|
||||||
|
||
|
Home > Determine software |
|
|
241. | EF CheckSum Manager 3.40 (efsoftware.com) | ||
If you send also a checksum file additionally, the receiver can determine on the basis the checksum whether the received files are OK or not. Also many files in the Internet are offered for the Download, e.g. Linux distributions in form of whole CD images, frequently with additional checksum files, often in the MD5 format. The EF CheckSum Manager makes possible to verify in a | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1220 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
242. | FileCheckMD5 00.02.01.10 (akamaisoftware.com) | ||
the checkfile data which can then be loaded in for testing to determine if the files have changed at all. Great for putting in the root folder of a CD-ROM to make sure the disc isn't defective when it is burned or mass produced. Simple utility to create checksum files based on the MD5 hash routine. Recursively scans a selected folder and creates the checkfile data which can then be | |||
Updated: 2, 2006 | Rating: 116 | Author: Brandon Staggs | Size: 280 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
243. | FileMap by BB 4.0.4 (dogkennels.net) | ||
If you had a record of files before and after, it would be easy to determine which files do not belong. FileMap by BB lets you take control of the growing number of files by making a record of those in the Windows, the System, and the Disk Root directories whenever you like, easily disclosing differences when compared. If ever secret files play havoc on your computer, you'll be | |||
Updated: 9, 2005 | Rating: 30 | Author: Bernie Madigan | Size: 144 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
244. | Hara-Kiri 2.02 (cyteg.com) | ||
of certain keys. If those keys are not being pressed, The files in a determined folders will be completely erased (without the possibility of reconstructing them with utilities like "UnErase" and "Undelete"). Once it deletes the folders it will delete itself from the disk so that the perpetrator has no | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
245. | HS CleanDisk Pro 5.00 (haysoft.com) | ||
They are intelligent because first, your windows system is determined automatically and then only relevant tasks to your operating system will be displayed. * Auto-detects low memory in the system and boosts performance by refreshing memory space. * Auto-runs at start-up, and surveys your system. * Increases free disk space INFORMATION * Shows Graphical System | |||
Updated: 8, 2004 | Rating: 42 | Author: Cenker Sisman | Size: 1207 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
246. | Iside 1.3 (littlelite.altervista.org) | ||
tool. The hash function is the fingerprint of file. It allows to determine if two files are different even if their size is the same. Ideal tool for configuration managers, programmers, deployers. Useful also to compare photos, music and movies downloaded from Internet. It can also be used for file integrity checking. Iside is a message digest computing tool. It can be used for file | |||
Updated: 9, 2005 | Rating: 0 | Author: Alessio Saltarin | Size: 628 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
247. | LaptopLocate.net 2.9.2 (tometasoftware.com) | ||
is turned on, the IP address of the computer is transmitted to a pre-determined location via email and logged for reference. This information is also transmitted to our servers and logged in the event your computer is ever stolen. LaptopLocate.net is helpful in finding where computers, especially | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 4839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
248. | MacPhoneHome 3.0 (pcphonehome.com) | ||
a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the local police and then notify the PC PhoneHome Command and Tracking Center, which will provide full tracking and recovery support. When the stolen computer goes online it will send a stealth message | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
249. | Auto ShutDown XP Professional 2003 (gillit.com) | ||
some key functions include: ShutDown Schedules Pre-determined shutdown can now be based on daily, weekly or a specific date schedule. Performance Counters - Conditional shutdown Performance Counters can now be used as conditional shutdown of the PC, for instance when the data download rate drops to zero bytes for five minutes. There can be over seven thousand | |||
Updated: 9, 2005 | Rating: 145 | Author: R Gill | Size: 1353 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
250. | NetSupport DNA 1.01 (aidsoft.com) | ||
most. Equally, having accurate inventory records is critical in determining how many users within the organization are actually utilizing certain applications. Paying particular attention to asset tracking will alert an organization to its infrastructure needs and highlight when to efficiently deploy IT solutions. Not only will this help to remove excess licensing and therefore trim | |||
Updated: 9, 2005 | Rating: 0 | Author: Jenni Hilton | Size: 48828 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Determine software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|