Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Trigonometric identity finder in Title/Summary

Identity Finder

Identity Finder

Use free tools such as the File Vault to encrypt any file in Windows and the Digital Shredder to shred any file from Windows Explorer. Manage passwords securely in the Password Vault. Search within files and web browsers to find unprotected Credit Card Numbers and Passwords.

  • Publisher: Identity Finder, LLC
  • Last updated: March 23rd, 2017
Designer for Identity Manager

Designer for Identity Manager

Novell's Identity Manager team is developing the Designer for Identity Manager, a powerful, graphical toolset designed to assist in configuring and deploying Identity Manager. The Designer tools enable you to: carry projects with you, keep a project open for an extended period of time, work on multiple projects at the same time and enjoy a smoother interface.

  • Publisher: Novell
  • Last updated: March 22nd, 2012
Identity Management Suite

Identity Management Suite

Without automated solutions identity management can be a tedious and resource-consuming task. Proper implementation of manual processes can be error-prone and very resource intensive, leaving no time and resources for other important IT projects. Identity management automation brings convenience, enhanced security, and brings sensible benefits to everyone in an organization.

  • Publisher: NetWrix Corporation
  • Home page: www.netwrix.com
  • Last updated: January 5th, 2010

Trigonometric identity finder in Description

Identity Knight

Identity Knight

Holes in Internet Explorer software allow 3rd party programs to access your private data. Your credit card numbers, SSN, driver license and e-mails can be stolen easily! Download Identity Knight, the unique credentials protection software, today!

  • Publisher: FSPro Labs
  • Last updated: May 12th, 2008
Network Identity Manager

Network Identity Manager

Network Identity Manager implements the long awaited support for multiple Identity Providers. An Identity Provider in Network Identity Manager is the module that determines which credential type can be used to define a Network Identity. Each Network Identity can be assigned its own icon.

  • Publisher: Secure-Endpoints Inc.
  • Last updated: October 6th, 2014
Novell eDirectory

Novell eDirectory

Novell eDirectory is the foundation for the world's largest identity management deployments. With eDirectory, businesses lay the groundwork for secure identity management solutions and multi-platform network services. Novell eDirectory provides centralized identity management, infrastructure, Net-wide security and scalability to all types of applications running behind and beyond the firewall.

  • Publisher: Novell, Inc.
  • Last updated: November 15th, 2011
Attachment Finder for Outlook Express version

Attachment Finder for Outlook Express version

Attachment Finder for Outlook Express helps you to find and save files from attachments. If Outlook Express has many e-mail messages then Arises problem - how to find file in messages.Attachment Finder for Outlook Express scaning all messages for attachments. When attachment will be found in messages all files from mesage will be saved to selected folder.

  • Publisher: Yarrow Soft
  • Home page: yarrowsoft.com
  • Last updated: January 29th, 2010
ViCalc

ViCalc

ViCalc-Software is a scientific calculator with protocol. With this software you can make Arithmetic operations, Brackets, Memory, Ans, Protocol, Percent, Trigonometric and inverse trigonometric functions, Hyperbolic and inverse hyperbolic functions, Grad, degree and radian, Angle conversion, Constant Pi, Exponential functions, Reciprocal.

  • Publisher: Kudaschov
  • Home page: kudaschov.com
  • Last updated: October 29th, 2011

Additional Trigonometric identity finder selection

Intel Identity Protection Technology

Intel Identity Protection Technology

Intel Identity Protection Technology (Intel IPT) provides a simple way for web sites and enterprises to validate that a user is logging in from a trusted PC. This software is supported on all Intel IPT-capable systems based on the Intel 6 Series Chipset, including the Intel Desktop Boards.

  • Publisher: Intel Corporation
  • Last updated: June 29th, 2020
Norton Identity Safe

Norton Identity Safe

Norton Identity Safe is a free password manager that makes logging into your favorite sites easier and more secure. It keeps your passwords synchronized across different computers, browsers and mobile devices. It warns you of unsafe sites right in your search results and blocks them.

AusLogics Duplicate File Finder

AusLogics Duplicate File Finder

Duplicate File Finder can help you locate and remove files with same data. It uses intelligent algorithms to compare not only the file names, but also contents to ensure no false search results. You can easily customize the file-type (photos, videos, documents, programs, and archives) from its interface before scanning.

  • Publisher: Auslogics Labs Pty. Ltd.
  • Home page: www.auslogics.com
  • Last updated: November 18th, 2024
Wifi Key Finder

Wifi Key Finder

Wifi Key Finder is a tool which allows you to find and recover Wifi keys from your wireless router. It can scan your wireless network settings in Windows and show the saved Wifi profiles and passwords. The program works with all brands of wireless routers such as Linksys, Netger, Cisco, Belkin etc. This is not a hacking tool: it only shows the password settings saved in your computer.

Easy Duplicate Finder

Easy Duplicate Finder

Easy Duplicate Finder can identify all kinds of duplicate files in your computer. It provides a one-click scan interface, which automatically searches for duplicate data and provides you the scan results in various categories, such as video, music, pictures, documents, archives, and others.

Duplicate File Finder by Rashid Hoda

Duplicate File Finder by Rashid Hoda

Finds duplicate pictures and videos This app does what it named for. You can choose any folder on your hard drive or use standard user folders and our app will deeply analyze contents of selected folders for searching for any duplicates. The ...

  • Publisher: PrivacyRoot IFG
  • Home page: privacyroot.com
  • Last updated: September 11th, 2021
Registry Trash Keys Finder

Registry Trash Keys Finder

Registry Trash Keys Finder (TrashReg) is an advanced Registry cleaning tool. The main function of RTKF is to allow the removal of unnecessary keys from the Windows Registry. Many programs leave keys in the Registry, even after programs removal using an uninstallation facility provided with the programs themselves. RTKF allows you to decide whether to delete or leave the keys found.

  • Publisher: SNC
  • Last updated: January 16th, 2015
Fast Duplicate File Finder

Fast Duplicate File Finder

Duplicate files or simply older or obsolete versions of files are not always that easy to locate and remove without help. Fast Duplicate File Finder performs thorough searches using the most sophisticated algorithms to help you find and manage duplicate files, detecting even those dupes whose different names may lead you to think that they’re totally different images or documents.

  • Publisher: MindGems Inc.
  • Last updated: November 18th, 2024
Hidden Identity Chicago Blackout

Hidden Identity Chicago Blackout

Hidden Identity Chicago Blackout is a game where you get to unravel the mystery and discover your true identity. Explore scenes from your past and find hundreds of cleverly hidden objects to piece together your lost identity. You’ll need to keep your wits to solve this riveting mystery.

  • Publisher: PopCap Games
  • Home page: www.popcap.com
  • Last updated: May 22nd, 2012
Awesome Duplicate Photo Finder

Awesome Duplicate Photo Finder

Awesome Duplicate Photo Finder can help you save disk space by finding and deleting duplicate images. The program has an intuitive interface, which allows practically anyone to use the program with no difficulty whatsoever. Actually, using the program is rather simple, you just need to select the folders you want to scan and start the search.