Low Sodium Diets Free Download

 

RSP Tar Gzip OCX

ActiveX OCX to list , test , and extract tar , tar-gzip and tar-bzip2 files , ability to pause , resume and cancel the execution , the code is optimized for new AMD and Intel processors , the decompression engine is loaded dynamically in the process. RSP Tar Gzip OCX is a shareware software filed under activex, development, programming, visual basic utilities.

cancel activex ocx amd

Food File

Software that is a free food database and calorie counter for 1000s of food products. Kelpiesoft Food File is for anyone who is interested in what they eat, but is particularly useful for those following a diet for health or weight loss reasons. Searching the database is as simple as typing in the food you are looking for - the software will display a lists of matching foods as quickly as you type. Food File is a freeware software filed under home, hobby food, drink utilities.

1000s calories food facts

Privacy.ACCESS v4.0

Privacy.ACCESS provides additional security to your logon by offering smart cards and fingerprint Biometrics as a highly secure method to unlocking your credentials and logging onto your computer. With Privacy.ACCESS the end-user may never need to know their logon credential, only their challenge/response questions stored on the smart card, or provide their finger print (stored on the smart card) in order to access the workstation.

digital privacy digital certificates finger print

Brilliant Database SDK

Brilliant DB SDK is an easy-to-use tool for creating end-user executable database applications. Design all aspects of your database (Forms, Reports, HTML/Text Export, Queries, Formulas, Scripts and Toolbar) quickly and easily using several powerful editors. Created databases have tree-like/relational structure, allow you to store all kinds of attached files, to use relational structure, to work with data using forms, tables or lists... Brilliant Database SDK is licensed as shareware and placed in databases, database management section.

web html database features password fields

Fax Machine

Got a scanner and a fax modem? Why not combine those two into a fax machine. Put a document on your scanner's glass, start Fax Machine, press Scan a page, press Send fax, fill in the recipient telephone number and press Fax it. That's all. This shareware is archived under utilities and fax category.

fax modem windows application automatic document feeder

Wiretap Professional

This software Stealth PC monitoring software lets you capture and record virtually everything on a PC including: all keystrokes typed, passwords entered, incoming & outgoing emails, instant messages (AIM/ICQ/MSN/Yahoo), all websites visited, apps started and more! Screenshot feature let's you see exactly what the user's desktop looks like at any time! Plus, email or ftp the logs & screenshots to anywhere in the world. All in total stealth!

content filtering wiretap professional pc monitoring software

Win Watermark Software

This graphics tool can add text or image watermark to any picture, protecting them from unauthorized distribution. Besides watermarking, it is also a useful and simple photos editor. You can personalize your photos using attractive frames; adjust image size to meet you need, resize images with high quality, rotate and rename your pictures, and convert your images to other format to save your disk space. This graphics shareware Win Watermark Software is categorized under graphic apps editors.

image watermarking tga format custom template

CryptDecrypt

This utility provides an easy way to protect your sensitive information. CryptDecrypt encrypts your data with a password that you select. CryptDecrypt includes several encryption algorithms to protect your data: AES (USA Government Standard) Triple-DES, GOST, RC2, RC4 and Windows Data Protection API. CryptDecrypt is a shareware software filed under security, privacy encryption tools utilities.

backdoors rc4 gost

AccessLock

Access Lock is a system-tray security utility, which enables you to lock your PC with a password by two methods. The first one hides your desktop and shows a screen saver while the second one does not hide it allowing others to watch what happens there. It also prevents unauthorized access on boot, logs the attemps of breaking the lock and allows people around to leave messages while the system is locked.

mouse cursor program interface security utility

 

Copyright 2003-2011 Filesland Software