|
||||||
|
||
|
Home > Store command software |
Related keywords: store, command, command line, e store, online store, Command, Store, store passwords, in store, store builder |
|
|
151. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
you can monitor and log across a network centrally, thus not even storing any log files on the client PC. With HWIN, you can issue remote commands to the HWPE 2 client remotely. All log files are stored uniquely by type and with user name and capture the user name, date, time, PC Name, record number, activity detected. HackerWacker Personal Edition 2 is a new update to | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
152. | Identity Knight 1.3 (fspro.net) | ||
on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature, allowing you to enter your credentials once and let the program do the rest. On the other hand, though, Internet Explorer stores this information in an | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
153. | JvCrypt 1.0 (vandaveer.com) | ||
using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one step. You have the option of creating a single encrypted zip file for each file selected or combining all of your selected files to a | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
154. | KeyText 2.25 (mjmsoft.com) | ||
text and automation utility. KeyText stores pieces of text, ready to be typed or pasted into any application by a simple hotkey press or menu selection. "Right-click anywhere" feature makes form-filling easier than ever. Include commands to run programs, click buttons, change windows, visit Internet sites and more - or automate mouse clicks which hit the right spot | |||
Updated: 9, 2005 | Rating: 145 | Author: MJMSoft Design | Size: 623 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
155. | Lock My PC 3.4 (fspro.net) | ||
homes. We tend to rely on our machines more and more each day. We store our valuable data, personal and business-critical information, photos, credit card information, important phone numbers and vast amount of other private information on our hard drives. We install firewalls and anti-virus software to protect this data from outside intrusions and hijacks. However, according to | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
156. | Love You Not 1.10 (pcshareware.com) | ||
from ActiveX controls, keeping them from opening without the user's permission. Microsoft Office macro virus protection: There are over 2,000 identified, catalogued and named Microsoft Office macro viruses. Although Microsoft has added macro virus protection to Office 97 Release 2 and Office 2000, you | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Kapusta | Size: 870 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
157. | Macro Mania 11.1 (nstarsolutions.com) | ||
This award-winning program will save you time and money as you automate your computer tasks with macros. Macro Mania eliminates all the tedious computer tasks and redundant typing chores that can be done much faster and easier with macros. It can launch new or activate an already running program; send | |||
Updated: 2, 2006 | Rating: 42 | Author: Jeff Camino | Size: 1171 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
158. | Message Pattern Extractor 2.10 (xyz3.com) | ||
to perform when patterns are recognized. It accepts input from stored emails (via MAPI) and/or files. It can generate database tables (via ODBC) and/or files. It can be configured to parse emails (header fields, text bodies) or perform transformations on files. MPX can perform a wide variety of tasks because its design recognizes that many transformation tasks | |||
Updated: 8, 2004 | Rating: 0 | Author: Jim Miller | Size: 1751 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
159. | Lock Folder XP 3.4 (everstrike.com) | ||
innovative and reliable technologies provide the safest way to store your information well protected against hacker attacks, malicious software and dishonest employees. But don't think that Lock Folder XP can only be used in the corporate environment - this application is perfect for home as well. We also advise you get Lock Folder XP if you have a laptop and travel frequently | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
160. | Mouse and Key Recorder 5.7 (kratronic.com) | ||
in any window, but it also contains more than 130 additional commands. These commands allow controlling the macro run (loops, conditions, goto, variables, etc.), manipulating files (delete, rename, etc.), starting or switching to programs, manipulating cursors, reading/writing files, logging your keystrokes, etc, etc. The Mouse and Key Recorder activities are stored | |||
Updated: 2, 2006 | Rating: 16 | Author: John Krauer | Size: 3737 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
|
Home > Store command software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|