|
||||||
|
||
|
Home > Key fields software |
Related keywords: fields, custom fields, IBE LOG FIELDS, custom database fields, Text to fields, form fields |
|
|
231. | Universal Plug-and-Play Tester 1.0 (Build 6.5) (noeld.com) | ||
Universal Plug-and-Play Tester is an experimental tool which lists all the available Internet Gateway Devices (IGDs) compatible with the Universal Plug-and-Play protocol. As soon as the program starts, it searches for available devices. You can enumerate the devices again at any time by clicking the Discover As soon as the program starts, it searches for available devices | |||
Updated: 9, 2005 | Rating: 0 | Author: Noel DANJOU | Size: 87 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
232. | RegWorks 1.3.2 (regwrks.com) | ||
and inactive (unloaded) ones. The program can also compare registry keys. In addition, RegWorks also monitors registry access. It displays names of applications and processes that access registry keys and logs all relevant data (returned function code, registry key accessed, registry values etc.). This feature is critical to quickly diagnosing and solving any access | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Loskutov | Size: 896 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
233. | RemoteExec 3.07 (isdecisions.com) | ||
Explorer version, Service Pack level, or a specific registry value/key. - Create and save RemoteExec actions and target computer lists as templates for future use. - Detailed activity result logging. - Command line mode, to remotely run RemoteExec actions from a script or with the task | |||
Updated: 9, 2005 | Rating: 0 | Author: Alastair Volrath | Size: 527 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
234. | Rocket Retriever 3.0 (pankhurst.com) | ||
Retriever organizes your computer's files into an easy to search list. Enter partial or full names to view all files with matching text in their names, ready to run or open. And pressing the Enter key on the entry runs the program, or launches your favorite program to let you view or edit the file. For example, typing in CAT lets you look for cat pictures, Once | |||
Updated: 9, 2005 | Rating: 0 | Author: David Pankhurst | Size: 707 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
235. | Search Engine Optimizer Optimiser 2.1 (clickok.co.uk) | ||
keyword web pages. Easy to use. Master in five minutes. Design key word web pages. Web site promotion. search engine optimization, optimisation - optimize optimise search engine listing ranking placement ensure. Instantly create keyword web pages. Easy to use. Master in five minutes. Design keyword web pages site | |||
Updated: 9, 2005 | Rating: 0 | Author: Kal Bashir | Size: 18400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
236. | Secura Backup Professional 2.13 (cmfperception.com) | ||
even E-Mail addresses. Using Blowfish encryption with a 128 bit key Secura Backup achieves the same level of security that banks use for their online services and is even suitable for military operations. Secure backups are a requirement in any profession that involves sensitive or classified data. Secura Backup offers scheduling features which are completely customizable and | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
237. | Secure Password Store 0.91 (lmphotonics.com) | ||
password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered To" and "Password" fields are encrypted. - Print out of database. - Export Database to CSV format in encrypted format | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 627 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
238. | On-Time Operator 03.02 (isuru.com) | ||
Operator is the key to unattended execution of computer operations. The core application has the facility to run a computer program, such as .exe, .bat, music files, etc., at predetermined intervals (e.g., every 20 minutes) or at a given time of the day. An advanced graphical user interface enables the user to intuitively navigate the application and specify selections of choice | |||
Updated: 9, 2005 | Rating: 0 | Author: L Dias | Size: 1143 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
239. | Password Fortress 1.01 (passwordfortress.com) | ||
have to worry about forgetting passwords or losing registration keys again. Password Fortress manages all your private information in a single application. Your sensitive information is protected with strong 256-bit Rijndael encryption and can only be accessed using your secret password. Password Fortress can be configured to store any type of information you like, such as | |||
Updated: 9, 2005 | Rating: 0 | Author: Donovan Dunning | Size: 3799 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
240. | Password Officer DeLuxe 5.0 (compelson.com) | ||
fills in the URL, waits until the page is loaded, fills in all fields, and finally clicks the proper button. -web-content scanner -automatic recognition of the page and filling in the fields -automatically clicks the necessary buttons -also menu-based choice of links Why is the Password Officer so useful? -stores all your passwords and log-in sequences -compresses | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
|
Home > Key fields software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|