|
||||||
|
||
|
Home > Prefix software |
|
|
291. | Hacker 2004 Digital Evil 2.1 (hacker2004.com) | ||
Delve deep into the underground world of a computer hacker Working for a black agency, your mission is to steal money, files, and other valuable material from internet servers across the world. A few years ago, Adam Mindlin had a vision. He saw a company based purely on profit... But it was more than that, Working for a black agency, your mission is to steal money, files, and other valuable material from internet servers across the world | |||
Updated: 9, 2005 | Rating: 42 | Author: Adam Rachoni | Size: 2450 kb | Shareware Go to category: Games & Entertainment > Action Similar programs | |||
292. | Network Protocol Poster 2004 (javvin.com) | ||
All network protocols, All operating systems, All on one chart! A "must have" for all networking professionals! A comprehensive guide and reference for IT and network professionals; An easy to use training tool for IT students to get an overall picture of data and telecommunications; A unique marketing tool | |||
Updated: 9, 2005 | Rating: 3688 | Author: Jenny Peith | Size: 500 kb | Data Only Go to category: Network & Internet > Other Similar programs | |||
293. | nnCron 1.91b12 (nncron.ru) | ||
nnCron is an advanced scheduler, scripting tool and automation manager. Besides possessing the traditional scheduler features (starting programs, displaying reminder messages and opening documents at specified time), nnCron also can: - start any program as a service, - run tasks as if they were started by | |||
Updated: 9, 2005 | Rating: 0 | Author: Nicholas Nemtsev | Size: 877 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
294. | Phone Lister 3.00 (cyber-matrix.com) | ||
Phone lister is an application used to manage corporate phone lists. Phone Lister can dramatically improve the speed of telephone extension retrieval for companies still using traditional time intensive paper-based solutions or limited in-house applications for phone list management. Phone Lister can be used | |||
Updated: 9, 2005 | Rating: 0 | Author: Cyber Matrix | Size: 1975 kb | Demo Go to category: Communications > Telephony Similar programs | |||
295. | Universal Programmer Analyser-UPA 2.2 (elrasoft.com) | ||
With this program you can read or write information from significant numbers of EEPROM's and microcontrollers, see I2C and microwire protocol, or use your computer as a 4 channels logic analyser. The hardware part is simple enough and uses COM and LPT port of the computer. Features: SCRIPTS EDITOR: A | |||
Updated: 9, 2005 | Rating: 2644 | Author: Penko Kovatchev | Size: 499 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
296. | timp 1.0.2 (tipic.com) | ||
• Easy to install and manage TIMP is a Total Instant Messaging (IM) Solution for office LAN or Internet communication. It is extremely easy to install and maintain and the varying set of features cover a wide array of customer needs. • Windows based TIMP runs on Windows 2000 and has Active Directory - Any Jabber client can be used (Linux, Java, Mac-OS, Palm, Pocket-PC, Web based client, etc) | |||
Updated: 9, 2005 | Rating: 0 | Author: Dave Linch | Size: 6429 kb | Commercial Go to category: Communications > Chat & Instant Messaging Similar programs | |||
297. | TrafficQuota 1.0 (digirain.com) | ||
TrafficQuota is a quota enforcement extension for Microsoft ISA Server. It enables you to restrict or allow users' access to the Internet, based on the volume of data downloaded (or uploaded) from the Internet. For example, user 'John' is allowed to download 500 MB a month, and after this he is denied | |||
Updated: 9, 2005 | Rating: 16 | Author: DigiRain Technologies | Size: 1633 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
298. | TZ Personal Firewall 3.3.0.0 (TrackZapper.com) | ||
TZ personal firewall stops Hackers, Trojans, Spyware, Viruses, DoS attacks & data thieves & protects your PC from Internet-borne threats. Put a secure barrier between your hard drive & hackers, whether you use a dial -up, ISDN, DSL or cable connection. Meets your requirements for Internet security & Internet | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 3458 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
299. | TZ Spyware-Adware Remover 8.2.0.0 (trackzapper.com) | ||
Spyware Remover is an Adware, SpyWare, Key Loggers, Trojans, Dialers, Hijackers, Trackware, Thiefware, Big Brotherware removal utility with multi-language support. It scans your memory (for active memory ad components, which are not stored on your hard drive and last only as long as the computer is powered | |||
Updated: 9, 2005 | Rating: 0 | Author: Track Zapper | Size: 6659 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
300. | UnixSpace Terminal 2.1.2 (unixspace.com) | ||
UnixSpace terminal - it's a graphical telnet/SSH client for Windows. Protocols: telnet, SSH1, SSH2 and rlogin. The program consist of two parts: UnixSpace terminal and SSH Proxy Server. The SSH proxy can be used independently. The terminal is capable of emulating Linux and FreeBSD console, VT220, ANSI, and | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Lashenko | Size: 456 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Prefix software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|