|
||||||
|
||
|
Home > Key robot software |
Related keywords: robot, Robot, News Robot, robot simulation, robot simulator, robot navigation, Web Robot |
|
|
31. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
and encrypts backup files using a choice of encryption methods and key lengths: DES, TDES-128, AES-128, AES-192, AES-256, or Blowfish (up to 448 bit key length.) RBackup then sends backup files off-site to the RBackup Server through the Internet, Intranet, or direct dial-up modems. RBackup has many failsafe features, and conforms to standard backup methodology. RBackup can be | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
32. | Quicknote 5.2 (jens.metz-furniere.de) | ||
on the top of your screen with the mouse or by pressing shortcut keys. In its resizable window you can jot down your notes and organize them in categories or even sketch small drawings. Still, this tiny tool has more possibilities than it seems on the first thought! Beneath the normal text functions, it can convert units, let you directly access frequently run programs, encrypt | |||
Updated: 2, 2006 | Rating: 16 | Author: Jens Müller | Size: 2086 kb | Freeware Go to category: Business > Other Similar programs | |||
33. | Access Administrator 4.14 (getfreefile.com) | ||
protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user "Admin" has | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
34. | Locked! 4.7.8 (jcmatt.com) | ||
securely protects your computer against access by others. It's proprietary multi-level structure integrates deeply within the Windows architecture, working with and controlling access until you unlock it with a password. Entries from the keyboard and mouse are blocked. Resetting or powering off the computer will not unlock it. Features include Boot Lock, StartUp Lock, Power Lock | |||
Updated: 2, 2006 | Rating: 0 | Author: James Matt | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
35. | Keylogger Pro 1.7 (exploreanywhere.net) | ||
KeyloggerPro is an advanced, low level stealth keystroke monitoring application that will secretly record and backup all keystrokes typed on your PC. It offers a wide variety of features including the ability to view keystrokes remotely by having the program send keystrokes to a specified email address every | |||
Updated: 2, 2006 | Rating: 257 | Author: Bryan Hammond | Size: 886 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | Keyboard Express 3.1 (keyboardexpress.com) | ||
of keystrokes to your windows applications with the touch of a key. These keystrokes can manually be entered in and assigned to over 700 hot keys. In addition, keystrokes can be captured “on the fly” as you are typing in one of your Windows applications. System date and times, symbols and more can be added for insertion into applications. Program activation, sound, repeats | |||
Updated: 2, 2006 | Rating: 0 | Author: Stan Jones | Size: 3044 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
37. | Cursor Hider 1.4.4 (softexe.com) | ||
with forms to fill in. At first you type the URL in the browser's address bar - www.softexe.com. What do you think about the dot behind softexe? To be or not to be (already typing)? For URL checking you have to take mouse and move the mouse pointer to the side of the screen. With Cursor Hider the | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
38. | CryptoCrat 2005 4.61 (secureaction.com) | ||
can only be unscrambled and read by someone who knows the secret | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
39. | ChatBlocker 2.6 (exploreanywhere.net) | ||
to ensure that they do NOT take place. When coupled with ChatBlocker's powerful security features, it's powerful stealth mode feature, and remote log viewing capabilities (via e-mail) - it makes ChatBlocker must have for any parent, employer, or anyone else looking to moderate Internet chat's! ChatBlocker is a desktop parental control application for moderating and | |||
Updated: 2, 2006 | Rating: 0 | Author: Bryan Hammond | Size: 1555 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
40. | Advanced Security Level 6.1 (softfolder.com) | ||
icons, local and network drives; disable Start Menu items, DOS, boot keys, Registry editing, taskbar, task manager and network access; lock screen with password; and much more. You can apply password protection for Windows and restrict users from running specific applications. Security restrictions can be applied to all or just for specific user. Advanced Security Level supports the | |||
Updated: 2, 2006 | Rating: 16 | Author: SoftFolder Inc | Size: 1065 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Key robot software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|