|
||||||
|
||
|
Home > Mercenary software |
|
|
221. | File & Folder Protector 2.33 (softheap.com) | ||
Protect Files and Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
222. | eXtended Task Manager 1.95 (warecase.com) | ||
give fast solutions for sudden problems which may arise in a product's functioning. - Debugging and improving application development. - A rich workstation investigation tool. - White box testing sessions for the QA department. - Investigation tool for integration possibilities. - And much | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Ritter | Size: 2464 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
223. | Easy2Sync for Files 1.11 (itsth.de) | ||
Do you have the same files on notebook and PC? Easy2Sync is the fast and easy method to make sure that the two computers (or FTP servers) are always in sync. Easy2Sync is easy to use and considers many special cases to protect your files when you synchronize the files. Easy2Sync was designed to regard many | |||
Updated: 2, 2006 | Rating: 39 | Author: Thomas Holz | Size: 2198 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
224. | Dupli Find 4.0 (rlvision.com) | ||
Dupli Find locates duplicate lines in textfiles, Excel spreadsheets and Word documents. Found duplicates are reported and can be easily removed from the file. Custom scripts can be used to narrow down the search for better results. Dupli Find can also be used as a general text utility that provides many | |||
Updated: 2, 2006 | Rating: 48 | Author: RL Vision | Size: 807 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
225. | DriveSitter 1.4 (otwesten.de) | ||
diagnostic and background monitoring tool. Based on the well proven S.M.A.R.T. (Self Monitoring Analysis and Reporting Technology), it constantly analyzes up to 30 health aspects per HDD and optionally displays its temperature in the system tray. DriveSitter reliably detects and forecasts up to 70% of all sudden HDD crashes before they occur: You will be alerted of unhealthy | |||
Updated: 2, 2006 | Rating: 16 | Author: Oliver Marr | Size: 1095 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
226. | DirSync Directory Synchronizer 3.0.4 (archersoft.com) | ||
DirSync is a powerful tool designed to backup, synchronize, replicate or restore files and folders smartly and quickly. It supports many powerful and flexible features, such as: run as service, remote administration, scheduling, simulation, e-mail reporting, filtering, unicode filename, validation, transfer | |||
Updated: 2, 2006 | Rating: 0 | Author: Frank Archer | Size: 2851 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
227. | DeviceLock 5.73 (ntutility.com) | ||
administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
228. | DeviceLock 5.73 (protect-me.com) | ||
administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
229. | CryptIt 1.301 (SinnerComputing.com) | ||
Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
230. | Cool Info FX 5.0 (tometasoftware.com) | ||
its detail, Network Administrators love it for the automation, CEO's love it for the price. Tometa Software, www.tometasoftware.com The Best System Information, Spy, Analysis, Auditing and Inventory Utility. Easy exporting to database and other formats including SQL & XML. Computers can use a central database to have a central network inventory of all systems on the | |||
Updated: 2, 2006 | Rating: 16 | Author: Luke Richey | Size: 12954 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Mercenary software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|