|
||||||
|
||
|
Home > Protecting software |
Related keywords: protecting php code, protecting software |
|
|
101. | HistorySweep 2.20 (historysweep.com) | ||
files, leaving them vulnerable to recovery. HistorySweep will protect your privacy in four of the top web browsers on the market (Internet Explorer, AOL Browser, Netscape, FireFox, and Opera) eliminating your history files beyond all practical recovery. The automation features included in HistorySweep will automatically remove your history files each time you boot your machine | |||
Updated: 2, 2006 | Rating: 16 | Author: Web Master | Size: 1425 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
102. | EasyFit 1.2 (mathwave.com) | ||
automate the distribution fitting process and save your time; protect yourself against potential time and money losses which can take place in case of invalid model selection. Program features: 13 classical distributions (Beta, Chi-Squared, Exponential, Extreme Value Type A (Gumbel), Extreme Value Type B, Gamma, Laplace (Double Exponential), Lognormal, Normal, Rayleigh | |||
Updated: 2, 2006 | Rating: 42 | Author: Antony Drokin | Size: 1509 kb | Shareware Similar programs | |||
103. | Automatic @Mail System 3.1 (pwp.netcabo.pt) | ||
Automatic @Mail System (AMS) is a program destined to send and receive E-Mail messages automatically. The program will go to monitorises some directories and some mailboxes previously configured. AMS can send all of predetermined type files found in a configured directory to a specific email address, or its | |||
Updated: 2, 2006 | Rating: 42 | Author: JosГ© Santos | Size: 1655 kb | Shareware Similar programs | |||
104. | Spytector 1.2.8 (spytector.com) | ||
via Email or/and FTP. In the delivered logs are also included the Protected Storage passwords (Outlook, MSN and others) and URL history (visited websites). The keylogger is using advanced hooking and stealth techniques. Spytector is completely invisible on the user's desktop and cannot be seen in the task manager, it's injected into explorer.exe on the startup and whenever the log | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrei Radu Poleacu | Size: 1006 kb | Shareware Similar programs | |||
105. | Link Commander Lite 3.0 (resortlabs.com) | ||
duplicate elimination, etc. A bookmarks collection can also be protected with a password. You can open bookmarks with any browser installed on your computer. For Link Commander, a Bookmark is not just a URL. When you add a bookmark, the program analyzes the page you bookmarked and retrieves additional info from it, such as title, short description, keywords, etc. This info helps | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Grishaev | Size: 3476 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
106. | StaffCop 1.9.5 (staffcop.com) | ||
history of visited web pages, but StaffCop maintains a separate - protected - list of visited web sites.??StaffCop is best for both small and medium companies and large corporations, where the issue of labor efficiency and better security problem is acute.??We are positive: with our system, just about any manager can get a better assessments of how their employees spend their time at | |||
Updated: 2, 2006 | Rating: 0 | Author: StaffCop Software | Size: 2054 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
107. | Duplicate Finder 3.0 (ashisoft.com) | ||
to be excluded from scanning altogether. + Can use wild cards. + Protects the windows and system folders. + Skips the hidden files and folder. + Show file versions and properties. + Resizable popup picture viewer. + Save search session and results for future searches. + Results can be exported in two | |||
Updated: 2, 2006 | Rating: 4849 | Author: Ishtiaq Mohammed Hussain | Size: 1898 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
108. | Visual Drawing Maker 1.14 (xpcad.net) | ||
is needed to explore, print and postil a drawing. 3.Difficulties to protect company intelligent property rights and technique secrest when providing customers with source design drawings, etc. Developed on the CAD midware technique basis, under lots of operation systems, it can be used on various CAD platforms. Presently it can support AutoCAD R14 to R2006 , IntelliCAD 3 to 5 | |||
Updated: 2, 2006 | Rating: 0 | Author: Yuan GaoFei | Size: 1883 kb | Shareware Go to category: Graphic Apps > CAD Similar programs | |||
109. | Password Recovery .MDB 2.0.1 (xaviware.cl) | ||
dedicated to that you can recover lost or forgotten Passwords of the protected databases of Microsoft Access 97/2000/2002-XP/2003. You only have to add the file *.mdb or *.mde to the program, and to pulse on the icon "to Obtain the Password". that simple. it also offers other tools to remove | |||
Updated: 2, 2006 | Rating: 70 | Author: Javier Orellana | Size: 1976 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
110. | wodSSHTunnel 1.5.0.0 (weonlydo.com) | ||
services will reside on same server as SSH server, or will be in protected network. Also, not only it will secure connections - but it will also allow you to create VPN to your services. How does it work? You setup any number of Channels - these are objects that will keep information about specific port forwarding request. For example, you can create Channel that will listen on | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1317 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
|
Home > Protecting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|