|
||||||
|
||
|
Home > Watch by software |
Related keywords: watch, Watch, watch list, server watch, watch for, clock watch, watch servers, WATCH, auction watch, news watch |
|
|
321. | Hara-Kiri 2.02 (cyteg.com) | ||
way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed, The files in a determined folders will be completely erased (without the possibility of reconstructing them with | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
322. | HS SoBigRemover 1.2 (haysoft.com) | ||
emails. It is hardly possible that a false email can be removed by the software which is not a virus but has similar size and subject like a virus. In this very rare case, the software company wont be responsible of removal and disclaims any warranty. 2) DISINFECT SoBig.f VIRUS FROM COMPUTER The second module of the sofware acts as an anti-virus tool , detects Sobig.f and if it | |||
Updated: 9, 2005 | Rating: 0 | Author: Cenker Sisman | Size: 576 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
323. | Iconic Tray 1.21 (iconictray.com) | ||
(notification area in Windows XP), or to a special new tray provided by Iconic Tray itself (see image). Whichever method you choose - bye bye those clogged up taskbars! Iconic Tray is very useful to hide seldom used or background applications which occupy your taskbar and hinder quick switching | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Nikitin | Size: 47 kb | Shareware Go to category: Desktop > Other Similar programs | |||
324. | Identity Knight 1.3 (fspro.net) | ||
the program is so easy that even a child could handle it. The step-by-step wizard interface ensures that you can easily control all the processes without difficulty. Multiple studies indicate that installing Identity Knight ensures optimum security settings for any kind of computing environment | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
325. | IntraMail 2003.01.20 (dplanet.ch) | ||
or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are extremely well protected against local hackers and Internet attacks like Trojans or Tunneling-helpers or other applications. Passwords stay encrypted in memory and swap files. Wireless networks and mixed | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
326. | KeyIt! 2.0 (keyit.com) | ||
dictionary, thesaurus, auction search, or a stock quote, all simply by typing 'wwww'. With our EmailThings module, you can insert cool images into your e-mail and documents simply by typing 'myimages'. And best of all, the additional modules are free! KeyIt works by | |||
Updated: 9, 2005 | Rating: 0 | Author: Kevin O'Donnell | Size: 2574 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
327. | KeyText 2.25 (mjmsoft.com) | ||
pieces of text, ready to be typed or pasted into any application by a simple hotkey press or menu selection. "Right-click anywhere" feature makes form-filling easier than ever. Include commands to run programs, click buttons, change windows, visit Internet sites and more - or automate mouse clicks | |||
Updated: 9, 2005 | Rating: 145 | Author: MJMSoft Design | Size: 623 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
328. | Lock Folder 5.0 (realclicks.com) | ||
important part - Lock Folder uses the encryption standards approved by the US Government. This and others innovative and reliable technologies provide the safest way to store your information well protected against hacker attacks, malicious software and dishonest employees. Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
329. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
USERNAMES and PASSWORDS. 5) Inconvenient- Through the use of its Watch List feature, Employee Monitoring alerts management early when employees begin wasting time or breaking company Internet policies. Not only is Employee Monitoring a potent productivity tool, it’s also a great network diagnostic utility tool, spyware detector, bandwidth monitor, sniffer, security tool and | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
330. | EscapeClose Pro 1.9 (sanapesoft.com) | ||
a tiny utility, allowing you to close or minimize the active window by pressing the Esc button. And now you can hide active window. Thus you can see it neither in the TaskBar nor in the Task Manager list (Ctrl+Alt+Del) nor in the list opening by pressing Alt+Tab. Or, to work more carefully, it | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Moshkov | Size: 319 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Watch by software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|