|
||||||
|
||
|
Home > King software |
Related keywords: KING JAMES, king james, john Zed King, King James Version, New King James Version, lotto king, Yi King, King Solomons Mines |
|
|
91. | Eazy Backup 3.0.1 (ajsystems.com) | ||
The Eazy Backup utility is designed to make it easy for all users with any level of expertise to create a backup or archive file of popular applications. More importantly, Eazy Backup makes it easy to restore data from a backup or archive file. Eazy Backup knows where the critical data is located and knows | |||
Updated: 2, 2006 | Rating: 0 | Author: Al Price | Size: 6856 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
92. | Directory Snoop 5.02 (briggsoft.com) | ||
Directory Snoop is a cluster-level search tool that lets Windows users snoop through their FAT and NTFS formatted disk drives to see what data may be hiding in the cracks. Use Directory Snoop to recover deleted files you thought you would never see again or permanently erase sensitive files so that no one | |||
Updated: 2, 2006 | Rating: 0 | Author: Kent Briggs | Size: 1534 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
93. | CryptoCrat 2005 4.61 (secureaction.com) | ||
CryptoCrat 2005 is a Windows XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
94. | Cool Info FX 5.0 (tometasoftware.com) | ||
its detail, Network Administrators love it for the automation, CEO's love it for the price. Tometa Software, www.tometasoftware.com The Best System Information, Spy, Analysis, Auditing and Inventory Utility. Easy exporting to database and other formats including SQL & XML. Computers can use a central database to have a central network inventory of all systems on the | |||
Updated: 2, 2006 | Rating: 16 | Author: Luke Richey | Size: 12954 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
95. | Cool Info FX 5.0 (tometasoftware.com) | ||
its detail, Network Administrators love it for the automation, CEO's love it for the price. Tometa Software, www.tometasoftware.com The Best System Information, Spy, Analysis, Auditing and Inventory Utility. Easy exporting to database and other formats including SQL & XML. Computers can use a central database to have a central network inventory of all systems on the | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 12954 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
96. | Chronos Clock 2.35.15 (rainbow-innov.co.uk) | ||
time synchronization using NTP/SNTP time-servers, to keep your PC's clock right up to date. * Quick Reminder set-up. * And many more. System Requirements * Windows 98, Windows ME, Windows NT4, Windows 2000, Windows XP, Windows 2003. * 5.5MB free disc space. * If you wish to use the Internet time synchronization function then a suitable connection via a modem or LAN must be | |||
Updated: 2, 2006 | Rating: 0 | Author: John Hudson | Size: 1568 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
97. | CD-DVD Lock 2.01 (getfreefile.com) | ||
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them. You can gain | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
98. | CD-DVD Lock 2.01 (softheap.com) | ||
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them. You can gain | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
99. | BlazingTools Perfect Keylogger Lite 1.15 (blazingtools.com) | ||
computer? Some applications of the keylogger: - Monitor children’s activity for parents - Monitor what programs opened and when - Recall what you wrote some time ago - Special purposes Features: - Invisible in Task Manager List - Logging texts typed in every application (including passwords and other | |||
Updated: 2, 2006 | Rating: 75 | Author: BlazingTools Software | Size: 172 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
100. | Ardamax Keylogger 2.4 (ardamax.com) | ||
Ardamax Keylogger is a small, easy-to-use keylogger that captures user activity and saves it to a logfile. The logfile can be viewed as a text or web page. Use this tool to find out what is happening on your computer while you're away, maintain a backup of your typed data automatically or use it to monitor logfile. The logfile can be viewed as a text or web page. Use this tool to find out what is happening on your computer while you're away | |||
Updated: 2, 2006 | Rating: 12034 | Author: Maxim Frolov | Size: 286 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > King software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|