|
||||||
|
||
|
Home > Verification software |
Related keywords: credit card verification, credit card number verification, creditcard verification, Email Verification, address verification, e mails verification, email verification |
|
|
51. | NetShift 6.2 (netshift.com) | ||
NetShift is a public-proof Web browser front end for PCS or kiosks with Internet/Intranet access. It allows users to operate a Web browser easily, either in a touch-screen information kiosk or on a corporate intranet. Sitting on top of and controlling the Web browser, it enables novices to browse in a safe | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Daw | Size: 36764 kb | Demo Go to category: Communications > Chat & Instant Messaging Similar programs | |||
52. | VeriFinger Extended SDK 4.2 (neurotechnologija.com) | ||
Supports DigitalPersona U.are.U, Identix DFR2090, Cross Match Verifier 300, BiometriKa FX 2000 and TouchChip TCRU1C scanners, AuthenTec AES4000. VeriFinger Extended SDK distribution package contains: * VeriFinger DLL (three licenses); * Fingerprint scanning component, which reads fingerprints from fingerprint scanner (supports DigitalPersona U.are.U, Identix DFR2090, Cross | |||
Updated: 9, 2005 | Rating: 0 | Author: Neurotechnologija | Size: 3948 kb | Demo Go to category: Development > Components & Libraries Similar programs | |||
53. | FingerPoint 1.4 (neurotechnologija.com) | ||
FingerPoint is an end user software package for person identification using his/her fingerprints as a unique ID. The system has integrated support for DigitalPersona U.are.U fingerprint scanners, and is intended for application in enterprises where frequent and reliable check-ups of personal identity are | |||
Updated: 9, 2005 | Rating: 16 | Size: 8012 kb | Demo Go to category: System Utilities > Other Similar programs | |||
54. | NetShift 6.1 (netshift.com) | ||
NetShift is a public-proof Web browser front end for PCS or kiosks with Internet/Intranet access. It allows users to operate a Web browser easily, either in a touch-screen information kiosk or on a corporate intranet. Sitting on top of and controlling the Web browser, it enables novices to browse in a safe | |||
Updated: 9, 2005 | Rating: 159 | Author: Tim Daw | Size: 24584 kb | Demo Go to category: Communications > Chat & Instant Messaging Similar programs | |||
55. | Hotmailer 3.0 (aidsoft.com) | ||
is a bulk email sender, email address finder and verifier. It can efficiently search large amount of e-mail addresses from a mail server in a short time. With built in SMTP server, it will connect to the remote server and post email addresses for verification. If the email address is valid, Hotmailer will automatically send the mail. With a 56K internet connection speed | |||
Updated: 9, 2005 | Rating: 0 | Author: Tan Chi Thai | Size: 479 kb | Demo Go to category: Communications > E-Mail Clients Similar programs | |||
56. | DVdriver 1.0 (pantiltcam.com) | ||
DVdriver runs in conjunction with multiple webcam software applications simultaneously. It lets your camcorder act like a webcam that has optical zoom, auto focus, stereo sound, auto stabilizing, night vision, high quality optics, and more, depending on your camcorder. Control zoom, focus, recording, and | |||
Updated: 9, 2005 | Rating: 79 | Author: V. Doma | Size: 556 kb | Demo Go to category: Audio & Multimedia > Video Tools Similar programs | |||
57. | AlertPingPro 2.7.6 (psgsoft.com) | ||
income is falling. Stop it with "AlertPing"! Alert Ping verifies accessibility of your host computers! It is used for 'pinging' IPs, f.e. computers in your local area network or in the internet. Build a list of TCP/IP devices (computers, printers, and other network components) to verify their network connections. AlertPing periodically pings each device to | |||
Updated: 9, 2005 | Rating: 0 | Author: Vadim Petrov | Size: 656 kb | Demo Go to category: Network & Internet > Network Monitoring Similar programs | |||
58. | Voices in the Abyss 1.00 (e-dition.net) | ||
April 15, 1912 : As the RMS Titanic begins its fateful journey into darkness, a third-class family, the Coopers, waits patiently for a place in the rapidly filling lifeboats. The ship is sinking fast, and Augusta Cooper realizes that her family will be left behind. She begs a first-class woman in a boat to | |||
Updated: 9, 2005 | Rating: 16 | Author: Mark Carlson | Size: 5639 kb | Demo Go to category: Business > Other Similar programs | |||
59. | Bigfoot Hunter 1.0 (aidsoft.com) | ||
This is the pefect computer program for searchers of Bigfoot. This program lets you record detailed information about each of your encounters, such as: DATE OF SIGHTING, TIME, SIGHTING DETAILS, LOCATION INFO, GPS COORDINATES, SOUND INFO, SMELLS, MOTION SENSOR ACTIVITY, NIGHT VISION ACTIVITY, NOTES, and much | |||
Updated: 9, 2005 | Rating: 0 | Author: Robert W. Benjamin | Size: 883 kb | Demo Go to category: Home & Hobby > Other Similar programs | |||
60. | PELock 1.06 (pelock.pac.pl) | ||
between application and license key system • creation and verification of registration keys using public keys encryption algorithms (RSA) • ability to create trial keys and hardware dependent keys • keeping of the database and checkup of "stolen" (illegal) registration keys • ready to use samples of license key system in C/C++/Delphi • user-friendly interface • many | |||
Updated: 9, 2005 | Rating: 0 | Author: Bartosz Wójcik | Size: 422 kb | Demo Go to category: Development > Other Similar programs | |||
|
Home > Verification software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|