[go: up one dir, main page]

Results for: stardict dictionary files

Suggested Categories:

File Converters
File converters are software tools that enable users to convert file types from one file type to another. File converters can convert different types of files such as documents, PDFs, images, and more.
File Repair Software
File repair software enables users to repair corrupt or damaged files. File repair software tools are useful for companies and users that need to repair and access files of all kinds including documents, downloads, images, videos, PDFs, and more.
File Sharing Software
File sharing software is software that enables users to securely share and exchange files and data over the internet. It allows people to easily store, access, and transfer documents, files, photos, videos, music, and other types of data to and from multiple devices. There are many popular file sharing programs available for both home networks and business use. These provide features such as file synchronization across multiple devices, security protocols for protection against malicious activity/hacking attempts, cloud-based storage capabilities, etc.
File Copy Software
File copy software is designed to transfer files and folders quickly, reliably, and often with enhanced functionality compared to standard operating system copy tools. It can handle large files, resume interrupted transfers, and manage batch operations more efficiently. Many solutions include error recovery, speed optimization, file verification, and filtering to copy only specific file types or updated versions. Advanced tools may support copying across local drives, network locations, and external storage devices with minimal downtime. This makes file copy software essential for IT administrators, content managers, and anyone handling large-scale or frequent file transfers.
File Compression Software
File compression software reduces the size of files or folders to save storage space and speed up transfers. It works by using algorithms to eliminate redundancy and efficiently encode data, often resulting in significantly smaller file sizes. These tools typically support multiple compression formats, such as ZIP, RAR, and 7z, and can also encrypt archives for added security. Many include features like batch compression, password protection, file splitting, and integration with cloud storage. File compression software is essential for sharing large files, archiving data, and improving storage efficiency on both personal and enterprise systems.
Business Filing Services
Business filing services enable anyone to quickly and easily create a business. Business filing services streamline the process of business registration, obtaining business licenses, and creating business entities such as an LLC, corporation, limited company, S corp, and more. Business filing services may also offer a la carte legal services.
File Sync Software
File sync software assists in the process of ensuring that edited files from multiple sources and locations are synchronized and have the same information.
Duplicate File Finders
Duplicate file finders are software tools that enable users to find and identify duplicate files, duplicate images, duplicate videos, duplicate documents, and more in order to prevent duplicates and free up space on their system or hard drive. Duplicate file finders are also known as duplicate file removers or duplicate file cleaners.
File Managers
File managers, also known as file browsers or file explorers, are software applications that enable a user to browse, search, organize, and manage the files and folders on their computer or device.
E-Filing Software
E-filing software for legal purposes enables attorneys, law firms, and self-represented litigants to electronically submit court documents to judicial systems. It streamlines the filing process by ensuring compliance with court formatting rules, deadlines, and procedural requirements. The software provides features like document tracking, real-time status updates, and automated notifications of court acceptance or rejection. With secure encryption and user authentication, it protects sensitive legal information from unauthorized access. By reducing reliance on paper filings, it increases efficiency, saves time, and minimizes the risk of errors or missed deadlines.
File Archiving Software
File archiving software is designed to compress, organize, and store files efficiently for long-term retention and easy retrieval. It helps reduce storage costs by using compression techniques and managing data lifecycle policies, such as automatic archiving and deletion. This software supports indexing and search capabilities, enabling quick access to archived files when needed. Many solutions integrate with backup and compliance systems to ensure data security and regulatory adherence. By centralizing archived data, it improves data management and preserves critical information over time.
File and Document Comparison Software
File and document comparison software enables users to compare the difference between two or more files or documents. File comparison tools can detect differences between files such as images, code, PDFs, media files, and more. Document comparison tools can detect the differences between two or more documents.
File Integrity Monitoring Software
File integrity monitoring software is a type of security tool designed to monitor and track changes made to files on a computer system. It works by comparing the current state of a file to its known baseline, alerting users if any unauthorized modifications have been made. This software can detect both accidental and malicious changes, making it useful for maintaining the integrity of important files. It is often used in conjunction with other security measures such as firewalls and antivirus programs to provide comprehensive protection against cyber threats. Overall, file integrity monitoring software plays an important role in ensuring the security and reliability of computer systems.
Secure File Transfer Software
Secure file transfer software enables the safe exchange of files between users, systems, or organizations by encrypting data in transit and at rest. It often supports protocols like SFTP, FTPS, and HTTPS to ensure secure communication while preventing unauthorized access. Many solutions include authentication, access controls, and audit logs to enhance compliance with security regulations. Advanced features may include automation, integration with cloud storage, and endpoint protection for seamless and secure file sharing. These tools are essential for businesses handling sensitive data, such as financial institutions, healthcare providers, and enterprises with strict security requirements.
HR Employee File Management Software
HR employee file management software is designed to assist HR departments with the process of gathering, searching, structuring and managing all employee information.
Managed File Transfer (MFT) Software
Managed file transfer (MFT) software provides the tools to ensure the efficiency and security of file transfers and data exchange across a network from one machine to another.
File Transfer Protocol (FTP) Software
File transfer protocol (FTP) software is software used for transferring files between different devices over a network. It allows users to upload and download files securely and efficiently. The software uses a client-server architecture, meaning one device acts as the client initiating the file transfer while the other device acts as the server receiving the data. FTP software also allows for remote access to files stored on a server, making it convenient for businesses and individuals with large amounts of data. Additionally, it supports multiple file formats and can resume interrupted transfers.
Metadata Management Software
Metadata management software enables users and organizations to manage, identify, fetch, and analyze metadata. Metadata management software streamlines the processes involved with managing metadata.
Encryption Software
Encryption software protects sensitive data by converting it into unreadable code that can only be accessed with the correct decryption key. It secures files, communications, applications, and entire systems from unauthorized access, cyberattacks, and data breaches. These tools use algorithms like AES, RSA, and elliptic-curve cryptography to safeguard data at rest, in transit, or in use. Many encryption platforms offer key management, user authentication, and compliance features to meet industry regulations and enterprise security requirements. Overall, encryption software is essential for maintaining privacy, ensuring data integrity, and protecting information across digital environments.
Data Governance Software
Data governance software helps organizations ensure the quality, consistency, security, and accessibility of their data across the enterprise. These platforms provide tools for defining data policies, standards, and processes, ensuring that data is properly classified, managed, and protected throughout its lifecycle. Data governance software often includes features like data cataloging, lineage tracking, metadata management, and role-based access controls. It supports compliance with data protection regulations such as GDPR and HIPAA, helping businesses maintain regulatory compliance and avoid potential legal risks. By using data governance software, organizations can improve data integrity, enhance decision-making, and foster better collaboration across teams.
View more categories (20) for "stardict dictionary files"

