|
||||||
|
||
|
Home > Same content software |
|
|
91. | Agent Undercover 2.0 (cresotech.com) | ||
operational - you can continue work in top window and watch the content of layer below at the same time. The holes do not disappear when you moving, resizing or minimizing your windows; all the effects of Agent Undercover are removed only by your direct order, or when the window is closed completely. Try it for yourself - install Agent Undercover and enjoy this fun and easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Cresotech, Inc. | Size: 1486 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
92. | AllWebMenus NetObjects Fusion component 1.0 (likno.com) | ||
Import FrontPage Navigation Structures - Use multiple menus in the same page - Free Sitemap generator based on the functional menu structure - Use of flexible positioning for your menus - Infinite levels of submenus and images for menu items - Create menus for framed web sites (cross-frame menus) | |||
Updated: 9, 2005 | Rating: 42 | Author: Likno Software | Size: 269 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
93. | Back2Life 2.32 (GrandUtils.com) | ||
- Standard and Smart recovery algorithms - Saving files even to the same disk from where they were recovered (for emergency cases) - HEX view of files and folders binary content - Cluster-use map display for erased files - Estimate of file damage - Long file names - Non-English characters | |||
Updated: 9, 2005 | Rating: 606 | Author: Alex Mokrov | Size: 253 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
94. | BitZipper 4.1 SR-1 (bitzipper.com) | ||
right-click menu. If you are frequently compressing the same set of files, BitZipper's reusable Backup Sets can help. Within seconds, you can quickly and easily define those files and folders to a Backup Set. Once defined, simply activate the backup process with the click of a button. Your backed up files can be accessed by BitZipper or any other tool capable of reading | |||
Updated: 9, 2005 | Rating: 124 | Author: Brian Rasmusson | Size: 2714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
95. | Chilkat Zip Self-Extractor 8.1.0 (zip-compression.com) | ||
encryption. The ChilkatZip Self-Extractor can safely encrypt the contents of your ZIP file with 128, 192, or 256-bit AES Encryption. To unzip, a user must provide the same password that was used when creating the self-extracting EXE. AES encryption is much stronger than standard ZIP encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 300 kb | Freeware Go to category: Development > Other Similar programs | |||
96. | ChilkatZip Self-Extractor 1.0.0 (chilkatsoft.com) | ||
encryption. The ChilkatZip Self-Extractor can safely encrypt the contents of your ZIP file with 128, 192, or 256-bit AES Encryption. To unzip, a user must provide the same password that was used when creating the self-extracting EXE. AES encryption is much stronger than standard ZIP encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 228 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
97. | ComBonus 1.0 (infovibe.com) | ||
down area allows more entries to be displayed on the screen at the same time. This reduces the time required to locate a desired entry. The expanded width allows the contents of each entry to be viewed in full, eliminating the clipping that can occur when the combo box is too narrow. Without ComBonus, it can be impossible to differentiate one entry from another if the two | |||
Updated: 9, 2005 | Rating: 0 | Author: John Lawrie | Size: 345 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
98. | CryptEnCrypt 1.10 (inetprom.com) | ||
to your computer will be able to open these files and read the contents. CryptEnCrypt allows you converting your existing files to encrypted files. Encrypted files contain just the same data as before, however the encrypted data is unreadable until it is decrypted, i.e. converted to the original state. CryptEnCrypt bases data encryption on a password that you specify while | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
99. | Delenda 2.415 (peccatte.karefil.com) | ||
not accessed during last 3 months to an archive folder on the same disk or toward a network drive. Once set up, let it do the work for you automatically. It can remove the contents of sub-folders and read-only files. There is an option to delete all files of a folder only if all the files are obsolete (i.e. no files are deleted if there exists a file of the folder which | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
100. | Disk CleanUp 2000 4.6 (gregorybraun.com) | ||
still remains on the disk. CleanUp will completely eliminate the contents of your deleted files. Disk CleanUp provides options to specify an NSA approved disk erasure method and background execution priority. Disk CleanUp works with any FAT16 or FAT32 hard drive, as well as MS Windows NTFS volumes. Facilities are also included to optionally clear web browser and user-specified | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 721 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Same content software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|