|
||||||
|
||
|
Home > Client invoicing software |
Related keywords: client, invoicing, ftp client, email client, Invoicing, Client, ssh client, FTP Client, client server, nfs client |
|
|
171. | SyncBack 3.2.7.0 (mjleaver.com) | ||
Easily backup, synchronize, or restore your files to another drive, FTP server, ZIP file, networked drive, or removable media. Highly configurable, SyncBack includes: detailed and easy to read log files; email results; simulated backups and restore; file filters; sub-directory selection; copy verification; | |||
Updated: 9, 2005 | Rating: 229 | Author: Michael Leaver | Size: 1948 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
172. | SyncPro Backup 2.1 (01ware.com) | ||
office , home and your notebook Computers, backups your day's and week's work and transfers Programs ' DATA between Computers (e.g.. synchronizing ICQ data between two PCs) synchronizes Folders and Files between Computers across network.Syncpro works as two way synchronization utility to ensure that files are up to date between drives or | |||
Updated: 9, 2005 | Rating: 0 | Author: Boshra Galal | Size: 2772 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
173. | System Shield 2.1c (iolo.com) | ||
Most people believe that when a file is deleted, it is permanently and irrecoverably "gone". The error in this belief is that it relies on some basic assumptions that are very far from the truth. Realistically, the following must be true in order for a file to be irrecoverably deleted: 1. The data | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
174. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
automatically generates a completed inventory card for each computer/client. Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic Netlog then reports any changes made on each client log-in to the inventory program. Other inventories, e.g. faxes, photocopiers and other | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
175. | Repellent 2.3.04 (easydesksoftware.com) | ||
Repellent can solve all your email and Internet virus worries with the click of a button, you can disable all VB and Java applets and scripting, as well as all Registry files. These are the viruses and worms that your virus scanner is trying to find and kill. These script viruses do the real damage, like | |||
Updated: 9, 2005 | Rating: 0 | Author: Guy Young | Size: 1633 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
176. | AEA's Resume Blaster 1.3.19 (placementprogram.com) | ||
and resumes to 46,400 US recruiters nationwide. Resume Blaster's basic database, includes more than 50,000 public and carefully verified contacts of hiring managers, headhunters and recruiters. No mail server nor email address is required. Create multiple resumes and send them to targeted recruiters by location, recruiter type and job category. Resume Blaster's features | |||
Updated: 9, 2005 | Rating: 82 | Author: Francesco Casi | Size: 90 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
177. | Security Folder 2.0 (everstrike.com) | ||
These days computers are everywhere. Reliable and tireless machines replace human beings at dull routine tasks in almost every area. Each day we tend to rely more and more on electronics as storage media and information processing and distribution systems. A decade ago, our puny hard drives contained hardly | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
178. | PalmTree 3.3 (clickok.co.uk) | ||
Password protect, lock and hide folders or directories and their subdirectories and files or documents on your PC. Encrypt files with BLOWFISH, CryptAPI. Hide messages in photograph. Stealth email. Encrypt password files and bank. Prevent unauthorised access by other computer users, friends | |||
Updated: 9, 2005 | Rating: 0 | Author: Kal Bashir | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
179. | PC Activity Monitor Lite 7.3 (spy-soft.biz) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected while monitoring are saved to the encrypted log file located on the user's machine. The monitoring program works in the background, transparent for the user, on the level of OS kernel driver. PC Acme Lite | |||
Updated: 9, 2005 | Rating: 139 | Author: Dmitry Bulat | Size: 2888 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
180. | PC Security 6.4 (tropsoft.com) | ||
Lock down your system like never before. Exercize total control over your computer with the following security options: Explorer Control, File Lock, Folder Lock, System Lock, Internet Lock, Shortcut/Program Lock, Restricted System, Window Lock, intruder Detection with Alarm, Flexible and complete password | |||
Updated: 9, 2005 | Rating: 18 | Author: Silvio Kuczynski | Size: 1100 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Client invoicing software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|