|
||||||
|
||
|
Home > Information systems software |
|
|
151. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
PC-Optimizer pro is a collection of over 30 system-maintenance and optimization utility to tune up windows performance. Remove junk files and zero size files to save valuable disk space; Registry Cleaner, to prevent application crashes;backup and restore backup; popup killer; Startup Manager, to prevent spy applications from running behind your back; erase your navigation tracks to | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
152. | Art Directory Print 3.1 (zzee.com) | ||
also their order and width. In addition to the standard pieces of information, such as file name, size, or modification date, Art Directory Print can also extract other data, for example, HTML titles, MP3 ID3 tags, image information, EXIF data, file hashes, etc. Program comes with a comprehensive file filter: by name (both include and skip), by date, by size, and by attributes | |||
Updated: 2, 2006 | Rating: 138 | Author: Paul Slavic | Size: 1984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
153. | Advanced Encryption Plug-In Pro for Windows Explorer 4.0.3 (secureaction.com) | ||
encryption standards. Shredding (Safe removing files from your system). The shredded files will never be restored even with using Norton Unerase software. Making SFX (Self-extracting archives) from your files. It allows you to send encrypted .exe files to your friends and partners. They do not need to have any software to extract important data with using password - only this sfx | |||
Updated: 2, 2006 | Rating: 25 | Author: SecureAction Research, LLC | Size: 879 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
154. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
business operation. According to multiple studies, the majority of information theft crimes are conducted without having network access to target machine. Most of us prefer not to turn computer off while we are away for coffee or going to the lavatory or have to attend a meeting in a conference room next door. That is the point where an average computer system is most | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
155. | Active Keys 2.31 (softarium.com) | ||
operating systems offer the increasing number of breathtaking features that bring computing to new edge. These days, computers transform into entertainment and information centers of our homes and offices. There is one major drawback of such miraculous integration, however - computers are still bound to traditional hierarchical interfaces which makes controlling various | |||
Updated: 2, 2006 | Rating: 613 | Author: Softarium.com Softarium.com | Size: 1628 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
156. | 1st Evidence Remover 2.14 (getfreefile.com) | ||
use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use and the other detailed information about your activities can be easily extracted and used against you | |||
Updated: 2, 2006 | Rating: 190 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
157. | 1st Evidence Remover 2.14 (softheap.com) | ||
use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use and the other detailed information about your activities can be easily extracted and used against you | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
158. | Capturix NETWorks 3.11.156 (capturix.com) | ||
from any network. It brings a group of very useful tools like: System Information that can show all information related with a specific network card or connection, Speed Meter, Route Information, IP config, Send Mail, Port Scanner with port description that have thousands of trojans port information and almost all protocols used for each port, Trace | |||
Updated: 2, 2006 | Rating: 258 | Author: Alexandre Simoes | Size: 3911 kb | Shareware Go to category: Network & Internet > Trace & Ping Tools Similar programs | |||
159. | Zoom Search Engine 4.2 (wrensoft.com) | ||
Zoom is a package for web developers to add an industrial-strength custom search engine to their website in a matter of minutes. No complicated server-side setup procedures, just index and upload from the convenience of your own Windows computer. Features include: "Google-like" context descriptions, wildcard | |||
Updated: 2, 2006 | Rating: 16 | Author: David Wren | Size: 1526 kb | Shareware Go to category: Web Development > Other Similar programs | |||
160. | Webserver Stress Tool 7.1.0.222 (paessler.com) | ||
Each user is simulated by a separate thread with his own session information (i.e. cookies for each simulated user are stored separately) and "surfs" the URLs independently from the other users - just like in real-world usage. URLs can be parameterized for each user and the sequence of URLs can be varied. POST and GET requests are supported as well as BASIC HTTP Authentication and | |||
Updated: 2, 2006 | Rating: 0 | Author: Dirk Paessler | Size: 8350 kb | Shareware Go to category: Web Development > Site Administration Similar programs | |||
|
Home > Information systems software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|