RSS 295 projects tagged "Windows"

No download No website Updated 25 Mar 2014 GeoToad

Screenshot
Pop 526.38
Vit 85.60

GeoToad is a geocaching query tool to help speed up the boring part of geocaching: choosing the cache and collecting the data. It allows you to generate any kind of complex query you want, and the program will go and poll the Geocaching query, grab the data, and output it to any format you want. The Geocache info can be synced straight to your GPS, iPod, PDA, or cell phone in over 20 different formats.

Download Website Updated 14 Feb 2014 MultiTail

Screenshot
Pop 1,564.22
Vit 80.63

MultiTail lets you view one or multiple files like the original tail program. The difference is that it creates multiple windows on your console (with ncurses). Merging of 2 or more log files is possible. It can also use colors while displaying the log files (through regular expressions) for faster recognition of what is important. It can also filter lines (again with regular expressions). It has interactive menus for editing given regular expressions and deleting and adding windows. One can also have windows with the output of shell scripts and other software. When viewing the output of external software, MultiTail can mimic the functionality of tools like 'watch'.

Download Website Updated 06 Oct 1999 P-Synch

Screenshot
Pop 30.15
Vit 72.84

P-Synch is a commercial password management toolkit which provides automated password synchronization, password strength enforcement, password self-reset by authenticated users, and streamlined password reset by helpdesk. P-Synch is available for both internal use as well as for Internet-based deployments in B2B and B2C applications.

Download No website Updated 23 Feb 2001 Harm

Screenshot
Pop 29.44
Vit 69.28

Harm acts as a four-way socket redirector that allows you to effectively make a TCP connection from the Internet to a host behind a Linux masquerade-style firewall. The server (behind the firewall) makes connections to the client (on the Internet). After a successful connection, it will bounce packets from a telnet client (Windows and Linux) to the Harm client, to the Harm server (Linux only), or to the telnet daemon behind the firewall.

Download Website Updated 27 Aug 2001 Permission Record Information Machine

Screenshot
Pop 33.82
Vit 67.93

Permission Record Information Machine (PRIM) delivers database connectivity via a web browser. Users can have different database permissions (e.g. create tables, modify tables, etc.). PRIM has built-in database analytical tools such as graph displays, reporting, etc. English and Chinese (Big5) language support.

Download Website Updated 10 Sep 2001 Python Font Downloader

Screenshot
Pop 10.82
Vit 67.83

PyFD is a cross-platform Python application using the wxPython toolkit. Its main task is send files, fonts, and snippets to a networked printer using LPR and Appsocket technologies.

Download Website Updated 14 Nov 2001 BEGET

Screenshot
Pop 12.92
Vit 67.35

BEGET is the first in a series of programs that allow for the access of all content data files, regardless of the system they were created on, or the digital file standard those systems use.

No download Website Updated 08 Apr 2002 Image Alchemy

Screenshot
Pop 17.78
Vit 66.26

Image Alchemy has the ability to convert between over 90 different raster image formats (including all colorspace and compression variations of each format). Color management features include gamma correction, undercolour removal, seven high quality dithers, colorspace conversion, and palette manipulation. It also includes a Postscript interpreter.

No download Website Updated 13 Jun 2003 Paragon NTFS for Linux

Screenshot
Pop 27.06
Vit 62.93

The Paragon NTFS for Linux driver provides read and write access to NTFS volumes for all kinds of files including system files.

Download Website Updated 24 Dec 2013 Tor

Screenshot
Pop 811.90
Vit 62.68

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Screenshot

Project Spotlight

List My Apps

App lister

Screenshot

Project Spotlight

ECMA-55 Minimal BASIC

A minimal BASIC compiler.