|
||||||
|
||
|
Home > Corruption software |
Related keywords: word corruption |
|
|
21. | Spyware Begone Free Scan 5.00 (aidsoft.com) | ||
Keyloggers, etc. Prevent Identity Theft, credit card theft, data corruption, Hacker attacks & even popup ads due to Spyware Infections. Now with built in AUTO PROTECT, LIVE UPDATE, SYSTEM RESTORE and one of the largest databases for your ultimate protection. Download Spyware Begone now. Spyware | |||
Updated: 9, 2005 | Rating: 0 | Author: Bernie Ferguson | Size: 1651 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
22. | Undelete 3.0 (execsoft.com) | ||
system administrators had to slog through backup tapes, hoping no corruption or gap made the file unrecoverable. Backups were really designed for catastrophic data-loss recovery, not individual file recovery. Undelete changes all that. It provides a cost-effective, instant-recovery solution that completes a company’s overall data-protection strategy and eliminates the high cost of | |||
Updated: 9, 2005 | Rating: 0 | Author: Colleen Toumayan | Size: 5000 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
23. | Palm Desktop Utilities 1.3 (palmosworld.com) | ||
Palm Desktop data again because of a hard drive crash, file corruption, or hotsync error. Palm Desktop Utilities gives you peace of mind in knowing that your Palm Desktop data is safe and secure and can be restored to the Palm Desktop in seconds in the event of a problem or data loss. Use the Information window to help shorten your call times with Palm Technical Support. Palm | |||
Updated: 9, 2005 | Rating: 1906 | Author: Kevin Steele | Size: 8301 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
24. | MG-Split 1.2 (web.tiscalinet.it) | ||
attributes when merging files. - Generate checksums to detect file corruption when merging files. What's New: - "Format disk" option when splitting to floppy disk. - Automatically imports Internet Mail and Windows Mail settings. - User Guide in standard Windows Help format. MG-Split is a file | |||
Updated: 9, 2005 | Rating: 0 | Author: Michele Galante | Size: 1044 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
25. | ModemTest 1.3 (passmark.com) | ||
modem, or phone line or their ISP service. ModemTest logs any data corruption and incorporates a modem speed test which reports the initial connection speed and the actual throughput. Two different test methods are provided. The first test method uses two telephone lines and two modems in a master / | |||
Updated: 9, 2005 | Rating: 0 | Author: David Wren | Size: 587 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
26. | FitoNT 1.0.0.0 (netnet.ca) | ||
of FITONT is a must in today's day and age of constant data corruption. Program watches selected Directory for changes, if change occurs, it transfers copy of changed file to selected destination on same machine, another workstation, server, floppy or Direct CD. Runs completely | |||
Updated: 9, 2005 | Rating: 0 | Author: Boris na | Size: 3752 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
27. | Backup Wolf 3.13 (lonewolf-software.com) | ||
button your files are backed up and safe. Quickly recover from file corruption or hard drive errors by selecting the Restore option. Backup Wolf will save you a remarkable amount of time and effort and give you the peace of mind of knowing your critical files are backed up and safe. Never lose another | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Davis | Size: 5311 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
28. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
messaging guards critical programs and data to protect against loss, corruption and unwanted access. File and Folder Locking, Hiding and/or File Encryption Select the protection you desire with a few mouse clicks, assuring your files and other assets are kept safe from any attempt to compromise | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
29. | Advanced CAB Repair 1.1 (cab-repair.com) | ||
data in them as much as possible, so to minimize the loss in file corruption. Main features: 1.Support to fix all version of Microsoft cabinet files 2.Support MSZIP, LZX and Quantum compression methods. 3.Support to repair CAB files on corrupted medias, such as floppy disks, Zip disks, CDROMs, etc. 4.Support to repair a batch of CAB files. 5.Provide an EXE stub and output a | |||
Updated: 9, 2005 | Rating: 6865 | Author: RepairFile.com Inc. | Size: 966 kb | Demo Go to category: System Utilities > File Compression Similar programs | |||
30. | Bandwidth Daemon 1.1 (grofsoft.com) | ||
database uses a transaction log, with two phase commit, to prevent corruption in the event of a power failure or system crash. Bandwidth Daemon runs as an NT service, so it will always be gathering packets, even when you are not logged in. It consumes minimal CPU and memory. The executable is around | |||
Updated: 9, 2005 | Rating: 16 | Author: Nick Maher | Size: 226 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Corruption software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|