|
||||||
|
||
|
Home > Personal information software |
Related keywords: information, personal, Personal, Personal Finance, personal information manager, Information, personal finance, Personal Information Manager, information manager, personal organizer |
|
|
361. | KeyboardTest 2.2 (passmark.com) | ||
image of a keyboard. Each time a key is pressed a variety of state information is updated in the window. Although desktop keyboards can be quickly and cheaply replaced, this is not the case for laptop computers where the keyboard is integrated into the computer itself. The failure of even a single key | |||
Updated: 9, 2005 | Rating: 37 | Author: David Wren | Size: 696 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
362. | Keyring 1.0.1 (morello.co.uk) | ||
is the easy and secure way to manage all your passwords, PIN's and other account information. These days it is almost impossible to keep track of all the different passwords you use in your day to day life. It is easy to fall into bad habits - using easily guessable passwords, using the | |||
Updated: 9, 2005 | Rating: 0 | Author: Tom Duncan | Size: 178 kb | Demo Go to category: System Utilities > Other Similar programs | |||
363. | Lock Folder 5.0 (realclicks.com) | ||
security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
364. | Email Spy Pro 4.5 (email-spy.biz) | ||
Email Spy Control Panel. Unique feature of Email Spy is bypass of personal firewall software, like Zone Alarm, Norton Personal Firewall and other similar (i.e. personal firewall, installed on monitored computer, can't detect Email Spy operation). Also there is unique possibility of the | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
365. | Find Protected 2.0 (aks-labs.com) | ||
associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can do a deep inspection of employees' files to enforce an | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
366. | EZ Password Secure 1.2 (esmarttools.com) | ||
groups. Further more, EZ Password Secure can store all other personal information, e.g. bank accounts. Built-in Password Generator provides custom passwords. With the 1-Click function, you can paste the username&password to the clipboard, and also launch the associated web site. Key features: Encrypted database. The encrypted database can be accessed only with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Yunqing Feng | Size: 628 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
367. | File and mp3 tag renamer 2.2 (123renamer.com) | ||
program ,you can quickly and easily batch rename files and mp3's with a number of possibilities and options, including change case, change the file extension, insert string,delete string,replace/remove string ,set the file attributes&time stamps, and enumeration renaming allows you to add number sequences to your filenames. File And MP3 Tag Renamer also allow you to rename your | |||
Updated: 9, 2005 | Rating: 67 | Author: Walter David | Size: 750 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
368. | File Monster 2.6.7 (nstarsolutions.com) | ||
completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize the file as being present anymore, yet the information hasn't really been | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
369. | Find In Context 2.00 (inetprivacy.com) | ||
can read them straight away. So whenever you have a question to your personal electronic library, Find In Context will give you a direct answer, within seconds and without the hassle of having to launch any other programs to open the files. The program is HTML-friendly, which makes it particularly | |||
Updated: 9, 2005 | Rating: 0 | Author: iNetPrivacy Software | Size: 343 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
370. | FingerPoint 1.4 (neurotechnologija.com) | ||
application in enterprises where frequent and reliable check-ups of personal identity are needed. It allows to avoid using of paper documents or magnetic cards, which can be lost, stolen, forgotten, etc. Demo version allow enroll only 10 persons. For more information please contact us or review our Web Site. FingerPoint is an end user software package for person | |||
Updated: 9, 2005 | Rating: 16 | Size: 8012 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Personal information software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|