|
||||||
|
||
|
Home > Solutions software |
|
|
141. | Evidence Killer 2005 1.0 (securedisk.netfirms.com) | ||
the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, clean recent documents lists for popular applications, can recover HD space, and many more. Protect your privacy with Evidence Killer 2005 and completely | |||
Updated: 2, 2006 | Rating: 82 | Author: Solution inc | Size: 2060 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
142. | East-Tec DisposeSecure 2005 3.3 (east-tec.com) | ||
every sector and bit of information. Data is removed according to U.S. Department of Defense standards or custom user security levels. East-Tec DisposeSecure 2005 can be operated from a floppy disk, CD or DVD to sanitize any drive or partition from the computer, regardless of the file system or the | |||
Updated: 2, 2006 | Rating: 0 | Author: Horatiu Tanescu | Size: 2574 kb | Shareware Similar programs | |||
143. | DMUSB 2.8.0 (flenik.com) | ||
provides a unique solution to the most disturbing administration problem: the backup. With DMUSB you can rest assured that your data are constantly monitored and duplicated, transparently (in the background). Based on client-server technology, DMUSB suits all networking environments, offering 365/7/24 data synchronization for multiple clients in parallel, that is, it monitors all | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Cassos | Size: 3709 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
144. | DeviceLock 5.73 (ntutility.com) | ||
administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
145. | DeviceLock 5.73 (protect-me.com) | ||
administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
146. | MP3Producer 2.48 (mp3developments.com) | ||
is an ideal solution for converting (grabbing) your audio CD collection to a variety of the most popular compressed audio formats such as MP3, WMA, WAV, OGG with the excellent output quality at a high ripping speed! Besides with this software you can easily convert WAV to OGG, WAV to MP3, WAV to WMA and OGG to MP3. MP3Producer has FreeDB function with customizable settings and | |||
Updated: 2, 2006 | Rating: 0 | Author: MP3 Developments | Size: 2490 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
147. | Actual Window Guard 3.8 (actualtools.com) | ||
changing program priority, window alignment, prevention of data's loss, changing of windows' titles, keeping the desired window on top of desktop, etc.! You can apply any number of these tools to all applications or to only one of them and change your own settings as many times as you want! If you always deal with the little quirks and limitations of windows, try Actual Window | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Tretyakov | Size: 1665 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
148. | Actual Window Rollup 3.8 (actualtools.com) | ||
imagine that you work with 7-8 applications simultaneously. What's the result? The task bar is so cluttered that it is almost impossible to find the desired window quickly. Minimize windows to the system tray so that you see only programs' icons? There is much more space now, but still - how to find exactly this or that icon among plenty of others? We offer you a smart | |||
Updated: 2, 2006 | Rating: 60 | Author: Michael Tretyakov | Size: 1677 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
149. | Active File Recovery for Windows 7.0 (file-recovery.net) | ||
hard drives in minutes and displays all recoverable files. It's a powerful and easy-to-use undelete solution for FAT and NTFS-based systems. Software supports Software and Hardware RAID, EFS encrypted data recovery. Also you can use it for IDE/ATA/EIDE hard drives, SCSI drives, floppy diskettes, and digital media (such as CompactFlash, SmartMedia, and Sony Memory Sticks) | |||
Updated: 2, 2006 | Rating: 2012 | Author: Active Data Recovery Services | Size: 1355 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
150. | Acronis Privacy Expert Suite 9.0 (acronis.com) | ||
browser Acronis Privacy Expert Suite is not only an anti-spyware solution. It combines a number of the must-have security and privacy tools into one solution: - Internet clean-up: protects your Internet privacy removing traces of your surfing; - System clean-up: eliminates traces of your | |||
Updated: 2, 2006 | Rating: 169 | Author: Acronis | Size: 4335 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
|
Home > Solutions software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|