20 Products for "stardict dictionary files"

  • 1
    Specops Password Policy

    Specops Password Policy

    Specops Software

    ...Specops Password Policy extends the functionality of Group Policy, and simplifies the management of fine-grained password policies. The solution can target any GPO level, group, user, or computer with dictionary and passphrase settings. Need a comprehensive list of vulnerable passwords to prevent dictionary attacks? Our password policy tool gives you many options. You can use a password dictionary, a file containing commonly used and/or compromised passwords, to prevent users from creating passwords susceptible to dictionary attacks. ...
  • 2
    Accent PDF Password Recovery

    Accent PDF Password Recovery

    Passcovery Co. Ltd.

    Accent PDF Password Recovery is a powerful software tool designed to recover and remove passwords from Adobe PDF files quickly and efficiently. It instantly removes the Permissions password, unlocking restrictions on editing, copying, and printing, while also brute-forcing the Document Open password with optimized speed. The software supports all versions of Adobe PDF and offers multiple attack methods including brute force, extended mask, and dictionary attacks with mutation capabilities. ...
    Starting Price: $40
  • 3
    Excel Password Recovery

    Excel Password Recovery

    eSoftTools Software

    eSoftTools Excel Password Recovery is a very helpful program for those who lost or forgot their MS Excel file opening password or excel worksheet password. This software moves you in 100% comfort zone by utilizing its smart technology driven Brute Force, Brute Force with Mask Attack and Dictionary Attack and recover lost excel file open password and worksheet password. User can easy to manage and recover XLS, XLSX, XLA, XLTM, XLSB, XLAM & XLSM file password recovery. eSoftTools Excel Unlocker tool easy to install on all versions of Windows operating systems and supported all version’s of Microsoft Excel file password recovery. ...
    Starting Price: $19
  • 4
    Datatrial Nucleus
    ...Nucleus Documents enables document management and version control for your quality documentation and media. Control, manage, and share company content with ease. Collate and control your electronic trial master file documents with ease using our centralized regulatory document management solution. Nucleus Coding enables dictionary term coding against both MedDRA and WHODrug dictionaries, either in our standalone application, or integrated into your data capture system.
  • 5
    PassRec

