|
||||||
|
||
|
Home > Shared resources software |
Related keywords: resources, human resources, shared, Resources, shared mailbox, human resources software, Educational Resources, System Resources, GDI Resources, system resources |
|
|
261. | Change Folder Icons 5.6 (nesoft.org) | ||
Icon" from popup menu. You can search for icons in all types of resource files starting with the selected folder. Also you can: -select an icon from any type of resource files; -export all icons from resource files into .ico-files; -change an icon for a drive (HDD, FDD | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Lyapunov | Size: 904 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
262. | Change Folder Icons 6.0 (nesoft.org) | ||
You can search for icons with specified parameters in all types of resource files starting with the selected folder. Also you can: - select an icon from any type of resource files; - export all icons from resource files into .ico-files; - change an icon for a drive (HDD, FDD | |||
Updated: 9, 2005 | Rating: 105 | Author: Andrew Lyapunov | Size: 953 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
263. | Change Folder Icons 6.1 (nesoft.org) | ||
You can search for icons with specified parameters in all types of resource files starting with the selected folder. Also you can: - select an icon from any type of resource files; - export all icons from resource files into .ico-files; - change an icon for a drive (HDD, FDD | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Lyapunov | Size: 1092 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
264. | Change Folder Icons 7.5 (nesoft.org) | ||
Explorer; - make your own libraries from found icons. What's new in version 7.5. Now you can: - drag-and-drop groups of files and folders at once to the list of found icons; - manually write/edit/delete the "path for icons..." in "Settings" window; - make all necessary actions with found icons using right mouse click (2 new menu items are added: * Icon actions: actions for | |||
Updated: 9, 2005 | Rating: 107 | Author: Andrew Lyapunov | Size: 1653 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
265. | Folder Guard Professional 7.5 (winability.com) | ||
you can use to restrict access to files, folders, and other computer resources. If you share your computer with your business colleagues, family, or roommates, you can use Folder Guard to stop other users from opening your personal files, or even completely hide your documents until a valid password is entered. You can protect sensitive system files from modification or | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 1235 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
266. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
267. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
268. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
269. | Windows Security Officer 6.8.1.1 (mybestsoft.com) | ||
Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
270. | CS Desktop Notes 3.6 (chissoft.com) | ||
it have nice and intuitive interface and consume minimal system resources. For quick access program put icon in system tray. To add new note just double click program icon in tray. If you will hold down SHIFT key while double click icon, new note text will be set from clipboard content. Existing note can be edited by double clicking on it. Features: * Tray icon for easy | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrey Chistyakov | Size: 123 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
|
Home > Shared resources software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|