detect leaks

Downloads All | Freeware
Products 1-30  |  Go to 1 Next >> page 
Deleaker Add-in for Visual C - 1.2

Deleaker: a new add-in for Visual C (VS 2003-2005) easily detects resource/memory leaks, localizes them in the source code and is tightly integrated into the Visual Studio development environment.





More Info
   
   
Rating: 0 Star0 Star0 Star0 Star0 Star
Current Version: 1.2
Release Date: Sep 22, 2006
License: Shareware
Price: $299
Downloads: 873


More on Detect Leaks
Deleaker Add-in for Visual C++ 1.2.9Data Added 1: June 21, 2007   
Deleaker Add-in for Visual C++. Boundschecker Debugging Detect Leaks.
Deleaker is a useful add-in for Visual Studio 2003-2005 that helps you to analyze programming errors, many of which are unique to Visual C++. Deleaker is a great tool for Visual C++ developers who occasionally have trouble detecting resource leaks and debugging their applications. With Deleaker, you can detect and localize resource leaks in memory, GDI and USER objects, handles, with no appreciable slow down to your application. Debugging has always been a headache for program developers....
Size: 1.0 MB License: Shareware Price: $99 
Keywords: Boundschecker - Debugging - Detect Leaks - Gdi Leak - Handle Leak - Leak - Purify - Resource Leak - Visual C++ - Visual Studio



Deleaker 3.0.10Data Added 1: September 09, 2014   
Deleaker. Boundschecker Debugging Detect Leaks.
Deleaker is a useful extension for Visual Studio 2005, 2008, 2010, 2012, 2013 that helps you to analyze programming errors, many of which are unique to Visual C++. Deleaker is a great tool for Visual C++ developers who occasionally have trouble detecting resource leaks and debugging their applications. With Deleaker, you can detect and localize resource leaks in memory, GDI and USER objects, handles, with no appreciable slow down to your application. Debugging has always been a headache...
Size: 2.1 MB License: Shareware Price: $99 
Keywords: Boundschecker - Debugging - Detect Leaks - Gdi Leak - Handle Leak - Leak - Purify - Resource Leak - Visual C++ - Visual Leak Detector



Network Leak Finder Data Added 1: February 25, 2010   
Netleak is a collection of small perlscripts that detects connectivity between network segments. It is mostly useful to detect "leaks" in large organizations that have private network segments physically separated from the Internet.. Network Leak Finder.
Size: 19.0 KB License: Freeware 


Windows Leaks Detector 1.1.3Data Added 1: April 19, 2013   
Windows Leaks Detector. .
The tool helps to detect any resorces leaks (memory, handles etc.) in any Win32 application. Based on hooking of Win API calls: no source code required, attaches to any running process. Call stack available. Agregates leaks by origin. GNU General Public License (GPL)
Size: 22.6 KB License: Freeware 


GVH Logging and Debug Library 3.0Data Added 1: May 24, 2007   
Super 32-bit logging and debugging tool for C/C++ developers. Decreases development time significantly: no more slowly stepping through your program. Use macros to write information to a logfile. EXTREMELY POWERFUL: optionally duplicate the debug info REAL-TIME to a scrollable window. Suspend/resume, detect memory leaks, log function-call stack, disable/enable all logging or specific types from any point in your app, hex-dumps, more than one log file, system-generated error...
Size: 76.6 KB License: Shareware Price: $34.95 
Keywords: Debugging - Logging - Realtime



BS Detect 1.12Data Added 1: June 21, 2007   
BS Detect. Alarm Bull Bullcrap.
Ever had a co-worker who spouts unbelievable loads of utter rubbish at regular intervals? Then this program is a necessity. BS Detect will display a customizable alert when anyone nearby begins to tell lies, exaggerations, or indeed, anything else you don't like. You can send an alert to yourself, to anyone on your network, you can even set an alert to go off after a delay of a few seconds!
Size: 1.5 MB License: Freeware 
Keywords: Alarm - Bull - Bullcrap - Bullshit - Crap - Detect - Exaggeration - Freeware - Rubbish - Shit



zmem anti-leakage library 6Data Added 1: August 05, 2012   
Detect memory leaks, debug them and analyze performance of allocation/deallocation with this simple middle-ware which provides wrappers for malloc/calloc/free
Size: 5.9 KB License: Freeware 


zmem anti-leakage library 6Data Added 1: March 20, 2013   
Detect memory leaks, debug them and analyze performance of allocation/deallocation with this simple middle-ware which provides wrappers for malloc/calloc/free BSD License
Size: 5.9 KB License: Freeware 


