|
||||||
|
||
|
Home > Every software |
|
|
131. | AutoTask 2000 Task Scheduler 3.68 (cypressnet.com) | ||
of your tasks. With AutoTask, you can define intervals such as every 5 minutes, every other day, every third working day, every second Tuesday of the month, twice a year etc. Along with the ability to define intervals, you can also set run times. AutoTask 2000 will allow you to launch a task based on certain conditions being true. Conditions such as whether or | |||
Updated: 2, 2006 | Rating: 16 | Author: James Hall | Size: 3706 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
132. | Ardamax Keylogger 2.4 (ardamax.com) | ||
Automatic startup - Ardamax Keylogger will launch itself each and every time you bootup your PC. Automatic startup in hidden mode - Configure Ardamax Keylogger to start recording keystrokes in hidden mode. Selectable log viewer - Select which file format (plain text or web page) you wish to use to display your recorded Ardamax Keylogger keystroke logs. Friendly interface | |||
Updated: 2, 2006 | Rating: 12034 | Author: Maxim Frolov | Size: 286 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
133. | Anti-keylogger 7.1.1 (anti-keyloggers.com) | ||
for Windows 2000/XP provides every computer with strong protection against most types of the keylogging software, both known and unknown. Anti-keylogger blocks keylogging programs activity without using of signature bases. Anti-keylogger is capable to buck various types of keylogging programs possibly included in any commercial, shareware, freeware products, as well as in | |||
Updated: 2, 2006 | Rating: 107 | Author: Raytown Corporation LLC | Size: 2979 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
134. | Anti-keylogger 7.1.1 (anti-keyloggers.com) | ||
for Windows 2000/XP provides every computer with strong protection against most types of the keylogging software, both known and unknown. Anti-keylogger blocks keylogging programs activity without using of signature bases. Anti-keylogger is capable to buck various types of keylogging programs possibly included in any commercial, shareware, freeware products, as well as in | |||
Updated: 2, 2006 | Rating: 82 | Author: Raytown Corporation LLC | Size: 2979 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
135. | Alarm++ 7.03 (12noon.com) | ||
birthdays, deadlines, TV shows * visit web pages -- read the news every morning or check your stocks weekly * send e-mail to your pager -- get reminders anywhere * send messages over the network -- help others remember * use speech and animation -- have animated characters talk and gesture * | |||
Updated: 2, 2006 | Rating: 42 | Author: Stefan Tucker | Size: 1439 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
136. | Advanced Registry Tracer 2.04 (elcomsoft.com) | ||
copy that REG file (and all the other files that were installed) to every machine on your network. ART is not a monitoring tool (like RegMon and Win-Expose Registry) nor is it an uninstaller (like CleanSweep or Uninstall). ART gives you full control of your Registry without affecting your system | |||
Updated: 2, 2006 | Rating: 706 | Author: Vladimir Katalov | Size: 1733 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
137. | Advanced Desktop Shield 1.63 (softstack.com) | ||
choose to lock your desktop layout or desktop layouts of your users, every time you or your users reboot your PC, the program will return everything on the desktop back to the original state: wallpaper, screen saver; deleted icons will be recreated and the new icons will be deleted. Desktop management includes creating desktop layouts for different purposes such as gaming, working | |||
Updated: 2, 2006 | Rating: 99 | Author: IM Soft | Size: 833 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
138. | Active Keys 2.31 (softarium.com) | ||
actions rather a memory quiz than a comfortable living. Each and every new piece of computer functionality involves using new software which in turn uses multiple menus, icons and buttons to access its features. It is fairly easy to control one application behavior but what if there are five or | |||
Updated: 2, 2006 | Rating: 613 | Author: Softarium.com Softarium.com | Size: 1628 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
139. | Access Lock 2.83 (getfreefile.com) | ||
define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
140. | Access Lock 2.83 (softheap.com) | ||
define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Every software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|