|
||||||
|
||
|
Home > Knowledge software |
|
|
31. | ieSupportManager 1.50 (iecomputersystems.com) | ||
ieSupportManager is a fully featured desktop and web based helpdesk system. Features include a web interface, email notifications, email logging, knowledgebase, contract management facilities and a comprehensive suite of reports. ieSupportManager allows users to add to and search its knowledgebase and | |||
Updated: 2, 2006 | Rating: 0 | Author: Stephen McNamee | Size: 14336 kb | Demo Go to category: System Utilities > Other Similar programs | |||
32. | TurboDemo 7.0 (turbodemo.com) | ||
outs, balloons, narration and interactions without any programming knowledge. Software Demos and Tutorials those are so easy to create. It is so simple. In only 3 Steps: 1: Record and Capture your screen activity 2: Edit and add your comments 3: Export and play back Use TurboDemo a) as a teaching tool to create interactive training and courses b) for sales and | |||
Updated: 2, 2006 | Rating: 128 | Author: Marc Schuler | Size: 14347 kb | Shareware Go to category: Audio & Multimedia > Presentation Tools Similar programs | |||
33. | Program Protector 2.1 (blumentals.net) | ||
is very easy to use and does not require any special computer knowledge. Program Protector is unique, because unlike other protection software, it is safe against circumvention. Malicious users can not disable protection by renaming the protected program's executable file or even uninstalling Program Protector itself. Key features: * Protects Windows applicaions with a | |||
Updated: 2, 2006 | Rating: 0 | Author: Karlis Blumentals | Size: 1300 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
34. | Personal Antispy 1.2 (blazingtools.com) | ||
trojans and other spy software. Personal Antispy is based on wide knowledge of spy software behavior and made by professionals in this area. Remember - antivirus is not enough! Antivirus software and firewalls cannot detect most keylogger programs. Top 7 reasons to own Personal Antispy: You have confidential information on your computer (bank account information, credit card | |||
Updated: 2, 2006 | Rating: 0 | Author: BlazingTools Software | Size: 327 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
35. | OE-Mail Recovery 1.7.7 (oemailrecovery.com) | ||
help you'll perform Outlook Express Recovery in 5 steps. No special knowledge is required to repair Outlook Express. OE-Mail Recovery is like insurance for your Outlook Express Emails. If, all of a sudden, you can't see any emails in an Outlook Express folder and it become necessary for you to repair | |||
Updated: 2, 2006 | Rating: 925 | Author: Victor Bobrov | Size: 944 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
36. | Junk-Out for Outlook 2003/2002/2000 1.0 (theofficemaven.com) | ||
it. Then it gets better with every e-mail you receive, adding to its knowledge from experience and the training you give it with just a click of the mouse. The Basic Version (Basic) keeps it simple: just use it as you find it at installation, and train it by marking any messages that are | |||
Updated: 2, 2006 | Rating: 0 | Author: Mike Craven | Size: 10536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
37. | Evidence Exterminator 2.14 (softstack.com) | ||
Windows registry? Did you know that anybody with a minimal computer knowledge including your spouse and children, your boss and the police can easily extract detailed information about your activities and use it against you? Did you also know that when you delete your files using the Delete command | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
38. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
your computer. Completely destroy information stored without your knowledge or approval: Internet history, Web pages and pictures from sites visited on the Internet, unwanted cookies, chatroom conversations, deleted e-mail messages, temporary files, the Windows swap file, the Recycle Bin, previously | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
39. | 4UOnly 1.2.7 (dillobits.com) | ||
of discovery. 4Uonly overcomes this problem by capitalizing on the knowledge that your identity was authenticated when you logged in to windows. It uses your own unique Windows security fingerprint to encrypt and decrypt your password crypt file. Your password list can only be viewed without providing | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
40. | 4UOnly 1.2.7 (dillobits.com) | ||
of discovery. 4Uonly overcomes this problem by capitalizing on the knowledge that your identity was authenticated when you logged in to windows. It uses your own unique Windows security fingerprint to encrypt and decrypt your password crypt file. Your password list can only be viewed without providing | |||
Updated: 2, 2006 | Rating: 0 | Author: Dillobits Software Dillobits | Size: 640 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Knowledge software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|