scriptik.ru

35343

Winsock & Internet

:

This is a map XML web service based on a huge raster maps or satellite images. Here, each registered user can place any objects (houses, images, goods offers, music clips etc) into a virtual map. In other words, project is a in-map geo-database of such objects. Also project is a monitor for the mobile objects (cars, etc). Some built-in services are implemented: e-mail service, chat service.

  • : Free
  • : PAS-co
  • : 02.11.2007

1st Mail Sender is a powerful program used for sending notification messages or requested newsletters to your subscribers by email. Providing some service, you would like to notify your users about significant events, send invoices or price lists as well as organize email-based subscriptions on your web sites. 1st Mail Sender is the best solution for such purpose.

  • : Shareware / $59.00
  • : SoftFolder Inc
  • : 18.06.2009

Change your Mac Address in seconds! Scan Mac Address within any range of IP address. Exports the scanning results from a Mac Address Lookup list. Change the Mac Address of your network card to any new Mac Address.It scan any range of IP for the proper Mac Address.It supports changing Mac Address of any networks cards under Windows NT/2000/XP.It supports exporting scanning results to txt file.

  • : Shareware / $19.95
  • : Paqtool
  • : 28.03.2011

Have you been port scanned lately? Completely ignoring network security is not smart and ignorance isn't exactly bliss. If you access the Internet via a cable modem, DSL, or even a dial-up connection, someone is always knocking on your virtual front door, giving your system the once-over. Protect your data, privacy and valuable computer system with AA Tools. AATools investigates and gathers information about your computer, network status, and service availability. That is a layman's way of saying it performs an inspection on everything vital to network security as it pertains to the protection of your computer, including the utilization of tools to check open ports, proxies, email lists, Internet applications, and general system information.Today there is no program, either anti virus nor anti trojan, that can detect unknown trojan horses. To secure your network, you may need to lock down applications that aren't required by any function you currently use. To do this effectively, you have to know what ports are available and what application is utilizing them. AATools Network Monitor displays the services that are active on all ports. Further, AATools Network Monitor maps the ports in use to their respective applications (this feature is available under Windows NT/2000/XP) providing a simple and easy solution to tracking application to port maps. This mapping is extremely useful while monitoring unwanted connections, investigating suspected trojans, viruses, and possible backdoors intrusions.AATools includes 11 different state-of-the-art tools for assessing optimizing, managing, and safeguarding your network and computers, all in one easy to use program. The information AATools conveys is simple to understand, easy to assimilate, and conducting a network integrity test for intruders is likewise, very simple. A worthwhile download for anyone wanting to gather info on their network and PC.

  • : Shareware / $49.95
  • : G-Lock Software
  • : 08.05.2011

Active WebPosition Gold positions your web site at the top of the rankings on major search engines! Analyzes web pages and designs new ones for a top ranking. Submits to major search engines and reports your positions by keyword. Tracks statistics including visitors to your site and search keywords used. The only software that includes for free our MetaMagician Gold software for meta tag management. And much, much more!

  • : Shareware / $149.00
  • : Myrasoft
  • : 16.07.2010

ActiveBrowse is a simple tray program that every Microsoft Explorer users must have. It opens four or six Explorer Windows tiled on the desktop that browse four or six different URLs.You can easly configure the URL for each window to your favourite Web site, using the Configure menu from the tray icon.The 2x2 tile can have different web sites than the 3x2 tile configuration. In this way you can browse up to ten different web sites at the same time and correctly ordered in your desktop.When you need to view a site in full-screen, simply click on the Maximize button: then if you want to restore the window position, click on the restore button and the explorer window will be tiled in the starting position.

  • : Shareware / $5.00
  • : Pragma Systems
  • : 16.10.2007

The ActiveIE range of components provides a stable means of implementing a full featured, thread safe web browser in your applications without the side effects of TWebBrowser. ActiveIE is built using the same libraries and COM objects imported by Delphi to create TWebBrowser, but that's where the similarities between TWebBrowser and ActiveIE end. ActiveIE does not need to rely on TWebBrowser and is deployed with supporting libraries and environment handlers that ensure Internet Explorer can be implanted into your Delphi applications with maintaining the same level of stability you would experience running Internet Explorer by itself.Compatible with Internet Explorer 3, 4 and 5 dvActiveIE components can be used to replace existing TWebBrowser code with virtually no changeover issues. If you already use TWebBrowser, you should be ready to use ActiveIE.

