Sleep » Developer.Team

Spider - Delphi profiler

Spider - Delphi profiler


Real time profiler for Delphi applications:
✓ Detailed debug information (internal, TDS, MAP)
✓ Display information for multi-threaded applications
✓ Timeline diagram for process execute
✓ Analysis of exceptions
✓ Analysis of the realtime use of memory
✓ Analysis of memory leaks
✓ Analysis of the call stack
✓ Analysis of run-time functions (code tracking)
✓ Analysis of the "deadlocks" (Sleep, CriticalSection, SendMessage, etc.)
✓ The ability to view the source code in the analysis of events
Read more

Remote Computer Manager 6.0.9 DC 03.05.2017 Enterprise License

Remote Computer Manager 6.0.9 DC 03.05.2017 Enterprise License
Remote Computer Manager 6.0.9 DC 03.05.2017 Enterprise License


Remote Computer Manager is a network utility for remote computer management. The program allow network administrators to centrally manage network PCs and make: remote desktop control, remote shutdown, run (execute) commands, launch applications and processes, Wake-on-LAN over IPv4, Wake on LAN over IPv6, lock workstation, log on, log off, sleep, hibernate, wake up, reboot, power on, power off, lock and unlock input devices, registry merge, file copy, installation of MSI packages, clock (time) synchronization and other remote operations for computers on network (Windows and Linux PCs).
Read more

Microsoft Research Detours Package Pro 3.0 Retail

Microsoft Research Detours Package Pro 3.0 Retail
Microsoft Research Detours Package 3.0 Retail


Detours is a library for intercepting binary functions on ARM, x86, x64, and IA64 machines. Detours is most commmonly used to intercept Win32 APIs calls within an application, such as to add debugging instrumentation. Interception code is applied dynamically at runtime. Detours replaces the first few instructions of the target function with an unconditional jump to the user-provided detour function. Instructions from the target function are placed in a trampoline. The address of the trampoline is placed in a target pointer. The detour function can either replace the target function or extend its semantics by invoking the target function as a subroutine through the target pointer to the trampoline.
Read more

Rohos Logon Key 3.1

Rohos Logon Key 3.1
Rohos Logon Key 3.1 | 6 Mb


Rohos Logon Key will protect your computer against illegal intrusion to personal information that is stored in your PC. Log on to Windows by using a two-factor authentication using a variety of tokens and electronic keys. Imagine, the program turns an ordinary USB flash drive into a powerful two-factor tool to protect your computer and laptop.
Read more

Comfort Software Hot Alarm Clock 4.1.0.0

Comfort Software Hot Alarm Clock 4.1.0.0
Comfort Software Hot Alarm Clock 4.1.0.0 | 11 Mb


What could be a more powerful tool than a computer? With gigabytes of memory and huge colorful display, your PC can serve as a perfect alarm clock. It can play your favorite music or let you use your favorite online radio station, use fixed or increasing alarm volume, launch your favorite apps and open Web sites on wakeup. It'll even conserve your computer power by automatically waking it up from sleep mode and putting it back to sleep when needed!
Read more

Hot Alarm Clock 4.0.4.0

Hot Alarm Clock 4.0.4.0
Hot Alarm Clock 4.0.4.0 | 11 Mb


Turn your PC into a powerful alarm clock! Wake up to your favorite music or tune to an online radio station of your choice, use fixed or increasing volume alarms, and get your computer ready by launching programs and opening Web sites on wakeup. With infinite number of highly configurable alarms, Hot Alarm Clock is super flexible and customizable. Setting a one-time wakeup call is easy, but configuring multiple complex alarms to wake you up on different days of weeks or calendar dates is not rocket science either. The amount of flexibility is enormous - you just cannot beat a PC when it comes to advanced settings!
Read more