|
||||||
|
||
|
Home > King software |
Related keywords: KING JAMES, king james, john Zed King, King James Version, New King James Version, lotto king, Yi King, King Solomons Mines |
|
|
391. | Magic Folders XP 04.04.2 (pc-magic.com) | ||
and normal access to all your folders and the files within. There's no need to un-hide each file or folder individually. And Magic Folders is totally transparent. No one need know your invisible folders/files even exist. If you wish you can establish 5 different accounts so everyone using your computer can create their own invisible folders that only they have access to. Keep | |||
Updated: 9, 2005 | Rating: 243 | Author: Scott Chaney | Size: 649 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
392. | Memory Defragmenter 1.1 (abexo.com) | ||
Memory Defragmenter is a software to free up wasted RAM. What is memory (RAM) fragmentation? Windows programs use RAM (Random Access Memory) for their operations, however sometimes they fail to release the RAM after use. This means that parts of your RAM is occupied holding useless data and your computer | |||
Updated: 9, 2005 | Rating: 0 | Author: Abexo Marketing | Size: 619 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
393. | MemoryBoost Pro 2.5 (rosecitysoftware.com) | ||
and more reliably. Windows lets closed programs stay in memory; that's why you have to reboot your computer to keep the performance up. MemoryBoost solves this problem by reclaiming unused memory for your applications. They can run faster, and Windows has less work to do, resulting in more stability | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Carrillo | Size: 1847 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
394. | Farsighter 2.00 (bysoft.se) | ||
Farsighter monitors a remote computer invisibly by streaming video to a viewer on your computer. You will know exactly what is happening on the remote computer as you see it in real-time. Some applications are: - Monitor your computer from a remote location. - Parents can monitor what their children are | |||
Updated: 9, 2005 | Rating: 42 | Author: Jon Kagstrom | Size: 2900 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
395. | GRL RealHidden 1.0 (grltechnology.com) | ||
GRL RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of another file, and then retrieve that hidden file. The resulting 'cloaked' file, that is the file containing hidden file, usually operates exactly like the original file. This product gives you the power to | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
396. | Hara-Kiri 2.02 (cyteg.com) | ||
"Hara-Kiri" (ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
397. | HDD Temperature Pro 1.4.206 (hddtemp.com) | ||
users who have only single hard-drive and is totally free. Using S.M.A.R.T. technology included in all modern HDDs, HDD Temperature checks and monitors the temperature of your hard drives; you can also set the maximum value of drive temperature so that you will be warned should this temperature be exceeded. S.M.A.R.T. stands for "Self-Monitoring, Analysis and Reporting | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuri Alexandrov | Size: 2409 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
398. | Hermetic Stego 5.17 (hermetic.ch) | ||
Hermetic Stego is a steganography program which allows you to encrypt and hide a message (the contents of any computer file) in another file so that the addition of the message to the container file will not noticeably change the appearance of that file. If the file which has been hidden is deleted then | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
399. | Hide Folders XP 2.2 (fspro.net) | ||
Every day we trust our personal files to a computer. Most of us store various bits of personal or business-critical information on our hard drives. If you share your computer with co-workers, children, or a spouse, or your computer is always connected to the Internet, your private files are under threat of | |||
Updated: 9, 2005 | Rating: 173 | Author: FSPro Labs | Size: 1025 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
400. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
machine to another. Now included with Icon Lock-iT XP is Moon Valley's Security Suite which includes a Password Assistant and System Security Check. These new features will help the user construct a computing environment free of external threats. Includes many features designed for home users, shared computers, and the mobile professional. The self-decryptor lets you send or | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > King software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|