|
||||||
|
||
|
Home > Modification software |
Related keywords: voice modification, visible light modification, modification date, last modification date |
|
|
401. | FontRenamer 1.0 (neuber.com) | ||
doesn't require installation, doesn't write to the registry, doesn't modify files outside of its own directories, isn't adware. FontRenamer is free and renames truetype font files (*.ttf) to the real name of the typefaces. Simply select a folder of font files and click Rename button. »Arial bold italic.ttf« instead of »arialbi.ttf« or »Brush Script.ttf« instead of | |||
Updated: 9, 2005 | Rating: 124 | Author: Alexander Neuber | Size: 51 kb | Freeware Go to category: Graphic Apps > Font Tools Similar programs | |||
402. | CopyProf 1.40 (time-river.com) | ||
Brief description If you need to sort (copy, move) files basing on formal criteria often CopyProf will help you automate this process. CopyProf is implemented as a console application (works under Win32 - v1.40, DOS and OS/2 - v1.11). Incoming files are placed in user defined archive formed basing on If you need to sort (copy, move) files basing on formal criteria often CopyProf will help you automate this process. CopyProf is implemented as a console application (works under Win32 - v1.40, DOS and OS/2 - v1.11) | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrey Sobolev | Size: 156 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
403. | Cryptainer LE Free Encryption Software 6.0.1 (cypherix.co.uk) | ||
behaves as a standard windows drive. The files can be read, viewed, modified, as well as moved from one place to another. Any kind of file - from word and excel documents to movies and pictures, can be encrypted. You can also send secure email attachments. It runs on all 32 bit versions of Windows (Windows 95, Windows 98, Windows ME, Windows 2000, Windows 2003 Server as well as | |||
Updated: 9, 2005 | Rating: 144 | Author: Cypherix Cypherix | Size: 2719 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
404. | CSDiff 5.0 (componentsoftware.com) | ||
reports. · Edit mode allows to accept, reject or manually edit any modifications. · Change detection by line, by word or by character. · Smart white-space difference analysis option. · Analysis of MS-Word documents. (MS-Word required) · Sophisticated folder difference analysis sorted by any key. · Support of compressed folders (ZIP files) for comparison between archived | |||
Updated: 9, 2005 | Rating: 97 | Author: David Matyas | Size: 1332 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
405. | dbfUtils 2.1.2.1 (aidsoft.com) | ||
is a convenient, full-featured utility for viewing, editing, modifying, converting and exporting DBF-format databasesIt allows you to add, delete, recall, sort, zap, pack records, view and edit tables, get detailed database information. It includes a hex viewer to view records, memos or the whole table.dbfUtils includes: Complete Statistics for numeric fields, Data Dictionary and | |||
Updated: 9, 2005 | Rating: 215 | Author: Del Geist | Size: 3068 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
406. | Desktop Lock 6.1 (toplang.com) | ||
Desktop etc. after your desktop was locked by the software, none can modify your document, access your computer or use programs on your | |||
Updated: 9, 2005 | Rating: 0 | Author: Cui Jiugang | Size: 604 kb | Shareware Go to category: Desktop > Other Similar programs | |||
407. | Personal Desktop Spy 2.10 (spyarsenal.com) | ||
the hot key, he or she will not be able to disable the snooper or modify any of its settings. Spy software for monitoring the activity of users on a PC by automatic capturing of desktop/active application screenshots and saving them to a specified directory on the hard drive. May be used for parental control or employee monitoring | |||
Updated: 9, 2005 | Rating: 0 | Author: Mikhail Kalinskiy | Size: 615 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
408. | DiamondCS ProcessGuard 3.150 (diamondcs.com.au) | ||
can easily be rendered null and void simply by terminating or modifying the host process. For example, a trojan could simply terminate your personal firewall before attempting to transmit your personal details over the Internet, effectively rendering the firewall useless and leaving the user with a false sense of security. Likewise, it could modify your antivirus program by | |||
Updated: 9, 2005 | Rating: 0 | Author: DiamondCS Support | Size: 1922 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
409. | DirDate 3.5 (crystalsoftware.com.au) | ||
line tool that can easily be automated to change files last modification date, creation date or last access date. It can change dates using either a reference file, the current date/time or a series of YEAR, MONTH, DAY, HOUR, MIN, SEC and MSEC commands. The 16-bit version included can be used to change folder, volume label and file entry dates, file sizes and attributes under | |||
Updated: 9, 2005 | Rating: 0 | Author: Simon Carter | Size: 624 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
410. | Disk Size Manager 1.41 (spadixbd.com) | ||
the conditions you may use is very wide contained text, creation/modification dates, size, attributes, etc. Disk Size Manager will help you to monitor the use of your resources so that you can avoid losing efficiency of your system. Disk Size Manager - a powerful hard disk space manager. Using Disk Size Manager you can keep track of your hard disks space to ensure its most | |||
Updated: 9, 2005 | Rating: 16 | Author: Spadix Software | Size: 1067 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Modification software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|