|
||||||
|
||
|
Home > To do lists software |
Related keywords: lists, mailing lists, grocery shopping lists, word lists, playlist smart lists, extended play lists, phone lists, Lists, distribution lists, gift lists |
|
|
391. | Easy Remover 2004 Pro 3.0 (r4u-soft.com) | ||
you ever wondered if there is a program able to completely cleanup, uninstall, manage your computer, and protect your privacy? We have the solution: Easy Remover 2004 Pro v.3.0! Completely uninstalls programs, detects phantom programs, startup manager, task manager, and a privacy keeper for Windows and | |||
Updated: 9, 2005 | Rating: 0 | Author: R4U Soft | Size: 3074 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
392. | Outlook Extractor 2.0 (mazepath.com) | ||
your folders, everything is easy and automatic! Both From: and To: addresses are extracted, including multiple recipients, with NO DUPLICATES! You get a clean mailing list, saved in a simple text file which is perfect to import or even cut and paste into your favorite program, mailing list manager, word processor, or spreadsheet! Save your time and let | |||
Updated: 9, 2005 | Rating: 0 | Author: William Smith | Size: 1897 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
393. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
privacy and compatibility problems. (Additional costs range from $49 to $179 per license = Thousands.) E.M. can monitor thousands of computers from just one computer, one installation, one license; 3) Technical Complexity- Employee Monitoring is simple, anyone can install and operate it; 4) | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
394. | Find Protected 2.0 (aks-labs.com) | ||
Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
395. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
Also there is a lot of the technologies in the market allowing to operate remotely the consecutive devices through the network TCP/IP. These solutions contain, both software and the hardware. Our company as well has the like solution: it is a product for the remote control of consecutive devices ENSD. Nowadays there are more and more devices with interface USB as alternative | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
396. | f2xml 1.0 (boulderwall.com) | ||
Do you need better control over your filesystem? f2xml provides that control. f2xml creates customised XML, HTML or TEXT based reports on your file system or removable storage (CD's, floppy disks, etc). The HTML and TEXT based output provide self contained reports. The XML format allows for further f2xml creates customised XML, HTML or TEXT based reports on your file system or removable storage (CD's, floppy disks, etc). GUI, command line or DLL interfaces | |||
Updated: 9, 2005 | Rating: 86 | Author: David Metcalfe | Size: 600 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
397. | Family Key Logger 2.40 (kmint21.com) | ||
Key Logger - this is the best choice, if you want to know what others are doing on your own computer while you are not at home (or office). Install Family Keylogger, set options "Start in hidden mode" and "Hide in task list", so that it makes itself invisible to anyone. After you return, you can just press keystroke to unhide. Family Keylogger - You have | |||
Updated: 9, 2005 | Rating: 1319 | Author: Mikhail Kalinskiy | Size: 93 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
398. | Family Keylogger 2.70 (spyarsenal.com) | ||
Keylogger - this is the best choice, if you want to know what others are doing on your own computer while you are not at home (or office). Install Family Keylogger, set options "Start in hidden mode" and "Hide in task list", so that it makes itself invisible to anyone. After you return, you can just press keystroke to unhide. Family Keylogger - You have | |||
Updated: 9, 2005 | Rating: 726 | Author: Mikhail Kalinskiy | Size: 532 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
399. | FastSum 1.9 (fastsum.com) | ||
algorithm, as a matter of fact FastSum is a Windows MD5 Checker. You do not have to be afraid of these unintelligible words, all you have to know is – how to run FastSum. You can rectify the errors occurring while data transfer. For example: Network transfers, CD-R and DVD | |||
Updated: 9, 2005 | Rating: 42 | Author: Kirill Zinov | Size: 424 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
400. | File Recover 4.15d (filerecover.com) | ||
Recycle Bin purges older files all the time in the normal course of doing its job. File Recover is an easy-to-use file recover and undelete program, designed to restore accidentally deleted files. It supports hard disks for FAT12, FAT16, NTFS and FAT32 file systems (all Window vers.) | |||
Updated: 9, 2005 | Rating: 83 | Author: Nils Rognerud | Size: 669 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > To do lists software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|