|
||||||
|
||
|
Home > Discover software |
|
|
221. | My BootDisk 2.71 (zhangduo.com) | ||
faster, troubleshoots varieties of boot or crash problems and discover potential file damage. Windows NT technology based systems such as Windows NT4, Windows 2000, Windows XP will not be out of luck. My Boot Disk provides the solution of booting up Windows NT/2000/XP with only one floppy disk. This enables users to troubleshoot multiple operating system boot crash and boot | |||
Updated: 9, 2005 | Rating: 42 | Author: Duo Zhang | Size: 569 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
222. | Iside 1.3 (littlelite.altervista.org) | ||
a file, select Copy and by right clicking on another file you will discover if the two files are equal. Includes file comparison, hash generating tool plus a complete folder comparison tool. The hash function is the fingerprint of file. It allows to determine if two files are different even if their | |||
Updated: 9, 2005 | Rating: 0 | Author: Alessio Saltarin | Size: 628 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
223. | DWG2PDF PDF Converter 3.0 (webtech360.com) | ||
Discover dwg2PDF's easy-to-navigate explorer-friendly environment Navigate with ease in dwg2PDF's three-frame display. The dwg2PDF interface displays a file tree showing the contents of the users computer; identification of selected files by name, size, type, date, and time; and conversion radio | |||
Updated: 9, 2005 | Rating: 16 | Author: Jeff Lin | Size: 11737 kb | Demo Go to category: System Utilities > Other Similar programs | |||
224. | DynamicalPassword 1.1 (advmathappl.com) | ||
you personal password (key) and the date. It is also useful for discovering weak links in a complex security system with many passwords protected elements/units. With "Dynamical Passwords" you may generate passwords on any date (even each day). There is no need to remember or save all these generated passwords as far as you can remember you personal password (key) and the date. It | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor | Size: 11 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
225. | Find Protected 2.0 (aks-labs.com) | ||
in, you run the scan. The result of the inspection is a list of discovered password protected files. Date and Size filters in Find Protected allow you to speed-up the search process. You may require to search for recently created or changed files or find files of specific size. Once you have found password protected files, these can be copied to a separate folder for further | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
226. | File Monster 2.6.7 (nstarsolutions.com) | ||
place many computer savvy people will look when they are trying to discover sensitive information on your computer. Some important questions you have to consider: # When you delete files is the information in those files something you want just anyone to have access to? # When you leave your | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
227. | FileSpy Pro 2.0 (ic.net) | ||
Pro is a powerful file monitoring utility for Novell file servers. Discover how many users opened a file, the length of time a user had a file open, how many times a user opened a file, the average length of time a user had a file open, etc. With FileSpy Pro you can also send messages to users, clear user's connections, unlock locked files, get extended file information, and run | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2322 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
228. | FlagRASH 1.0 (sente.co.uk) | ||
because of our own experience of copying files from CD's and discovering they are all read-only. The problem is that there is no way to clear flags across multiple folders under Windows. With this application, thousands of files and folders in hundreds of folders can all have their read-only attribute changed in one click. It handles all or any of the four attribute flags | |||
Updated: 9, 2005 | Rating: 16 | Author: Nik Allday | Size: 342 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
229. | Amiasoft Password 3.3.6.22 (amiasoft.com) | ||
program exit, Full program help files. Download your trial copy and discover how it can make your life easier today! A tool to help ease your web-based existence! Not spyware - not adware! Just a great tool for the price! A few features include multi-user, Drag/drop, Passwords, Usernames, URL launch capability, random password creation and password | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Kidd | Size: 713 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
230. | Canary Standard 2005.01.28 (11) (alphalink.com.au) | ||
Discover how this monitoring program will help you monitor what your child does when using the home computer (programs run, files printed, programs installed,...), and while surfing the Internet (web sites visited, files downloaded, emails sent,...). Each order comes with a FREE report that contains | |||
Updated: 9, 2005 | Rating: 16 | Author: Serge Botans | Size: 848 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Discover software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|