|
||||||
|
||
|
Home > Completion software |
Related keywords: automatic code completion, automatic statement completion, word completion, auto completion |
|
|
241. | Evidence Destructor 2.14 (emailarms.com) | ||
later, you don't have to type a whole name and you don't have to complete forms and enter passwords again. In many cases it is done for your ease of use, but the problem with that is you compromise on your security when you use all these features. If somebody were to look at your PC, which happens quite often. For example your wife wanted to use it for something, or your kids would | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
242. | Event Log Watchdog 3.0 (keroonsoftware.com) | ||
Event Log Watchdog monitor's your Windows Event Logs and notifies you via Email or Syslog when a new event is logged. You can define which Event Logs you wish to monitor and what types of events you wish to receive Email notification of. One license per machine. Event Log Watchdog monitor's your Windows Event | |||
Updated: 2, 2006 | Rating: 0 | Author: Rob Rhodes | Size: 7224 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
243. | EF Process Manager 3.41 (efsoftware.com) | ||
or kill any running process * register and unregister modules * complete information about process and modules * see Windows error codes * consult environment variables * search for modules on the disk * export the information for further use in Excel So, with one quick look you can see | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1156 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
244. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet history, Web pages and pictures from sites visited on the Internet, unwanted cookies, chatroom conversations, deleted e-mail messages, temporary files | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
245. | DirSize 4.7.1 (crystalsoftware.com.au) | ||
your favourite spreadsheet for further analysis Showing you the complete folder tree Command line tool that can easily be automated to generate nightly reports of disk space usage, network space hogs and very large folder trees. Reports can be sorted and small folders can be prevented from being | |||
Updated: 2, 2006 | Rating: 0 | Author: Simon Carter | Size: 760 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
246. | D_back 1.60.3 (backupforall.com) | ||
and server systems. The results of all backup activities can be completely checked up at any time. The standard output of scheduled tasks, the history of all startups, errors and warning messages are registered in text log files. In addition exists possibility to notify user by e-mail about starting/ending, errors or warnings of each backup job. Reliable data-backup tool for any | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
247. | D_back 1.60.3 (svap.pp.ru) | ||
and server systems. The results of all backup activities can be completely checked up at any time. The standard output of scheduled tasks, the history of all startups, errors and warning messages are registered in text log files. In addition exists possibility to notify user by e-mail about starting/ending, errors or warnings of each backup job. Reliable data-backup tool for any | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
248. | Cursor Hider 1.4.4 (softexe.com) | ||
and nothing blocks the URL now. You can turn off the mouse pointer completely. This is a very useful option for touch screen devices. You will not see the cursor at all! Cursor Hider helps you to work more productively. It removes the mouse pointer from the working position (so that the mouse cursor | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
249. | CryptIt 1.301 (SinnerComputing.com) | ||
use this file only once, this is known as a one-time pad and it is completely unbreakable, even to computers 1000 years from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted any part of the file. Thus attempts to decrypt | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
250. | CopyCat 4.1.27 (hahntech.com) | ||
on matching differential and incremental items when standard copy completed. Optional folder and/or file exclusion capability (with "wildcard" specifications). Optional file or folder date/time stamps to avoid overwriting previous backups. Extensive logging to verify activities and monitor potential problems. Easy selection of one or multiple source items and creation of the desired | |||
Updated: 2, 2006 | Rating: 104 | Author: Tom Hahn | Size: 1184 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Completion software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|