|
||||||
|
||
|
Home > Complaint software |
Related keywords: user complaint |
|
|
241. | Evidence Destructor 2.14 (emailarms.com) | ||
When you are working on your computer performing the day to day activity like surfing the Internet, paying your bills online and logging into the websites with passwords, your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures you | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
242. | Event Log Watchdog 3.0 (keroonsoftware.com) | ||
Log Watchdog monitor's your Windows Event Logs and notifies you via Email or Syslog when a new event is logged. You can define which Event Logs you wish to monitor and what types of events you wish to receive Email notification of. One license per machine. Event Log Watchdog monitor's your Windows Event Logs and notifies you via Email when a new event is logged. You can define | |||
Updated: 2, 2006 | Rating: 0 | Author: Rob Rhodes | Size: 7224 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
243. | EF Process Manager 3.41 (efsoftware.com) | ||
Manager is and what you can do with it: * you can easily see what’s happening behind the desktop * which processes are running on your computer * you can see all modules which are loaded, or only those used by a particular process * you’re the master: Process Manager lets you close normally | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1156 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
244. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
245. | DirSize 4.7.1 (crystalsoftware.com.au) | ||
Command line tool that can easily be automated to generate nightly reports of disk space usage, network space hogs and very large folder trees. Reports can be sorted and small folders can be prevented from being displayed. Both 32 bit and 16 bit versions are included, all support long filenames. Full | |||
Updated: 2, 2006 | Rating: 0 | Author: Simon Carter | Size: 760 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
246. | D_back 1.60.3 (backupforall.com) | ||
D_back is a data backup tool designed to automate reserving of your critical data and saving backups to any type of storage media including CD / DVD and remote FTP servers. The program can help you to protect your data from computer crashes, accidental deletion, virus damages, and ensure you will never lose | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
247. | D_back 1.60.3 (svap.pp.ru) | ||
D_back is a data backup tool designed to automate reserving of your critical data and saving backups to any type of storage media including CD / DVD and remote FTP servers. The program can help you to protect your data from computer crashes, accidental deletion, virus damages, and ensure you will never lose | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
248. | Cursor Hider 1.4.4 (softexe.com) | ||
with forms to fill in. At first you type the URL in the browser's address bar - www.softexe.com. What do you think about the dot behind softexe? To be or not to be (already typing)? For URL checking you have to take mouse and move the mouse pointer to the side of the screen. With Cursor Hider the | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
249. | CryptIt 1.301 (SinnerComputing.com) | ||
Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
250. | CopyCat 4.1.27 (hahntech.com) | ||
CopyCat: Protect your valuable data and software! Easy to use, powerful backup utility with sophisticated scheduling capability by source file or folder. Copy local or remote files and folders to local or remote destinations in original folder/file structure or as a standard "zip" archive. Optional labels and | |||
Updated: 2, 2006 | Rating: 104 | Author: Tom Hahn | Size: 1184 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Complaint software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|