|
||||||
|
||
|
Home > Random numbers software |
Related keywords: random, numbers, Random, phone numbers, serial numbers, winning numbers, dial numbers, Numbers, random number generator, paint by numbers |
|
|
151. | Express Notes Information Organiser 1.02 (nch.com.au) | ||
Express Notes Card File Software for Windows Express Notes lets you store and organize notes on your computer. Typically this software is used as a phone or address book, diary or card file but it can be used for just about anything. Some examples include todo lists, recipes, customer records and more | |||
Updated: 9, 2005 | Rating: 82 | Author: NCH Swift Sound | Size: 104 kb | Freeware Go to category: Home & Hobby > Personal Finance Similar programs | |||
152. | NitroRAM 1.31 (roadside-software.com) | ||
NitroRAM simply the best utility for recovering wasted RAM and optimizing the RAM. NitroRAM will recover leaked memory (memory used by a program, but not freed). NitroRAM will also flush out unused DLLs, closed files, and other information that is wasting the RAM's space. NitroRAM features an intelligent | |||
Updated: 9, 2005 | Rating: 39 | Author: RoadSide Software | Size: 188 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
153. | Geomancy 2.0.0 (tarot-deutung.de) | ||
ancient method of divination. Our programm generates a series of random odd and even numbers and builds from the 16 possible combinations of points 16 geomantic figures. Each figure relates to correspondent field of activity and can appear in one of 12 astrological houses plus 3 non-astrological. The programm user "sows" or casts figures and gets afterwards his readings | |||
Updated: 9, 2005 | Rating: 202 | Author: Mario Krsnic | Size: 2035 kb | Shareware Go to category: Home & Hobby > Astrology / Biorhythms / Mystic Similar programs | |||
154. | Hermetic Stego 5.17 (hermetic.ch) | ||
bits of the message are inserted into the bytes of the image files randomly and in such a way as to defeat the use of statistical tests to reveal the presence of a hidden message. 3. The program can be used with a user-specified stego key or with a default stego key; use of a default stego key allows sending a hidden message to another person who does not know what that stego key | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
155. | Keyring 1.0.1 (morello.co.uk) | ||
passwords, together with other infomation such as username/account number and web page in a single securely encrypted file. For convenience, a single click will jump you to the account's web page and copy your password or username to the clipboard ready to paste into the login window. So | |||
Updated: 9, 2005 | Rating: 0 | Author: Tom Duncan | Size: 178 kb | Demo Go to category: System Utilities > Other Similar programs | |||
156. | Easypass 2.0 (andresensoft.de) | ||
2.0 is a random password generator for all areas where passwords have to be set or changed (like hotlines, helpdesks and administrators). Features: Fast and easy to use. Generates three types of passwords. Speakable password: This passwords can be used and spoken much easier than normal passwords. With speakable passwords the communication with the end-user becomes much | |||
Updated: 9, 2005 | Rating: 42 | Author: Ulrik Andresen | Size: 2927 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
157. | ENVY 1.00 (radiks.net) | ||
bitwise operations, comparsions, date & time functions, random numbers, file I/O, and text parsing ) ENVY is able to alter environment variables in the parent COMMAND.COM environment, greatly simplifying many programming tasks which must be accomplished via a batch file. ENVY is well-suited to address frequent problems such as needing to build a filename or | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Lawless | Size: 24 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
158. | Eraser 5.3 (tolvanen.com) | ||
Manual of the US Department of Defense and overwriting with pseudo-random data. You can also define your own overwriting methods. Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
159. | Evolution Interface 1.1 (evolution-interface.com) | ||
and truly simplifies and personalizes computing. Create any number of desktops, quickly and easily. Each desktop can be customized for particular projects or to suit the individuality of the user.. Link desktops together, swiftly surf from desktop to desktop with one click. Desktops are so easy to clone or create from scratch, you can have custom desktops for work, projects | |||
Updated: 9, 2005 | Rating: 0 | Author: CodeName: MANA LLC | Size: 8470 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
160. | File Monster 2.6.7 (nstarsolutions.com) | ||
further, File Monster also overwrites the original file name with a randomly generated name and it changes the file's creation date. It can even erase pesky hidden files, system files, and read-only files. Don't leave sensitive data on your computer: deleted files are the first place many computer | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Random numbers software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|