|
||||||
|
||
|
Home > Examples software |
Related keywords: frame examples |
|
|
21. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
22. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
23. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
24. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
25. | LeoCrystal 2.5 (leokrut.com) | ||
LeoCrystal is a software program that performs numerical Monte Carlo modeling of reaction on the surface of the growing crystal for illustrative educational and research purposes. With the help of this program you can estimate influence of effective geometrical sizes of structure elements of the crystal and | |||
Updated: 3, 2006 | Rating: 0 | Author: Leonid Sakharov | Size: 444 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
26. | Masker 7.0.6 (softpuls.com) | ||
files (exe, dll, ocx); video files (avi, mov, mpg, asf); For example, you could create a picture file that looks and behaves exactly like any other picture file but contains hidden encrypted files. It is impossible to recognize that the carrier file contains hidden files. Also the carrier file will remain fully functional. Images can be viewed, sounds can be played and videos | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
27. | FoldMonkey 1.46 (monkeyjob.com) | ||
services. All errors are logged and displayed as they occur. For example, if a file already exists, FoldMonkey will tell you. FoldMonkey comes with fully integrated online and offline help and support. Monitor a folder for new or incoming files. Rename files. Create directories based on names, extensions, creation, last accessed and modified dates. Make folders from custom text | |||
Updated: 3, 2006 | Rating: 39 | Author: monkey job | Size: 1464 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
28. | COM Port Toolkit 3.6 (compt.ru) | ||
an integrated serial communications testing toolkit. It sends user's data to and receives one from a device and records all transfers to a log. You can test equipments serial communications protocol by hand: feed it input, check the output. You can write or use a script written by other developers to automate some specific tasks: CRC calculations, special transfer rules, outgoing | |||
Updated: 3, 2006 | Rating: 16 | Author: Michael Golikov | Size: 1199 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
29. | PostSmile 5.1 (postsmile.com) | ||
too often people's e-mails are overly formal and conservative. This dooms them to be ineffective and plain boring. PostSmile is capable of adding smiley faces to any e-mail to make the message more personal and compassionate. You can Drag and Drop images and animations, smilies and emoticons, text or | |||
Updated: 3, 2006 | Rating: 636 | Author: Alexey Yakshin | Size: 2158 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
30. | Ghost Hunter 5.0 (aidsoft.com) | ||
Search, Sort, Built-In Help File, Import and DisplayPhoto's for each investigation and more. This is the perfect computer program for anyone into Ghost Hunting or any other types of hauntings. This program lets yourecord detailed information such as: DATE OF OCCURANCE, TIME OF OCCURANCE, LOCATION, GPS INFO, HISTORY | |||
Updated: 3, 2006 | Rating: 0 | Author: Robert W. Benjamin | Size: 970 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
|
Home > Examples software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|