  • : Shareware / $30.00
  • : EvoCorp Corporate Solutions
  • : 08.07.2008

Ad Striker is an Adware, SpyWare, Key Loggers, Trojans, Dialers, Hijackers, Trackware, Thiefware remover, Big Brotherware removal utility with multi-language support. Also includes a Firewall for protection against any entrance to your equipment through backdoors, Anti Phishing utility to block orged or spoofed spam email & automatic live update. Also removes Bundled spyware components from Kazza, Morpheus, audiogalaxy, and many other spywares.

  • : Free
  • : BulletProof Soft
  • : 16.05.2007

AdDelete is a comprehensive filter technology so that you can focus on your internet browsing without the clutter and block unwanted advertising and popup windows. Two stage filter removes advertisements. Built-in caching accelerates the web.

  • : Shareware / $29.95
  • : Professional Data Analysts
  • : 27.04.2011

This is a simple descendant from the standard TwebBrowser component. It's purpose is to display a rotating web page or advert from within your programIt is ideal for allowing your programs to earn income from referral services such as Commission Junction, or just to display your own advertising or update information to your clients.New Feature - The component can now check for a new version of your program and automatically launch a URL based on the program version and/or upgrade version.

  • : Free
  • : John Williams
  • : 06.02.2010

Small application for storing names for opening person's site or link directly by Internet Explorer. It uses ini-files.

  • : Free
  • : TChag-Sys
  • : 06.08.2008

AdminMagic is a quick and easy remote desktop control utility, featuring virtually real-time screen updating thanks to its new and improved screen engine. Thanks to its remote deployment and remote authentication, you don't have to visit each computer even if it is outside your trusted domain security. To minimize configuration and installation effort, AdminMagic has a wizard to ensure proper deployment and configuration.

  • : Shareware / $99.00
  • : Arnout van der Vorst
  • : 09.02.2009

Have you been port scanned lately? Completely ignoring network security is not smart and ignorance isn't exactly bliss. If you access the Internet via a cable modem, DSL, or even a dial-up connection, someone is always knocking on your virtual front door, giving your system the once-over. Protect your data, privacy and valuable computer system with AA Tools. AATools investigates and gathers information about your computer, network status, and service availability. That is a layman's way of saying it performs an inspection on everything vital to network security as it pertains to the protection of your computer, including the utilization of tools to check open ports, proxies, email lists, Internet applications, and general system information.Today there is no program, either anti virus nor anti trojan, that can detect unknown trojan horses. To secure your network, you may need to lock down applications that aren't required by any function you currently use. To do this effectively, you have to know what ports are available and what application is utilizing them. AATools Network Monitor displays the services that are active on all ports. Further, AATools Network Monitor maps the ports in use to their respective applications (this feature is available under Windows NT/2000/XP) providing a simple and easy solution to tracking application to port maps. This mapping is extremely useful while monitoring unwanted connections, investigating suspected trojans, viruses, and possible backdoors intrusions.AATools includes 12 different state-of-the-art tools for assessing optimizing, managing, and safeguarding your network and computers, all in one easy to use program. The information AATools conveys is simple to understand, easy to assimilate, and conducting a network integrity test for intruders is likewise, very simple. A worthwhile download for anyone wanting to gather info on their network and PC.

  • : Shareware / $49.95
  • : G-Lock Software
  • : 03.09.2011

The AHM E-Mail Components are a set of e-mail components that will allow you to send/receive e-mail from as many Accounts as you like using the POP/SMTP/MAPI interface respectively. Each mail component includes the ability to send and receive e-mail in design time. Each mail component supports multiple messages and each message supports multiple attachments. TAHMAccountManager is included to enable the ability of sending and receiving e-mail using several accounts.

  • : Shareware / $69.00
  • : Alexander Mehlhorn
  • : 15.12.2010

The developers of the given facilities very often face with such a necessity. For instance, during the debugging in a remote machine or when different people with the help of different machines (which are nevertheless connected to one machine) maintain the same facilities. ANSD is designed especially for the solving of these problems. The use of our product gives you the possibility to give the remote access to serial port via TCP/IP.

