|
||||||
|
||
|
Home > Acrobat key software |
Related keywords: acrobat, Acrobat, Adobe Acrobat, adobe acrobat, Adobe Acrobat Reader, search adobe acrobat, compare adobe acrobat, index adobe acrobat, Acrobat file |
|
|
391. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
parents are outside of the home they can remotely monitor children's PC activity using this software. A security service could monitor employee's PC activity from any Internet host in the world to prevent industrial espionage. For local Intranet networks a system administrator can monitor correctness of user's PC activity and restore activity history in any case of | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
392. | Perfect Keyboard PRO 6.30 (pitrinec.com) | ||
by typing a short abbreviation (text shortcut) or pressing a hotkey (key shortcut). The Perfect Keyboard supports macro recording (keyboard and/or mouse events) so that user can simply record macros rather than program them. The Perfect Keyboard scripting language (150+ commands) allows one to insert time and date, activate a window, launch applications, manage files and directories | |||
Updated: 2, 2006 | Rating: 16 | Author: Petr Pitrinec | Size: 1694 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
393. | PestPatrol 3.0 (safersite.com) | ||
access trojans (RATs), and more * Hacker tools: Password crackers, key loggers, port scanners, and more * Spyware: Rogue applications that phone home user and system information without permission. These pests create back doors into your PC, compromising privacy and data integrity. PestPatrol detects and disables or removes thousands of pests quickly and safely. PestPatrol | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
394. | PXE Boot Image for VMware, floppy image 1.0 (emboot.com) | ||
boot agents for VMware are client-based 'virtual' firmware that allows a VMware client VM to do a "network boot” using the virtual NIC. Our boot agents for VMware are fully compliant with the Intel Wired for Management - Preboot Execution Environment (PXE) specification. PXE is the defacto industry standard protocols/APIs for network booting. By working closely with VMware | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Marfisi | Size: 67 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
395. | Qubit Master 2.1 (quantum-intelligence.com) | ||
task by giving out a single voice command, menu selection or key combination. For example, say 'Send weekly report to Bill' and it will open a new e-mail message, address it to 'Bill', fill the subject line with 'Weekly report' and format the message body. Or, press Control, Shift and 'H' keys and it will take you to the Hotmail site, enter the user name and password | |||
Updated: 9, 2005 | Rating: 0 | Author: Branislav Vasilijevic | Size: 6571 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
396. | RAM Saver Pro 5.0 (wintools.net) | ||
Easy-to-use RAM optimizer tool that will keep your computer running faster. It increases the operation system performance by making more memory available for your applications. RAM Saver Pro will: - defragment system memory for faster access time; - increasing the efficiency of your CPU and Motherboard | |||
Updated: 2, 2006 | Rating: 164 | Author: Ruslan Smekalov | Size: 406 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
397. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
and encrypts backup files using a choice of encryption methods and key lengths: DES, TDES-128, AES-128, AES-192, AES-256, or Blowfish (up to 448 bit key length.) RBackup then sends backup files off-site to the RBackup Server through the Internet, Intranet, or direct dial-up modems. RBackup has many failsafe features, and conforms to standard backup methodology. RBackup can be | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
398. | Reg Organizer 3.1 (chemtable.com) | ||
performance. You can thoroughly search the Registry to find all the keys related to a certain application - Reg Organizer does this job quicker and better than other similar programs. Other Reg Organizer features include the ability to find and replace the Registry entries, automatic Registry cleanup, configuration files management (manages various types of configuration files | |||
Updated: 2, 2006 | Rating: 0 | Author: Konstantin Polyakov | Size: 1440 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
399. | RegWorks 1.3.2 (regwrks.com) | ||
and inactive (unloaded) ones. The program can also compare registry keys. In addition, RegWorks also monitors registry access. It displays names of applications and processes that access registry keys and logs all relevant data (returned function code, registry key accessed, registry values etc.). This feature is critical to quickly diagnosing and solving any access | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Loskutov | Size: 896 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
400. | RemoteExec 3.07 (isdecisions.com) | ||
Explorer version, Service Pack level, or a specific registry value/key. - Create and save RemoteExec actions and target computer lists as templates for future use. - Detailed activity result logging. - Command line mode, to remotely run RemoteExec actions from a script or with the task | |||
Updated: 9, 2005 | Rating: 0 | Author: Alastair Volrath | Size: 527 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
|
Home > Acrobat key software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|