|
||||||
|
||
|
Home > Best buy software |
|
|
351. | Paragon NTFS for Linux 2.0 (pad.paragon.ag) | ||
or have already changed the default kernel, you will not probably be able to use this driver. If you are interested in buying or evaluating Paragon NTFS for Linux driver for any Linux distribution you should go to http://www.ntfs-linux.com/index.htm. Note: This package contains Paragon NTFS for Linux demo version as well. The demo version mounts NTFS partitions in read-only | |||
Updated: 9, 2005 | Rating: 0 | Author: Konstantin Komarov | Size: 2447 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
352. | Password Protect 3.4 (password-protect-software.com) | ||
That's all there is to do - the folder is protected. Should your PC be rebooted in Windows Safe Mode, DOS or another operating system, your data is safe. Unlike other utilities, Password Protect never stores passwords on your hard drive or in the Windows registry, where malicious users can easily get | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Tolliver | Size: 760 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
353. | Port Flash 3.0 (webroot.com) | ||
It is a unique and specialized tool that normally could only be acquired as a component of a more expensive solution. Webroot designed PortFlash to address the needs of system administrators. PortFlash encapsulates some very powerful features into a simple, time-saving network utility that is within easy reach of any budget. With this innovative Internet security tool, users | |||
Updated: 3, 2005 | Rating: 42 | Author: Steve Thomas | Size: 1409 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
354. | ProfileLink 3.00 (heptasoft.com) | ||
this, but none of them ware fully automatic. One way to do it could be to let the user select the profile when the mail client was launched, another could be to create a number of batch files that the user could invoke depending on his or her current location. The last method we will mention here is one that seems to be widely used and it relies on creating multiple | |||
Updated: 9, 2005 | Rating: 0 | Author: Jack Jensen | Size: 824 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
355. | Protector Plus for Exchange 7.2.F02 (protectorplus.com) | ||
the infected emails. Protector Plus ensures that the network will be free of viruses that spread through email. Protector Plus detects emails infected by all types of viruses, trojans and worms before they reach the user's inbox. Protector Plus for Exchange is packed with many useful features like remote management, email alerts, InstaUpdate, quarantine, compressed files scanning and | |||
Updated: 9, 2005 | Rating: 0 | Author: Kartheek S | Size: 2949 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
356. | RegVac Registry Cleaner 4.02.12 (superwin.com) | ||
- Ten Tools to Clean your Registry Why buy several programs to clean your registry when RegVac will do it all and more. Speed up your computer. Avoid computer crashes. Get your registry sparkling clean. And repair Windows and applications. Stronger cleaning power than other registry cleaners. Free updates. Some of the tools in RegVac are not available anywhere else. The | |||
Updated: 2, 2006 | Rating: 42 | Author: Ray Geide | Size: 1183 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
357. | RPN Engineering Calculator 6.3.2 (j-a-associates.com) | ||
save up to 4 numbers into memory, 2 of these storage registers can be used for register arithmetic; Lastx, retrieves the last number that was used; Drop, deletes the number in x-reg and Drops the number in y-reg into x-reg; xy, exchanges the values in the x-reg and y-reg; xВІ; square root of x; 1/x; | |||
Updated: 2, 2006 | Rating: 0 | Author: Jim Allen | Size: 1466 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
358. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
the occurrence of all critical events for corrective measures to be taken, manually or automatically, thus avoiding any undesired consequences. Sentry Pro Version features customized monitoring objects for servers (MS Exchange, MS SQL, MS IIS, MS ISA) and for OS Platforms (Windows 2000, NT, XP). Due to it's web based interface Sentry Pro can be configured and | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
359. | SoloKeep 2.0 (solostar.ca) | ||
encryption algorithm, SoloKeep ensures that no one else will be able to view your passwords without knowing your personal SoloKeep password. You'll never have to remember another username and password again. Features: Viewing your personal passwords is quick and easy. Passwords are stored behind encryption and password protection. Allows for an unlimited amount of | |||
Updated: 9, 2005 | Rating: 0 | Author: Brad Pineau | Size: 666 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
360. | Private Encryptor 6.2 (tropsoft.com) | ||
an extremely flexible and easy to use interface. Files/Folders can be Encrypted, Decrypted or Shredded right from the Windows Explorer when you right click. Since the Stealth Decryptor can be downloaded free from our website, the receiver of an encrypted email message does not have to buy the program. The latest in encryption technology to protect your sensitive data | |||
Updated: 9, 2005 | Rating: 0 | Author: Silvio Kuczynski | Size: 1540 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Best buy software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|