|
||||||
|
||
|
Home > Boot keys software |
Related keywords: boot, keys, boot manager, hot keys, network boot, remote boot, Boot ROMs, Boot Services, multi boot, boot agent |
|
|
181. | Egg 1.3 (SinnerComputing.com) | ||
Looking for a countdown timer to prevent you toasting your clothes in the dryer or freezing soft-drink cans while you are "working" on your computer? Egg is an easy to use countdown timer, settable by second divisions from 1 second up to 45 days. While it features a compact window, common times are settable | |||
Updated: 2, 2006 | Rating: 434 | Author: Andrew Glina | Size: 37 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
182. | e-Surveiller spy software 1.6.3 (e-surveiller.com) | ||
e-Surveiller is a powerful user-activity monitoring, logging and real-time surveillance software package. With it, you can monitor the activities of several computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on | |||
Updated: 2, 2006 | Rating: 0 | Author: Surveille Technology | Size: 3882 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
183. | DUST 1.2 (WayBeyondUK.com) | ||
allows you to switch to another logged on session using a chosen hot key combination just like you use Alt+Tab to switch tasks. This does not involve going to the Windows XP welcome screen and with password saving and automatic logon makes it very quick and easy to switch between sessions. Ideal for | |||
Updated: 2, 2006 | Rating: 0 | Author: Nicholas Russell | Size: 1436 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
184. | Direct Folders 2.42 (codesector.com) | ||
Waste lot of time while opening and saving files? Direct Folders allows you access most recent and favorite folders directly from the standard File Open and File Save dialog boxes, as well as Explorer, WinZip and WinRAR. Direct Folders can also automatically resize file dialogs, switch to the details view and | |||
Updated: 2, 2006 | Rating: 42 | Author: Jackie Ray | Size: 975 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
185. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
on the target system. DevSolutions SecureFile incorporates public key cryptography in which two complementary keys-a key pair-are used to maintain secure communications. It compresses and encrypts selected files and produces a self-decryption archive. The encrypted file can be decrypted simply by double clicking the archive with the given password for symmetric | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
186. | Database Tour Pro 5.0.5.629 (raritet.com.ua) | ||
Universal database tool with report builder. Tested on Paradox, dBase, FoxPro, ASCII, Lotus, HTML, InterBase, Oracle, SQL Server, MS Access, MS Excel. Main features are: -Viewing, editing and printing data. -Automatically created reports and convenient report builder (with templates, expressions, preview | |||
Updated: 2, 2006 | Rating: 203 | Author: Vitaliy Levchenko | Size: 1741 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
187. | Cursor Hider 1.4.4 (softexe.com) | ||
Cursor Hider helps you to work more productively. It removes the mouse pointer (the mouse cursor does not cover the entered text) while you are working with the keyboard and returns the pointer with any mouse action. Real example: You are going to visit aweb site with forms to fill in. At first you type the | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
188. | CryptoCrat 2005 4.61 (secureaction.com) | ||
can only be unscrambled and read by someone who knows the secret | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
189. | CryptIt 1.301 (SinnerComputing.com) | ||
rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
190. | Compare It! 3.85 (grigsoft.com) | ||
Powerful file compare and merge utility. Features: build-in editor with syntax highlighting, undo and wordwrap; highlights changes within lines; editing or fast by-difference merging; printing; html and text reports; zip support; Unicode support; search and replace with regular expressions; manual line | |||
Updated: 2, 2006 | Rating: 16 | Author: Igor Green | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Boot keys software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|