|
||||||
|
||
|
Home > Shared drive software |
Related keywords: drive, shared, hard drive, Drive, scenic drive, hard drive backup, virtual drive, erase hard drive, flash drive, shared mailbox |
|
|
221. | StormWindow 95 4.55 (cetussoft.com) | ||
use of StormWindow security measures will allow secure use of any shared Windows 95 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of desktop changes; hiding individual drives in | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1457 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
222. | StormWindow 98 5.14 (cetussoft.com) | ||
use of StormWindow security measures will allow secure use of any shared Windows 98 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of desktop changes; hiding individual drives in | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
223. | StormWindow Me 6.02 (cetussoft.com) | ||
use of StormWindow security measures will allow secure use of any shared Windows Me computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of desktop changes; hiding individual drives in | |||
Updated: 9, 2005 | Rating: 16 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
224. | StormWindow NT 2.14 (cetussoft.com) | ||
use of StormWindow security measures will allow secure use of any shared Windows NT computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of desktop changes; hiding individual drives in | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1283 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
225. | System Monitor 1.4.1 (rundegren.com) | ||
on a network. It can monitor the usage of CPU, Memory, Disk Drives and Network Adapters and notify you when a certain resource exceeds a certain value. You can set it up to log events and create usage reports to databases located anywhere on your network. You can also search remote computers for files, folders or running processes and delete or terminate these with ease. By | |||
Updated: 2, 2006 | Rating: 0 | Author: -- -- | Size: 860 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
226. | Total Control 2.3 (icxr.com) | ||
and connections, fix Windows options, change all your system and drives' icons and finally dive deeper into your system and boost your Windows performance by configuring memory and critical settings. In addition, six addins for Total Control are available for free by installing this software. Hundreds of hidden | |||
Updated: 9, 2005 | Rating: 0 | Author: Panos Koutsoukeras | Size: 2356 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
227. | Trash it! 1.71 (trashituninstaller.com) | ||
or the net, and if you are tired of having them mess up your hard drive with files you don't really need, then Trash it! is for you. Use Trash it! to free up your hard drive of files that you have no need for, thus leaving more space for the files that you really need. Just run Trash it! once before you install a program and it will take a snapshot of all files present in | |||
Updated: 8, 2004 | Rating: 42 | Author: Mustafa Lokhandwala | Size: 1691 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
228. | Tray Safe 4.3 (traysafe.com) | ||
(yours). Should someone access your PC or make a copy of your hard-drive, they won't be able to launch or hack the program. In addition, Tray Safe offers a wide choice of wold's most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password manager is just as convenient as it is secure. It works with all types of passwords, web (including custom | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
229. | TreeSize Free 1.77 (jam-software.com) | ||
TreeSize Free can be started from the context menu of a folder or drive and shows you the size of this folder, including its subfolders. Each folder can be expanded in Explorer-like style to see the size of its subfolders. Scanning is done in a thread, so you can already see results while TreeSize is working. The space, which is wasted by the file system can be displayed and the | |||
Updated: 2, 2006 | Rating: 42 | Author: Joachim Marder | Size: 686 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
230. | Acronis True Image 9.0 (acronis.com) | ||
option which enables you to create an image of your entire hard disk drive, including the operating system, applications, user settings, and all data. Use the image to restore your PC to a known working state without any reinstallation. 2) A new file-based backup option which enables you to backup and | |||
Updated: 2, 2006 | Rating: 139 | Author: Acronis | Size: 38022 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Shared drive software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|