|
||||||
|
||
|
Home > Check lists software |
Related keywords: check, lists, spell check, Check, pre submission check, mailing lists, check printing, Check Writing, Spell Check, check link popularity |
|
|
321. | Clone 2.1.0 (newtonsoftware.co.uk) | ||
to run and configure. Clone keeps a track of how many files it has checked and copied so you always know what the program is doing. Main Features 1) Backup files and directories to a defined location - as many as you like 2) Uses the date and time, file size or the archive attribute to determine | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Newton | Size: 3847 kb | Demo Go to category: System Utilities > Other Similar programs | |||
322. | D_back 1.60.3 (backupforall.com) | ||
stack) for any kind of your data. The management of of the file list is simple and flexible. Included and excluded files are specified separately, wildcards (* ?) are allowed in all paths and file names. The program is ideal for automatic unattended backing up. The software distribution kit contains command-line backup utility and backup scheduler which allow you to organize | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Apollonov | Size: 2273 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
323. | DefPrin 1.72 (insync-software.co.uk) | ||
Checks that your default printer is the one you want and not that one in the Business Centre where you were working yesterday, so the confidential report you are about to print need not be read by all your colleagues or competitors. An absolute godsend for mobile laptop users. Here's a little | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Newman | Size: 523 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
324. | Dr.Web Anti-Virus for Workstations 4.31.a (advancedforce.com) | ||
to access files and hard drives system areas and performs real-time check of any object trying to penetrate the local file system. Upon detecting a virus or any other malicious program, SpIDer Guard blocks any access to the file, so that no harmful activity occurs until the user chooses the | |||
Updated: 3, 2005 | Rating: 0 | Author: Igor Daniloff | Size: 4253 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
325. | DRemote 1.0 (products.asynchrony.com) | ||
if you have to check the database server downstairs, start the webserver at second floor, and your computer is at the first floor! Well, now you can control & monitor remote computers from your PC. Whatever your job function is, there will always be a need to go around to other computers - whether it is just to check the status of the servers running, start/stop some | |||
Updated: 8, 2004 | Rating: 165 | Author: Shawn Roach | Size: 1057 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
326. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
investigated to be done on this item – and so on. Here is brief list of stages: - receiving; - estimating (defects and repair pricing); - customer approval; - dry-out (if needed); - repairing (in-house or subcontracted); - quality check; - shipping back to customer. Each Equipment is accounted by it's Model, Model Group, Manufacturer and | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
327. | Email Address Juggler 2.75 (mirage-avm.com) | ||
has plenty of time-saving tools for loading, splitting and merging lists. If somebody decides they want out from a list, add them to the removals list to make sure that you don't bother them again. When you've got your list ready, use the built-in international spell-checker to check your message and then send it out with a click of the | |||
Updated: 2, 2006 | Rating: 0 | Author: Ian Tragen | Size: 3132 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
328. | Evidence Killer 2005 1.0 (securedisk.netfirms.com) | ||
history, your temporary files, recycle bin, clean recent documents lists for popular applications, can recover HD space, and many more. Protect your privacy with Evidence Killer 2005 and completely eliminate sensitive data! Evidence Killer 2005 completely eliminates all hidden evidence of activites on | |||
Updated: 2, 2006 | Rating: 82 | Author: Solution inc | Size: 2060 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
329. | f2xml 1.0 (boulderwall.com) | ||
tasks and reports, such as: Finding zero length (empty) files Listing duplicate files Sorting files and folders to find the largest files. Keep track of all files stored on CD's, or floppy disks such that they can be accessed without re-loading the media (eg for large music collections archived to CD). For example, when you write a new CD, run f2xml against the CD to list | |||
Updated: 9, 2005 | Rating: 86 | Author: David Metcalfe | Size: 600 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
330. | Fastcheque 1.3 (atlantic-coast.com) | ||
simple program that lets you print out single cheques (checks) or batches from a list file (CSV format). Support for Deluxe Forms US and UK cheques or scan in your own. Multicurrencies or add your own. Multiple printers. Remembers names and addresses of all payees for next time. SWREG # 17275 (GO SWREG). Very simple program that lets you print out single cheques | |||
Updated: 8, 2004 | Rating: 0 | Author: Sales Dept | Size: 857 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Check lists software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|