|
||||||
|
||
|
Home > Watch list software |
Related keywords: list, watch, mailing list, to do list, List, mailing list manager, Watch, distribution list, drop down list, password list |
|
|
231. | CopyLock 1.08 (noeld.com) | ||
files to update, click Apply, restart and that's it! You can also list and edit the pending operations from the system after you ran an installer or view the processes which use the locked files. Disclaimer: you can crash your system or make it unbootable if you are not careful, use at your own risk | |||
Updated: 9, 2005 | Rating: 0 | Author: Noel DANJOU | Size: 121 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
232. | Crime Catcher 2.1 (crime-catcher.com) | ||
for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Every single pixel being monitored for change. Hide Crime Catcher completely from view! Can appear in the system tray, taskbar, both, or neither - completely hidden from view! Email notifications with attachments Have emails of what the webcam has | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
233. | D_back 1.60.3 (backupforall.com) | ||
stack) for any kind of your data. The management of of the file list is simple and flexible. Included and excluded files are specified separately, wildcards (* ?) are allowed in all paths and file names. The program is ideal for automatic unattended backing up. The software distribution kit contains command-line backup utility and backup scheduler which allow you to organize | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
234. | Dekart Private Disk 2.07 (dekart.com) | ||
program fails to protect the system. Now you can create a white-list of applications, only these programs will be allowed to access the contents of the encrypted drive. This feature protects your data from external threats, as well as internal ones: group leaders can be sure that employees are able to access sensitive information while doing their job, but they cannot copy it, or use | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
235. | Desktop Resetter 1.7.2 (nouturn.com) | ||
each resolution and with a click of a button you can sit back and watch everything fly back into place! Desktop Resetter is an easy-to-use program designed to save/remember desktop item positions (icons, windows, popup windows, application switcher, etc.). If they change or move, they can be | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Damato | Size: 809 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
236. | Desktop Scout 4.0 (globalpatrol.net) | ||
remotely from the comfort of your own workstation. You can even watch or control the users desktop, transfer files, start and stop programs, launch web sites and documents, log off, restart or shutdown the computer remotely. Beyond surveillance, Desktop Scout allows you to block access to any program, document or web site based on the current user. You can simply deny access | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
237. | DeviceLock 5.73 (ntutility.com) | ||
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
238. | Disk and Registry Alert 2.09 (softdd.com) | ||
are installed without your knowledge. You can also create and save lists of each comparison so that you may reference these changes later, and you have the option to print if you wish. Uninstalls tend to leave many garbage files behind, and many programs install extra files or folders, adware, or | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftDD Software | Size: 707 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
239. | Dr.Web Anti-Virus for Workstations 4.31.a (advancedforce.com) | ||
Dr.Web® Anti-Virus for Workstations provides a powerful and reliable anti-virus protection for your personal computer. If run with default settings, Dr.Web® automatically scrutinizes all possible ways of the viral intrusion, blocks and reports any malicious behaviors. The user may entrust Dr.Web® to | |||
Updated: 3, 2005 | Rating: 0 | Author: Igor Daniloff | Size: 4253 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
240. | EF Duplicate Files Manager 3.21 (efsoftware.com) | ||
Or you give that only such files are to be specified in the result list, which exhibit additionally the same file size. If necessary, the EF Duplicate Files Manager can analyze even the file content. It indicates then only dupes, which are absolutely identical. The EF Duplicate Files Manager looks if desired in multiple drives or multiple paths for dupes. Beyond that it is able to | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1854 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Watch list software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|