|
||||||
|
||
|
Home > File viewer software |
Related keywords: file, viewer, File, image viewer, file transfer, file management, file encryption, Viewer, picture viewer, file manager |
|
|
31. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
32. | Exe Icon Changer 4.269 (softboy.net) | ||
tool can replace the icon in the executable file easily very much ! Even the executable file compressed or the size of the icon is inconsistent, he can replace easily ! It can also change the icon of other executable file types such as Dll, Ocx, Scr and so on. The icon of folder and driver can be changed by Exe Icon Changer too. If you want to extract and save the icons | |||
Updated: 3, 2006 | Rating: 602 | Author: Zhang Yan | Size: 835 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
33. | Clean Disk Security 7.54 (diskcleaners.com) | ||
program gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk cleaning method is now available as an option | |||
Updated: 3, 2006 | Rating: 16 | Author: Kevin Solway | Size: 660 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
34. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
35. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
36. | AdmWin 7.5 (wennstrom.org) | ||
and event log records from multiple Windows machines. Search for files and calculate directory sizes across multiple machines. View remote Windows services and processes. Manage remote Windows machines with the remote command prompt. AdmWin is a Windows, Linux & Novell network toolkit. Batch | |||
Updated: 3, 2006 | Rating: 190 | Author: Wennstrom Software | Size: 3449 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
37. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
38. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
39. | WinCatalog Standard 1.53 (wincatalog.com) | ||
to the catalog not only disks and folders, but also the individual files. There is one more new feature: WinCatalog Standard supports non-file items enabling you to catalog your books, videos or even postage stamps and coins! The main program window is split in three parts providing | |||
Updated: 3, 2006 | Rating: 42 | Author: Michael Rusakov | Size: 1667 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
40. | ArtTraderUK 2.0 (arttraderuk.net) | ||
http://www.arttraderuk.net/desktop, which can be used directly to view the artworks. The readme.txt file has details of how to configure the Web channel and screen saver settings. A screen saver displaying the orginal artworks of British artists exhibited by dealers of the ArtTraderUK website. The screen saver cycles through a random selection of the artworks available at | |||
Updated: 3, 2006 | Rating: 0 | Author: Darren Berry | Size: 20 kb | Freeware Go to category: Desktop > Similar programs | |||
|
Home > File viewer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|