    PassRec

    PassRec

    ...recovery process varies. Below are the three password attacking methods: Dictionary Attack: search for password from inbuilt or customized dictionaries. Brute-force Attack: find passwords within the ranges and lengths you set. Brute-force with Mask Attack: Attempt every possible number or letter, which may be time-consuming.
  • 6
    1Data

    1Data

    Sincera

    1Data is a modern, flexible data management platform that enables businesses to integrate, analyze, and act on data through low-code/no-code tools. It helps break down data silos, ingesting data from multiple sources via connectors (databases, APIs, files, messages), and lets users define business rules and workflows to automate analysis and trigger actions. Components include connectors, rules, workflows, a data dictionary, exception management, and metrics. Users can build simple or complex flows of data/events/rules to achieve specific outcomes, track what data exists and how it’s used via the data dictionary, and monitor, manage, or resolve data exceptions. 1Data also supports use cases like ETL/data pipelines, data lakes/warehouses, data standardization, reconciliation and cleansing, and data distribution.
  • 7
    GlobalVision Text Inspection
    ...Generate comprehensive inspection reports to review and navigate through all the differences found. Compare hardcopy samples to digital files for fast and accurate inspections of printed packaging components. Compare text and spelling in over 30 foreign languages with dictionaries built directly into GlobalVision.
  • 8
    GFI EndPointSecurity
    ...All functionality is built into a dashboard that provides relevant information, suggestions for boosting protection, and shortcuts to common security tasks. The data awareness module provides another layer of endpoint protection by scanning each relevant file and searching for the most common types of information susceptible to a security breach (e.g. SSNs, PANs, etc.). The module supports inputs in the form of regular expressions and dictionary files. It also contributes to your data loss prevention (DLP) and compliance efforts. Use enhanced file control capabilities to scan archived files and block files based on size.
  • 9
    aSISt

    aSISt

    FINGO

    ...The reports were not only difficult to prepare, but also the market lacked relevant tools for managing and preparing XBRL reports. To address this, we partnered with GPM Systems Sp. z o.o. and created an application that allows to prepare and manage these mandatory filings in line with the XBRL format. aSISt hides the technical complexity of XBRL behind an interface and vastly simplifies the filing process. The user is given forms similar to Excel sheets, which makes the application uniquely intuitive. The process of preparing filings was simplified to four basic steps. aSISt supports reporting periods, taxonomies (dictionaries) versioning management and ensures compliance with the selected taxonomy version for each report.
  • 10
    HelpSmith

    HelpSmith

    HelpSmith

    ...Using HelpSmith, you can create a CHM help file, a fully responsive Web Help system compatible with desktop computers and mobile devices, Printed Manual, PDF document, ePub eBook, and Microsoft Word document from a single source help project. You can write topic content using a built-in word processor that includes a spell checker with dictionaries available for many languages.
    Starting Price: $199 one-time payment
  • 11
    Narrator

    Narrator

    Mariner Software

    ...Choose different voice attributes for your assigned characters such as rate, pitch, inflection and volume. There are silent read-along options for stage directions. Export to iTunes or sync to your iPad, iPod or iPhone. Use the export option for AAC sound files for use with other sound playing software such as iMovie or as a screencast voice over. Improve the pronunciation of words and phrases; replace acronyms and symbols using the Dictionary preference.
    Starting Price: $29.95
  • 12
    Subtitle Edit

    Subtitle Edit

    Subtitle Edit

    ...For a list of features see below or check out the Subtitle Edit Help page. On my blog you can download latest beta version and read about/discuss new features. Merge short lines/split long lines. Change casing using names dictionary. Multiple search and replace. Can open subtitles embedded inside Matroska files. A Subtitle Edit dll (LibSe.dll) is available for programmers (BSD New/Simplified license). Compile it from source code.
  • 13
    h5py

    h5py

    HDF5

    ...It lets you store huge amounts of numerical data, and easily manipulate that data from NumPy. For example, you can slice into multi-terabyte datasets stored on disk, as if they were real NumPy arrays. Thousands of datasets can be stored in a single file, categorized and tagged however you want. H5py uses straightforward NumPy and Python metaphors, like dictionary and NumPy array syntax. For example, you can iterate over datasets in a file, or check out the .shape or .dtype attributes of datasets. You don't need to know anything special about HDF5 to get started. In addition to the easy-to-use high level interface, h5py rests on a object-oriented Cython wrapping of the HDF5 C API. ...
    Starting Price: Free
  • 14
    Understand

