|
||||||
|
||
|
Home > Bed software |
|
|
141. | InSync Backup Software 7.0.82 (dillobits.com) | ||
jobs that can specify one or more source directories, each which can be synchronized to one or more target directories. InSync uses state of the art techniques copying only data that is different between source and target directories. It also takes advantage of multi thread processing, allowing parallel processing of multiple jobs. A built-in scheduler interface allows the automatic | |||
Updated: 3, 2006 | Rating: 77 | Author: Dillobits Software Dillobits | Size: 1380 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
142. | InSync Backup Software 7.0.82 (dillobits.com) | ||
jobs that can specify one or more source directories, each which can be synchronized to one or more target directories. InSync uses state of the art techniques copying only data that is different between source and target directories. It also takes advantage of multi thread processing, allowing parallel processing of multiple jobs. A built-in scheduler interface allows the automatic | |||
Updated: 3, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 1380 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
143. | Exe Icon Changer 4.269 (softboy.net) | ||
such as Dll, Ocx, Scr and so on. The icon of folder and driver can be changed by Exe Icon Changer too. If you want to extract and save the icons in exe file, Exe Icons Changer will be your first choice. It can save the icon as two formats: bmp and ico.The Function Lists of Exe Icon Changer 1. Replace all kinds of executable Icons and permit to take place of any icons in | |||
Updated: 3, 2006 | Rating: 602 | Author: Zhang Yan | Size: 835 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
144. | Clean Disk Security 7.54 (diskcleaners.com) | ||
you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk cleaning method is now available as an option. This program can also clean the | |||
Updated: 3, 2006 | Rating: 16 | Author: Kevin Solway | Size: 660 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
145. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
146. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
147. | Free Asmw Eraser Pro 3.4 (asmwsoft.com) | ||
with Asmw Eraser Pro, your file data is gone forever and cannot be recovered, It Supports Multi language interface. Protect your privacy by erasing the tracks of your | |||
Updated: 3, 2006 | Rating: 91 | Author: asmwsoft | Size: 1700 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
148. | ABC Amber Outlook Express Converter 4.14 (thebeatlesforever.com) | ||
file of any document format: PDF (Adobe Acrobat doesn't need to be installed), RTF format (also doesn't require MS Word to be installed), hypertext HTML format, text format, MS DOC format, popular CHM format, old good HLP format, more; - supports mutiple encoding tables; - supports display and render of HTML emails; - ease to setup and use; - command line suppport; | |||
Updated: 3, 2006 | Rating: 120 | Author: ProcessText Group | Size: 1364 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
149. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
150. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Bed software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|