|
||||||
|
||
|
Home > Unwanted files software |
Related keywords: files, hide files, Files, PDF files, compare files, protect files, duplicate files, delete files, recover files, unwanted |
|
|
101. | Hara-Kiri 2.02 (cyteg.com) | ||
data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed, The files in a determined folders will be completely erased (without the possibility of reconstructing them with utilities like "UnErase" | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
102. | IdentaFone Pro 2.50 (identafone.com) | ||
calls and offers many ways to keep you informed about your caller's identity. Once the caller information is obtained, this virtual telephone assistant can speak the caller's name through your PC speakers, screen pop the callers name, send the information to a pager or cell phone, submit an email message with the caller information, or broadcast a popup over the local network | |||
Updated: 9, 2005 | Rating: 35 | Author: IdentaFone Software | Size: 2945 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
103. | IECleaner 1.1 (zipstore.com) | ||
are stored on your computer. It is not only a list of Urls but files (pictures, movies, pages...) are also stored. Additionally, most sites visited write small files called "cookies" to your hard disk. IECleaner helps you to eliminate all your surf evidences. Unlike other competitors products, IECleaner provides intelligent ways to eliminate only targeted urls. You can clean | |||
Updated: 9, 2005 | Rating: 39 | Author: Atypie Software | Size: 1190 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
104. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
105. | JoinLine 1.9 (WindowsUtilities.com) | ||
fixes text files with long fixed length records and unwanted line wraps. Spreadsheets and database programs import individual text records with data on the same line. However, sometimes text lines are wrapped before the end of the record. If these records always wrap to the same number of lines, then JoinLine can restore the wrapped records to single line records. A space | |||
Updated: 9, 2005 | Rating: 71 | Author: Frank Snyder | Size: 1799 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
106. | MiniApps 5.06 (backtec.com) | ||
one freeware in one install: AlphaBook, AttriBat (file attribute control), BlockIt, Tape Calculator, 2 Calendars, Change Video Resolution, RGB Color converter, Drives Info, File Inventory, 2 IconViewers, Long File Name Backup and Restore, Make Shortcut, Move files and folders, MyNotes Lite, MyNotes, Sort Lines Alphabetically, Submission Info, Stay OnTop | |||
Updated: 2, 2006 | Rating: 16 | Author: Theodore Fattaleh | Size: 7339 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
107. | Child Control 2005 7.153 (salfeld.com) | ||
XP). Set time limits for the PC and/or the Internet and block/filter unwanted Internet contents. Limit access to internal Windows components and personal folders. A protocol informs you at any time as to what happened on your computer and when. Access is protected via password. Several safety steps | |||
Updated: 9, 2005 | Rating: 16 | Author: Dierk Salfeld | Size: 3703 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
108. | Desktop Surveillance Personal Edition 6.0.3 (omniquad.com) | ||
all user activities: web sites, chat rooms, newsgroups, games, files and folders. You can view reports of the collected data at leisure when you are back, or data can be immediately sent to you by e-mail or FTP. Give access to the wealth of information available on your computer and the Internet, while providing a safety net. You can customise the system so that all the information | |||
Updated: 2, 2006 | Rating: 42 | Author: Daniel Sobstel | Size: 2675 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
109. | On-Time Operator 03.02 (isuru.com) | ||
the facility to run a computer program, such as .exe, .bat, music files, etc., at predetermined intervals (e.g., every 20 minutes) or at a given time of the day. An advanced graphical user interface enables the user to intuitively navigate the application and specify selections of choice. A detailed log of all Events processed by the application is maintained and the user can | |||
Updated: 9, 2005 | Rating: 0 | Author: L Dias | Size: 1143 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
110. | Optimize Computer 1.2 (amicutilities.com) | ||
problems, cleaning and fixing Windows registry, deleting unnecessary files, fine-tuning your internet connection settings, shredding the unwanted files like cookies, internet history and temporary files and more! Features: - Removes junk files from your hard disk | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexandru Marias | Size: 1611 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Unwanted files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|