|
||||||
|
||
|
Home > All in one software |
|
|
351. | DirSize 4.7.1 (crystalsoftware.com.au) | ||
from being displayed. Both 32 bit and 16 bit versions are included, all support long filenames. Full scrolling support in either direction. Now includes HTML output option. Its uses include: Finding space hogs on a network Finding multiple copies of a single application on a server Finding which folders could be archived to save space (typically those that contain lots of | |||
Updated: 2, 2006 | Rating: 0 | Author: Simon Carter | Size: 760 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
352. | Directory Report 24.2 (file-utilities.com) | ||
find duplicate files, rename files, and maintain your files - all in 1 tool Why buy separate programs for each feature when you can buy the one program that does it all Print a directory tree of an entire disk or a single directory Prints .DLL, .EXE version information Prints .AVI, .MP3, .MSI, and .WAV properties Prints to a printer, text file | |||
Updated: 2, 2006 | Rating: 0 | Author: Allan Braun | Size: 7985 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
353. | DeviceLock 5.73 (ntutility.com) | ||
administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
354. | DeviceLock 5.73 (protect-me.com) | ||
administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
355. | Desktop Resetter 1.7.2 (nouturn.com) | ||
all shortcut and icon junkies!!! .....do your icons tend to move with no help from you? Do you find it frustrating to always have to put them back? Want to do restore everything with a few clicks? Desktop Resetter to the rescue! Just hit "remember" for each resolution and with a click of a button you can sit back and watch everything fly back into place! Desktop Resetter is an | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Damato | Size: 809 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
356. | Delenda 2.415 (peccatte.karefil.com) | ||
replicate folder structure when moving files and leave a shortcut in source folder after files transfer to archiving location. 3 methods for deletion or move tasks: - delete old files immediatly - delete files and send files to Recycle Bin - transfer aged data toward an archive folder. Can be used to dispatch files, monitors number of files in each structure. It | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
357. | CryptoCrat 2005 4.61 (secureaction.com) | ||
XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating self-decrypting exe archives. To | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
358. | CryptIt 1.301 (SinnerComputing.com) | ||
to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) CryptIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
359. | CompreXX 4.1 (mimarsinan.com) | ||
Behave Like Folders in Explorer! Browse, copy files from, and add files to archives just like any regular folder. Drag and drop, copy and paste files to and from the archive folders. Perform all archive tasks without ever leaving Explorer, including converting archive types from one to another. Right-Click Explorer Extensions! Create any archive type from the | |||
Updated: 2, 2006 | Rating: 197 | Author: Sinan Karaca | Size: 5360 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
360. | CD Tray Pal 1.0.56 (e-systems.ro) | ||
is a handy utility that acts as a CD-ROM Drive control menu. It runs in the system tray and makes opening/closing CD door easier than ever, even on multiple CD-ROM drives! Features: - Autorun at system startup - Runs as system tray icon - Capable of handling multipe CD-ROM Drives - OpenCD | |||
Updated: 2, 2006 | Rating: 207 | Author: Emsa Systems | Size: 179 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > All in one software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|