|
||||||
|
||
|
Home > Shape files software |
Related keywords: files, shape, hide files, Files, PDF files, compare files, protect files, duplicate files, delete files, recover files |
|
|
151. | TuneUp Utilities 2006 (tune-up.com) | ||
usage. TuneUp DiskCleaner scans your hard disk for these unnecessary files and removes them. Another useful tool is TuneUp RegistryCleaner, which finds and solves problems caused by invalid entries, references and links in the Windows registry. Programs that you don't use anymore can be comfortably removed with TuneUp Uninstall Manager. Optimize the performance of your computer | |||
Updated: 2, 2006 | Rating: 831 | Size: 8888 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
152. | Acronis True Image 9.0 (acronis.com) | ||
PC to a known working state without any reinstallation. 2) A new file-based backup option which enables you to backup and restore individual files and folders, like your My Documents folder or a specific file, like your latest tax return. A wizard walks you through all of the steps. Acronis True Image 9.0 makes restoring your system even faster with the exclusive new | |||
Updated: 2, 2006 | Rating: 139 | Author: Acronis | Size: 38022 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
153. | Transparent Screen Lock PRO for WinNT/2000/XP/2003 4.50 (e-motional.com) | ||
regular users from disabling or tampering with the program. Log file tracks failed logon attempts, and can initiate shutdown/logoff. Save log file locally, to network or to Event Log. Use quick-launch icon to run program immediately, run at a preset time interval or run as screensaver. Option to grant system access to Administrators, specified User Groups (local or global) | |||
Updated: 2, 2006 | Rating: 16 | Author: Sandra Buckingham | Size: 992 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
154. | SecureWord 1.5 (secureword.com) | ||
for storing important information such as logins, passwords and files. Taking into consideration that somewhat similar programs exist, let us explain you why you should choose SecureWord and in what ways we enhanced and developed our program for your convenience. We are using modern and secure encryption algorithms. The main method, used in SecureWord is AES, Advanced Encryption | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
155. | FlowChart.NET 4.0.3 (mindfusion.org) | ||
structures. The control provides more than 100 predefined box shapes and allows custom-designed ones. Both images and text can be placed inside nodes. Appearance can be customized further by setting fonts, colors and brush styles, custom painting. Other features include an alignment grid, shadow effects, scrolling and zooming, locking, z-order and pen styles. Several automatic | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 4943 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
156. | Registry Drill 3.2.01 (easydesksoftware.com) | ||
A blank Key, a pointer to a non existing Key, a non existing file, invalid characters, and more. The Drill has several main components, the Quick Drill which quickly searches the Registry for 15 different possible types of errors that other Registry cleaners do not. The Deep Drill goes through the entire Registry slowly and carefully. looking for more than 50 different kinds | |||
Updated: 2, 2006 | Rating: 0 | Author: Easy Desk Software | Size: 7797 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
157. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
when computers are not being used. It compresses and encrypts backup files using a choice of encryption methods and key lengths: DES, TDES-128, AES-128, AES-192, AES-256, or Blowfish (up to 448 bit key length.) RBackup then sends backup files off-site to the RBackup Server through the Internet | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
158. | Quicknote 5.2 (jens.metz-furniere.de) | ||
this purpose, you have to run the program first, then create a new file, then type a line or two and save the file. Too many things to do in order to simply write down a thought? With Quicknote, it does not matter which programs you are currently using; whenever you want to write something down | |||
Updated: 2, 2006 | Rating: 16 | Author: Jens Mьller | Size: 2086 kb | Freeware Go to category: Business > Other Similar programs | |||
159. | Printfil 4.3 (guolo.com) | ||
applications. You can set your application to print to an ascii file, or you can have Printfil capturing a parallel port output, automatically redirecting your print jobs to any printer, even if a printer is phisically connected to the captured port. In addition, it will allows you to: - preview printing - include logos or background images stored in separate files | |||
Updated: 2, 2006 | Rating: 1170 | Author: Davide Guolo | Size: 1007 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
160. | pdf stamp command line 2.0 (toppdf.com) | ||
numbers, contact information or any text that you need added to the file. PDF Stamp (PDF Watermark) Command Line features: 1. PDF Stamp (PDF Watermark) is easy to use; 2. PDF Stamp (PDF Watermark) does NOT need Adobe Acrobat software; 3. PDF Stamp (PDF Watermark) supports PDF1.6 protocol | |||
Updated: 2, 2006 | Rating: 0 | Author: X H | Size: 403 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Shape files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|