SuggestSoft.com

With

SI Caller ID 1.0

SI Caller ID 1.0: Use your modem as a big-screen talking Caller ID announcement system with a voice, and clearly speaks names and numbers. Did you know that the National Do Not Call Registry does not protect you against all telemarketers? Charities and non-profits are excluded, and business numbers are not eligible to participate in the Registry. Stop the rest of the telemarketers with SI Caller ID! Blocking telemarketing calls has never been easier with tools as simple as a modem and a free software utility. SI Caller ID blocks known






AstroMenace 1.3.2: AstroMenace is a unique hardcore scroll-shooter crafted with superb 3d graphics
AstroMenace 1.3.2

with two different control styles, simulator and arcade. It`s up to you to decide, whether to concentrate on inflicting damage and make total carnage or involve some skillful maneuvering to the flight. Along with different navigation systems there are 22 playable ships each with its own specific characteristics. What`s more AstroMenace comes with a convenient system of pilot profiles that redeems from a saveload routine and a handy interface creating

scroll, aliens, arcade action, shooter, space





RemoteNetstat 1.1: Displays remote network computer IP, ICMP, TCP, UDP and Server statistics.
RemoteNetstat 1.1

with reset flag, cumulative connections, details about UDP datagrams the number of received datagrams, datagrams without port, datagrams with errors, sent datagrams, listening connections, ICMP messages in incoming and outgoing states including the number of messages , errors, unreachable messages, TTL exceeded messages, messages with parameter problems, source quench messages, redirected messages, echo messages, echo replies, time stamp replies,

admin, network, interactive, system, task, local, service, remote, execute, parameters, administrator, tool, programs



RemoteNetstat 1.3.3: Displays remote network computer IP, ICMP, TCP, UDP and Server statistics.
RemoteNetstat 1.3.3

with reset flag, cumulative connections, details about UDP datagrams the number of received datagrams, datagrams without port, datagrams with errors, sent datagrams, listening connections, ICMP messages in incoming and outgoing states including the number of messages , errors, unreachable messages, TTL exceeded messages, messages with parameter problems, source quench messages, redirected messages, echo messages, echo replies, time stamp replies,

admin, network, interactive, system, task, local, service, remote, execute, parameters, administrator, tool, programs



DataMatrix ECC200 Font and Encoder 11.5: Collection of fonts and components to generate ECC200 Data Matrix barcodes.
DataMatrix ECC200 Font and Encoder 11.5

with TrueType, PCL and PostScript fonts by using IDAutomation Vertical Interleaved Technology. Includes VB code, Java Library, ASP.NET Web Control, .NET Forms Control DLL and examples for Excel, Word, Access, Java, .NET and Crystal Reports. Hundreds of text characters and binary data can be stored securely and inexpensively with the DataMatrix symbology. Using Reed Solomon error correction, the printed DataMatrix symbol can also withstand damage

bar code, ecc200, datamatrix, data matrix, ecc 200, barcode, fonts



Depths of Peril 1.015: Depths of Peril is a single player action RPG with strong strategy elements.
Depths of Peril 1.015

with strong strategy elements. You play as a faction leader protecting the barbarian city, Jorvik, by destroying threatening monsters and completing quests. At the same time, you compete with rival factions to see who will rule the city. Barbarians choose their leaders by fighting to the death! As a faction leader, you must deal with rival factions through diplomacy, trade, and in time, war. Between battles and raids against other barbarian factions

action rpg, game, strategy rpg



IDAutomation Data Matrix Font & Encoder 7.4: Collection of fonts and components to generate ECC200 Data Matrix barcodes.
IDAutomation Data Matrix Font & Encoder 7.4

with TrueType, PCL and PostScript fonts by using IDAutomation Vertical Interleaved Technologyâ„¢. Includes VB code, Java Library, ASP.NET Web Control, .NET Forms Control DLL and examples for Excel, Word, Access, Java, .NET and Crystal Reports. Hundreds of text characters and binary data can be stored securely and inexpensively with the Data Matrix symbology. Using Reed Solomon error correction, the printed DataMatrix symbol can also withstand damage

bar code, ecc200, datamatrix, data matrix, ecc 200, barcode, fonts


More Results: 1  2  3  4  5  6  

World IT News