|
||||||
|
||
|
Home > Mechanism software |
|
|
151. | AlfaClock 1.84 (alfasoftweb.com) | ||
Ancient Egyptians used the shadow clock (gnomon) to determine correct time. The Greeks used the water clock, or clepsydra. The first mechanical clock appeared in the fourteenth century. Then, in 1929 first electronic timepieces appeared. As time changes, so do the time-keeping devices. Now, in the | |||
Updated: 9, 2005 | Rating: 222 | Author: Eugene Boukyan | Size: 1924 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
152. | AMI Font Wrangler 2.0d (mindworkshop.com) | ||
AMI Font Wrangler is the TrueType font manager that makes it easy to batch install, remove, rename, and copy fonts. You can quickly browse and weed installed and downloaded fonts, print a contact sheet, and resolve typeface name conflicts. If you install fonts in Windows, you will find that keeping track of | |||
Updated: 9, 2005 | Rating: 0 | Author: Alchemy Mindworks | Size: 1973 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
153. | Anti-EyeStrain 2.72 (svteam.ru) | ||
fields generated by computer monitors used to be considered the mechanism of that negative influence. Now it is obvious that the notorious radiation is not to blame. The main reason why computer users suffer from health problems is eyestrain. This program will help your eyes relax, and thus increase the efficiency of your work. The user-friendly ErgoWizard will analyze your | |||
Updated: 9, 2005 | Rating: 213 | Author: Yevgenii Chukharev | Size: 1174 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
154. | CD-DVD Lock 2.01 (getfreefile.com) | ||
it works more faster than any other software using cryptooperation mechanisms. The main purpose of the program is to restrict an ability of copying data between removable media and hard disk drives as well as deny access to media itself. CD-DVD Lock will allow you avoid many of headaches connected with | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
155. | ConversionTool 4.2.2 (keper.com) | ||
Access database into a SQL Server database, unlike the Microsoft’s UpSize Wizard preserving all table structure details, and supports the conversion of the views and procedures. Moreover, the tool supports solution of structural problems between Access and SQL Server like making the implicit behavior | |||
Updated: 9, 2005 | Rating: 6616 | Author: Burkhard Lau | Size: 3151 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
156. | Cresotech TypeRecorder 1.0 (cresotech.com) | ||
Cresotech TypeRecorder (T-Rec) is easy to use and convenient utility for recording keystroke sequence while working with word processing programs, games, multimedia applications, etc. Simple way to avoid excessive manual typing by using pre-recorded macros. This is a new software tool that revives an old | |||
Updated: 9, 2005 | Rating: 0 | Author: Cresotech, Inc. | Size: 1491 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
157. | Data Stash 1.5 (skyjuicesoftware.com) | ||
add the data files you'd like to hide, via an easy drag and drop mechanism. The receptacle file remains fully functional. Password protection is also provided, using Blowfish encryption. This is useful if you wish to keep out certain files from prying eyes, under the guise of a normal file. For example you can hide sensitive document files into a bitmap file, and retrieve them later | |||
Updated: 9, 2005 | Rating: 0 | Author: Chooi Guan Lim | Size: 384 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
158. | Dekart Private Disk 2.07 (dekart.com) | ||
to them. Dekart Private Disk includes innovative Disk Firewall mechanism - a unique technology that makes your files as safe as they could possibly be. Disk Firewall shields files from viruses and other malware even if your antivirus or antispyware program fails to protect the system. Now you can create a white-list of applications, only these programs will be allowed to access the | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
159. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
clicking the archive with the given password for symmetric key mechanism and no input is necessary for certificate based decryption.. DevSolutions SecureFile also can be used to create a EncryptionArchive file. The encryption archive can be extracted by ArchiveExtractor utility comes with this setup. Self-Decryiption archive and Encryption archive can hold creators name and | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
160. | Dr. Bulk eMailer Pro 8.0.0.7.1 (npust.com) | ||
(pro) verifies and sends out e-mails, bypassing your ISP's conventional mail service. Its main task is to deliver e-mails in the specified lists. Dr. Bulk eMailer (pro) is shareware. It runs on Windows 95/98/ME or Windows 2000/NT4/XP. Dr. Bulk eMailer (pro) provides direct sending, bypassing the ISP mail services. It will connect directly with Mail servers, and then | |||
Updated: 9, 2005 | Rating: 0 | Author: GARY KUO | Size: 1593 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Mechanism software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|