Eltima Serial Splitter Mobile 3.0

Serial Splitter Mobile by Eltima is useful if you need several applications to work with the same serial port on your mobile device simultaneously. Finally, one program works with one virtual port, the other one with another port and so on, but in fact all of them work with the same split real port. It enables data exchange between applications, which can be used in GPS simulation systems. ...

Author Virtual Serial Port Software
License Free To Try
Price $49.95
Released 2007-07-06
Downloads 299
Filesize 7.59 MB
Requirements Microsoft Windows Mobile 2003/2005
Installation Install and Uninstall
Keywords split real ports on mobile device, virtual com port, share serial port, gps splitter mobile, disable serial ports
Users' rating
(7 rating)
Eltima Serial Splitter MobileOtherWindows CE, Pocket PC, Windows Mobile 2003, Windows Mobile 2005
Eltima Serial Splitter Mobile read only - Download Notice

Using Eltima Serial Splitter Mobile Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of Eltima Serial Splitter Mobile on rapidshare.com, depositfiles.com, megaupload.com etc. All Eltima Serial Splitter Mobile download links are direct Eltima Serial Splitter Mobile full download from publisher site or their selected mirrors.
Avoid: read only oem software, old version, warez, serial, torrent, Eltima Serial Splitter Mobile keygen, crack.
Consider: Eltima Serial Splitter Mobile full version, read only full download, premium download, licensed copy.

Eltima Serial Splitter Mobile read only - The Latest User Reviews

Most popular Other downloads

Encrypt PDF SDK-COM Component

2.1 download

... (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) existing PDFs, set permissions, add ... print the file will be disabled in Acrobat Reader application, you also can encrypt a PDF allowing ...

Stellar Data Recovery Premium

12.1.0.4 download

... to check other vitals like electricals, sector scan, read elements, power-on time, etc. Users also have the option to save the SMART parameter graph as a JPEG image. With Stellar ...

Fast File Search

1.00 download

... such as Skip Hidden Files, System Files or Read Only Files in Search. The Software presents itself in ...

Hasleo NTFS for Mac

4.6 download

... After the NTFS drive is mounted, you can read or write the NTFS drive as you read and write to a Mac's native drive, so ... storage devices. By default, Hasleo NTFS for Mac only lists NTFS drives. You can uncheck the 'Only ...

Text Monkey PRO

1.0.1 download

... quoted so many times it's almost impossible to read. With Text Monkey, cleanup is a snap: just ... HTML tags from a web document so that only the readable text remains.) Example 3: You're editing ...

Eltima Serial Splitter Mobile

3.0 download

... the ports are equal! You can specify a read-only access mode for every created port. You can also manage real serial port settings: Baudrate, Parity, Databits, Stopbits, Flow Control. Since ...

FileSalvage

7.0.1 download

... which in addition SubRosaSoft has improved upon, to read the same piece of information and to automatically ... underlying architecture of Mac OS X, FileSalvage can read and display audio, video, image, text and other ...

WebTemp

3.38 download

... help you create statistics from CPU temperature meter readings measured by SpeedFan and other tools. WebTemp ... To provide CPU temperature, voltage and fan speed readings WebTemp needs an external hardware monitoring tool like ...

NTFS-3G

2011.1.15 download

... free, easy to use and powerful tool, a read-write NTFS file-system driver. This means one can finally ... to format NTFS volumes via diskutil · Automatic read-write mounting of NTFS volumes · Customizable locale settings ...

NeoBookDBPro

1.6a download

... applications that provide employees with full, limited or read-only access to corporate data. Access to tables can be restricted to protect critical data from being modified or deleted. · Add ...