|
||||||
|
||
|
Home > Personal detail software |
|
|
101. | IView Pro Inventory Manager 3.0 (168.144.45.89) | ||
is suite of tools that can design your custom reports, report details of your hardware and softwares and also different from other inventory management tools. CBR IView is a fully functional Windows system monitoring tool.You can monitor nearly 600 parameters like CPU usage, network protocols, shared devices,total memory, used memory,processes with virtual size etc..One of the | |||
Updated: 9, 2005 | Rating: 139 | Author: Ertugrul Akbas | Size: 48828 kb | Commercial Similar programs | |||
102. | IView 3.0 (168.144.45.89) | ||
is suite of tools that can design your custom reports, report details of your hardware and softwares and also different from other inventory management tools. CBR IView is a fully functional Windows system monitoring tool.You can monitor nearly 600 parameters like CPU usage, network protocols, shared devices,total memory, used memory,processes with virtual size etc..One of the | |||
Updated: 9, 2005 | Rating: 42 | Author: Ertugrul Akbas | Size: 48828 kb | Commercial Similar programs | |||
103. | CArTomancy 2.4 (cartomancy.net) | ||
gives both playing cards and Tarot professional card readings with detailed explanations. It provides 3 kinds of personalized playing cards fortune telling (52 and 36 card decks), 4 Tarot decks, and 35 classic and modern Tarot spreads including Business, Celestial Necklace, Feng Shui, Gemini, Love | |||
Updated: 9, 2005 | Rating: 546 | Author: Olga Pudrovska | Size: 10919 kb | Shareware Go to category: Web Development > Java & JavaScript Similar programs | |||
104. | Aqua Data Studio 4.5.2 (aquafold.com) | ||
and auto-completion to develop and test scripts including detailed client statistical information and multigrid results. Its graphical browsing capabilities allow you to understand the structure and dependencies of the database schema at a click of a mouse. It also includes the ability to save your query results in many formats including HTML and XML. Aqua Data Studio is a SQL | |||
Updated: 9, 2005 | Rating: 324 | Author: John LH | Size: 50822 kb | Commercial Go to category: Development > Other Similar programs | |||
105. | Print Censor Personal 4.04 (usefulsoft.com) | ||
(50 people or less) and each employee prints only a few copies of personal correspondence or any other document not directly related to business each month, the total cost over a year amounts to hundreds, even thousands dollars. Can your business afford this? You can now eliminate unnecessary | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Egorov | Size: 1586 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
106. | m9P Zipper XT 1.0 (mental9Production.com) | ||
of zipped files. Filters files based on name or type. Creates detailed report of zipping operations. integrated text editor, web browser, media player, & pic viewer. m9P Zipper XT can be used free for 1 month. License costs only $14.00. Purchasing m9P Zipper XT license is safe and secure. We use Secure Socket Layer (SSL) to protect the security of your credit card information | |||
Updated: 9, 2005 | Rating: 0 | Author: Khaled Aboulhosn | Size: 4326 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
107. | PC 2 Answering Machine - Professional Edition 2.0 (teley.com) | ||
Machine 2.0 - Professional Edition' is a software designed for the personal computer which functions as an answering machine for home or office. General Points:Complete 'Answering machine' software, Professional calls log. Adding remarks, flags and priority for each call. Display of voice and speech | |||
Updated: 9, 2005 | Rating: 0 | Author: Ron Gal | Size: 2320 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
108. | IntraMail 2003.01.20 (homepage.sunrise.ch) | ||
PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are extremely well protected against local hackers and Internet attacks like Trojans or Tunneling-helpers or other applications. Passwords stay encrypted in memory and swap files. Wireless networks and mixed networks can be used | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
109. | CheckSpace 3.3.0 (kosiol.com) | ||
the log. The Dr. Watson monitor cachts Watson errors and send you a detailed error report if an error occured. That helps you to locate the problem and prevent it for the future. With the application monitor you can check if a specified program is running. If not, you can execute it. If it runs, you | |||
Updated: 9, 2005 | Rating: 0 | Author: Timo Kosiol | Size: 2733 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
110. | HDD Temperature 1.3 (siguardian.com) | ||
There are many reasons why hard-drives get damaged, and overheating is probably the most common one. If you remember your physics lessons well, you know that spinning something at several thousand revolutions per minute causes heat, plenty of heat. That is why servers and computers have coolers, fans and | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuri Alexandrov | Size: 1016 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Personal detail software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|