|
||||||
|
||
|
Home > Complement software |
Related keywords: winrar complement |
|
|
241. | Evidence Destructor 2.14 (emailarms.com) | ||
When you are working on your computer performing the day to day activity like surfing the Internet, paying your bills online and logging into the websites with passwords, your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures you | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
242. | Event Log Watchdog 3.0 (keroonsoftware.com) | ||
Event Log Watchdog monitor's your Windows Event Logs and notifies you via Email or Syslog when a new event is logged. You can define which Event Logs you wish to monitor and what types of events you wish to receive Email notification of. One license per machine. Event Log Watchdog monitor's your Windows Event | |||
Updated: 2, 2006 | Rating: 0 | Author: Rob Rhodes | Size: 7224 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
243. | EF Process Manager 3.41 (efsoftware.com) | ||
What the Process Manager is and what you can do with it: * you can easily see what’s happening behind the desktop * which processes are running on your computer * you can see all modules which are loaded, or only those used by a particular process * you’re the master: Process Manager lets you close | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1156 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
244. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
Protect your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
245. | DirSize 4.7.1 (crystalsoftware.com.au) | ||
Command line tool that can easily be automated to generate nightly reports of disk space usage, network space hogs and very large folder trees. Reports can be sorted and small folders can be prevented from being displayed. Both 32 bit and 16 bit versions are included, all support long filenames. Full | |||
Updated: 2, 2006 | Rating: 0 | Author: Simon Carter | Size: 760 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
246. | D_back 1.60.3 (backupforall.com) | ||
D_back is a data backup tool designed to automate reserving of your critical data and saving backups to any type of storage media including CD / DVD and remote FTP servers. The program can help you to protect your data from computer crashes, accidental deletion, virus damages, and ensure you will never lose | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
247. | D_back 1.60.3 (svap.pp.ru) | ||
D_back is a data backup tool designed to automate reserving of your critical data and saving backups to any type of storage media including CD / DVD and remote FTP servers. The program can help you to protect your data from computer crashes, accidental deletion, virus damages, and ensure you will never lose | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
248. | Cursor Hider 1.4.4 (softexe.com) | ||
Cursor Hider helps you to work more productively. It removes the mouse pointer (the mouse cursor does not cover the entered text) while you are working with the keyboard and returns the pointer with any mouse action. Real example: You are going to visit aweb site with forms to fill in. At first you type the | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
249. | CryptIt 1.301 (SinnerComputing.com) | ||
Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
250. | CopyCat 4.1.27 (hahntech.com) | ||
CopyCat: Protect your valuable data and software! Easy to use, powerful backup utility with sophisticated scheduling capability by source file or folder. Copy local or remote files and folders to local or remote destinations in original folder/file structure or as a standard "zip" archive. Optional labels and | |||
Updated: 2, 2006 | Rating: 104 | Author: Tom Hahn | Size: 1184 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Complement software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|