Methods Of Undetected Suicide
Dinapter automatically generates a mapping between methods of incompatible components based on their public interfaces and behaviors. It uses a combination of expert system and A* algorithm. Based on A. Brogi, C. Canal and E. Pimentel papers.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 2.83 MB | Download (45): Specification of Behavioral Adapters Download |
PacketDB projects goal is to create a set of workflows that treat tcpdumps/packet captures as just another sort of data to be loaded into relational structures and manipulated using the well-established methods of relational databases. The real fun begins after the scripts run and you get to...
Platforms: *nix
License: Freeware | Size: 10.24 KB | Download (96): PacketDB Download |
Comprehensive protection with the latest version of Integos network and malware security program, includes threat-detection techniques, improved methods of detection, combined detection protocols, proactive behavioral analysis, and a full range of defensive functions. VirusBarrier X6 protects...
Platforms: Mac
License: Freeware | Size: 34.6 MB | Download (429): VirusBarrier X6 for Mac OS Download |
Free download for PDF reader for copy protected PDF documents. CopySafe PDF was specially designed to protect PDF documents from all methods of copy and reproduction.
CopySafe PDF is the most secure solution for distributing copy protected PDF files and the only solution that can protect...
Platforms: Windows
License: Freeware | Size: 5.9 MB | Download (68): Copysafe PDF Reader Download |
Elyse is a file management system which solves the major problem with traditional methods of managing large numbers files on computers: paths and folders. Storing files in Elyse eliminates the need to decide precisely where to store a file, or to subsequently find where it was stored. Any logical...
Platforms: Mac
License: Freeware | Size: 26.6 MB | Download (55): Elyse for Mac Download |
Elyse is a file management system which solves the major problem with traditional methods of managing large numbers files on computers: paths and folders. Storing files in Elyse eliminates the need to decide precisely where to store a file, or to subsequently find where it was stored. Any logical...
Platforms: Windows
License: Freeware | Size: 8.94 MB | Download (53): Elyse Download |
Affiliate marketing is one of the most prevalent methods of earning money on the internet. Affiliate Marketing was pioneered by Amazon in the mid 90s and was a widely successful program. Prior to the birth of Affiliate Marketing the main method for earning money from your websites dealt with...
Platforms: Windows
License: Freeware | Size: 44 KB | Download (580): Affiliate Marketing Guide Ebook Download |
WMI Object Viewer
- Explore WMI Namespaces
- Explore WMI classes, the subclasses, the structures
- Get the properties, the methods of each class, get the properties' value.
- Easy to use, freeware and well-qualified...
Platforms: Windows
License: Freeware | Size: 200 KB | Download (408): WMI Object Viewer Download |
MB Daily Mystic Scope is a daily divination program based on the different divination methods of Tarot, Numerology and Runes. This software displays your lucky card, stone or number depending on your choice of program. This helps an individual deal with different situations that one may face in...
Platforms: Windows
License: Freeware | Size: 3.33 MB | Download (545): MB Daily Mystic Scope Download |
MBR Regenerator is a simple way to recover your activation system
Multiple loaders, and patches on the system, prevent programs like loader work, leaving messages, not the original Windows constantly appearing
This is program doesn't replace the function of a loader, or similar, it is not...
Platforms: Windows
License: Freeware | Size: 1.02 MB | Download (466): MBR Regenerator Download |
C4J is a simple, powerful and non-intrusive tool that makes it easy to add contract verification of instances and methods of any Java class or interface, with full inheritance support. C4J brings Design By Contract to Java.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 573.19 KB | Download (49): C4J - DBC for Java Download |
Peng-pong is a project to create a nice pong game in SDL with innovative rules and methods of interaction and play. Some, but not all of these innovations include multiple-ball games, multiple paddles, multiple players, and a new way of scoring one's game
Platforms: Windows, Mac, Linux
License: Freeware | Size: 391.05 KB | Download (45): peng-pong Download |
Realex Payments plug-in payment files for both Redirect and Remote methods of integration.
Platforms: Windows, *nix, PHP, BSD
License: Freeware | Download (56): Realex Payments Download |
When 'false', all prices and methods of ordering a disabled unless the user is logged in.Thus the customer is steered now also with the Button to buy to the Login/for registration.Search at catalog/includes/application_top.php on Line 354:// customer adds a product from the products pagecase...
Platforms: Windows, *nix, PHP, BSD
License: Freeware | Download (48): Prices for Logged-In Users Only Download |
We attempt to reproduce and efficiently implement in MATLAB publicly available methods of Affymetrix MAS 5 and GCOS 1.2 software that perform single-array and comparison analysis for Affymetrix data given by CEL and CDF files and create corresponding CHP data structures:1. CHP data structure is...
Platforms: Matlab
License: Freeware | Size: 20.48 KB | Download (45): Absolute and Comparison Analysis for Affymetrix Data Download |
This package includes a number of methods of determining the delay between two period signals. The delay may be calculated to subsample accuracy. Methods include: three-point interpolation using parabolic, Gaussian, or cosine functions; a phase method; and an iterative method.A simple example is...
Platforms: Matlab
License: Freeware | Size: 10 KB | Download (39): Subsample Delay Estimation Download |
This toolbox implements the methods of [1] and [2] to design H-infinity controllers for linear spatio-temporally invariant, or multidimensional (MD), systems. Utilities are also provided for the following types of operations on MD systems:1. System description (MD systems are specified via a...
Platforms: Matlab
License: Freeware | Size: 5.36 MB | Download (43): Multidimensional Systems Toolbox Download |
SafeClick module provides Drupal with various techniques and methods of protection from Clickjacking attacks.From Wikipedia: "Clickjacking is a malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly...
Platforms: PHP
License: Freeware | Size: 10 KB | Download (45): SafeClick Download |
Set::Hash is a Perl module with hashes as objects with lots of handy methods (including set comparisons) and support for method chaining. SYNOPSIS use Set::Hash; my $sh1 = Set::Hash->new(name=>"dan",age=>33); my $sh2 = Set::Hash->new(qw/weight 185 height 72/); $sh1->length->print; # 2...
Platforms: *nix
License: Freeware | Size: 7.17 KB | Download (89): Set::Hash Download |
The Getfem++ project focuses on the development of a generic and efficient C++ library for finite element methods elementary computations. The goal is to provide a library allowing the computation of any elementary matrix (even for mixed finite element methods) on the largest class of methods and...
Platforms: *nix
License: Freeware | Size: 4.3 MB | Download (107): Getfem Download |