|
||||||
|
||
|
Home > Arm software |
|
|
321. | DeviceLock 5.73 (ntutility.com) | ||
administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
322. | DeviceLock 5.73 (protect-me.com) | ||
administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
323. | DeepBurner 1.7 (deepburner.com) | ||
DeepBurner is an advanced and extremely powerful CD and DVD burning package that comes absolutely for FREE. It removes the hassle of making CDs, DVDs, and autoruns. It even makes it easy for you to create and print your own labels and booklets. DeepBurner supports a very wide range of internal and external | |||
Updated: 2, 2006 | Rating: 46 | Author: Maxim Afanasjev | Size: 2671 kb | Freeware Go to category: Audio & Multimedia > CD Burners Similar programs | |||
324. | CryptIt 1.301 (SinnerComputing.com) | ||
Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
325. | Cool Info FX 5.0 (tometasoftware.com) | ||
its detail, Network Administrators love it for the automation, CEO's love it for the price. Tometa Software, www.tometasoftware.com The Best System Information, Spy, Analysis, Auditing and Inventory Utility. Easy exporting to database and other formats including SQL & XML. Computers can use a central database to have a central network inventory of all systems on the | |||
Updated: 2, 2006 | Rating: 16 | Author: Luke Richey | Size: 12954 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
326. | Cool Info FX 5.0 (tometasoftware.com) | ||
its detail, Network Administrators love it for the automation, CEO's love it for the price. Tometa Software, www.tometasoftware.com The Best System Information, Spy, Analysis, Auditing and Inventory Utility. Easy exporting to database and other formats including SQL & XML. Computers can use a central database to have a central network inventory of all systems on the | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 12954 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
327. | CompreXX 4.1 (mimarsinan.com) | ||
Archives Behave Like Folders in Explorer! Browse, copy files from, and add files to archives just like any regular folder. Drag and drop, copy and paste files to and from the archive folders. Perform all archive tasks without ever leaving Explorer, including converting archive types from one to another | |||
Updated: 2, 2006 | Rating: 197 | Author: Sinan Karaca | Size: 5360 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
328. | CalculatorX 1. 2 (xoyosoft.com) | ||
by using CalculatorX. Here is just a short list of CalculatorX's major features: - Arithmetic operation - Logic and Bitwise operation - Relation operation - Built-In Functions - Constant support, such as PI, E, TRUE, FALSE etc. - Alias for operators and functions, eg."sh" and "hsin" is the same function - Unlimited nesting for expression - The mixed operation for | |||
Updated: 2, 2006 | Rating: 0 | Author: XoYo Li | Size: 1311 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
329. | BigSpeed Zipper 4.1 (bigspeed.net) | ||
from a .zip utility, make this one your first choice. It's free, by the way! BigSpeed Zipper is a .zip format compression utility. Being simple and intuitive to use with its explorer-style interface, it boasts a large number of features the other utilities on the market do not | |||
Updated: 2, 2006 | Rating: 0 | Author: BigSpeed Computing | Size: 777 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
330. | Ascella Log Monitor Plus 1.5.1 (file-monitor.com) | ||
Allows users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN, which can be received by the Windows NT4/2000 Messenger service, and using e-mail, SMS and ICQ (via e-mail gates). Works as Windows service. Allows users to monitor events | |||
Updated: 2, 2006 | Rating: 42 | Author: AAR Software Ltd. | Size: 799 kb | Demo Go to category: System Utilities > Automation Tools Similar programs | |||
|
Home > Arm software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|