Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Java trace file access in Title/Summary

Konesans Trace File Source 2008

Konesans Trace File Source 2008

The Trace File Source adapter is a useful addition to your SSIS toolbox. It allows you to read 2005 and 2008 profiler traces stored as .trc files and read them into the Data Flow. From there you can perform filtering and analysis using the power of SSIS. There is no need for a SQL Server connection this just uses the trace file.

  • Publisher: Konesans Limited
  • Home page: www.sqlis.com
  • Last updated: November 23rd, 2011
Polytec File Access

Polytec File Access

Polytec File Access (PFA) enables retrieval of Polytec data via external applications supporting Microsoft’s Component Object Model (COM), e.g. Visual Basic, Matlab, LMS Test.Lab, VSI Rotate. Supports *.pvd; *.svd file formats including User Defined Data Sets (UDDS). For Windows applications only.

  • Publisher: Polytec GmbH
SoftPerfect File Access Monitor

SoftPerfect File Access Monitor

SoftPerfect File Access Monitor monitors access to your files and provides detailed history of who read, wrote, and manipulated them. SoftPerfect File Access Monitor can be used on a file server to track network users activity, as well as on a local computer where it will track local users file access.

  • Publisher: SoftPerfect
  • Last updated: November 30th, 2016

Java trace file access in Description

DJ Java Decompiler

DJ Java Decompiler

DJ Java Decompiler v3.9.9.91 is a disassembler and graphical decompiler for Java which is responsible for reconstructing the original source code from the already compiler binary CLASS files that is Java Applets. Besides, it is a fully featured Java editor that uses graphic user interface with syntax coloring. But you do not need to have Java Virtual Machine (JVM) or other Java SDK pre-installed.

  • Publisher: Atanas Neshkov
  • Home page: www.neshkov.com
  • Last updated: September 20th, 2016
Java Bridge to Exchange

Java Bridge to Exchange

The Exchange bridge product is an effective solution to access data stored in the Microsoft Exchange server from Java. Exchange items like e-mails, contacts and appointments can be accessed, created, imported or exported with the library. Enable your Java application to access Exchange messages, export attachments and send, forward or reply to e-mails programmatically.

MyJarExplorer

MyJarExplorer

MyJarExplorer is a program that will let you view and edit Java .jar files. If you have associated the .JAR extension with this program, it will open when you double click on any Java .jar file. It will run a .bat where it will start the program from a command prompt.

  • Publisher: Lucian Marinescu
  • Last updated: February 10th, 2012
DNA Dragon

DNA Dragon

DNA Dragon is a powerful DNA sequence contig assembler program. The DNA sequences are assembled into contigs and a direct comparision of trace date with nucleotide data is possible. It also allows for proofreading and base editing. It handles more than 100000 samples from sequence formats (FASTA, GenBank, EMBL), trace file formats (SCF, ABI, AB1) and next generation sequencing file formats.

  • Publisher: SequentiX - Digital DNA Processing
  • Home page: www.dna-dragon.com
  • Last updated: March 6th, 2015
Colasoft Packet Player

Colasoft Packet Player

Colasoft Packet Player is a packet replayer which allows users to open captured packet trace files and play them back in the network. It supports many packet trace file formats created by sniffer softwares such as Colasoft Capsa, Wireshark, Network General Sniffer and WildPackets EtherPeek/OmniPeek, etc.

  • Publisher: Colasoft LLC.
  • Home page: www.colasoft.com
  • Last updated: July 3rd, 2017

Additional Java trace file access selection

File Access Scheduler

File Access Scheduler

Protect your files from being executed, viewed, changed and deleted with File Access Scheduler. This software will automatically enable a chosen protection based on currently logged-in user, current time and the schedule you specify. By using this software it is quite easy to disable Internet access, certain games and other software applications during certain periods of time.

  • Publisher: Ixis Research LTD
  • Home page: www.pc-safety.com
  • Last updated: June 19th, 2010
IObit Unlocker

IObit Unlocker

IObit Unlocker performs well in solving “cannot delete files”, “access is denied”, “The file is in use by another program or user", or "There has been a sharing violation” problems. With IObit Unlocker, you can manage all your files the way you want.

  • Publisher: IObit
  • Home page: www.iobit.com
  • Last updated: December 21st, 2022
GiliSoft File Lock Pro

GiliSoft File Lock Pro

File protection is more of a necessity than a luxury nowadays. Data theft, both locally and remotely, is sadly becoming common practice. GiliSoft File Lock Pro offers you an easy-to-implement and use solution that can hide and protect files, folders, disks, and drives, both in local and external drives, with a unique high-security password.

  • Publisher: GiliSoft International LLC
  • Last updated: November 18th, 2024
PowerSuite

PowerSuite

Uniblue Powersuite is a set of tools to optimize Window settings, remove unwanted files, and rectify registry errors. Defragmentation of hard disks and registry hive files improves the response and file-access speed. Cleaning of duplicate files, removing old backup files, compressing large data, and uninstalling unwanted programs could also be done.

  • Publisher: Uniblue Systems Limited
  • Home page: www.uniblue.com
  • Last updated: February 5th, 2019
4Sync

4Sync

4Sync is a powerful, handy, convenient and reliable cloud storage solution that lets you access any of your files from a secure online location at any time and from any device, from laptops and desktop computers to smartphones and tablets. Its effective file synchronization capabilities will ensure that your files will always be up-to-date, even if you access them from multiple locations.

  • Publisher: New IT Solutions
  • Home page: www.4shared.com
  • Last updated: November 16th, 2015
Folder Guard

Folder Guard

Folder Guard lets you control access to files, folders, and other Windows resources. You can use it to lock selected folders using a password. You can also hide your private folders so that it becomes invisible to all users and software applications.

  • Publisher: WinAbility Software Corp.
  • Home page: www.winability.com
  • Last updated: November 18th, 2024
MotoCast

MotoCast

With MotoCast, you can get instant, mobile access to virtually all of your music, photos, videos and more. There are several ways to connect to and sync content, so no matter which device you’re using, you’re never far from what’s important. Connect with MotoCast Wireless to stream all your music, videos, documents and more.

  • Publisher: MOTOROLA MOBILITY, INC.
  • Last updated: October 24th, 2012
QuickStart

QuickStart

Quick Start is a very simple yet powerful application launcher that can let you access all your documents, media files, applications and web bookmarks in seconds. I have used many application launchers including some popular ones like launchy, Symbol Commander and MGlaunch and they work perfect but the simplicity and power of Quick Start is unbelievable

  • Publisher: DigiArch.org
  • Last updated: September 2nd, 2012
Wise Force Deleter

Wise Force Deleter

Wise Force Deleter is a program that lets you delete those pesky files that reside in your computer and can’t be deleted by usual methods. The program is useful for people whose PCs may be infected with malware, as well as users who have files that constantly run in the background and refuse to go away.

Trend Micro SafeSync

Trend Micro SafeSync

SafeSync is a program that will back up and sync files between your computers and mobile devices. You can stream music and video to your smartphone, share photos with friends on your tablet, or just play it safe and keep secure backups of your most important memories on all your devices.

  • Publisher: Trend Micro Incorporated.
  • Home page: uk.trendmicro.com
  • Last updated: July 15th, 2015