IBM AIX memory leak detector 1.0Data Added 1: May 15, 2013   
AIXmem is a tool to detect memory leaks in a IBM AIX C-development environment. AIX 'User Defined Malloc Replacement' is used to trace the memory allocation and freeing. --> Unfortunately i don't have time to make something useful out of this. :( <-- Public Domain
Size: License: Freeware 


Abee Compare MP3 0.91Data Added 1: May 24, 2007   
Abee Compare MP3. Detect Similar Mp3 Determine Same Mp3 Discover Like Mp3.
This program allows you to create mp3 collection from files on your disks and then compare mp3-files and detect files with the same tags (mp3 duplicates). It also can determine similar mp3 files. For example if one file has "The Beatles" in the author-tag but another file has "The Beetles" in this tag this program will discover such alike mp3 files. Program can discover all similar files on your hard drive, network drives, CD or DVD-drives. Sometimes the twin mp3 files occupy a lot of space...
Size: 1012.1 KB License: Freeware 
Keywords: Detect Similar Mp3 - Determine Same Mp3 - Discover Like Mp3 - Find Similar Mp3 - Find Twin Mp3 - Mp3 Duplicate - Mp3 Tag Comparer - Same Mp3 Observer



MMD Logger 2.0 with GDI Tool 2.0Data Added 1: June 21, 2007   
MMD Logger with GDI tool is windows console-like program designed to log, save and analyze debug messages. It helps C/C++ programmers debug and profile their code. With MMD logger you can easily control program flow, time and memory consuming etc. Debug features are switching on/off by defininig/undefining one parameter and no additional code is generated when logging is off. GDI tool reports GDI object creation and deletion, GDI memory leaks, and GDI function failures. If you write any...
Size: 406.2 KB License: Shareware Price: $15 
Keywords: Bug - Debug - Debugger - Error - Failure - Finder - Gdi - Leaks - Log - Logger



Project Analyzer 10.2.04Data Added 1: November 27, 2016   
Project Analyzer. Analyzer Debugger Diagram.
Project Analyzer is a Visual Basic source code analyzer, optimizer and documenter. It works with VB, VB.NET, ASP.NET and Office VBA. Project Analyzer does an automatic code review to detect quality control issues like dead code, unoptimal variable declarations, unoptimized syntax, memory leaks and functionality issues such as missing event handlers or questionable tab order. You can enforce programming standards on variable naming, commentation, disallowed statements and code complexity....
Size: 8.2 MB License: Shareware Price: $299 
Keywords: Analyzer - Debugger - Diagram - Document Generator - Metrics - Optimizer - Print Source Code - Profiler - Test - Unused Code



HandyAvi 5.0Data Added 1: June 14, 2013   
HandyAvi. Animation Astro-imaging Astronomy.
Use any video device that has a DirectShow driver to make time-lapse, motion-detect, meteor trail, planetary or animation movies. Easy to use! Simply start HandyAvi then select the type of movie you want to make (Time-lapse, Motion-detect, meteor trail, Astronomy or Animation). Use the control panel that comes up to set up and begin making your AVI movie. * SCIENCE: Sspeed things up such as flowers opening up or clouds moving in the sky using Time-lapse. Make time-lapse movies...
Size: 6.6 MB License: Shareware Price: $59.95 
Keywords: Animation - Astro-imaging - Astronomy - Ccd - Lightning - Messier Marathon - Meteor - Motion Detect - Movie - Photography



Max Spyware Detector 19.0.1.15Data Added 1: April 09, 2010   
Max Spyware Detector. Adware Removal Anti Spyware Software Antispyware.
Max Spyware Detector is a complete solution for individuals, professionals and home users to scan, detect and delete spyware to get rid of the malware, adware popup, Keylogger and Trojans instantly. Powered with Smart Scan Technology and Max Shields keep you protected all the time when you are online browsing the Internet. Max Spyware Detector has advanced features which protect the users PC real time from the nastiest spyware. It scans and removes the detected spyware safely from your PC and...
Size: 10.8 MB License: Shareware Price: $29.95 
Keywords: Adware Removal - Anti Spyware Software - Antispyware - Check For Spyware - Clean System Security - Detect Spyware - Online Spyware Scan - Remove Spyware - Scan Spyware - Spyware Check



