Rating - DownloadsCurrent sorting : Points

F30 Facebook Password RecoveryVer.: 2013

categ.: Security & Privacy > Password Managers

No icon available

...information user accounts of Facebook stored in IE7, IE8, Firefox 3.5, 3.6, 4.0, 5.0, Safa...refox 3.5, 3.6, 4.0, 5.0, Safari, Google Chrome, Google Chrome Canary build o SXS, Flock, RockMelt, SRWare Iron, Comodo Dragon and ChromePlus. This ...S, Flock, RockMelt, SRWare Iron, Comodo Dragon and ChromePlus. This is a 8 in 1 Password Recovery tool, usefull for recover stored password of Facebook of the 3 more popular Webbrowsers and more. You only have to open the pro...more. You only have to open the program, and pulse on the icon "Recover Passwords". that simple. In synthesis, a tool that can take us out of a difficulty in more than an occasion. The current version of Facebook Password Recovery will run on Windows XP, Vista and Windows 7. Trial period is endless. All passwords are recovered instantly. Recover Facebook stored passwords from Internet Explorer...

Download size: 147 kBytes

SuperEasy Password Manager FreeVer.: 1.0.0.25

categ.: Security & Privacy > Password Managers

...cedures, SuperEasy Password Manager Free automatically detects when a password is required...ts when a password is required and generates a secure password on-the-fly. Furthermore, SuperEasy Password Manager Free automatically fills in forms...ermore, SuperEasy Password Manager Free automatically fills in forms with your personal information, if desired. This free version lets you manage up to fifteen account passwords and one identity card. SuperEasy Password Man...entity card. SuperEasy Password Manager PRO lets you manage any number of account passwords and identity cards. All Features: - Fill out forms instantly - Log In automatically - Manage web accounts - Integrated password generator - Manage app accounts - Create encrypted identities - Create encrypted memos - Virtual keyboard - Encrypted backups of your passwords...

Download size: 13619 kBytes

Advanced LAN ScannerVer.: 1.0

categ.: Network & Internet > Network Monitoring

...ork scanner for Win32. And it`s fast. It`s VERY fast. Advanced Lan Scanner uses multithrea...ed Lan Scanner uses multithreading technique, that gives it ability to scan more than 1000 elements per second! If used to scan ports, Advanced Lan ... than 1000 elements per second! If used to scan ports, Advanced Lan Scanner can scan all 65536 ports in less that minute! Also, fast scan is not only Advanced Lan Scanner good feature. It performs very deep scan upon each com...rforms very deep scan upon each computer you wish, extracting users, services, shares and a lot of over useful information. It can connect to target machine using default user rights, or you can specify login and password to use. It also has a powerful export options with script language to describe your own save format! So, try our freeware program and see, how REAL Lan Scanner must look....

Download size: 561 kBytes

Softlookup Search ToolbarVer.: 1.01

categ.: Audio > Utilities & Plug-Ins

...dows device driver fast and easy. The Softlookup Toolbar takes only seconds to install, is...es only seconds to install, is free to use and enables you to search the softlookup drivers database from within your Internet Explorer browser. S...okup drivers database from within your Internet Explorer browser. Softlookup does not collect any information about you (such as your IP address, name, email address, etc.). In order to install the plugin close all IE window...tall the plugin close all IE windows first, then follow the instructions in the install screen. The toolbar is quite self explanatory and easy to use....

Download size: 2094 kBytes

Adeptia Data Integration SoftwareVer.: v5.1

categ.: Business & Finance > Databases & Tools

No icon available

...system (straight thru) data flows but also the more common human-to-system or system-to-hu...uman-to-system or system-to-human business processes where business users need to interact with running data flows to view information, correct erro...o interact with running data flows to view information, correct errors and resubmit data if needed. Adeptia Integration Server allows companies to "centrally manage" all their integration interfaces from one, web-based app... interfaces from one, web-based application. All the application touchpoints, database connections, protocols, Web Services, formats and schemas, mapping rules, data validations, triggers, alerts and notifications and run-time logs are all managed from one place. On an ongoing basis, as rules and formats change, this approach really simplifies the process of maintaining all the interfaces and data bridges....