    Understand

    SciTools

    Understand is a comprehensive static-analysis and code-comprehension platform that helps software engineers “see” and understand large, complex code bases, whether legacy, safety-critical, or modern multi-language projects. It parses your source code and builds a complete “code dictionary” of every entity (files, classes, functions, variables), populating cross-references, call trees, dependency graphs, control-flow diagrams, and more. Through interactive, customizable graphs and visualizations, call graphs, control flow graphs, dependency trees, and UML-style class diagrams, you can explore exactly how parts of the code connect, which modules depend on which, and where changes may ripple across the project. ...
    Starting Price: $100 per month
  • 15
    sqlmap

    sqlmap

    sqlmap

    ...It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. Support to directly connect to the database without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name. Automatic recognition of password hash formats and support for cracking them using a dictionary-based attack. ...
  • 16
    FuzzDB

    FuzzDB

    FuzzDB

    FuzzDB was created to increase the likelihood of finding application security vulnerabilities through dynamic application security testing. It's the first and most comprehensive open dictionary of fault injection patterns, predictable resource locations, and regex for matching server responses. FuzzDB contains comprehensive lists of attack payload primitives for fault injection testing. These patterns, categorized by the attack and where appropriate platform type, are known to cause issues like OS command injection, directory listings, directory traversals, source exposure, file upload bypass, authentication bypass, XSS, HTTP header crlf injections, SQL injection, NoSQL injection, and more. ...
    Starting Price: Free
  • 17
    Endpoint Protector
    Endpoint Protector is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft and offers seamless control of portable storage devices. Endpoint Protector’s filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or data protection regulations such as GDPR, PCI DSS, CCPA, HIPAA, etc. Endpoint Protector features several specialized modules that can be mixed and matched based on client needs. The modules comprise: Content Aware Protection, Device Control, Enforced Encryption, and eDiscovery . ...
  • 18
    Keepsake

    Keepsake

    Replicate

    ...This facilitates the retrieval of code and weights from any checkpoint, aiding in re-training or model deployment. Keepsake supports various machine learning frameworks, including TensorFlow, PyTorch, scikit-learn, and XGBoost, by saving files and dictionaries in a straightforward manner. It also offers features such as experiment comparison, enabling users to analyze differences in parameters, metrics, and dependencies across experiments.
    Starting Price: Free
  • 19
    GuitarTab

    GuitarTab

    GT1 Apps

    ...It includes GuitarPro tabs and chords for guitar, bass, ukulele and drums which also can be accessed offline. In addition to the large selection, you also have the option of importing your own tab files. Sync your favorites and playlists across different devices. Features: ☆ Access more than 1000000 guitar tabs & chords in various formats ☆ Open and play GuitarPro tabs (supported formats: .gp3, .gp4, .gp5, .gpx and .gp) ☆ Realistic sound engine with various adjustment options ☆ Search YouTube for music videos and lessons ☆ Download, print and share your favorite tabs ☆ Access your favorites and playlists across different devices and use them also offline ☆ Edit tabs and import your own library ☆ Access interesting information about artists and albums ☆ Large chords dictionary...
    Starting Price: $0
  • 20
    ClinSoft

    ClinSoft

    Innovate Research

    ...Our CDM Team Is Well-Versed With Current Good Clinical Data Management Practices (cGCDMP) International conference on harmonization Good Clinical Practices (ICH-GCP) 21 CFR Part 11 Compliance Health Insurance Portability and Accountability Act (HIPAA) Requirements Applicable Regulatory Guidelines SAS datasets SAS XPORT transport files EDC Helpdesk Support 24/7 On-Site and Off-Site Clinical Data Management Services Electronic Data integration and transfer Quality Control Activities Medical Dictionary for Regulatory Activities (MedDRA) Serious Adverse Event (SAE) Reconciliation Clinical Database Transfers Clinical Database Lock paper Case Report Form (pCRF) and electronic Case Report Form.
  • Previous
  • You're on page 1
  • Next