  • : Shareware / $149.00
  • : Max Zotov
  • : 04.06.2007

AlarIT Virtual Serial Driver is appointed for emulation of one, two or more (up to200) serial streams. Hardware devices are not necessary. This product isbased on Windows XP DDK and doesn't require using devices of othermanufacturers. The whole product is created with the help of Microsoft tooling.

  • : Shareware / $109.00
  • : Max Zotov
  • : 24.04.2007

Alchemy Eye is a system management tool that continuously monitors server availability and performance. In the event of network errors, Alchemy Eye can alert the network administrator by cell phone or pager BEFORE problems get seriously out of hand. This helps protect your company's data and reduces the likelihood of costly network failures. If a server goes down, Alchemy Eye automatically notifies the network administrator and writes a detailed log file.

  • : Shareware / $299.00
  • : Alchemy Lab
  • : 07.09.2011

ALMailSlot is a component which allows applications to communicate across a network using mailslots.

  • : Free
  • : DigiCraft Software
  • : 25.03.2011

TALsmtpClient class implements the SMTP protocol (RFC-821). Support file attachement using MIME format (RFC-1521, RFC-2045). Support authentification (RFC-2104).

  • : Free
  • : Arkadia
  • : 20.04.2011

Analyse Spider (ANSP) is a powerful Web Log File Analyzer tool with a wealth of analysis to help you optimize your site. This tool can also help you to see if your Web site promotion is paying off, when you should update your Web site, and which errors occurred on your Web site.It offers the easiest way to produce professional Log Reports from your raw log files. This powerful Log File Analyzer comes to you packed with features and the best-looking Log File output available. Analyse Spider can be used to process web-site logs, e.g. Apache, Microsoft Internet Information Server, and others:Visitor Geographic Region Statistics: Other log analysis softwares (such as SurfStats, webtrends log analyzer...) use reverse DNS lookup technology to generate geographical information, which is slowly speed and highly incorrect. Analyse Spider uses an internal IP mapping technology that identifies a visitor's geographical region by their IP address.This program allows you to track visits by robots, spiders, crawlers, and other automated surf tools to your Web site. With the unique feature, Identify which spider visited, when it visited, and what pages it may have indexed. If, for example, a search send out what are called spiders, crawlers or robots to visit your site and gather web pages. Here you can see which check if they have spidered all your pages. It can identify spiders (the Best 10 top search engines and other spiders). When a search engine have spidered your site, you will usually show up in the search listings after a few weeks.Download Statistics:Download Product: The report and graph show the downloaded software file name, the download the number of times, the number of download file From Download Site, the number of download file From Home Page,the percentage of download file From Home Page that was used during the specified time period (per Day, Week, Month).Download Resource: The report and graph show the number of download file From Download Site, the number of download file From Home Page, the percentage of download file From Home Page that was used during the specified time period (per Day, Week, Month).Advanced visitor filter:Using filters to include and exclude specific pages or files (Example: you can use this filter to see how many people visited your download page, or how many people downloaded a specific file).Using filters to include and exclude specific IP or IP ranges.Range of Date: All Dates, current month's only, Specific period.Day of Week (Example: you can use this filter to see what happened on a specific day).Hour of Day (Example: you can use this filter to see what happened at a specific time).Access Statistics: This report shows the number of visitors, web pages viewed, files downloaded and Incomplete downloaded, directories that were accessed, and images that were accessed during the time period entered, the number of unique IPs, the amount of bandwidth used, and Day of the Week, and Hour of the Day. Technical Information Statistics: This report shows errors visitors encountered at the site, broken down by Missing Files (404) and Miscellaneous Errors.Easy-to-use interface: Analyze spider has an extremely easy to use interface that requires no technical knowledge whatsoever.Analysis is presented in easy to read lists or graphs.Can analyze GZ compressed log files: Without first extracting them to your hard drive, so you save disk space and download time.Supports major web server log file formats on both Windows and Unix platforms. Auto detects log file format.Reports on multiple log files as if they are one continuous log file to view historical trends.To use Analyse Spider, you need to have access to your server's log files.

  • : Shareware / $49.95
  • : Analysespider
  • : 27.01.2008