Download size: 136718 kBytes

Cache Lister for WinGateVer.: 0.6

categ.: Network & Internet > Other Internet Tools

No icon available

...It generates a listing of all URLs which are currently in WinGates cache. The information ...nGates cache. The information listed for each item include URL, cache file, size, content-type, cache hits and access/modification date. This listin..., content-type, cache hits and access/modification date. This listing can be used to eliminate unwanted or old content from the cache by simply deleting the associated cache file.......

Download size: 185 kBytes

Access Recovery FreeVer.: 1.0

categ.: Business & Finance > Databases & Tools

...overing damaged Microsoft Access (.mdb and .accdb) files. Access Recovery Free is powered ...cess Recovery Free is powered by a proprietal and comprehensive error algorithm and database developed by the Access Recovery Free team. We have als...and database developed by the Access Recovery Free team. We have also designed the user interface with the inexperienced and computer illiterate in mind - you do not need any previous experience of file recovery in order to s...ence of file recovery in order to successfully repair your Access databases. The recovery process is straightforward and follows a 1-2-3 approach. Step 1 is where you choose the database file which needs to be repaired. Step 2 is where Access Recovery Free performs a deep scan and analysis of the file and identifies the errors and repair requirements. Step 3 is where the results are presented to the user and the...

Download size: 1238 kBytes

Norton Internet Security for Mac BetaVer.: 5

categ.: Security & Privacy > Anti-Virus Tools

...about getting attacked or scammed. Norton Internet Security for Mac gives you the power to...for Mac gives you the power to protect your identity, your Mac, and your files from all types of online threats so you can safely enjoy your favorit...rom all types of online threats so you can safely enjoy your favorite online activities. Norton Internet Security for Mac warns you of unsafe websites and suspicious online merchants right in your search results. It blocks da...n your search results. It blocks dangerous and phishing websites designed to steal your identity and hard-earned money. And, it automatically detects and eliminates online threats?including spyware?before they can steal your personal information, take control of your Mac, or damage your irreplaceable files....

Download size: 74752 kBytes

Component Conversion UtilityVer.: 0.6

categ.: Software Development > Tools & Source Editors

...e in a variety of languages. It allows users to define objects in a friendly GUI or to imp...ts in a friendly GUI or to import code from a text/binary file or a database. Once components have been created or imported, the CCU can output many...ce components have been created or imported, the CCU can output many flavors of source code. The app is perfect for n-tier development in which coders are generally forced to redefine objects in several languages (SQL, HTML/...ts in several languages (SQL, HTML/JavaScript, Java, etc.). Beyond just creating table definitions, forms and accessor/mutator methods (respectively), the CCU propagates validation code across several languages. Use the CCU to define basic constraints (String length, number range/precision, regular expressions, etc.) and the appropriate check constraints, JavaScript validation and exception handling code (respec...

Download size: 2901 kBytes

CyberDefenderFREEVer.: 2.0

categ.: Security & Privacy > Anti-Virus Tools

...fections other security software misses, offering protection from spyware, viruses, spam, ... from spyware, viruses, spam, phishing and Internet identity theft. CyberDefenderFREE provides rapid detection and protection against fast-moving on...rFREE provides rapid detection and protection against fast-moving online security threats while working alongside other antivirus and security software. The company?s patent-pending earlyNETWORK? is the world?s first distribu...WORK? is the world?s first distributed system for security updates which detects and immunizes PCs against new virus attacks within hours after discovery. By making your computer part of the solution, CyberDefenderFREE works while you do - with an efficient scan speed. Every PC on the CyberDefender network is on the lookout for suspicious files and reports them to the Early Alert Center? which then quickly anal...

Download size: 11264 kBytes

Find others 'information' freeware Pages : 1 2 3 . . . 217
 Sponsored Links:
Google
 
Web www.FreewareBox.com