|
||||||
|
||
|
Home > Client invoicing software |
Related keywords: client, invoicing, ftp client, email client, Invoicing, Client, ssh client, FTP Client, client server, nfs client |
|
|
211. | Backup4all 3.0 (backup4all.com) | ||
Backup4all is an award-winning backup software for Windows. Backup4all protects your valuable data from partial or total loss by automating backup tasks, password protecting and compressing it to save storage space. Using Backup4all you can easily backup to any local or network drive, backup to FTP (with | |||
Updated: 2, 2006 | Rating: 24 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
212. | Backupper Standard 5.1 (backupper.com) | ||
Backupper is a powerful and flexible data backup utility. It allows to easily create backup copies of important data even for inexperienced users. However it will help professionals as well by providing an efficient way to automate regular backups of large amount of data on a flexible schedule. Backupper | |||
Updated: 9, 2005 | Rating: 0 | Author: Develepers Team | Size: 1861 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
213. | Batch Rename .EXE 1.0.48 (stintercorp.com) | ||
Tired of renaming your files by hand? This wizard makes the busywork that invariably comes with downloading and managing media files disappear. Run your file list through an extensive array of filename filters to ensure your files are labeled and organized exactly how you want them. Rename files using filters | |||
Updated: 2, 2006 | Rating: 16 | Author: SoftTech InterCorp | Size: 977 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
214. | BCWipe 3.07.2 (jetico.com) | ||
BCWipe ensures that another person will not restore files you have deleted from a disk. When you delete sensitive files from a disk on your computer, Windows does not erase the contents of these files from the disk - it only deletes 'references' to these files from filesystem tables. Contents of the deleted | |||
Updated: 9, 2005 | Rating: 24 | Author: Jetico Inc. | Size: 2651 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
215. | BitDefender Professional 6.4.3 (bitdefender.ro) | ||
users to enjoy their data protection as they move to the future's technologies. Besides the complete antivirus protection, features as Internet filtering or Privacy control help you stay away from troubles when browsing the Net. Benefits: * Filters all possible virus access ways * Blocks any virus, Trojan, Internet worm and other malicious code * Alerts you about | |||
Updated: 3, 2005 | Rating: 117 | Author: Monica Gheorghiu | Size: 8900 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
216. | Chilkat Zip Self-Extractor 8.1.0 (zip-compression.com) | ||
is regarded by security experts as being unsecure. Chilkat's streaming compression and encryption technology allows the ChilkatZip Self-Extractor to create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your end-user's computer, even if that computer has very little | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 300 kb | Freeware Go to category: Development > Other Similar programs | |||
217. | ChilkatZip Self-Extractor 1.0.0 (chilkatsoft.com) | ||
is regarded by security experts as being unsecure. Chilkat's streaming compression and encryption technology allows the ChilkatZip Self-Extractor to create an EXE from any size ZIP file. The streaming compression and decryption technology also ensures that it will be possible to unzip the archive on your end-user's computer, even if that computer has very little | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 228 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
218. | Cipherlok 2.1 (softlok.com) | ||
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
219. | Clone 2.1.0 (newtonsoftware.co.uk) | ||
Clone allows you to backup your files. Clone can be run as either a screen saver or as a standard windows utility. Run as a screensave, clone backups up the data that is important to you while you take a break from your computer. This ensures you have a copy of your most important files backed up. Clone | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Newton | Size: 3847 kb | Demo Go to category: System Utilities > Other Similar programs | |||
220. | Comparator 2.2 (softbytelabs.com) | ||
Comparator will finds, deletes and copies over duplicate files, it will also find missing files and perform full backup routines. It will shows you a side by side list of the contents of any two files so you can see what is missing and what is new. It can easily sync the files to ensure a perfect match. And | |||
Updated: 9, 2005 | Rating: 42 | Author: M. Purkhardt | Size: 508 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Client invoicing software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|