SuggestSoft.com

Scanning

Rising Antivirus 2006 18.53

No Image Rising Antivirus detect and remove local viruses, variant viruses, Trojan horses and malicious programs . Files, e- mails, memory and Web pages are under the all-in-one real-time monitoring system. Smart Upgrade technology can actively upgrade the software , real-time monitoring. Supports running program and files scanning, compressed file scanning.






EZTwain Pro Toolkit 3.20b22: The easiest and fastest way to add TWAIN scanning to your software.
EZTwain Pro Toolkit 3.20b22

If you want to add TWAIN scanning to an application, EZTwain will save you time and frustration. Our Code Wizard will have you scanning in minutes, our rich feature set won`t let you down. No unit royalties. Works with BMP, PNG, GIF, JPG, TIFF, DCX, and PDF files. Bindings for: Access, Borland C++, C#, Clarion, dBASE, Delphi, LotusScript, Perl, PowerBasic, VB, VB.NET, MSVC/C++ and VFP.

scanning, progress, clarion, twain, foxpro, perl, lotusscript, dbase, vb net, control, delphi





ScanAndSave 2.0: ScanAndSave is document scanning software that scans and saves your documents
ScanAndSave 2.0

ScanAndSave is a Windows document scanning software that lets you use your scanner and PC to quickly scan, save, and organize all your important documents. ScanAndSave simplifies the process and eliminates the cumbersome steps that are required by other scanning software. The file formats that ScanAndSave supports include PDF, TIFF, BMP, JPG, GIF, and more. ScanAndSave is free to try for 30 days. It costs $12.95 to purchase.

archiving program, document scanning software, archive documents, scan documents, scanning software



TWIAScan component 1.0.0: WIA based scanning component for legacy Delphi versions
TWIAScan component 1.0.0

WIA based scanning component for Delphi 6 and 7. This component was made for legacy Delphi versions (D5-D7) to provide scanning interface for contemporary hardware. Feature list: * WIA detection * Scan full or partial document * Set DPI * Output to file * Output to TPicture object * Grayscale mode * Abort and error events * No dialogs pop up during operation * Adjust contrast and brightness

scanning, scan, component, twiascan, scanner, delphi



SpreadMsg Lite 6.21: Unattended Data Capture, Scan, Extract & Instant Messaging / Data Forwarding
SpreadMsg Lite 6.21

scanning agent that searches the user`s email waiting at their ISP or Exchange Server. EMail scanning and retrieval is supported for POP3 and IMAP email servers. For new messages waiting, it applies user-specified rules, like looking for specific text content, or for email "from" a specific person, or email containing specific words in the "subject", etc. If the user rules are met, wireless or instant messages are delivered or other action is taken

network, blackberry, forward, monitor, t900, open view, email, storm, alpha, 2 way, weather, instant messaging, temperature



Email Spider 3.1: Harvest emails and prevent vulnerabilities
Email Spider 3.1

scanning, and the last 20 emails found! Stop and Resume scanning with the click of a button, you can even resume after shutting down the program! Can play sounds whenever an email is found, whenever skipping to the next search, and when scanning is complete. Advanced users can program their own reports, data export scripts, queries and even integrate the data into webpages or web scripts! A brandable (a.k.a. Private Label) version of this software

crawler, spider, email addresses, web robot, email, harvest, web crawler, web spider, robot



Clone Terminator 3.0: Clone Terminator searches for unused duplicate files and removes them all
Clone Terminator 3.0

scanning. The third stage includes customizing additional settings, if needed, for the scanning and deletion processes. Afterwards, goes the scanning itself. And the last stage of the process is a table showing the results. With a totally simplistic interface you will need no special skills to boost the performance of your computer. Clone Terminator will not instantly destroy the removed files. The program will place them into the desktop bin, from

duplicate file remover, clone remover, unused files


More Results: 1  2  3  4  5  6  

World IT News