Nokia Mobile Phone Investigation 2.0.1.5Data Added 1: December 11, 2007   
Nokia Mobile Phone Investigation. Byte Code C C#.
Download best PDA cell phone inspector software available with Source code that detect mobile phone, PDA and pocket pc information. Investigation software with embedded VC++ MFC, VB, Embedded C++ source code and various mobile technologies like AT+CPBR, AT+CPBS, AT+CBS, AT+CSQ, AT+CIMI, AT+CGSN etc is useful for development of Forensic program. Forensic utility fetch PDA phone hardware configuration detailed accurately. Software easily configured with your hardware through USB port and...
Size: 689.0 KB License: Shareware Price: 192861INR 
Keywords: Byte Code - C - C# - Cell - Code - Configuration - Detect - Device - Dll - Embedded



.NET Email Verifier Component 1.2Data Added 1: July 28, 2008   
.NET Email Verifier Component. .net .net Component Asynchronous.
Safabyte SfbEmailVerifier is a versatile component for validating email-addresses. It allows you to add email address validation to both .NET WinForm and WebForm applications. Developers are able to detect invalid email through validation syntax, check bad or accepted email addressed with Black List and White List. By setting validation level to its maximum level, email address will go through 6 checking levels: address syntax, black and white lists, Mail Exchange records, Smtp Connection and...
Size: 3.9 MB License: Shareware Price: $99 
Keywords: .net - .net Component - Asynchronous - Component - Detect Dns Servers - Dotnet - Dotnet Component - Email - Email List - High Performance Internal Mx Cache



A Metal Detectorists Database for HanDBase 1.0Data Added 1: February 22, 2010   
This database is for those who metal detect and want to keep track of their finds. It has forms and linked databases...making it easy to keep records of the location, finds on specific dates, etc. There are also capabilities for drawing maps, keeping GPS coordinates, and so on. You should open the database called detecto first...the rest is self-explanatory..... DDH Software -. Leading supplier of Palm OS & Pocket PC applications, including HanDBase, the awarding winning relational database...
Size: 8.5 KB License: Freeware 
Keywords: A Metal Detectorists Database For Handbase 1 0 - Business - Database - Databases - Ddh Software - Detect - Detectorists - Handbase - Handheld - Keep Track



UrlPaster Bookmark Manager 2.5Data Added 1: September 20, 2010   
UrlPaster Bookmark Manager. Bookmark Manager Detect Browser Favorites Manager.
The portable bookmark solution for multi-browser. Bookmark webpage with one keystroke! Detect browser type automatically! Import bookmarks from browser favorites! Find duplicated, check broken links with multi-thread! One exe only, No installation! Support IE, Firefox, Chrome, Safari, Opera, Maxthon, Avant and Slim! UrlPaster Bookmark Manager would import favorite bookmarks from the installed IE, FireFox, Safari, Chrome, Opera browsers automatically when the first run, and save the bookmark...
Size: 679.0 KB License: Shareware Price: $19.95 
Keywords: Bookmark Manager - Detect Browser - Favorites Manager - Save Link



1-abc.net Duplicate Finder 5.00Data Added 1: November 12, 2012   
1-abc.net Duplicate Finder. Attribute Automatically Camera.
In times where thousands of files are located on a computer, sometimes it is very hard to maintain an observation. This very easy to use program helps you to detect duplicate files on your machine, on external hard drives, on CDs, DVDs, USB sticks and camera cards. Since each user defines duplicate files different concerning file name, file size, attributes, last modification time and so on you can determine by yourself what the program should look for. After the selection of any path or...
Size: 467.0 KB License: Shareware Price: 14.99EUR 
Keywords: Attribute - Automatically - Camera - Clean - Cleaning - Data - Date - Delete - Detect - Disk



UserGate IM Control 1.0Data Added 1: September 29, 2012   
UserGate IM Control. Black List Dlp Gateway Solution.
UserGate Instant Messengers Control is a free messenger control solution by Entensys, which can be used to optimize employees' work time, prevent data leaks and information security threats. + Messenger Control in Corporate Networks Uncontrolled use of messengers in corporate networks can cause work time abuse by employees, data leaks and threats to network information security if any infected files are received. UserGate IM Control provides IM usage control within the corporate...
Size: 24.1 KB License: Freeware 
Keywords: Black List - Dlp - Gateway Solution - Icq - Jabber - Linux - Mail Ru Agent - Messenger Control Solution - Morphological Analysis - Msn



DUMA library 2.5.15Data Added 1: July 16, 2012   
DUMA (Detect Unintended Memory Access) is a multi-platform memory debugging library. It can detect memory leaks and buffer overruns (or underruns) in a malloc() / new memory buffer. DUMA is a fork of Bruce Perens' Electric Fence library.
Size: 234.8 KB License: Freeware 


