Extract text from diverse document formats

PDF and DOC are probably the most common extensions for digital documents nowadays. This means that you need to have a PDF reader and a DOC-compatible app, or you're doomed.

Luckily there's another trick that enables you to read PDF, DOC and other popular document formats without having to install their associated software. Just use Text Mining Tool, a simple utility that extracts the text from any file you load on the program and displays it on its screen. Then you only have to save it as plain format or copy it directly to the Clipboard for later usage.

The program doesn't include any other configuration options, which keeps it very easy to use. On the downside, it lacks the possibility of customizing the output. During our tests, we ripped the text from a PDF document and the resulting TXT file was all garbled up when opened in Notepad (not when opened in Wordpad tough).

Text Mining Tool is a good choice for extracting text from PDF and DOC to plain files. Bear in mind that both format and images will be lost.

  • Pros

    • Enables you to read almost any document, even without the necessary software app
  • Cons

    • Output file may be unformatted. Try opening it in different text editors
 0/3

App specs

  • License

    Free

  • Version

    1.1.42

  • Latest update

  • Platform

    Windows

  • OS

    Windows 2000

  • Language

    English

  • Downloads

    13.2K

  • Size

    8.80 MB

  • Developer

Program available in other languages


Icon of program: Text Mining Tool

Text Mining Tool for PC

  • Free
  • 4.3
    5
  • 13.2K
  • V1.1.42

User reviews about Text Mining Tool

by Anonymous

limit. The ATM Routed Bridge Encapsulation feature is used to route IP over bridged RFC 1483 Ethernettraffic from a stub-bridged LAN. By reducing the size of the nonsecured network, this feature reducesthe security risk associated with normal bridging or IRB. With a single virtual circuit (VC) allocated to limita subnet, which could be as small as a single IP address, IP addresses in the subnet can be used to limitthe trust environment to the premises of a single customer.

by Anonymous

command. Defaults No default behavior or valuesCommand Modes Interface configurationCommand HistoryExamples The following example configures the ATM Routed Bridge Encapsulation feature on an interface:interface atm 4/0.100 point-to-pointip address 172.16.5.9 255.255.255.0atm route-bridged ippvc 0/32protocol Protocol for which the route-bridge feature is enabled.Release Modification12.0(5)DC This command was introduced.12.1(2)T This command was integrated into Cisco IOS Release 12.1(2)T.ATM Routed Bridge EncapsulationGlossary8Cisco IOS Release 12.3(8)YGGlossarybridge group—A group of interfaces bridged together to emulate a multiport bridge.Bridge Group Virtual Interface—See BVI.BVI—Bridge Group Virtual Interface. The logical Layer 3-only interface

You may also like

Explore Apps

Latest articles

Laws concerning the use of this software vary from country to country. We do not encourage or condone the use of this program if it is in violation of these laws.
Softonic
Your review for Text Mining Tool
Softonic

In Softonic we scan all the files hosted on our platform to assess and avoid any potential harm for your device. Our team performs checks each time a new file is uploaded and periodically reviews files to confirm or update their status. This comprehensive process allows us to set a status for any downloadable file as follows:

Clean

It’s extremely likely that this software program is clean.

What does this mean?

We have scanned the file and URLs associated with this software program in more than 50 of the world's leading antivirus services; no possible threat has been detected.

Warning

This software program is potentially malicious or may contain unwanted bundled software.

Why is the software program still available?

Based on our scan system, we have determined that these flags are possibly false positives.

What is a false positive?

It means a benign program is wrongfully flagged as malicious due to an overly broad detection signature or algorithm used in an antivirus program.

We’d like to highlight that from time to time, we may miss a potentially malicious software program. To continue promising you a malware-free catalog of programs and apps, our team has integrated a Report Software feature in every catalog page that loops your feedback back to us.

Flag any particular issues you may encounter and Softonic will address those concerns as soon as possible.