|
||||||
|
||
|
Home > Identification software |
Related keywords: name tags identification, language identification, character set identification, file identification |
|
|
321. | BatteryMon 2.0 1006 (passmark.com) | ||
have decreased performance over time, it is important to be able to identify and monitor their performance. With BatteryMon, monitoring the state of your battery has never been easier. BatteryMon is an easy to use Windows program that allows the monitoring of laptop computer batteries and uninterruptible power supplies (UPS). Graphically see the battery charge / discharge rate | |||
Updated: 9, 2005 | Rating: 1082 | Author: David Wren | Size: 913 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
322. | Broken Cross Disk Manager 3.81 (bcdm.broken-cross.com) | ||
description, a comment, an image thumbnail or other information, to identify them more easily. Add password-protection to protect items in your database. To search for files, you can open multiple search dialogs with options for date, size and categories. The fast search function supports as well | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin Fucik | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
323. | CFList 1.0 (ciansoft.com) | ||
available on the Windows clipboard. Gives the integer value to identify each format. Useful for software development using the clipboard. Free tool provides list of formats currently available on the Windows clipboard. Gives the integer value to identify each format. Useful for software development using the | |||
Updated: 9, 2005 | Rating: 0 | Author: Ian Chester | Size: 211 kb | Freeware Go to category: System Utilities > Clipboard Tools Similar programs | |||
324. | Clean Star Sp@ce S@ver System 2.0c (infoexchg.com) | ||
specific file types as determined by the user/user's software. All identified files are placed in the Windows Recycle Bin for user review & confirmation. It is easy and safe to use on all Win 95/98/ME/XP/NT/2000 systems. Clean Star removes excess files left by software installations, web browsers | |||
Updated: 8, 2004 | Rating: 0 | Author: I EA | Size: 1555 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
325. | CloneMaster 2.19 (softbytelabs.com) | ||
Delete is a filter for flagging files for deletion. CloneMaster identifies duplicates based on name, byte size, data, and so on. Also there is a security feature that you can enable to leave your windows directory alone. That is, CloneMaster will not process any files and subdirectories within your Windows folder. You can also Deselect all files too. Find TRUE duplicate files (byte | |||
Updated: 9, 2005 | Rating: 0 | Author: M. Purkhardt | Size: 1513 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
326. | ConversionTool 4.2.2 (keper.com) | ||
converts everything it can automatically. All remaining items are identified, the problem is shown clearly to the user, and an interactive mechanism is provided. If, for example, a record could not be inserted due to a constraint violation (a wrongfully inserted date like 1/1/199), this insert instruction is logged in a separate error log, and can be edited and executed. When a | |||
Updated: 9, 2005 | Rating: 6616 | Author: Burkhard Lau | Size: 3151 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
327. | cPWD 2.6 (absolutedynamics.com) | ||
Target multiple Administrator accounts based on the Security Identifier Descriptor (SID). Dynamically generate and apply C2-Compliant random passwords. Rename the local administrator account. Update services configured to logon with domain credentials. History kept on all system changes made with cPWD. A powerful Information Security Management tool that will protect the local | |||
Updated: 2, 2006 | Rating: 0 | Author: Donnie Byerley | Size: 725 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
328. | Delenda 2.415 (peccatte.karefil.com) | ||
identifies files older than x days based on file creation, modification, last accessed date and deletes or moves them to archive folders. You can replicate folder structure when moving files and leave a shortcut in source folder after files transfer to archiving location. 3 methods for deletion or move tasks: - delete old files immediatly - delete files and send files to | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
329. | DIRlist 2.6 (WindowsUtilities.com) | ||
descriptions of files and subdirectories. It can be difficult to identify a files purpose and content with just the filename, especially when the file is old or shared between users. DIRlist provides free text descriptions to supplement the file name for project documentation, instruction manuals, and general identification of directory contents. Files and subdirectories are | |||
Updated: 9, 2005 | Rating: 42 | Author: Frank Snyder | Size: 1597 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
330. | Disk and Registry Alert 2.09 (softdd.com) | ||
were added or removed on your system. This provides a sure way to identify if any viruses or spyware were placed on your system during software installations, and also allows you to make sure all uninstalls have removed the necessary files. You can always see if any hidden programs, adware, rogue programs, spyware, or program dlls are installed without your knowledge. You can also | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftDD Software | Size: 707 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Identification software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|