|
||||||
|
||
|
Home > Best buy software |
|
|
221. | Private Encryptor 6.2 (tropsoft.com) | ||
an extremely flexible and easy to use interface. Files/Folders can be Encrypted, Decrypted or Shredded right from the Windows Explorer when you right click. Since the Stealth Decryptor can be downloaded free from our website, the receiver of an encrypted email message does not have to buy the program. The latest in encryption technology to protect your sensitive data | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
222. | Tech-Pro Utilities Collection 1.1 (tech-pro.net) | ||
Safe, Tech-Pro Zip, Clock Sync and many more. No Windows user should be without this suite of tools. They're free to use without registration, but if you like them, become a registered user in exchange for a donation. The Tech-Pro Utilities Collection contains 12 of the most popular utilities. You get | |||
Updated: 9, 2005 | Rating: 0 | Author: Julian Moss | Size: 1374 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
223. | TEXTools 2.2 (fireflysoftware.com) | ||
expressions and they can either operate on the entire input text or be limited to just isolated blocks of text. TEXTools can be invoked from batch files using TEXTools Command Line (TCL), or automated from languages such as VBScript, JScript, Perl, Python, Visual Basic, Delphi, C++, etc. Why write code to process text when you can "pipe" it? While the other guys are still | |||
Updated: 9, 2005 | Rating: 571 | Author: Barry Block | Size: 1026 kb | Shareware Go to category: Development > Other Similar programs | |||
224. | Tri Text Tools 2.2 (isvs.tripod.com) | ||
an average PC. In the case of NLX edit, backups can automatically be made to preserve original content of files. NLX handles text files of UNIX or MAC format and automatically converts their new-line sequences over to IBM-PC format in a safe and controlled manner. STRINGS can extract text from | |||
Updated: 9, 2005 | Rating: 63 | Author: Anunga Muhummud | Size: 185 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
225. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
the occurrence of all critical events for corrective measures to be taken, manually or automatically, thus avoiding any undesired consequences. Sentry Pro Version features customized monitoring objects for servers (MS Exchange, MS SQL, MS IIS, MS ISA) and for OS Platforms (Windows 2000, NT, XP). Due to it's web based interface Sentry Pro can be configured and | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
226. | Paragon NTFS for Linux 2.0 (pad.paragon.ag) | ||
or have already changed the default kernel, you will not probably be able to use this driver. If you are interested in buying or evaluating Paragon NTFS for Linux driver for any Linux distribution you should go to http://www.ntfs-linux.com/index.htm. Note: This package contains Paragon NTFS for Linux demo version as well. The demo version mounts NTFS partitions in read-only | |||
Updated: 9, 2005 | Rating: 0 | Author: Konstantin Komarov | Size: 2447 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
227. | Password Protect 3.4 (password-protect-software.com) | ||
That's all there is to do - the folder is protected. Should your PC be rebooted in Windows Safe Mode, DOS or another operating system, your data is safe. Unlike other utilities, Password Protect never stores passwords on your hard drive or in the Windows registry, where malicious users can easily get | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Tolliver | Size: 760 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
228. | ProfileLink 3.00 (heptasoft.com) | ||
this, but none of them ware fully automatic. One way to do it could be to let the user select the profile when the mail client was launched, another could be to create a number of batch files that the user could invoke depending on his or her current location. The last method we will mention here is one that seems to be widely used and it relies on creating multiple | |||
Updated: 9, 2005 | Rating: 0 | Author: Jack Jensen | Size: 824 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
229. | Protector Plus for Exchange 7.2.F02 (protectorplus.com) | ||
the infected emails. Protector Plus ensures that the network will be free of viruses that spread through email. Protector Plus detects emails infected by all types of viruses, trojans and worms before they reach the user's inbox. Protector Plus for Exchange is packed with many useful features like remote management, email alerts, InstaUpdate, quarantine, compressed files scanning and | |||
Updated: 9, 2005 | Rating: 0 | Author: Kartheek S | Size: 2949 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
230. | MindSoft FreeRAM 4.0b (mindsoftweb.com) | ||
version has been optimized to work under Windows XP, obtaining the best results running its applications. Buy FreeRAM right now and your PC applications will go faster than ever. While using your PC, the executed programs and the used files are taking part of your RAM memory, progresively slowing down your equipment. MindSoft FreeRAM can recover the lost memory to make your | |||
Updated: 9, 2005 | Rating: 124 | Author: Javier Rodriguez | Size: 1926 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Best buy software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|