|
||||||
|
||
|
Home > Meaning software |
Related keywords: name meaning, meaning of names, chinese meaning |
|
|
251. | LANMessage Pro 4.00 (dimaware.com) | ||
for communicating with other people on your network. It provides a means of communication that is faster than e-mail and is easier than yelling down the hallway. On all networks traffic is a concern, but LANMessage Pro has that taken care of. LANMessage Pro uses the built in messenger service called net send. Net send does not require you to connect to a server like most instant | |||
Updated: 2, 2006 | Rating: 42 | Author: Dima Sokoletsky | Size: 284 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
252. | Kiwi CatTools 2.2 (kiwisyslog.com) | ||
Free network management and device configuration tools. CatTools is a utility for managing network devices (routers, switches and firewalls). Automated configuration backups, password changes and scripted configuration commands. Supports Cisco, 3Com, Foundry, Extreme, Netscreen and PIX etc. Runs on Windows 98 | |||
Updated: 2, 2006 | Rating: 0 | Author: Kiwi Enterprises | Size: 4132 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
253. | Kiwi CatTools 2.2 (kiwisyslog.com) | ||
Free network management and device configuration tools. CatTools is a utility for managing network devices (routers, switches and firewalls). Automated configuration backups, password changes and scripted configuration commands. Supports Cisco, 3Com, Foundry, Extreme, Netscreen and PIX etc. Runs on Windows 98 | |||
Updated: 2, 2006 | Rating: 16 | Author: Kiwi Enterprises | Size: 4132 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
254. | Keylogger Hunter 2.1 (styopkin.com) | ||
of such process is an empty file of the keylogger, which by no means can contain data about pressed keys. Use of Keylogger Hunter allows you to be less dependent on freshness and completeness of the antivirus database, which can possibly contain no information about a rare version of a keylogger. Thus, you have an opportunity to install on your computer and use a special program | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexander Styopkin | Size: 611 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
255. | KGB Spy 3.93 (refog.com) | ||
of all keyboard activity. It allows you to monitor your children's activity at home or to make sure your employees do not use company's computers inappropriately. There are three versions of keylogger - Free KGB Key Logger, KGB Keylogger and KGB Spy. Free KGB Key Logger is absolutely free, contains all basic features described above and is intended for non-commercial use at | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
256. | JUnitConv - Units Of Measure Converter 1.0.001 (tecnick.com) | ||
JUnitConv is an universal Units of Measure Converter, it converts numbers from one unit of measure to another. Built as a Java Applet, JUnitConv is platform-independent and highly-configurable, it supports an unlimited number of Units Categories, Units of Measure and Multiplier Prefixes that could be | |||
Updated: 2, 2006 | Rating: 0 | Author: Nicola Asuni | Size: 138 kb | Freeware Go to category: Web Development > Java & JavaScript Similar programs | |||
257. | JIT Scheduler 8.30 (gibinsoft.net) | ||
Document, System Shutdown or just Message (Remind). This means, that you can open document (e.g. picture, text or Web - page link etc.) as well as launch an application (.exe). You can also turn off your computer at the desired time and show text messages which remind about some important events. It is useful for scheduling different routines : virus scanning, disk checking | |||
Updated: 2, 2006 | Rating: 42 | Author: Igor V. Polyakoff | Size: 678 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
258. | IsoBuster 1.9 (smart-projects.net) | ||
your data. The use of alternative ways to get to the data means that you get the best out of your CD/DVD drive. Furthermore IsoBuster circumvents Windows and does everything by itself, it communicates directly with the devices and takes care of all the data interpretation. This means that it is not limited to what Windows can see and it is able to deal with all sorts | |||
Updated: 2, 2006 | Rating: 45 | Author: Peter Van Hove | Size: 2411 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
259. | Hide Files 3.4 (hide-files.biz) | ||
to protect them is to make files or folders invisible for another's eyes. Hide Files makes hidden any files and folders (or whole Windows folder or even all computer disks). Hide Files allows you to select any folders (and sub folders with files) of your choice to protect as hidden files and folders. You can select any folders on your computer or drag-and-drop the desired folders | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
260. | Hide Files 3.4 (spydex.com) | ||
to protect them is to make files or folders invisible for another's eyes. Hide Files makes hidden any files and folders (or whole Windows folder or even all computer disks). Hide Files allows you to select any folders (and sub folders with files) of your choice to protect as hidden files and folders. You can select any folders on your computer or drag-and-drop the desired folders | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Meaning software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|