|
||||||
|
||
|
Home > Intellectual property software |
|
|
151. | Network Investigation Suite 1.13 (microolap.com) | ||
Net Investigation Suite is intended to use for network packets capture and packets generation tasks without using of preinstalled packet drivers. Meanwhile, Net Investigation Suite contains its own packet driver, which is loaded and unloaded dynamically. So, Net Investigation Suite allows you to use all power | |||
Updated: 8, 2004 | Rating: 0 | Author: microOLAP Technologies | Size: 1416 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
152. | eDating Professional 3.0 (66.225.218.202) | ||
greeting cards, buddy list, ignore list, message archive, who's online, multiple top 10's, picture rating (hot or not), personal pages, e-mail message notification. Use it as free, monthly paid or per profile paid dating service. A short list of standard modules: member to member instant messaging, greeting cards, buddy list, ignore list, message archive, who's | |||
Updated: 8, 2004 | Rating: 0 | Size: 15 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
153. | BrainCom 1.2 (concelsystems.com) | ||
BrainCom is an artificial neural network. Utilizing backpropagation algorithm It can be used in almost all research fields such as nonlinear regression, forecasting, curve fit, pattern recognition, classification, decision making, problem optimization, time series analysis. Its user friendly | |||
Updated: 8, 2004 | Rating: 16 | Author: Theodore Stavrothanassis | Size: 2476 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
154. | Attachment Reminder v1.0 (products.asynchrony.com) | ||
if you need to send a file to someone quickly…but nobody's perfect. Anyone who sends e-mail regularly has had the misfortune of sending e-mail without an intended attachment. It's embarrassing, and in the context of a business transaction can cause even the most professional presentation to lose its impact. Now, there's a solution. AttachmentReminder | |||
Updated: 8, 2004 | Rating: 1425 | Author: Mark Dinman | Size: 148 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
155. | Actual Title Buttons Lite 2.0 (actualtools.com) | ||
add the new Roll up\Unroll and Stay on Top buttons to any program's title bar next to the Windows standard Minimize/Restore/Close buttons. The new buttons are as easy to use as the standard ones: you can force window to stay on top of other windows or roll up it with a single mouse click. The | |||
Updated: 8, 2004 | Rating: 432 | Author: Michael Tretyakov | Size: 1614 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
156. | ExtMania 0.7 (reg.net) | ||
with the file type you choose and delete or edit each program's properties, such as starting parameters or icons. Besides, and this is the most interesting feature, ExtMania monitors all file associations and automatically adds newly installed programs to the lists. ExtMania will immediately alert you to any attempt on the part of any program to associate any one file type | |||
Updated: 8, 2004 | Rating: 0 | Shareware Go to category: System Utilities > Other Similar programs | |||
157. | SecurDataStor 5.01 (encryptx.com) | ||
files from spyware, snooping agents, and theft of identity or intellectual property. With EncryptX SecurDataStor you can share sensitive information safely across different Microsoft® Windows® operating systems, different network and firewall technologies, and across different forms of removable storage media. It uses powerful 448-bit blowfish encryption and a | |||
Updated: 8, 2004 | Rating: 65 | Author: David Duncan | Size: 2673 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
158. | BMS-EmailObserver 5.1 (monitoring-software.co.uk) | ||
is a suitable tool for: - Parents concerned about their children's computer activity, i.e. what kind of messages they send by email, who they communicate with etc. - Spouses concerned about their partner's secret cyber relationship etc. - Businesses trying to control internal information turnover, to stop incorrect using of the company name, drain of trade/industrial | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 631 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
159. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
160. | PestPatrol 3.0 (safersite.com) | ||
off. And when that happens, you could lose passwords, customer data, intellectual property - even your web site or, if you telecommute and connect to your office via a VPN, the entire corporate network. PestPatrol defeats the threat by detecting and eliminating: * Trojan horses | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Intellectual property software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|