underlying freeware downloads


Search results for «underlying»:

MJ Browser 1.0 MJ Browser 1.0
… utines. MJ Browser features a complete history of unique sites visited favourites form completion Google, dictionary and thesaurus lookups of selected text Print preview… 

Cooliris 1.1 Cooliris 1.1
… ying content without having to click back and forth.… 

Quesa Wrappers 0.6.2f Quesa Wrappers 0.6.2f
… d geometry levels and the creation 3D objects in code. Requirements REALbasic 5.5 +… 

Oxygen WndTransparency ActiveX Control 1.0 Oxygen WndTransparency ActiveX Control 1.0
… phi, Borland C++ Builder and other programming tools… 

ITkeys 1.1 ITkeys 1.1
… With the help of ITkeys, entrusted staff can now directly and simply carry out group management for Active Directory and other account systems. ITkeys features ITkeys uses native access controls. When a user is given access to update a group the underlying system (e.g. Active Directory) is updat… 

Elementary 0.8.1 Elementary 0.8.1
… appings via both Xml files and .NET Attributes and provides many advanced ORM features 1-1, 1-n and n-n relationships Lazy Loading Retrieval and persistence of child objects Automatic schema inference and validation Dynamic Objects Single and Composite Keys Access to underlying ADO.NET… 

Snare for Windows 2.6.4 Snare for Windows 2.6.4
… d understanding of exactly what event information is going to be used for, proir to enabling event monitoring on your servers.… 

No More Cookies 1.3.0.23 No More Cookies 1.3.0.23
… ve the cookie so that you don’t have to sign on each time you visit that web site. To “save” the cookie, click on the box to the left of the source name and choose Authorize. You’ve just asked the software to move that source and all its underlying cookies to the Authorized tab so that y… 

Password Recovery for MS Access 1.0 Password Recovery for MS Access 1.0
… tabase password. This program should work on any platform that supports Java. Softp… 

CopyLock 1.09 CopyLock 1.09
… ter you ran an installer or view the processes which use the locked files. Notes: - the operation may not work if the file to replace is protected by the system. Since CopyLock is based on documented APIs it will only allow what the underlying system allows. - Use the included… 


Related: