|
||||||
|
||
|
Home > Utility software software |
Related keywords: software, utility, Software, Utility, RAD Software, free software, spy software, UTILITY, desktop utility, backup software |
|
|
101. | MySQL Migration Toolkit 2.3 (convert-in.com) | ||
Migration Toolkit is a software pack to convert any data source to MySQL and vice versa. It includes the following utilities: (1) Access-to-MySQL - migrates MS Access database to MySQL server; (2) DBF-to-MySQL - moves DBase (dbf) databases to MySQL server; (3) Excel-to-MySQL - converts MS Excel spreadsheet into MySQL database; (4) MSSQL-to-MySQL - migrates MS SQL | |||
Updated: 2, 2006 | Rating: 45 | Size: 13200 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
102. | MetaDataMiner Catalogue PRO 4.2.19 (peccatte.karefil.com) | ||
Extract metadata from MS Office, PDF, HTML, Adobe files, IPTC info from jpeg and tif images into XML, CSV, Word files or HTML pages without programming. Set file properties via mass update function for MS Office and NTFS Windows 2000 files. You will easily Catalog and retrieve: MS Office documents | |||
Updated: 2, 2006 | Rating: 632 | Author: Patrick Peccatte | Size: 2688 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
103. | MacNames Site License 1.1m (peccatte.karefil.com) | ||
MacNames works with Microsoft Services for Macintosh (MacFile), Cyan Software MacServerIP or Group Logic ExtremeZ-IP. It is probably the only Windows NT/Windows 2000/Windows XP software that lets you quickly prepare files created in Macintosh and stored on a WinNT, Windows 2000 or Windows | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2589 kb | Commercial Go to category: System Utilities > File & Disk Management Similar programs | |||
104. | Lock My PC 3.4 (fspro.net) | ||
information on our hard drives. We install firewalls and anti-virus software to protect this data from outside intrusions and hijacks. However, according to reports by IT specialists, the majority of electronic data theft crimes happen due to improper protection of computer systems from the inside | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
105. | Izbushka Wallpaper Organizer 1.01 (izbasoft.com) | ||
I came across a program called "Izbushka". While the name of this software is rather strange, it finally solved my problem. The program sits in the system tray and controls the wallpapers on your desktop. It allows you to manage your collection of desktop wallpapers and change them via a schedule. Simple enough and it works! Being able to put my wife and daughter on schedule, I | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Lvov | Size: 3593 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
106. | LaptopLocate.net 2.9.2 (tometasoftware.com) | ||
LaptopLocate.net is a software utility that will monitor a computer's IP address to allow server administrators and general users to locate their computer. Using cutting edge technology, each time a computer that has LaptopLocate.net is turned on, the IP address of the computer is transmitted to a pre-determined location via email and logged for reference. This | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 4839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
107. | IsoBuster 1.9 (smart-projects.net) | ||
is a high end but low cost utility to do data recovery from CD and DVD. By better Error handling and several retry-mechanisms IsoBuster has a fair chance of recovering your data. The use of alternative ways to get to the data means that you get the best out of your CD/DVD drive. Furthermore IsoBuster circumvents Windows and does everything by itself, it communicates directly | |||
Updated: 2, 2006 | Rating: 45 | Author: Peter Van Hove | Size: 2411 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
108. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more. It can also audit password and security policies, perform HTTP/CGI server auditing, registry auditing In addition, Infiltrator also | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
109. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
software to replicate directories and synchronize files, backup documents or distribute data automatically, mirroring important folders from a Windows NT/W2K/XP server toward another, checking a list of source folders at regular time intervals and updating target folders with new or modified files including sub-directories. Idem will check and copy files or folders security | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
110. | Hide Files & Folders 2.4 (softstack.com) | ||
Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Utility software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|