|
||||||
|
||
|
Home > Memories software |
|
|
11. | PRTG - Paessler Router Traffic Grapher 5.2.0.574 (paessler.com) | ||
may also be used to monitor many other aspects of a network such as memory and CPU utilization. With PRTG Traffic Grapher the user receives comprehensive bandwidth and network usage data that helps to optimize the efficiency of the network. Understanding bandwidth and resource consumption is the key to | |||
Updated: 2, 2006 | Rating: 16 | Author: Dirk Paessler | Size: 9813 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
12. | Mailbag Assistant 3.9 (fookes.com) | ||
If you're not an experienced computer user, you'll enjoy the program's simple grid layout, which allows you to sort e-mails in many ways just by clicking column headings. You can also use Mailbag Assistant's E-mail Wizard and Quick-Match searches to track down messages quickly and easily. If you're a power user, you'll appreciate tools for creating message subsets, extracting | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Fookes | Size: 1910 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
13. | Mailbag Assistant 3.9 (fookes.com) | ||
If you're not an experienced computer user, you'll enjoy the program's simple grid layout, which allows you to sort e-mails in many ways just by clicking column headings. You can also use Mailbag Assistant's E-mail Wizard and Quick-Match searches to track down messages quickly and easily. If you're a power user, you'll appreciate tools for creating message subsets, extracting | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Fookes | Size: 1910 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
14. | BPS Spyware and Adware Remover 9.3.0.0 (bulletproofsoft.com) | ||
It is completely customizable to customers' needs. It scans your memory (for active memory ad components, which are not stored on your hard drive and last only as long as the computer is powered up), registry, & drives for known adware modules & for known SpyWare parasites & scum-ware components and lets you remove them safely from your system. Using BPS Spyware/Adware | |||
Updated: 2, 2006 | Rating: 122 | Author: BulletProof Soft | Size: 8238 kb | Demo Go to category: System Utilities > Other Similar programs | |||
15. | WinCal 4.9.0 (techsysconsultants.com.au) | ||
friends, you are able to produce a stunning calendar in minutes. The memories of special events, such as holidays, are no longer hidden in photographic albums but before you every day. A business is able to produce a calendar promoting themselves, their products or services to their customers in | |||
Updated: 2, 2006 | Rating: 0 | Author: Rajesh Jain | Size: 16326 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
16. | WinCal 4.9.0 (techsysconsultants.com.au) | ||
friends, you are able to produce a stunning calendar in minutes. The memories of special events, such as holidays, are no longer hidden in photographic albums but before you every day. A business is able to produce a calendar promoting themselves, their products or services to their customers in | |||
Updated: 2, 2006 | Rating: 0 | Author: Rajesh Jain | Size: 16326 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
17. | Aurigma Image Uploader 3.5 (aurigma.com) | ||
etc), details, list, and icons; * Supports non-images too. * Memory friendly even for huge number of uploaded files; * Auto-recovery upon connection failure; * Send up to 3 thumbnails for each image; * Ability to rotate 90, 180, and 270 degrees; * Ability to add descriptions to files; * Displays progress bar/estimation time during upload; * Displays print quality | |||
Updated: 2, 2006 | Rating: 1677 | Author: Fedor Skvortsov | Size: 2593 kb | Shareware Go to category: Development > Active X Similar programs | |||
18. | System Monitor 1.4.1 (rundegren.com) | ||
Windows computers on a network. It can monitor the usage of CPU, Memory, Disk Drives and Network Adapters and notify you when a certain resource exceeds a certain value. You can set it up to log events and create usage reports to databases located anywhere on your network. You can also search remote computers for files, folders or running processes and delete or terminate these with | |||
Updated: 2, 2006 | Rating: 0 | Author: -- -- | Size: 860 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
19. | Folder Lock 5.3.9 (newsoftwares.net) | ||
users and hackers. Files can also be protected on USB Flash Drives, Memory Sticks, CD-RW, floppies and notebooks. Protection works even if files are taken from one PC to another on a removable disk, without the need to install any software. It locks files in Windows, DOS and even Safe Modes. Additional | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
20. | AxCrypt 1.6.2.3 (axcrypt.sourceforge.net) | ||
use. - Absolutely no configuration needed - just use it. - Secure memory handling - no keys or data in the paging file - Private branding support for commercial or corporate versions. - Open source under GNU GPL. Easy to use strong file encryption, integrated with Windows Explorer. Encrypt | |||
Updated: 2, 2006 | Rating: 337 | Author: Svante Seleborg | Size: 1034 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Memories software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|