|
||||||
|
||
|
Home > Highway software |
|
|
341. | GiPo@DB_Utilities 4.4 (gibinsoft.net) | ||
GiPo@DB_Utilities is a set of utilities for Windows 95/98/ME/NT/2000/XP that provide an easy way to work with different OLE DB- and ODBC-compatible databases and data sources such as Microsoft SQL Server 7.0/2000, Oracle DBMS, Informix, MySQL, DB2, Microsoft Access, dBase, Paradox, FoxPro, Visual FoxPro and | |||
Updated: 9, 2005 | Rating: 22 | Author: Igor Artemov | Size: 2488 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
342. | IconLover 2.0 (aha-soft.com) | ||
IconLover gives professional and amateur artists the ability to design and edit all the graphics required in the software development cycle, including icons, static and animated cursors, and other interface elements. All these graphics can now be designed in a single application. IconLover offers a variety and create your own unique icons, cursors and other tiny images. Manage icon libraries, and create a unique look and feel to your desktop and folders | |||
Updated: 9, 2005 | Rating: 0 | Author: Aha-soft Team | Size: 940 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
343. | IsSearch 1.1.9 (screenresources.com) | ||
immerse into digital era, information becomes the center of our life's meaning. But there is something even more valuable then the information itself: the ability to find required information fast! Data capacity of modern hard drives is dozens times higher then their predecessors had only a couple | |||
Updated: 9, 2005 | Rating: 0 | Author: Screenresources | Size: 1111 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
344. | KbStart 1.7 (KbStart.com) | ||
o Ultra fast, adaptive search algorithm: Learns from the user's habits o Easy installation: Automated setup management and an extensive default setup allows KbStart use "out of the box" PRICING The free, built in, evaluation license is sufficient for occasional use. It allows you to access a maximum of 7 different items per session. Those items can be accessed as often as you | |||
Updated: 9, 2005 | Rating: 0 | Author: Brian Rice | Size: 1769 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
345. | KeyboardTest 2.2 (passmark.com) | ||
KeyboardTest is an easy to use Windows based application that allows users to quickly check that all the keys on their computer keyboard are functioning correctly and look at the internal scan codes being generated by the keyboard. The down and up stroke of each key is registered and highlighted on a | |||
Updated: 9, 2005 | Rating: 37 | Author: David Wren | Size: 696 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
346. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
347. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of backup copies of the | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
348. | Eraser 5.3 (tolvanen.com) | ||
The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
349. | Filzip 3.04 (filzip.com) | ||
extracting, testing and emailing archives with one click. It's really | |||
Updated: 9, 2005 | Rating: 16 | Author: Philipp Engel | Size: 1199 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
350. | Folder Guard Professional 7.5 (winability.com) | ||
modified in any way. When Folder Guard hides a folder, the folder-s contents becomes invisible to all applications including Windows programs like Explorer, applications like Office, and even MS-DOS programs. You can require password access to the protected folders to keep away unauthorized visitors | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 1235 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Highway software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|