|
||||||
|
||
|
Home > Client invoicing software |
Related keywords: client, invoicing, ftp client, email client, Invoicing, Client, ssh client, FTP Client, client server, nfs client |
|
|
281. | SignIt! for Windows 1.1 (xlreader.com) | ||
3 features: 1) Sign a JAR file (main function) Objective: ensure integrity (protection) and certification of the file. 2) Create private keys Objective: create a key to be used (or reused) to sign JAR files. 3) Manage private keys Objective: change aliases, passwords, copy/delete entries, 1) sign a JAR file (main function), 2) create private keys, 3) manage private keys | |||
Updated: 8, 2004 | Rating: 130 | Author: Robert Della Malva | Size: 21300 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
282. | SoloKeep 2.0 (solostar.ca) | ||
SoloKeep is a fast and easy to use application that stores all your passwords using encryption and password protection. SoloKeep can keep track of those hard to remember website passwords and other login information. Using a powerful encryption algorithm, SoloKeep ensures that no one else will be able to view | |||
Updated: 9, 2005 | Rating: 0 | Author: Brad Pineau | Size: 666 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
283. | SpyPC 7.0 (xelerate.biz) | ||
to the internet, as well as certain parts of the PC. With SpyPC's surveillance functions, you can see what anyone really does on the PC. Plus, log keystrokes in chat rooms or make secret | |||
Updated: 9, 2005 | Rating: 0 | Author: Hans Fremuth | Size: 3678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
284. | Stealth KeySpy 2.0.0 (professionalglobalmarketing.com) | ||
IMPORTANT ANNOUNCEMENT for wives, husbands, parents, girlfriends, boyfriends, employers, teachers… ANYONE with a computer! * Have you ever suspected your spouse or partner of CHEATING online and wanted to know NOW? * Have you ever wondered what your kids are REALLY doing and seeing on the computer for · A reliable way to protect your kids online. · A powerful encryption utility for all your e-mails and personal documents. · A secure "real time" data back-up system. · An automated utility that records all PC activities | |||
Updated: 9, 2005 | Rating: 48 | Author: Tom Eagar | Size: 700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
285. | SyncBack 3.2.7.0 (mjleaver.com) | ||
Easily backup, synchronize, or restore your files to another drive, FTP server, ZIP file, networked drive, or removable media. Highly configurable, SyncBack includes: detailed and easy to read log files; email results; simulated backups and restore; file filters; sub-directory selection; copy verification; | |||
Updated: 9, 2005 | Rating: 229 | Author: Michael Leaver | Size: 1948 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
286. | SyncPro Backup 2.1 (01ware.com) | ||
office , home and your notebook Computers, backups your day's and week's work and transfers Programs ' DATA between Computers (e.g.. synchronizing ICQ data between two PCs) synchronizes Folders and Files between Computers across network.Syncpro works as two way synchronization utility to ensure that files are up to date between drives or | |||
Updated: 9, 2005 | Rating: 0 | Author: Boshra Galal | Size: 2772 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
287. | System Shield 2.1c (iolo.com) | ||
Most people believe that when a file is deleted, it is permanently and irrecoverably "gone". The error in this belief is that it relies on some basic assumptions that are very far from the truth. Realistically, the following must be true in order for a file to be irrecoverably deleted: 1. The data | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
288. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
automatically generates a completed inventory card for each computer/client. Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic Netlog then reports any changes made on each client log-in to the inventory program. Other inventories, e.g. faxes, photocopiers and other | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
289. | Visual Hindsight Home Edition 2.2 (visualhindsight.com) | ||
Visual Hindsight is professional-grade network camera surveillance and recording software. It supports cameras and video servers manufactured by Axis, D-Link, ELMO, Flexwatch, Hunt, IDView, IQinVision, JVC, Mobotix, Orite, Panasonic, PDuke, Pixord, Sony, Toshiba, Vivotek and others. Visual Hindsight allows | |||
Updated: 9, 2005 | Rating: 0 | Author: RFC Services | Size: 6388 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
290. | Visual Patch 1.0.0.3 (indigorose.com) | ||
Rose's Visual Patch provides software developers with a comprehensive solution for creating secure full-history software update patches. Designed for use on all 32-bit Windows platforms, these compact, self-installing patch files can be distributed on diskette or CD-ROM or sent via email, web or LAN. Unlike setup programs, which contain all of the files needed to run an | |||
Updated: 9, 2005 | Rating: 0 | Author: Colin Adams | Size: 5801 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Client invoicing software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|