|
||||||
|
||
|
Home > Store command software |
Related keywords: store, command, command line, e store, online store, Command, Store, store passwords, in store, store builder |
|
|
111. | PowerZip 7.06 (powerzip.biz) | ||
the purpose of each button or control. You can use PowerZip's 128-bit & 256-bit AES encryption to create password-protected Zip files to store confidential documents and files or send them through insecure channels, such as e-mail. PowerZip supports two new compression methods (Deflate64 and BWT) to provide you with a higher level of compression than is normally | |||
Updated: 9, 2005 | Rating: 124 | Author: Dimitri Ternovski | Size: 1920 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
112. | ProUpdater 5.00.03 (openwindow.com) | ||
v5.0, Open Window's latest release of its highly regarded file backup and synchronization program, makes it easy to set up a customized backup routine to protect your irreplaceable data files. In addition, the program excels at the task of keeping your various machines "in synch". Using this double-threat capability, the user can set up a backup routine and a multiple-machine | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Bryant | Size: 583 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
113. | Love You Not 1.10 (pcshareware.com) | ||
from ActiveX controls, keeping them from opening without the user's permission. Microsoft Office macro virus protection: There are over 2,000 identified, catalogued and named Microsoft Office macro viruses. Although Microsoft has added macro virus protection to Office 97 Release 2 and Office 2000, you | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Kapusta | Size: 870 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
114. | Lock Folder XP 3.4 (everstrike.com) | ||
innovative and reliable technologies provide the safest way to store your information well protected against hacker attacks, malicious software and dishonest employees. But don't think that Lock Folder XP can only be used in the corporate environment - this application is perfect for home as well. We also advise you get Lock Folder XP if you have a laptop and travel frequently | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
115. | NetStatus Professional 2.4.1.0 (otosoftware.com) | ||
and generate reports via a web interface. Because it uses XML to store all data collected, there is not a heavy database overhead involved in setup. The user simply installs and opens their browser. If users need to run a trace route or arp on the machine where NetStatus Professional is running, several network utilities have been wrapped into the browser interface to allow you to | |||
Updated: 9, 2005 | Rating: 0 | Author: Todd Rogers | Size: 6546 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
116. | NWSEND 4.0.0 (nwsoft.ru) | ||
of users extremely FAST. Incredible speed of the program (it's at least two times faster than any other available solution) allows you to work easy and without unneeded delays. For further streamlined workflow, NWSend allows you to store ten frequently used messages and send it just by one mouse click. And system administrators will appreciate NWSend's | |||
Updated: 9, 2005 | Rating: 0 | Author: Konstantin Vyatkin | Size: 1519 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
117. | Identity Knight 1.3 (fspro.net) | ||
on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature, allowing you to enter your credentials once and let the program do the rest. On the other hand, though, Internet Explorer stores this information in an | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
118. | JvCrypt 1.0 (vandaveer.com) | ||
using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one step. You have the option of creating a single encrypted zip file for each file selected or combining all of your selected files to a | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
119. | KeyText 2.25 (mjmsoft.com) | ||
text and automation utility. KeyText stores pieces of text, ready to be typed or pasted into any application by a simple hotkey press or menu selection. "Right-click anywhere" feature makes form-filling easier than ever. Include commands to run programs, click buttons, change windows, visit Internet sites and more - or automate mouse clicks which hit the right spot | |||
Updated: 9, 2005 | Rating: 145 | Author: MJMSoft Design | Size: 623 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
120. | EasyConsole 1.2 (peccatte.karefil.com) | ||
you navigate in drives and through folders using Windows issuing DOS commands on a slave MSDOS console, saving command-line instructions for future use. Last 20 commands are memorized and you will be able to store 10 long most used or favorite command lines on 10 buttons | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 1476 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
|
Home > Store command software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|