|
||||||
|
||
|
Home > Away software |
|
|
341. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
network. Our product allows to use any USB equipment located far away through the TCP/IP network. There is a number of the equipment controlled through a serial port from a PC or a | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
342. | File Tutelary 1.12 (siskinsoft.com) | ||
can encrypt any file with a password so your documents are kept safe away from prying eyes. It also includes many features such as step by step to make it easier to use. What's FileTutelary ? -------------------------------------------------------------------------------- FileTutelary is a shareware to | |||
Updated: 9, 2005 | Rating: 42 | Author: Ricky Chen | Size: 570 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
343. | Find In Context 2.00 (inetprivacy.com) | ||
files together in a single report, where you can read them straight away, and the built-in context viewer allows you to browse through bigger fragments of the original files instantly, without having to open them in other programs. The fast and flexible proximity search algorithm and the file access | |||
Updated: 9, 2005 | Rating: 0 | Author: iNetPrivacy Software | Size: 343 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
344. | Folder Guard Professional 7.5 (winability.com) | ||
You can require password access to the protected folders to keep away unauthorized visitors. On a user-by-user basis, you can allow or deny access to the files and folders of your choice, as well as to the removable drives, Start Menu and Control Panel. You can configure the protection so that users would not be able to download programs from the Internet or install them from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 1235 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
345. | Folder Security 2.5 (folder-security.com) | ||
and it will prompt you to remember your password, without giving it away to anybody else. This security software provides a simple and effective way to password-protect any type of documents including but not limited to .doc and .xls files. You can even password-protect Windows programs. It's a sound | |||
Updated: 9, 2005 | Rating: 0 | Author: Nicole Collet | Size: 755 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
346. | FolderBox 1.00 (baxbex.com) | ||
extension. Additional drives and folders are now just a mouse click away. Within a FolderBox you can copy and move, open and delete files, just as usual. FolderBox supports the typical drag & drop handling of files. It is fully interoperable with "standard" Explorer or the desktop. You can even use FolderBox inside Internet Explorer! FolderBox is an free extension for Windows | |||
Updated: 9, 2005 | Rating: 0 | Author: Carsten Paasch | Size: 796 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
347. | Fomine WinPopup 3.8 (fomine.com) | ||
has a contact list, which shows user status: online, offline, busy, away. Fomine WinPopup supports many useful features such as emoticons, autoanswer machine, send attached files, contact list sharing, sound on receiving and sending messages, history of messages, etc. The program has an impressive set | |||
Updated: 9, 2005 | Rating: 0 | Author: Vitali Fomine | Size: 1322 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
348. | GammaChron 1.0 (DesertViewSoftware.com) | ||
days, atmosphere data for selected day, events list indicates "Days Away", "Early Warning" for voice and pop-up notifications. Atmosphere Information - Current moon phase icon in system tray, sunrise, sunset, moonrise, moonset, synodic day and meteor shower data with notifications. Net | |||
Updated: 9, 2005 | Rating: 120 | Author: David Rinehart | Size: 1046 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
349. | Ghost Keylogger 3.80 (keylogger.net) | ||
applications of the keylogger - Monitor your computer while you are away - Retrieve lost information - Parents can monitor their children activity - Monitor what and when programs opened - Find out what you actually wrote Would you like to know what people are doing on your computer? Ghost Keylogger is an invisible easy-to-use surveillance tool that records every keystroke to an | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
350. | Hara-Kiri 2.02 (cyteg.com) | ||
(ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed, The files in a determined folders will be completely erased (without the possibility of | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Away software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|