|
||||||
|
||
|
Home > Messenger plug in software |
Related keywords: plug in, messenger, instant messenger, Messenger, plug ins, plug, Plug in, MSN Messenger, lan messenger, windows messenger |
|
|
171. | Active Network Monitor 2.01 (ntutility.com) | ||
Network Monitor is a tool for the day-to-day monitoring of computers in the network. Active Network Monitor runs under Windows NT/2000/XP and allows Systems Administrators to gather information from all the computers (even from the Windows 9x/Me computers) in the network without installing | |||
Updated: 9, 2005 | Rating: 0 | Author: Ashot Oganesyan | Size: 1947 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
172. | Archive XP 10.16-sp16 (cyberspacehq.com) | ||
were regular folders - just click on the file and they will open in a familiar Windows folder-style interface. The optional Light interface allows you to manage archive files the traditional way (e.g WinZip style). The functionality of the program can be extended, using plug-ins; several | |||
Updated: 9, 2005 | Rating: 337 | Author: Sales CyberHQ | Size: 1 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
173. | Calc98 5.3 (calculator.org) | ||
set of conversions, constants and physical property data, a built-in periodic table of the elements, number base conversions, vectors, matrices and complex numbers. It is especially suitable for the scientific, engineering, medical and teaching professions and in finance. Scientific | |||
Updated: 9, 2005 | Rating: 0 | Author: Bill Ayers | Size: 500 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
174. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
and Stored ComputerSafe records unauthorized access violations in a protected event-log file with a time and date stamped description of the threat. The system records key stroke activity that may provide clues as to the intruder’s intentions or their identity. Notification Services – Theft Recovery ComputerSafe sends various types of remote notifications when | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
175. | CompreXX 4.1 (mimarsinan.com) | ||
Behave Like Folders in Explorer! Browse, copy files from, and add files to archives just like any regular folder. Drag and drop, copy and paste files to and from the archive folders. Perform all archive tasks without ever leaving Explorer, including converting archive types from one to another. Right-Click Explorer Extensions! Create any archive type from the 28 available | |||
Updated: 2, 2006 | Rating: 197 | Author: Sinan Karaca | Size: 5360 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
176. | CryptoExpert 2005 PE 6.02 (secureaction.com) | ||
encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
177. | CryptoExpert 2003 Professional 2.87 (cryptoexpert.com) | ||
encryption system to encrypt and decrypt data. Your files are stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
178. | CryptoExpert 2006 Professional 6.4.3 (secureaction.com) | ||
encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
179. | EndTask Pro 2.00.0123 (products.asynchrony.com) | ||
on most computers. There is no need to install any proxy servers or plug-ins. The Pro edition includes common features such as a "White list" and the classic "Instant-Blocker". Our task management software, like antivirus and firewall software, is critical for keeping your computer running | |||
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
180. | Maxus 3.05 (neurobridge.com) | ||
applications or open documents at the specified time. A built-in traffic monitor displays the real-time graph of bandwidth usage. The hotkeys manager lets you assign custom keyboard shortcuts to some of the routine Windows tasks (such as restarting the system), start various applications using the hotkeys and even open and close the CD-ROM tray by pressing keys on your keyboard | |||
Updated: 8, 2004 | Rating: 0 | Author: NeuroBridge | Size: 1366 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Messenger plug in software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|