|
||||||
|
||
|
Home > I mode software |
Related keywords: mode, batch mode, kiosk mode, command line mode, console mode, stealth mode, Learning Mode, Console mode font, display mode, Sleep mode |
|
|
1. | Data Destroyer 7.31 (hermetic.ch) | ||
bytes with alternating bit patterns, before the file is deleted (i.e., unlinked). Data Destroyer can purge either: (a) a single file, (b) all files in a folder, (c) a specified subset of files in a folder, (d) all files in a folder and all files in all subfolders of that folder, (e) a specified | |||
Updated: 2, 2006 | Rating: 16 | Author: Peter Meyer | Size: 1826 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
2. | Tray Safe 4.3 (traysafe.com) | ||
a variety of enhancements, like strong password generator, network mode (client/server passwords, network password sharing). Plus, it can run directly from a removable USB drive, so you can keep and carry it with you. If you are looking for a password keeping solution and are willing to try only | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
3. | Tray Safe 4.3 (fgroupsoft.com) | ||
a variety of enhancements, like strong password generator, network mode (client/server passwords, network password sharing). Plus, it can run directly from a removable USB drive, so you can keep and carry it with you. If you are looking for a password keeping solution and are willing to try only | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
4. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
RBackup Remote Backup is the premier Online Backup and Restore system containing a full-featured Client and a powerful online backup Server. Designed for use by commercial Remote Backup services. Easily branded. RBackup replaces troublesome tape drives and forgetful computer users, operating unattended and | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
5. | Printfil 4.3 (guolo.com) | ||
via fax (using any third-party fax software acting like a printer - i.e. Microsoft Fax - or a multifunction - all-in-one - printer) - print to networked printers without having to "NET USE" a LPT port - use special windows fonts (barcodes, for instance) as well as normal characters - exporting the | |||
Updated: 2, 2006 | Rating: 1170 | Author: Davide Guolo | Size: 1007 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
6. | Network Clipboard and Viewer 1.0.0.20 (interdesigner.com) | ||
to file, send text content to keyboard to emulate keystrokes (i.e.: saves time when have to enter long codes, etc.). Easy access at any time with Win+C combination (Windows Start Key and C letter). - Enhanced Security with list of allowed computers on network, password enforced, Favorites computers access, remote users (authorized or blocked), etc. - Allows to compress remote | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Serrano | Size: 2015 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
7. | Hide Files 3.4 (hide-files.biz) | ||
- Hotkey and password protection for program start. - Stealth Mode - program itself can be hidden. - Hide Files will hide any folders including Windows, Windows System folders and Windows partition root folders without damage of operational system itself (i.e. your computer will continue to work normally). - Invisibility of hidden files over network. - Locking of hidden | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
8. | Hide Files 3.4 (spydex.com) | ||
- Hotkey and password protection for program start. - Stealth Mode - program itself can be hidden. - Hide Files will hide any folders including Windows, Windows System folders and Windows partition root folders without damage of operational system itself (i.e. your computer will continue to work normally). - Invisibility of hidden files over network. - Locking of hidden | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | Delenda 2.415 (peccatte.karefil.com) | ||
to delete all files of a folder only if all the files are obsolete (i.e. no files are deleted if there exists a file of the folder which is not obsolete). A log file can be activated to report the list log of deleted or transfered file names. You can optionally use it as a Windows NT or 2000 or Windows XP service or in command line mode for cleaning via batch processing | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
10. | 7Way Email Checker 1.82 (start7way.com) | ||
options. Very easy and simple to use. Defends your mail from | |||
Updated: 2, 2006 | Rating: 42 | Author: Ruve Anton | Size: 512 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
|
Home > I mode software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|