|
||||||
|
||
|
Home > Share information software |
Related keywords: information, share, personal information manager, Information, Personal Information Manager, information manager, share ware, information security, information management, Share |
|
|
341. | Email Spy Pro 4.5 (email-spy.biz) | ||
email activities of a child or spouse or want to monitor an employee's use of company or personal emails during business hours, Email Spy Pro automatically sends you a copy of all SMTP-based emails that was | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
342. | eXtended Task Manager 1.95 (warecase.com) | ||
give fast solutions for sudden problems which may arise in a product's functioning. - Debugging and improving application development. - A rich workstation investigation tool. - White box testing sessions for the QA department. - Investigation tool for integration possibilities. - And much | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Ritter | Size: 2464 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
343. | Filehand Search 3.0 (filehand.com) | ||
view. Scroll and search through extracts in the results to find the information you are looking for without having to open the file. Or, click to open a file. Use the simple or the advanced input forms to enter Boolean queries. Results are shown sorted in order of relevance. In the list view, results can be sorted by file name, date, size, etc. Use tabs to set up different search | |||
Updated: 9, 2005 | Rating: 0 | Author: Elliot Mednick | Size: 683 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
344. | Folder Protection 2.1 (folder-protection.com) | ||
Folder Protection is ideal for notebooks. Prevent confidential information from ending up in the wrong hands. A folder can be protected simply by right-clicking on it within Windows Explorer. Attempting to open the folder will bring up the Folder Protection password dialog. The protected folders cannot be copied or deleted while they are locked. Folder Protection lets you set a | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Cadwallen | Size: 786 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
345. | FolderSafe 2.1 (occultsoft.com) | ||
to non-virtual files and folders of your choice, manage your net shares. If you want to improve security of some sensitive folders/files, FolderSafe can help. FolderSafe Features - Office XP style UI - Easier to utilize - Complete control over access to your choice - Protection from both the | |||
Updated: 8, 2004 | Rating: 120 | Author: Ken Li | Size: 3066 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
346. | GetDataBack for FAT 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, FAT or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted... Recover even when Windows doesn't | |||
Updated: 9, 2005 | Rating: 1267 | Author: Ragnhild Fesel | Size: 2811 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
347. | GetDataBack for NTFS 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, MTF or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted... Recover even when Windows doesn't | |||
Updated: 9, 2005 | Rating: 1729 | Author: Ragnhild Fesel | Size: 2789 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
348. | Ghost Keylogger 3.80 (keylogger.net) | ||
keylogger - Monitor your computer while you are away - Retrieve lost information - Parents can monitor their children activity - Monitor what and when programs opened - Find out what you actually wrote Would you like to know what people are doing on your computer? Ghost Keylogger is an invisible | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
349. | Hara-Kiri 2.02 (cyteg.com) | ||
3. You are a secret agent and have dealings with confidential information... Suddenly enemies burst into your headquarters... You, don't stopping skirmish :-), are clicking on "Hara-Kiri" shortcut or press hot key and... even tortures will not help them to profit by important secrets... "Hara-Kiri" is a radical way to keep your confidential data away from unauthorized access by | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
350. | HexCmp 2.19 (fairdell.com) | ||
synchronous scrolling; an Info panel, which shows the file information in different formats and more, this program will most definitely become an asset for both home users and companies. Instead of the full files comparison, upon loading you can compare just the current parts of the files, displayed on the screen, which saves you your working time. HexCmp supports files up to 2 | |||
Updated: 2, 2006 | Rating: 132 | Author: Fedor Mishin | Size: 687 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
|
Home > Share information software |
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|