My Old Software

Software

In the early 1990’s, I distributed several commercial software packages. Applications such as children’s and adult level games, Internet applications and online games, advanced testing applications, and programmer utilities were included in the SparTech repertoire. The following are the software applications that were distributed:

Matchem

Rated 4 stars by Ziff-Davis! As featured on The Learning Journey CD! Ziff-Davis (publisher of PC Magazine) gave Matchem 4 stars in a recent review. A Concentration type board game featuring colorful graphics, full stereo sound, and more. Also includes customizable options that’ll make the game extremely competitive for adults too!

KeyBoard Capers

CNET’s Shareware of the Month CNET’s Shareware of the Month! Let the little tikes learn their alphabet while building familiarity with the computer keyboard. Featuring lively, colorful animation, dynamic stereo sound, animated keyboard hints, and more…

Harmony

Simple, but fun! Regular Tic Tac Toe too easy? Try this four by four by four game!

Web Auto Pilot

Look Ma’, no hands… Web Auto Pilot is an automated Web browser utilizing the advanced technologies of Microsoft’s Internet Explorer 4.0 (and greater) engine. Web Auto Pilot allows you to create a ‘slideshow’ of Web pages – especially suitable for slideshow presentations of WebCam sites (a pre-programmed WebCam slide show is included).

Nobody’s Home

PC based caller ID! Like your CallerID but wish you didn’t have to run to the phone to see who’s calling? Like your CallerID but wish your unit held more than 20 calls? Nobody’s Home monitors your phone line and captures and logs CallerID information. Featuring multitudes of call statistics, easy access to call records, customizable address entries, and more. Nobody’s Home will also vocally announce all callers through your PC speakers! Also features the ability to automatically block selected callers, all callers, or simply block those pesky ‘out of area’ sales calls.

Little Writer

A word processor for kids! Finally, a word processor for kids! But we’re talking much more than an easy to use interface, large colorful buttons, and integrated educational games… This word processor actually talks to you! Each letter is pronounced as it is typed. When a word is completed it is read back to you. When a sentence is completed, the entire sentence is read back. And for the adults – want to have your computer read to you? Simply cut and paste the document into Little Writer, close your eyes, sit back, and enjoy…

Roster Ripper

Make your lineup, track player statistics, and more! Roster Ripper is a game management application for U10 and under soccer coaches. Roster Ripper will assist you in managing your game roster and game lineups. It will calculate extensive statistics on game lineups so you can easily adjust you lineup to fit your game needs. Final roster, field diagram, and player summary can be printed to take with you to the game.

Leave a Reply

Related Post

Remotely monitoring your children’s computers using iTalc

Using iTalc on your private home network, you can monitor your kid’s activities and keep an eye on what websites they are browsing, what they are doing on social networking sites like Facebook, and even watch as they read their email. There are other tools that offer similar functions such as keylogging tools and web site blockers, but iTalc is a perfect addition to your arsenal of child protection tools.

Universal Studios California Backlot Tour

One of the most interesting things we saw on our 2001 Southern California vacation was the backlot tour of Universal Studios. Below are pictures I took during the tour of the Universal Studios California Backlot Tour. Tours are given in trams with a guide narrating the scenes. Depending on when you go, areas of the backlot are sometimes closed while they are filming.

Security and Hacking Notes

Encryption and Authentication DESCRIPTION Privacy protection using DES (symmetric algorithm) involves the use of two secret keys. Each party must share their secret key with others. This makes this sort of encryption difficult to use in web technologies. RSA public key encryption (asymmetric) solves this problem. RSA uses matched pairs of encryption and decryption keys. […]