|
||||||
|
||
|
Home > Examine software |
Related keywords: examine url |
|
|
271. | Find Protected 2.0 (aks-labs.com) | ||
Find Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
272. | EtherScout 1.10 (globalpatrol.net) | ||
EtherScout is an Internet traffic monitoring utility that sits in your network and records and analyzes traffic patterns of Internet usage. Reports can be generated in real time, showing detailed information on what users are doing, or trends of surfing behavior on your network. After collecting this | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1216 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
273. | FileTiger 1.32 (filetiger.com) | ||
consist of two operations: 1) Looking at files, including examining their contents, changing storage details like file names and dates, and exploring directory trees. 2) Moving the files between two folders or directories, including copying, copying only newer or missing files, and creating archives (backups and ZIP files). FileTiger is designed to do these things | |||
Updated: 2, 2006 | Rating: 0 | Author: Jerry Stern | Size: 1565 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
274. | FitoNT 1.0.0.0 (netnet.ca) | ||
WRONG....In today's day and age, your personal or company data is in danger 24 hours a day 7 days a week. That 7 day span, or 24 hour span is to long to have your valuable data in harms way. Your data is under constant threat from virus's brought in by employee's checking their e-mail, internet hackers | |||
Updated: 9, 2005 | Rating: 0 | Author: Boris na | Size: 3752 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
275. | FolderAccess 2.0 (lockfolder.net) | ||
FolderAccess is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
276. | FolderMatch 3.3.8 (foldermatch.com) | ||
FolderMatch solves this problem. It even gives you the ability to examine the differences between Microsoft Word documents! Computer professionals: Whenever there are duplicate copies of files/folders across a network, there is always a risk that they may be out of sync. FolderMatch can eliminate this risk. No more painful inspections for missing files when setting up | |||
Updated: 9, 2005 | Rating: 0 | Size: 3740 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
277. | FontPage 3.0.0 (bluefive.pair.com) | ||
lets you examine and compare all of the fonts on your system. You can view any typeface in bold, italic, underline and also 3D. In addition, you can also compare two selected fonts and preview fonts that are not yet installed on your system. FontPage can also print a sample page for selected fonts or print a list of all installed fonts. FontPage lets you examine and compare | |||
Updated: 2, 2006 | Rating: 16 | Author: David De Groot | Size: 1052 kb | Freeware Go to category: Desktop > Cursors & Fonts Similar programs | |||
278. | GetDataBack for FAT 2.31 (runtime.org) | ||
to interfere with the recovery and improve the results, by examining the scan log, the file system details, file and directory information, by selecting the sector range to be scanned, by choosing excessive search for file systems or search for lost files, by calling Runtime's DiskExplorer. Recover files over your local network or over a serial cable. This feature enables you | |||
Updated: 9, 2005 | Rating: 1267 | Author: Ragnhild Fesel | Size: 2811 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
279. | GetDataBack for NTFS 2.31 (runtime.org) | ||
to interfere with the recovery and improve the results, by examining the scan log, the file system details, file and directory information, by selecting the sector range to be scanned, by choosing excessive search for file systems or search for lost files, by calling Runtime's DiskExplorer. Recover files over your local network or over a serial cable. This feature enables you | |||
Updated: 9, 2005 | Rating: 1729 | Author: Ragnhild Fesel | Size: 2789 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
280. | Golden Eye 4.11 (monitoring-spy-software.com) | ||
Have you ever wondered what your children doing on the Internet? Who they talk to and what pictures they see? Are you suspecting your husband or wife is cheating on you? who they email ? what movies they see? who they chat with ? Do you want to know what your employees are doing during work hours? Golden | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin | Size: 1490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Examine software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|