|
||||||
|
||
|
Home > Fish log software |
Related keywords: fish, Fish, fish screensaver, fish screen saver, FISH, tropical fish, clown fish |
|
|
151. | IP Mailer 2004d (wappu.tv) | ||
your ISP gives you a temorary IP address each time you log on, you can email your IP address automatically to your friends and office/home so that you can find your computer for remote access regardless of the constantly changing IP address. If you use your computer remotely or need to have other people access some server functionality on your PC you can let them know what your IP | |||
Updated: 9, 2005 | Rating: 151 | Size: 1600 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
152. | KikBak File Protection Utility 1.2 (simplis.com) | ||
processing with individual subfolder exclusion. Integrated activity log and help. Liberal licensing. Easy setup and user interface. If you suffer a disk failure or other catastrophic problem, you will find the latest copies of your important files on the backup devices. Plus, KikBak's | |||
Updated: 9, 2005 | Rating: 0 | Author: J Pando | Size: 399 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
153. | LanHunter 1.50 (waterfallsoft.com) | ||
LanHunter makes it easy to search for files on your local network (LAN). When you use LanHunter, you can specify several search criteria. For example, you can search for files by name, date, size and text in a file. With a big number of details you will find everything you want on your network! LanHunter | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Vdovin | Size: 1017 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
154. | LogWatcher 2.10 (acrasoft.com) | ||
is an advanced utility designed to search through Windows NT event logs to find certain keys that you define, and to execute special tasks when it finds them. LogWatcher also supports text-based event logs, typical of those created by unattended processes that do not write to the Windows NT event log. LogWatcher will search logs on multiple remote computers, and | |||
Updated: 9, 2005 | Rating: 0 | Author: Acrasoft | Size: 1900 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
155. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
156. | FileSpy 3.0 (ic.net) | ||
who are using a specific file. It also allows viewing of the user's rights to the file/directory, how the file was opened, the user's network address, and the date and time the user logged in to the network. With FileSpy you can also send messages to selected network users and if you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2014 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
157. | Control Freak 1.3 (windsweptsoftware.com) | ||
an Address Bar, The Command Line, which starts were Explorer's Address Bar leaves off. Mail Call Mail Call is a full-featured email client supporting the SMTP Internet email protocol. It has support for HTML, plain text, and full web pages. Supports multiple mail accounts and has a Remote | |||
Updated: 9, 2005 | Rating: 0 | Author: Greg DeBacker | Size: 2808 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
158. | ConversionTool 4.2.2 (keper.com) | ||
Access database into a SQL Server database, unlike the Microsoft’s UpSize Wizard preserving all table structure details, and supports the conversion of the views and procedures. Moreover, the tool supports solution of structural problems between Access and SQL Server like making the implicit behavior | |||
Updated: 9, 2005 | Rating: 6616 | Author: Burkhard Lau | Size: 3151 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
159. | All-In-One Spy 2.0 (allinonespy.com) | ||
addresses of Internet pages that were visited, and maintains log file for applications that were run on the computer. It can create screenshots with the specified time period and record sounds from the computer's microphone to a sound file. With All-In-One SPY you can disable certain applications and web site addresses. The program runs in the stealth mode and is completely | |||
Updated: 9, 2005 | Rating: 42 | Author: Nikita Melkin | Size: 2824 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
160. | Always Watching 1.0 (liquidmirror.com) | ||
when a file or folder changes on your system? Ever needed to monitor log file changes, watch incoming files on a server or simply wanted to monitor changes on a local hard drive or network share? Then Always Watching! is for you! Always Watching! allows you to watch any folder on your file system or available network share for changes to file size, modification date, filename or | |||
Updated: 9, 2005 | Rating: 79 | Author: Mike Stevenson | Size: 1005 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Fish log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|