|
||||||
|
||
|
Home > User names software |
Related keywords: user, names, user interface, multi user, Multi user, user friendly, domain names, end user, User Interface, User Interface Components |
|
|
211. | Disk Order 5.00 (yildun.com) | ||
folders, Make a new directory, file, Association - add, remove, use default, File attributes - add, change, Search for files, search for text, remove unwanted files, ZIP and Unzip utility with preview and file add remove from an archive, GZip compression utility, ARJ decompression and preview, Copy larger files on multiple floppy disks, Execute programs, Shell execute programs with | |||
Updated: 2, 2006 | Rating: 0 | Author: Samir Alicehajic | Size: 1076 kb | Shareware Similar programs | |||
212. | Directory Snoop 5.02 (briggsoft.com) | ||
Snoop is a cluster-level search tool that lets Windows users snoop through their FAT and NTFS formatted disk drives to see what data may be hiding in the cracks. Use Directory Snoop to recover deleted files you thought you would never see again or permanently erase sensitive files so that no one will know they ever existed. Supported media include local hard drives, floppy | |||
Updated: 2, 2006 | Rating: 0 | Author: Kent Briggs | Size: 1534 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
213. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
SecureFile 3.1 is an easy to use encryption and compression program, which is able to encrypt your personal files and sensitive data quickly, easily and securely. In addition to encryption, SecureFile creates self-decrypting exe - files which anybody with the right password / certificate can decrypt, even if SecureFile is not installed on the target system. DevSolutions | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
214. | Deletor 3.1 (basta.com) | ||
disks clean by deleting or shredding files corresponding to file name patterns or extensions that you specify. Deletor also has support for filter packs, which allow you to store sets of your most commonly used file deletion specifications. Combine this with file date filtering and command line access to the program, and you can easily automate the cleaning process with batch | |||
Updated: 2, 2006 | Rating: 82 | Size: 458 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
215. | Delenda 2.415 (peccatte.karefil.com) | ||
Bin - transfer aged data toward an archive folder. Can be used to dispatch files, monitors number of files in each structure. It lets you define daily purge time and exclude some days of the week. With Delenda you can suppress files in one directory when they reach 7 days, transfer those that have more than 12 hours to another directory and move those documents not | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
216. | D_back 1.60.3 (backupforall.com) | ||
separately, wildcards (* ?) are allowed in all paths and file names. The program is ideal for automatic unattended backing up. The software distribution kit contains command-line backup utility and backup scheduler which allow you to organize automatic data processing on both personal computers and server systems. The results of all backup activities can be completely checked up at | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
217. | D_back 1.60.3 (svap.pp.ru) | ||
separately, wildcards (* ?) are allowed in all paths and file names. The program is ideal for automatic unattended backing up. The software distribution kit contains command-line backup utility and backup scheduler which allow you to organize automatic data processing on both personal computers and server systems. The results of all backup activities can be completely checked up at | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
218. | CryptIt 1.301 (SinnerComputing.com) | ||
file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
219. | Catfood Desktate 2.20.0127 (catfood.net) | ||
cloud data and optional layers including political borders and place names. The continuously updated result can be set as your desktop wallpaper or used as a screensaver. Desktate features include: The terminator between day and night is continuously calculated; you can see sunrise and sunset around the world and observe the changing seasons throughout the year. Desktate | |||
Updated: 2, 2006 | Rating: 0 | Author: Catfood Software | Size: 11559 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
220. | Broken Cross Disk Manager 3.81 (broken-cross.com) | ||
JAR, RAR, TAR and ZIP archives. You can easily manage your data by using folders or categories. Give items in your database a description, a comment, an image thumbnail or other information, to identify them more easily. Add password-protection to protect items in your database. To search for files | |||
Updated: 2, 2006 | Rating: 0 | Author: Kevin Fucik | Size: 893 kb | Shareware Similar programs | |||
|
Home > User names software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|