|
||||||
|
||
|
Home > Informations software |
Related keywords: medical informations, collect Summary Informations |
|
|
321. | Macro Mania 11.1 (nstarsolutions.com) | ||
running program; send keystrokes to any Windows programs; transfer information between programs; read, write, copy, move, delete and rename files and folders; interact with the windows clipboard, and much more. All of these tasks, and many more, can be done with macros -- which means they can be performed very quickly and with minimal effort from the computer user. Macro Mania even | |||
Updated: 2, 2006 | Rating: 42 | Author: Jeff Camino | Size: 1171 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
322. | Lock My PC 3.4 (fspro.net) | ||
each day. We store our valuable data, personal and business-critical information, photos, credit card information, important phone numbers and vast amount of other private information on our hard drives. We install firewalls and anti-virus software to protect this data from outside | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
323. | LaptopLocate.net 2.9.2 (tometasoftware.com) | ||
LaptopLocate.net is a software utility that will monitor a computer's IP address to allow server administrators and general users to locate their computer. Using cutting edge technology, each time a computer that has LaptopLocate.net is turned on, the IP address of the computer is transmitted to a | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 4839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
324. | Keylogger Hunter 2.1 (styopkin.com) | ||
on your PC. Neutralizes up to 90% of keyloggers, depriving them of information about the pressed keys. Keylogger Hunter was created, which paralyzes accumulation of information by Hook-based keyloggers. This program is neither a detector, nor a disabler of keyloggers; it paralyzes the | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexander Styopkin | Size: 611 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
325. | Junk-Out for Outlook 2003/2002/2000 1.0 (theofficemaven.com) | ||
using a combination of statistical methods (Bayesian filtering) and information you provide, to show only e-mail messages you want to see. The more you use Junk-Out, the better it gets at distinguishing useful e-mail, and getting junk out of your way. The heart of Junk-Out is its continually learning content-based / Bayesian filter mechanism. This feature can use a Fast Track word | |||
Updated: 2, 2006 | Rating: 0 | Author: Mike Craven | Size: 10536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
326. | JetStart 3.0 (codesector.com) | ||
well or use it as a command line replacement. Place your most used information in the handy toolbar. Just single mouse click to open any file or multiple files at once. Full drag and drop adding and arranging buttons. You can even drag and drop buttons *from* JetStart to Desktop, Start Menu or Quick | |||
Updated: 2, 2006 | Rating: 0 | Author: Jackie Ray | Size: 540 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
327. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information, including installed software, shares, users, drives | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
328. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
Idem will check and copy files or folders security information ie ACL permissions on NTFS partitions and files and folders attributes ie hidden, system, archive, etc. Synchronize and transfer data across local or network drives each time that existing files are modified in original folders or on newer files are created. Idem detects changes and will copy or dispatch | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
329. | ID_Bank 1.24.13 (rainbow-innov.co.uk) | ||
from Rainbow Innovations. ID_Bank is able to hold your personal information relating to usernames, passwords, pins, login details etc; information you often forget or write on scraps of paper that anyone else can read. Your information is stored in a secure encrypted file, all you need to remember is one password to access it. ID_Bank includes the following features | |||
Updated: 2, 2006 | Rating: 0 | Author: John Hudson | Size: 1546 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
330. | Hide Files 3.4 (hide-files.biz) | ||
you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best way to protect them is to make files or folders invisible for another's eyes. Hide Files makes hidden any files and | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Informations software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|