Chronos Atomic Clock Synchronizer 5.4.0

Chronos Atomic in Internet

Chronos Atomic Clock Synchronizer 5.4.0

Chronos Atomic Clock Synchronizer is a utility for people who need their computers to use exact time. The program connects to various atomic clock timeservers and synchronizes your internal clock with time provided by these servers. Key benefits: Connects on many atomic clock time servers; You can add any time server needed; Improved algorithm to calculate differences between servers; Calculates delays and synchronize on less than 0.1...


   
 
Related Software

NetWorx 6.1 SoftPerfect  Network Monitors

NetWorx is a simple, yet powerful tool that helps you objectively evaluate your bandwidth situation. NetWorx can collect bandwidth usage data and measure the speed of your Internet or any other network connection. NetWorx can help you identify possible sources of network problems, ensure that you...

SoftPerfect Network Scanner 7.1.2 SoftPerfect  Network Monitors

SoftPerfect Network Scanner is a fast universal IPv4/IPv6 scanner with a modern interface and many advanced features. It is intended for both system administrators and general users interested in computer security. The software can ping computers, scan ports, discover shared folders and comes...

GlassWire Free Firewall 2.0.78 GlassWire  Firewalls

GlassWire's free firewall software helps protect your privacy & security by monitoring your network activity for suspicious activity. You'll be shocked by how many applications on your computer are sending your private data over the Internet without you knowing. Once suspicious activity is...

AD Sound Tools 1.2 Adrosoft  Sound Tools

AD Sound Tools is a real-time software that provides effective use of your PC sound devices. It includes a signal generator, a recorder, two oscilloscopes and two spectrum analyzers. The program allows to control your recording device in time and frequency domains, record a signal to WAV file and...

SoftPerfect Switch Port Mapper 2.0.7 SoftPerfect  Networking

SoftPerfect Switch Port Mapper works with managed network switches and reports what is connected to switch ports, and which ports are not connected. For every connected port, it lists the MAC address, IP address and host names of the computers associated with that port. Additionally, it can...

My WiFi Hotspot 5.0 Rogosoft Corporation  Optimize Connection

Share your Internet connection from one PC to other PC or mobile devices without using a WiFi router. If you have a PC that has a wired Internet connection and a wireless network card, you can definitely let your other PC or phone or tablet access the Internet. My WiFi Hotspot software quickly...

JavaScript Diagram 3.1 MindFusion LLC  Components and Libraries

JsDiagram is a flow diagramming JavaScript / HTML 5 Canvas library for web applications. It helps you create and present flowcharts, workflow and process diagrams, organizational and relationship charts, network and hierarchy drawings, graphs and trees. The library includes more than 100 stock...

@SwIt Printfil 5.22 aSwIt Srl: Mail, Print for DOS, Windows  Printing

Printfil allows printing from DOS, Unix, Linux, host programs to any Windows printer, including USB, GDI, network printers, IP, fax printers and PDF writers, without changes to the original applications. Printfil can capture data sent to one or more parallel ports (PRN: , LPT1:-LPT9:), serial...

Network Icons Pack 1.0 MIKLSOFT  Icons and Cursors

Collection of network icons for applications of modern devices One can easily tell and application or video game by its associated icon. In fact, nearly anything on a computer is represented by such as tiny image. As such, Network Icons Pack offers a bundle of high-quality icons to be used...

SoftPerfect WiFi Guard 2.0.0 SoftPerfect  Network Monitors

SoftPerfect WiFi Guard is an essential tool for everyone running a small wireless network and striving to keep it secure. Generally, modern WiFi networks are well protected, but they have a few weaknesses that can compromise your WiFi password; this includes vulnerabilities in encryption and...