|
||||||
|
||
|
Home > Key software |
|
|
251. | Advanced Security Administrator 10.14 (softheap.com) | ||
Printers, System and Internet Options. You can disable your boot keys, context menus, DOS windows, Registry editing, Internet and Network access. Hide your desktop icons, individual drives, Start menu items, or even the entire taskbar. You can also apply password protection to Windows and restrict users to running specific applications only, Control Internet Usage, view statistics of | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
252. | Advanced Registry Tracer 2.04 (elcomsoft.com) | ||
Tracker lets you save frequently examined or modified Registry Keys, Values and Data as bookmarks so you can easily work with them at a moment's notice. ART lets you efficiently install the same software to many machines on a network with just a few keystrokes. Simply install the software on one machine, make a REG file of all the changes to the Registry, then copy that REG file | |||
Updated: 2, 2006 | Rating: 706 | Author: Vladimir Katalov | Size: 1733 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
253. | AcuteFinder 1.3 (hugmot.is) | ||
use, but corporate users have 15 days to evaluate. Free trial-key on request. AcuteFinder finds duplicate files on your computer. You can then delete or move the files to an archive directory, saving a lot of disk space. Fast and easy way to clean up your disks. Great tool for network administrators. Free | |||
Updated: 2, 2006 | Rating: 149 | Author: Ingolfur Tryggvason | Size: 2504 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
254. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
Screen Lock operates as follows: first it disables Windows system key combinations, such as Alt+F4, Ctrl+Alt+Del, Alt+Tab and WinKey and then shows security screen over your desktop that would not let anyone except you in without the proper password. Once the system keys are disabled, it is not | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
255. | Active Keyboard 3.1 (drive-software.com) | ||
applications, documents, and URLs, and over 80 other actions to hot keys - Create shortcut keys supporting both mouse and keyboard macros - Minimize any window to the system tray with this utility - Hide application windows by using a hotkey or an icon in the system tray - Control your Winamp player - Open, Play and Close your CD-ROM - Lock and Unlock your CD-ROM | |||
Updated: 2, 2006 | Rating: 144 | Author: Dmitri Drive | Size: 914 kb | Shareware Go to category: Desktop > Other Similar programs | |||
256. | Active Keys 2.31 (softarium.com) | ||
true? No! Softarium.com is here ready to offer its amazing Active Keys software that will turn your ordinary keyboard into full-blown remote controller for your entire system. That's right! No more miles of mouse moves and injured wrists, no more hassle and interface havocs! Just total control of | |||
Updated: 2, 2006 | Rating: 613 | Author: Softarium.com Softarium.com | Size: 1628 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
257. | Active Key Logger 3.0 (winsoul.com) | ||
Key Logger this is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Key Logger on your computer, it will allow you to make program settings for tracking activities on your computer. If you enable "Run Active Key Logger when windows start" then the program will run | |||
Updated: 2, 2006 | Rating: 242 | Author: Alex Atushev | Size: 703 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
258. | Cursor Hider 1.4.4 (softexe.com) | ||
Cursor Hider helps you to work more productively. It removes the mouse pointer (the mouse cursor does not cover the entered text) while you are working with the keyboard and returns the pointer with any mouse action. Real example: You are going to visit aweb site with forms to fill in. At first you type the | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
259. | Acronis Privacy Expert Suite 9.0 (acronis.com) | ||
and other malicious programs. Our latest version, 9.0, adds key new features to ensure that your PC is not infected with malware: - Rootkit removal automatically detects rootkits and enables users to remove these programs - Quarantine places detected spyware items to the quarantine store before removal - Enhanced malware shield allows you to set the level of protection you | |||
Updated: 2, 2006 | Rating: 169 | Author: Acronis | Size: 4335 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
260. | Access Lock 2.83 (getfreefile.com) | ||
to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only thing is available in this mode is a pop-up password-entry dialog with an input area for the password that restores your desktop to working condition. Access Lock enables | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Key software |
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|