|
||||||
|
||
|
Home > Self software |
|
|
311. | Floppy Image 2.3.3 (rundegren.com) | ||
or transfer). Save the image file compressed, uncompressed or as a self-extracting exe. Add descriptions to or convert your old image files. Supports DMF and other non-standard formats. Logically recreate bad sectors when writing floppy disks, allowing for an exact duplicate of your source disk to be | |||
Updated: 2, 2006 | Rating: 0 | Author: -- -- | Size: 814 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
312. | FSet 6.1 (xuebrothers.net) | ||
In Tree and List View. Split and Combine Large Files. Create Self-Extract Zip Files FSet gets you released from repetitive file copying, moving, ziping or deleting. Files are pick out using Name Filter and Time Filter, and then bined to operation. To repeat the operation, you just double click the | |||
Updated: 9, 2005 | Rating: 0 | Author: Jun Xue | Size: 224 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
313. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
- Catches and deletes spam BEFORE it reaches your inbox. - Self learns based on your spam and good email and adapts to new types of spam. - Detects spam with great precision and accuracy. - Stops viruses and malicious code. - Safe email preview - no pictures are downloaded, no hidden scripts or codes are executed. - Cuts down unproductive email traffic and saves bandwidth | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
314. | Hara-Kiri 2.02 (cyteg.com) | ||
way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed, The files in a determined folders | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
315. | HDD Temperature 1.3 (hddtemperature.com) | ||
warned should this temperature be exceeded. S.M.A.R.T. stands for "Self-Monitoring, Analysis and Reporting Technology" and is currently the most advanced technology in this field; this technology was developed by HDD manufacturers and is supported by IBM, Maxtor, Seagate, Hitachi and many others. HDD Temperature Pro is created specially for small and large companies that have many | |||
Updated: 3, 2005 | Rating: 48 | Author: Yuri Alexandrov | Size: 1016 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
316. | HDD Temperature Pro 1.4.206 (hddtemp.com) | ||
warned should this temperature be exceeded. S.M.A.R.T. stands for "Self-Monitoring, Analysis and Reporting Technology" and is currently the most advanced technology in this field; this technology was developed by HDD manufacturers and is supported by IBM, Maxtor, Seagate, Hitachi and many others. HDD Temperature Pro is created specially for small and large companies that have many | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuri Alexandrov | Size: 2409 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
317. | HDD Thermometer 1.3 (rsdsoft.com) | ||
to the hard disk temperature. Most of modern hard disks provide self temperature value through S.M.A.R.T. So if at least one of your hard disks supports this feature than this program will be useful for you. When designing HDD Thermometer, we aimed to create fast, small, and feature-rich software. We considered that we succeeded in this. The most part of its life program eats | |||
Updated: 9, 2005 | Rating: 82 | Author: Georgy Koychev | Size: 253 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
318. | Hiding CHAOS 5.6 (safechaos.net) | ||
Stego product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier file). Includes built-in encryption and ability to hide data within specific sub-areas of the image. Chaos uses the newest chaos logic and stream cipher. It has high speed and allows variable-length keys | |||
Updated: 8, 2004 | Rating: 16 | Size: 458 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
319. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
for home users, shared computers, and the mobile professional. The self-decryptor lets you send or distribute encrypted files with peace of mind. Instead of simply locking your file or folder, Icon Lock-iT XP will transform it into a self-extracting executable. This executable can be sent to | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
320. | InstallEssen 2.51 (essencomp.com) | ||
your program into single self-extracting executable file. No scripts need be written. Executable directly from the Web. Allows user to add Environment Variables and Registry Entries. Creates Shortcuts for Desktop and Start Menu. Execution of other programs within Installable. Customizable License and Welcome Message Templates. Customizable Project, Installation and Delivery | |||
Updated: 9, 2005 | Rating: 0 | Author: Apurva Parekh | Size: 2017 kb | Commercial Go to category: Development > Install & Setup Similar programs | |||
|
Home > Self software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|