|
||||||
|
||
|
Home > Touch files software |
Related keywords: files, hide files, Files, PDF files, compare files, touch, touch typing, protect files, duplicate files, delete files |
|
|
351. | Rocket Retriever 3.0 (pankhurst.com) | ||
Retriever organizes your computer's files into an easy to search list. Enter partial or full names to view all files with matching text in their names, ready to run or open. And pressing the Enter key on the entry runs the program, or launches your favorite program to let you view or edit the file. For example, typing in CAT lets you look for cat | |||
Updated: 9, 2005 | Rating: 0 | Author: David Pankhurst | Size: 707 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
352. | Router Tester 1.0 (Build 10.4) (noeld.com) | ||
will add it to the next update. Please read the included readme.txt file for instructions. Router Tester is an application to help DynSite users to accurately identify the path to the HTML status page of their | |||
Updated: 9, 2005 | Rating: 0 | Author: Noel DANJOU | Size: 119 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
353. | SafeData Technology Suite 1.0 (codetek.com) | ||
create a virtual safe for totally private document storage. SafeFile’s™ virtual safe prevents anyone else who uses the same computer from being able to access any files you place inside the virtual safe. SafeClean™ quickly removes Internet history files and caches that can allow | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Thompson | Size: 2365 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
354. | SecurDesk! 5.32 (cursorarts.net) | ||
a complete replacement for the Windows default Explorer.exe desktop/file manager shell. SecurDesk! Features Include: a desktop interface which can be custom designed; Logging of system usage; Enhanced file management with optional restrictions; Virtual desktops; Data protection with | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
355. | Password Depot 2.0.8 (hello-engines.com) | ||
security: You can use the lock function to restrict other user’s access to your personal passwords. - Passwords analyzer: Check and improve the quality of your passwords. - Decrypt and encrypt external files. - Use variables in URLs to meet all the requirements. - Support of TANs for online banking. - Import/export of passwords from/to other password | |||
Updated: 9, 2005 | Rating: 0 | Author: AceBIT GmbH | Size: 5265 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
356. | Password Protected Lock 2.91 (softfolder.com) | ||
the Windows multiuser system, but doesn't save its passwords in PWL files! This is a password-protected desktop security utility that lets you lock your desktop with a password on boot, or at the time you are leaving your PC. Try our Password Protected Lock for free. Password Protected Lock is an | |||
Updated: 9, 2005 | Rating: 0 | Author: SoftFolder Inc | Size: 724 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
357. | PC Security 6.4 (tropsoft.com) | ||
your computer with the following security options: Explorer Control, File Lock, Folder Lock, System Lock, Internet Lock, Shortcut/Program Lock, Restricted System, Window Lock, intruder Detection with Alarm, Flexible and complete password protection and Drag and Drop support. A very powerful and easy to | |||
Updated: 9, 2005 | Rating: 18 | Author: Silvio Kuczynski | Size: 1100 kb | Demo Go to category: System Utilities > Other Similar programs | |||
358. | PointCapture 1.0 (softwaresubmit.net) | ||
take you a long time to find by yourself by opening PowerPoint files one-by-one. Locate all PowerPoint slides with only certain text, numbers (or both) in them. Locate PowerPoint files that meet certain PowerPoint File Properties criteria, such as Author and create date. You can even search custom fields. Do a combined File Properties and slides search, such | |||
Updated: 9, 2005 | Rating: 0 | Author: Kalani Thielen | Size: 516 kb | Commercial Go to category: Business > Office Suites & Tools Similar programs | |||
359. | PowerKey 2.0 (gals1.chat.ru) | ||
online. PowerKey uses encryption types, which comply with U.S. export restrictions. It allows you to perform block encryption of files and folders with any of the 8 well-known crypto algorithms (Blowfish, Cast, 3Des, Des, Gost, RC2, Rijndael, Twofish). At first, the data is compressed using zip method with ratio 0..9 (available on selection) to speed up the encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Nick Nifontov | Size: 1062 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
360. | ProBot SE 2.3.0 (nethunter.cc) | ||
and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer owner for the exact reconstruction of the computer usage. ProBot SE is very suitable for monitoring | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Touch files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|