UnThreat AntiVirus 4.1.10942Data Added 1: April 05, 2012   
UnThreat AntiVirus. Antispyware Antivirus Detect Malware.
The highly effective Anti-Virus engine is built to instantly scan, detect and remove viruses, trojans, worms as well as other suspicious or unknown threats that reach your system through attachments, downloads or removable storage devices are rendered harmless or blocked entirely. The firewall component controls all the traffic reaching your computer - inwards and outwards. Security is based on application behavior. The firewall prompts you whenever an application or other...
Size: 8.5 MB License: Shareware Price: $29.95 
Keywords: Antispyware - Antivirus - Detect Malware - Firewall - Firewall Protection - Quarantine Virus



W32/AutoIt Trojan Cleaner 7.0Data Added 1: June 05, 2012   
W32/AutoIt Trojan Cleaner. Detect Trojan Malware Trojan.
W32/AutoIt Trojan Cleaner will detect and remove W32/AutoIt Trojan and its variants completely, from your system. Simply double-clicking the executable will launch it. Follow the user-friendly instructions to detect and remove the W32/AutoIt Trojan and its variants from your computer.
Size: 451.0 KB License: Freeware 
Keywords: Detect Trojan - Malware - Trojan - Trojan Cleaner - W32 Autoit - W32 Autoit Trojan



Malware Eraser 1.2 Build 0.114Data Added 1: August 29, 2012   
Malware Eraser 1.2 Build. Detect Detect Malware Malware.
* Malware Eraser is small utility that runs in the background and detect and remove specific malware, trojans, worms and other malicious threats that can damage your computer. * It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Malware Eraser utilizes next-generation scan engine technology, including process scanning, digitally signed .DAT files, and scan performance...
Size: 1.1 MB License: Freeware 
Keywords: Detect - Detect Malware - Malware - Malware Remover - Remove - Remove Malware



SNFaceCrop 1.4.4354.42696Data Added 1: September 14, 2012   
SNFaceCrop. Crop Crop Face Cropper.
SNFaceCrop is a Windows-based application to detect and crop faces from image files. The detected faces can be automatically saved into files or copied into the Windows clipboard. SNFaceCrop uses OpenCV library. SNFaceCrop is very easy to use. There are two detection modes in SNFaceCrop: interactive mode and batch mode. In interactive mode, you use the menus and user interfaces available in SNFaceCrop application window. In batch mode, you...
Size: 2.1 MB License: Freeware 
Keywords: Crop - Crop Face - Cropper - Detect Face - Face - Image Cropper



ChangeAlyzer 1.1Data Added 1: June 05, 2014   
ChangeAlyzer. Changealzyer Changes Detect Changes.
ChangeAlyzer is a professional easy-to-use System Monitoring Application to detect changes in the Registry and/or Filesystem. It can show you which changes are made to your System when you install any Software or when you change Settings in an Application or Windows. With that knowledge it is easy to find out if a application really needs the installation process or if it just can be started when you only have the program folder. Or you can check if an installation of a software is...
Size: 1.5 MB License: Shareware Price: 7EUR 
Keywords: Changealzyer - Changes - Detect Changes - Filesystem - Pc - Registry - Registry Keys - Registry Values - Snapshot - System



drippy for linux 0.1Data Added 1: December 12, 2013   
drippy provides a plugin for nose which reports tempfile leaks during test runs. For example: $ /path/to/nosetests --with-drippy ....................... test_some_feature (yourpackage.tests.FeatureTests) -- before: 0, after: 1 Featuretests -- before: 0, after: 1 ........... yourpackage.tests -- before: 0, after 1 yourpackage -- before: 0, after: 1
Size: 10.2 KB License: Freeware 
Keywords: 0243s - Drippy - Drippy Linux - Featuretests - Leaks - Linux - Pathtonosetests - Plugin - Reports - Runsfor



Zeppoo 0.0.3dData Added 1: August 09, 2013   
Zeppoo makes it possible to detect if a rootkit is installed on your system. Zeppoo also makes it possible to detect hidden tasks, syscalls, some corrupted symbols, modules, and also hidden connections. For that, it mainly uses /dev/kmem to directly inspect the memory of the kernel, and when possible, /dev/mem.
Size: 41.0 KB License: Freeware 
Keywords: Detect - Installed - Makes - Rootkit - System - Zeppoo



