|
||||||
|
||
|
Home > On pages software |
Related keywords: pages, web pages, Yellow Pages, White Pages, Pages, doorway pages, Java Server pages, Extract pages from PDF, Active Server Pages, save web pages |
|
|
171. | MemOptimizer 3.00 (pointstone.com) | ||
than ever before! Whenever a Windows based program is running, it's consuming memory resources - unfortunately many Windows programs do not "clean up" after themselves and often leave valuable memory "locked", preventing other programs from taking advantage of it and slowing your computer's performance! In addition, memory is often locked in pages so if your program | |||
Updated: 2, 2006 | Rating: 16 | Author: Steven Martins | Size: 1193 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
172. | IdentaFone Multi-Line Caller ID Software 3.99 (identafone.com) | ||
for monitoring up to 100+ lines. By using your local network, only one Caller ID box is required, allowing several workstations to have the same detailed status of callers and line usage. Full integration with MS Outlook Contacts adds the convenience of working with your favorite PIM. Screen pops, line status, memos, forwarding to pagers, cell phones or email, speed dial | |||
Updated: 2, 2006 | Rating: 0 | Author: IdentaFone Software | Size: 2752 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
173. | ID_Bank 1.24.13 (rainbow-innov.co.uk) | ||
can be trouble especially on the Internet. You may have too many to remember and if you don't take care someone else will gain access to them! ID_Bank can help solve your problem. ID_Bank is a secure identity and password protection system from Rainbow Innovations. ID_Bank is able to hold your personal information relating to usernames, passwords, pins, login details etc; | |||
Updated: 2, 2006 | Rating: 0 | Author: John Hudson | Size: 1546 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
174. | Examine32 4.31 (examine32.com) | ||
using either ordinary text or GREP-like regular expressions, based on the standard UNIX search utility. The logical operators OR, AND, NOT and XOR can be used with a specified search proximity. Files within ZIP archives can also be searched for text. File formats supported by Examine32, in addition to text files, are text files with Unix and MacIntosh line endings, Microsoft Word | |||
Updated: 2, 2006 | Rating: 0 | Author: Trevor Poile | Size: 625 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
175. | Evidence Destructor 2.14 (emailarms.com) | ||
you are working on your computer performing the day to day activity like surfing the Internet, paying your bills online and logging into the websites with passwords, your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures you | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
176. | Egg 1.3 (SinnerComputing.com) | ||
in the dryer or freezing soft-drink cans while you are "working" on your computer? Egg is an easy to use countdown timer, settable by second divisions from 1 second up to 45 days. While it features a compact window, common times are settable with only two clicks from a selection of 12 customisable times. It can have a beep or almost any standard audio file (including MP3s) for | |||
Updated: 2, 2006 | Rating: 434 | Author: Andrew Glina | Size: 37 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
177. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet history, Web pages and pictures from sites visited on the Internet | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
178. | CryptIt 1.301 (SinnerComputing.com) | ||
file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
179. | Break 1.23 (SinnerComputing.com) | ||
category. It maintains a running total to show you how long you are on your computer, and what you do most while on it. In addition, Break totalises time at work, on break and away from the computer. The timer can be set from 1 to 120 minutes and can remind you using a window and any | |||
Updated: 2, 2006 | Rating: 110 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Business > Project Management Similar programs | |||
180. | BigSpeed Zipper 4.1 (bigspeed.net) | ||
interface, it boasts a large number of features the other utilities on the market do not have. The most notable one is the ability to extract files from archives on remote servers without having to download the archive.The possibilities given by this and other features change the whole concept of an archive utility. BigSpeed Zipper also allows you to search in all zip files | |||
Updated: 2, 2006 | Rating: 0 | Author: BigSpeed Computing | Size: 777 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
|
Home > On pages software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|