|
||||||
|
||
|
Home > Create folders from list software |
Related keywords: create, list, folders, mailing list, to do list, hide folders, create screensaver, create PDFfiles, Create, List |
|
|
131. | nnBackup 3.01b10 (nncron.ru) | ||
and convenient tool for backing up and synchronizing your files and folders, creating and processing file-lists. When backing up you can optionally compress the data using gz or zip algorythms and start specified applications before and after main backup process. nnBackup includes special tools for removing obsolete data from the backup. Using nnBackup you can | |||
Updated: 9, 2005 | Rating: 0 | Author: Nicholas Nemtsev | Size: 308 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
132. | Omniquad Set Me Up 3.5j (omniquad.com) | ||
the most from your Win95/98/ME computer with over 80 runtime enhancements, settings and tools covering system boot, Windows graphics, sound, system maintenance, file encryption, crash protection and recovery, Internet Explorer, new Windows 95/98/ME and general security enhancement User interface and help. Detailed descriptions of all features will guide you through advanced settings | |||
Updated: 9, 2005 | Rating: 0 | Author: Daniel Sobstel | Size: 2683 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
133. | Genie Backup Manager 4.0 (genie-soft.com) | ||
options.. You can protect all your data including files and folders, e-mail data and settings of some of the most commonly used clients (Outlook Express, Microsoft Outlook, Eudora, MSN 8), Windows settings, Registry, Internet Explorer settings, Fonts, Favorites, Windows Address Book, Desktop and more. You do not need to create more than one backup job to backup data | |||
Updated: 9, 2005 | Rating: 124 | Author: Muayyad Shehadeh | Size: 5575 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
134. | GREPPES Text Tools 2.4 (isvs.tripod.com) | ||
similar to EGREP on UNIX systems. It can reuse search patterns from user created definition files, employ (MarkedGroups) of pattern data that may be reused later BY USER SPECIFIED NAMES in search or replace patterns. Magic or wildcard symbols and formats are like those in other GREPS, and PERL. They include any of "^$[].(){}<>#%-/;!?*+&|~`'@:,="and backslash | |||
Updated: 9, 2005 | Rating: 0 | Author: Anunga Muhummud | Size: 321 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
135. | IconLover 2.0 (aha-soft.com) | ||
applications. IconLover includes the ability to import icons from executables, image and library files. The built-in search and extract function enables busy artists to scan through the contents of a folder or a drive and arrange all images found in any files into a single icon library for easy and effective management. This program features a greatly improved image | |||
Updated: 9, 2005 | Rating: 0 | Author: Aha-soft Team | Size: 940 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
136. | EldoS PKI Tools 1.2 (eldos.org) | ||
verify signature and decrypt files using X.509 certificate right from Windows Explorer. It also allows to send encrypted or signed files by e-mail. File Processor seamlessly integrates into Windows Explorer to provide easy access to file manipulation functions. It lets you perform both simple file operations such as pack files into ZIP archive, send files by e-mail, securely delete | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
137. | Email Audit 3.2 (km-vision.com) | ||
clusters Spam mails, Junk mails, Bounce mails into their respective folders. The email audit utility comes with a host of built in spam control filters and flexible user defined filters. You can now create Whitelist of email IDs belonging to your friends, colleagues, relatives so that mails | |||
Updated: 9, 2005 | Rating: 0 | Author: Shama Hegde | Size: 8172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
138. | Find Protected 2.0 (aks-labs.com) | ||
company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can do a deep inspection of employees' files to enforce an intelligent data security policy across their organizations. Find Protected was designed to search for and identify password protected files | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
139. | EzSearch 3.6 (soft9000.com) | ||
tie-up EzSearch! . EzSearch keeps real-time records: The number of folders searched, number of files rejected, number of files qualified, and elapsed search-time, are just some of the data available to help you gauge the effectiveness of your search. These counters help you monitor the progress of | |||
Updated: 9, 2005 | Rating: 0 | Author: R. Nagy | Size: 1763 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
140. | f2xml 1.0 (boulderwall.com) | ||
control over your filesystem? f2xml provides that control. f2xml creates customised XML, HTML or TEXT based reports on your file system or removable storage (CD's, floppy disks, etc). The HTML and TEXT based output provide self contained reports. The XML format allows for further analysisthrough XSLT | |||
Updated: 9, 2005 | Rating: 86 | Author: David Metcalfe | Size: 600 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Create folders from list software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|