|
||||||
|
||
|
Home > Remover software |
|
|
301. | ActiveX Windows NT/2000 group and account UserManager 2.03 (pstruh.cz) | ||
Features User account and group manipulation Add and remove users and groups Add and remove user from a group Enumaration Domain servers enameration Local and global group enameration User enameration Group members and user groups enumeration User account properties Name, Password and Account policy Fullname, Comment Last Logon, Logoff, Number | |||
Updated: 9, 2005 | Rating: 200 | Author: Antonin Foller | Size: 292 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
302. | Favorites Sweeper 3.00 (manitools.com) | ||
a clean in your Internet Explorer Favorites, by removing broken and duplicated links. Favorites Sweeper will find and list these bad favorites for you, allowing you to remove its in a fast and easy way. Promote a clean in your Internet Explorer Favorites, by removing broken and duplicated links. Favorites Sweeper will find and list these bad favorites for you | |||
Updated: 9, 2005 | Rating: 16 | Author: Manitools Software | Size: 1326 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
303. | U-Wipe 2.0 (u-wipe.com) | ||
With U-Wipe, you can easily manage digital certificates through three modes of safety, and delete the tracks in Microsoft Windows and Microsoft Office, temporary files, and more. U-Wipe supports such applications as Microsoft Internet Explorer 4.1 and higher, Microsoft Office 97 and 2000, Netscape 6, Mozilla | |||
Updated: 9, 2005 | Rating: 16 | Author: Artemiy Babamuratov | Size: 1971 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
304. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PC PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
305. | PowerControl 1.0 (onlimemedia.com) | ||
make Shutdown, Reboot, Hibrnete, Logoff, Standby, Lock the local or removed computer (or several computers). As you may may awake the removed computer with the help of function Wake-On-LAN. You can specify a delay, which can either be an absolute time (eg. 8pm) or a relative time (eg. "20 | |||
Updated: 9, 2005 | Rating: 20 | Author: Pavel Abraksas | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
306. | R-Undelete 2.0 (r-undelete.com) | ||
on any valid logical disks visible by the host OS when files were: removed without Recycle Bin; removed by virus attack or power failure; removed when Recycle Bin has been emptied. Recovering encrypted files, compressed files and alternative data streams. R-Undelete recognizes | |||
Updated: 9, 2005 | Rating: 16 | Size: 942 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
307. | #Remove Access Security 3.0 (e-tech.ca) | ||
Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety of situations, including corrupted passwords, corrupted workgroup | |||
Updated: 9, 2005 | Rating: 102 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
308. | SecurDesk! 5.32 (cursorarts.com) | ||
Whether you are responsible for multiple computers in a corporate office, or just need a way to keep novice users from tampering with the system settings, SecurDesk! offers many options which may be used alone, or in conjunction with other security measures, to control access to important materials, to hide | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
309. | Startup Control Center 2.11 (sureshotsoftware.com) | ||
presents them in a easy to understand graphical interface. Find and remove any installed spyware, keylogger or other invisible monitoring applications. Startup Control Center allows you to add, edit, disable, move or delete startup entries. You can also change the loading order of the startup entries | |||
Updated: 9, 2005 | Rating: 30 | Author: Jon Kagstrom | Size: 800 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
310. | System Cleaner 4.94f (allerasoft.com) | ||
within seconds! - Delete junk and obsolete files Safely scan and remove many different garbage files on your computer, freeing up extra disk space and keeping your system at peak performance. Clean dead shortcuts from your Start menu and Desktop. - Protect your privacy. All the sites you visit and images you see are stored in your computer. Deleting Cache and History will not | |||
Updated: 9, 2005 | Rating: 0 | Author: Steven Martins | Size: 1300 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
|
Home > Remover software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|