|
||||||
|
||
|
Home > Term software |
Related keywords: short term rental properties, search term, long term savings |
|
|
161. | SoundBreak 1.0 (lost.co.nz) | ||
tunnel syndrome are all faces of the same malaise. In layman's terms, if you use something too much, you'll damage it. For those on the coal face of the IT industry, it's endemic, and can mean losing a career when typing becomes too painful to sustain... What can you do? A good | |||
Updated: 8, 2004 | Rating: 0 | Author: Leon Matthews | Size: 762 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
162. | ActiveTextBox 2.3 (ActiveTextBox.com) | ||
it was entered. It means that if you ever have to enter a search term, file name or path, e-mail address, or personal data, you can simply select it from the list instead of wasting time for typing the same information over and over again. It may seem like a small thing at first, but only after few | |||
Updated: 9, 2005 | Rating: 0 | Author: AbsoluteWay | Size: 806 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
163. | Advanced Encryption Package 2006 4.2.9 (secureaction.com) | ||
all encryption programs allow you to do so--they vary, however, in terms of how difficult the process is. AEP2006's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can | |||
Updated: 2, 2006 | Rating: 105 | Author: SecureAction Research, LLC | Size: 2558 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
164. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
all encryption programs allow you to do so--they vary, however, in terms of how difficult the process is. AEP2006 PRO's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
165. | UsefulRest 2.6b (olympsoft.com) | ||
yourself from excessive computer use. With permanent and long-term computer work, you are vulnerable to eyesight deterioration, back and hand pain, headaches and eye problems. Why endure this needless stress? In order to prevent these potential problems, most ergonomic experts advise taking regular, short breaks in computer work to relax the eyes, the hands, the wrists (vulnerable | |||
Updated: 2, 2006 | Rating: 0 | Size: 1056 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
166. | Cool Find 1.14 (coolfilesearch.com) | ||
your own file type group easily. - Provide detail date and time term search including date and time of creating file, accessing file and modifying file. - New search in search results is supported. - Cool Find can show summary info of mp3 files, PDF files and office files . - Support thumbnail view of image files - Support Drag, Drop and Copy of files, including those in | |||
Updated: 2, 2006 | Rating: 0 | Author: Cui Ying Jie | Size: 1528 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
167. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
of work reports. ESCM is built with intuitive interface bound to terms used in service industry. So, it works with "Equipment" having one or more "Defects". "Equipment" is received from "Client". After 1st stage – "Receiving", it goes to 2nd – "Estimating", where "Repairs" investigated to be done on this item – and so on. Here is brief list of stages: - receiving; | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
168. | IsSearch 1.1.9 (screenresources.com) | ||
any item in the list shows the item in built-in viewer. The search term is highlighted so that eye-scanning the results take less time. IsSearch powers fast searches within text files, MS Word documents, HTML-pages, MS Excel workbooks and MS Power Point presentations. But that's not all! Throw in | |||
Updated: 9, 2005 | Rating: 0 | Author: Screenresources | Size: 1111 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
169. | l0stat 1.1 d (dlcsistemas.com) | ||
provides statistical info about all user or computer accounts in terms of a basic and position analysis. Basic Analysis gives a global view of strength of password account: - Total accounts - how many null passwords, same passwords as accounts, revealed passwords - type of characters on password contents - distribution of passwords classified by their lengths Position | |||
Updated: 9, 2005 | Rating: 2106 | Author: J. M. Jimenez | Size: 1340 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
170. | Message Pattern Extractor 2.10 (xyz3.com) | ||
/ Manipulator for EMails and Files. User defines patterns in terms of sets; defines a state machine in terms of patterns and actions. Accepts input from stored emails and/or files. Generates database and/or | |||
Updated: 8, 2004 | Rating: 0 | Author: Jim Miller | Size: 1751 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Term software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|