|
||||||
|
||
|
Home > Acrobat key software |
Related keywords: acrobat, Acrobat, Adobe Acrobat, adobe acrobat, Adobe Acrobat Reader, search adobe acrobat, compare adobe acrobat, index adobe acrobat, Acrobat file |
|
|
231. | Universal Plug-and-Play Tester 1.0 (Build 6.5) (noeld.com) | ||
Universal Plug-and-Play Tester is an experimental tool which lists all the available Internet Gateway Devices (IGDs) compatible with the Universal Plug-and-Play protocol. As soon as the program starts, it searches for available devices. You can enumerate the devices again at any time by clicking the Discover As soon as the program starts, it searches for available devices | |||
Updated: 9, 2005 | Rating: 0 | Author: Noel DANJOU | Size: 87 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
232. | RegWorks 1.3.2 (regwrks.com) | ||
and inactive (unloaded) ones. The program can also compare registry keys. In addition, RegWorks also monitors registry access. It displays names of applications and processes that access registry keys and logs all relevant data (returned function code, registry key accessed, registry values etc.). This feature is critical to quickly diagnosing and solving any access | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Loskutov | Size: 896 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
233. | RemoteExec 3.07 (isdecisions.com) | ||
Explorer version, Service Pack level, or a specific registry value/key. - Create and save RemoteExec actions and target computer lists as templates for future use. - Detailed activity result logging. - Command line mode, to remotely run RemoteExec actions from a script or with the task | |||
Updated: 9, 2005 | Rating: 0 | Author: Alastair Volrath | Size: 527 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
234. | Rocket Retriever 3.0 (pankhurst.com) | ||
Retriever organizes your computer's files into an easy to search list. Enter partial or full names to view all files with matching text in their names, ready to run or open. And pressing the Enter key on the entry runs the program, or launches your favorite program to let you view or edit the file. For example, typing in CAT lets you look for cat pictures, Once | |||
Updated: 9, 2005 | Rating: 0 | Author: David Pankhurst | Size: 707 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
235. | Search Engine Optimizer Optimiser 2.1 (clickok.co.uk) | ||
keyword web pages. Easy to use. Master in five minutes. Design key word web pages. Web site promotion. search engine optimization, optimisation - optimize optimise search engine listing ranking placement ensure. Instantly create keyword web pages. Easy to use. Master in five minutes. Design keyword web pages site | |||
Updated: 9, 2005 | Rating: 0 | Author: Kal Bashir | Size: 18400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
236. | Secura Backup Professional 2.13 (cmfperception.com) | ||
even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure backups are a requirement in any profession that involves sensitive or classified data. Secura Backup offers scheduling features which are completely customizable and | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
237. | Secure Password Store 0.91 (lmphotonics.com) | ||
password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered To" and "Password" fields are encrypted. - Print out | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 627 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
238. | On-Time Operator 03.02 (isuru.com) | ||
Operator is the key to unattended execution of computer operations. The core application has the facility to run a computer program, such as .exe, .bat, music files, etc., at predetermined intervals (e.g., every 20 minutes) or at a given time of the day. An advanced graphical user interface enables the user to intuitively navigate the application and specify selections of choice | |||
Updated: 9, 2005 | Rating: 0 | Author: L Dias | Size: 1143 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
239. | Password Fortress 1.01 (passwordfortress.com) | ||
have to worry about forgetting passwords or losing registration keys again. Password Fortress manages all your private information in a single application. Your sensitive information is protected with strong 256-bit Rijndael encryption and can only be accessed using your secret password. Password Fortress can be configured to store any type of information you like, such as | |||
Updated: 9, 2005 | Rating: 0 | Author: Donovan Dunning | Size: 3799 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
240. | Password Officer DeLuxe 5.0 (compelson.com) | ||
Password Officer offers a professional solution for all your password issues: generating, entering, storing, securing, changing, organizing, transporting and accessing. Security coupled with convenience: the strongest possible encryption, secure database of your most valued secrets, automatic logon to | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
|
Home > Acrobat key software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|