Proxy Detector 0.1Data Added 1: December 18, 2013   
Proxy Detector is a PHP class that can detect HTTP requests via proxy. This class can detect if a visitor uses a proxy server by scanning the headers returned by the user client. When the user uses a proxy server, most of the proxy servers alter the header. The header is returned to PHP in the array $_SERVER.
Size: 20.5 KB License: Freeware 
Keywords: Class - Detect - Detector - Http - Php - Proxy - Requests - Server



For searches similar to detect leaks see "Related Downloads" under the categories listing.
Products 1-30  |  Go to 1 Next >> page 
Categories
Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Mobile
Network & Internet
Screen Savers
Security & Privacy
Servers
Utilities
Web Development
Related Downloads
Wiki Leaks
Memory Leaks Xp
Information Leaks
Privacy Leaks
Find Memory Leaks
Stop Memory Leaks
Detect Them
Detect Bs N
Detect I
Detect File
Top Downloads
  Oxford Dictionary... 
  Server Genius 
  WinCHM - help... 
  Webcam and Screen... 
  iFunia Media Player... 
  CrossUI Builder... 
  1st Choice Free... 
  AudFree Audio... 
  DVDFab DVD Ripper 
  AudFree DRM Audio... 
  RDS WebAccess 
  Cute Web Phone... 
  Xing Lead Extractor 
  SSuite Agnot... 
  SSuite File Shredder 
  Soft4Boost TV Recorder 
  FewClix for Outlook 
  RecordPad... 
  Sidify Music... 
  Mgosoft XPS... 
New Downloads
  Start Menu 8 5.4.0.2
  Dr.Web CureIt 12.5.202101211
  PubTyper 1.1
  IObit Malware Fighter 8.5.0.789
  Vivaldi for MacOS 3.6
  Isoo Backup 4.6.1.790
  Aiseesoft HD Video... 9.2.28
  Aiseesoft MTS... 9.2.32
  Mgosoft JPEG To PDF... 8.8.0
  Bopup IM Suite... 5.8.4
  Switch Audio and... 9.05
  Switch Plus Edition 9.05
  Gammadyne Mailer 61.0
  WavePad Masters... 12.23
  Mgosoft JPEG To PDF... 8.8.0
  Mgosoft JPEG To PDF... 8.8.0
  PDF-XChange Editor 9.0.352
  Dr.Web Security Space 12.0.4.2201
  Ezi Accounting 2.7.10.07
  Mgosoft Image To... 8.8.0
Latest Downloads
Selling A Car
Mac Install Cd
Htc Hero Sound
Manage Accounts
Kdlink Its Pppoe Client
Xml Treeview Editor
Freeware Desktop Time
Camera Digital Easyshare Kodak
Doom Press Release Pre Beta
Spy On Yahoo Messenger
Ant Game
Ice Cream Business
Seth Puzzle Boxes
Recipe Box Cards
Mexican Drinks
A Registry Optimizer
View Bmf
Share Usb Scanner
Find Open Shares Freeware
Dell Battery
Latest Reviews
SoftPerfect RAM Disk (Sean)
Superb disk utility for speeding up laptops and prolonging the life of their hdd.
StarCode Lite POS and Inventory Manager (Ed Martin)
I would say best inventory software for small shops or stores. Never found an app like this...
ConyEdit for Windows (reshim)
Programmers feel the comfort of coding using ConyEdit which is capable to edit codes in batch...
Disc Cover Studio (harish)
No need to go for a professional designer for the cover of new record, you can do it on your own...
Kaspersky Security Scanner (Anthony)
Scans software to find whether it is harmful for computer and also checks for updates of security...
Comodo Firewall (Maxmuller)
This just another awesome product from Comodo to protect your computer from unwanted inbound or...
TCP Splitter (Redrick)
This lets the data packets we send split into several packages which is convenient for many...
Project Viewer Lite (Tensialar)
This is a light weight software for viewing MS project files easily without the MS project...
PDF Shaper Professional (Mortinus)
I had difficulties with the pdf documents which needed to be edited before presentation, then I...
Hotelare (Nielsine)
You can enable your guests book any room instantly through your website, also receive the...
 
All software information on this site, is solely based on what our users submit. Download32.com disclaims that any right and responsibility for the information go to the user who submit the software, games, drivers. Some software may not have details explanation or their price, program version updated. You should contact the provider/actual author of the software for any questions. There are also user reviews/comments posted about various software downloads, please contact us if you believe someone has posted copyrighted information contained on this web site.   Copyright © 1996-2015 Download 32.