|
||||||
|
||
|
Home > Custom software |
Related keywords: Custom web site, custom controls, Custom Controls, custom screen saver, Outlook custom forms, custom reporting, custom fields, custom window, custom MP3, create custom compilations |
|
|
191. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more. It can also audit password and security policies, perform HTTP/CGI server auditing, registry auditing In | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
192. | IconChanger 3.5 (shelllabs.com) | ||
Does your desktop look plain and boring? Get Icon Changer! Icon Changer is a software application that makes changing icons fun and easy. It's a hassle-free way to personalize your desktop without having to open up any computer manuals. Simply click the icon you want to change, point at the one you like and | |||
Updated: 2, 2006 | Rating: 434 | Author: Marat Maksyutov | Size: 1128 kb | Shareware Go to category: Graphic Apps > Icon Tools Similar programs | |||
193. | Folder Maker 2.1 (skyjuicesoftware.com) | ||
of your files. Enhanced CSV support allows creation of custom folder and file names, provided in a delimited text file. Folder Maker is a batch tool that allows you to create dozens of folders and files effortlessly and easily. Enumeration allows you to number folders and files, while prefix and postfix options allow total customisation of names. Supports CSV | |||
Updated: 2, 2006 | Rating: 39 | Author: Chooi Guan Lim | Size: 688 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
194. | ExpressZIP 4.5.0 (avantrix.com) | ||
more properties for EXE style archives to be set including a custom title and introduction message, a unique icon for the archive, password protection and file overwrite properties , Easy to use Wizards for creation of both EXE and ZIP archives, Built-in support to view most common picture files (BMP, GIF, JPG, ICO, etc.) Archive spanning operations over just about any | |||
Updated: 2, 2006 | Rating: 0 | Author: AVANTRIX Inc. | Size: 3998 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
195. | Email Address Juggler 2.75 (mirage-avm.com) | ||
of email addresses. It's perfect for keeping your friends, customers or club members up to date. It has plenty of time-saving tools for loading, splitting and merging lists. If somebody decides they want out from a list, add them to the removals list to make sure that you don't bother them again. When you've got your list ready, use the built-in international | |||
Updated: 2, 2006 | Rating: 0 | Author: Ian Tragen | Size: 3132 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
196. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
and sensitive information. Other features include support for custom privacy needs, user-defined erasure methods, scheduler functionality, command-line parameters, integration with Windows Explorer, password protection, and Anti-Surprise (Anti-Boss or Panic) Key feature. The latest version comes with a Media Wiper to erase entire drives, support for updated versions of Yahoo | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
197. | East-Tec DisposeSecure 2005 3.3 (east-tec.com) | ||
Data is removed according to U.S. Department of Defense standards or custom user security levels. East-Tec DisposeSecure 2005 can be operated from a floppy disk, CD or DVD to sanitize any drive or partition from the computer, regardless of the file system or the operating system. Whether you want to prevent identity theft, protect your privacy or stop competitors from stealing your | |||
Updated: 2, 2006 | Rating: 0 | Author: Horatiu Tanescu | Size: 2574 kb | Shareware Similar programs | |||
198. | Dupli Find 4.0 (rlvision.com) | ||
duplicates are reported and can be easily removed from the file. Custom scripts can be used to narrow down the search for better results. Dupli Find can also be used as a general text utility that provides many functions for manipulating text files. Everything can be automated using command lines to save time and effort. Use Dupli Find to... o Delete duplicate emails in mailing | |||
Updated: 2, 2006 | Rating: 48 | Author: RL Vision | Size: 807 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
199. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
DevSolutions SecureFile 3.1 is an easy to use encryption and compression program, which is able to encrypt your personal files and sensitive data quickly, easily and securely. In addition to encryption, SecureFile creates self-decrypting exe - files which anybody with the right password / certificate can | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
200. | Deletor 3.1 (basta.com) | ||
or extensions that you specify. Deletor also has support for custom filter packs, file date filtering, and command line | |||
Updated: 2, 2006 | Rating: 82 | Size: 458 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Custom software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|