|
||||||
|
||
|
Home > A i software |
|
|
211. | Network Eagle Monitor 4.3 (network-eagle.com) | ||
Eagle is a network monitor program. Create categorized task lists on a "set and forget" basis. Network Eagle can ping server, monitor TCP port, check HTTP URL (with HTTP auth), test FTP link, check disk space usage, execute external command check, check databases via ODBC, monitor MS SQL server via native interface, and more. Write your own check scripts using JS and VBS | |||
Updated: 9, 2005 | Rating: 0 | Author: Yury Zaitsau | Size: 3042 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
212. | Hermetic Stego 5.17 (hermetic.ch) | ||
Stego is a steganography program which allows you to encrypt and hide a message (the contents of any computer file) in another file so that the addition of the message to the container file will not noticeably change the appearance of that file. If the file which has been hidden is deleted then there is no indication that it even exists, but it can still be recovered when | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
213. | Lifespan Age Calculator by Peter Riddell 3.0 (home.thirdage.com) | ||
elapsed. Can also subtract an age from an end date to caclulate a start date.. Very useful for government forms in my country, thats for sure. ELAPSED TIME CALCULATION eg: DD/MM/YYYY -- DD/MM/YYYY == X days Y months Z years START DATE CALCULATION eg: DD/MM/YYYY -- X days Y months Z years == DD/MM/YYYY A tiny footprint (35k zipped, 80k unzipped) makes Lifespan Age | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Riddell | Size: 76 kb | Freeware Go to category: Business > Calculators & Converters Similar programs | |||
214. | Duplicate files manager 4.0 (cequal2000.com) | ||
could scan faster , or scan using less memory. After scan finish , I could generate a report of your files, report how much free space you could get.It could save scan result as job so that process it later. Duplicate files manager help you find out and clean duplicate files,expand disk space | |||
Updated: 9, 2005 | Rating: 0 | Author: Cequal Chan | Size: 1779 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
215. | Email Spy Pro 4.5 (email-spy.biz) | ||
like Zone Alarm, Norton Personal Firewall and other similar (i.e. personal firewall, installed on monitored computer, can't detect Email Spy operation). Also there is unique possibility of the emails capture and immediate forwarding it to your secret email address ONLY. So you have complete control of all outgoing emails of monitored user and can make decision: will real | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
216. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
downloads and streaming content and all emails including POP3 and I/M usernames and PASSWORDS. E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
217. | EndTask Pro 2.00.0123 (products.asynchrony.com) | ||
software hides pop-ups and just shows information about them. With a simple mouse hover you can take a peek and decide whether to show them. Otherwise, pop-ups will be automatically blocked after a few seconds. The technology is invisible to sites that try to detect and foil blockers. Its design isn't based on a specific browser so it will work on most computers | |||
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
218. | ENVY 1.00 (radiks.net) | ||
is a batch file enhancement utility for MS-DOS, Win95,Win98, NT batch files. ENVY will work under Windows NT/2000 if COMMAND.COM is used as the batch processor. ENVY is a stand-alone program that provides 38 new subcommands for use in batch files ( spanning string-manipulation, mathematics, bitwise operations, comparsions, date & time functions, random numbers, file | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Lawless | Size: 24 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
219. | File Spy 3.0 (soft9000.com) | ||
friend (lets call him Robert) had a sad story to tell: It seems that he has an employer that changed the rules half way into his tenure on the job. After having been forced to sign an agreement that Bob would not have done when he had several competitive job offers pending, he exclaimed: "It's not | |||
Updated: 9, 2005 | Rating: 0 | Author: R. Nagy | Size: 1484 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
220. | Copy This Path 1.0 (camtech2000.net) | ||
you work a lot with the paths to files or folders like I do, this can be a time saving tool. This will add the command 'Copy This Path' to the right click context menu in Windows Explorer to copy the full path of a file or folder to Windows Clipboard. The additional option 'Auto | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Campbell | Size: 391 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
|
Home > A i software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|