|
||||||
|
||
|
Home > Icon software |
Related keywords: icon editor, icon maker, icon library, icon manager, icon creator, tray icon, free icon, buddy icon, icon themes, drive icon |
|
|
131. | Active Task Manager 1.61 (orionsoftlab.com) | ||
runs the scheduled tasks even on a logged off computer. The tray icon menu lets you start any task manually. Other applications can interact with ATM via ActiveX Automation. This tool occupies system resources minimally. Ample documentation is also available. A compact automaton tool to set up and run unattended tasks. It starts exe, bat and com-files, shuts down the system and | |||
Updated: 2, 2006 | Rating: 0 | Author: Andy Panichkin | Size: 790 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
132. | Active Keyboard 3.1 (drive-software.com) | ||
this utility - Hide application windows by using a hotkey or an icon in the system tray - Control your Winamp player - Open, Play and Close your CD-ROM - Lock and Unlock your CD-ROM - Change the volume, mute - Logon and Power management - Open dialup connections - Empty recycle bin - Create New Folder - Lock/Unlock Desktop - Show/Hide Windows - Show/Hide | |||
Updated: 2, 2006 | Rating: 144 | Author: Dmitri Drive | Size: 914 kb | Shareware Go to category: Desktop > Other Similar programs | |||
133. | Active Keys 2.31 (softarium.com) | ||
involves using new software which in turn uses multiple menus, icons and buttons to access its features. It is fairly easy to control one application behavior but what if there are five or twenty of them? Aren't you missing your favorite remote controller? Wouldn't it be great to use one controller to manipulate all the functionality of your PC? Is it a dream that never comes true | |||
Updated: 2, 2006 | Rating: 613 | Author: Softarium.com Softarium.com | Size: 1628 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
134. | Access Lock 2.83 (getfreefile.com) | ||
define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only thing is available in this mode is a pop-up password-entry dialog with an input | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
135. | Access Lock 2.83 (softheap.com) | ||
define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only thing is available in this mode is a pop-up password-entry dialog with an input | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
136. | 1st Security Administrator Pro 10.14 (softheap.com) | ||
DOS, Registry editing, Internet and Network access. Hide desktop icons, individual drives, Start Menu items, taskbar, task manager, tray icons. Apply password protection to Windows and restrict users to running applications. Control Internet Usage, spy on PC users. Security restrictions can be applied universally or to specific PC users. 1st Security Administrator is very | |||
Updated: 2, 2006 | Rating: 222 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
137. | 1st Security Agent 6.14 (softheap.com) | ||
editing, taskbar, task manager, and network access, hide desktop icons, and much more. You can apply password protection to Windows and restrict users to running specific applications only. Security restrictions can be applied universally or just to specific users. 1st Security Agent also supports Internet Explorer security that enables you to customize many aspects of the Internet | |||
Updated: 2, 2006 | Rating: 42 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
138. | 1st Security Agent Pro 6.14 (softheap.com) | ||
editing, taskbar, task manager, and network access, hide desktop icons, apply password protection to Windows and restrict users to running applications. Due to support of the multiuser environment, security restrictions can be applied universally or just to specific users. Built-in Internet Explorer Security enables you to customize different aspects of the Internet Explorer Web | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
139. | 1st Security Administrator 10.14 (softheap.com) | ||
DOS, Registry editing, Internet and Network access. Hide desktop icons, individual drives, Start Menu items, taskbar, task manager, tray icons. Apply password protection to Windows and restrict users to running applications. Control Internet Usage, spy on PC users. Security restrictions can be applied universally or to specific PC users. 1st Security Administrator is very | |||
Updated: 2, 2006 | Rating: 432 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
140. | 1st Desktop Guard 1.63 (emailarms.com) | ||
Desktop Guard lets you prevent your desktop icons from getting rearranged, stop users from changing desktop wallpaper and screen saver, secure your public access computers, save, restore, manage and lock desktop layouts. With personal computers becoming part of our lives and everyone in the household | |||
Updated: 2, 2006 | Rating: 903 | Author: emailarms emailarms | Size: 841 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Icon software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|