|
||||||
|
||
|
Home > Temporary files software |
Related keywords: files, hide files, Files, PDF files, temporary, compare files, protect files, duplicate files, delete files, recover files |
|
|
401. | LFNit! 3.6 (crystalsoftware.com.au) | ||
software has compressed, backed up, copied, moved or tranferred your files, use LFNit! to restore the long filenames with the completely portable .BAT file! Very useful with old software. Safe- doesn't use direct disk access. FAT32 compatable. What's New in v3.6 ================== * | |||
Updated: 9, 2005 | Rating: 0 | Author: Simon Carter | Size: 442 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
402. | LinkFerret-Remote Capture Agent 3.10.447.0 (baseband.com) | ||
sample network traffic. Non-technical personnel can capture files and automatically forward results. It can even be invoked by other programs. Its ability to function in environments that many popular monitoring tools do not support, such as 802.11B/G or on multiprocessor platforms, make it a good transitional tool. Data can be captured using the advanced LinkFerret technology | |||
Updated: 9, 2005 | Rating: 16 | Author: David Ebert | Size: 1220 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
403. | Lock Folder 5.0 (realclicks.com) | ||
Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
404. | DustBuster 2.8.2 (casperize.com) | ||
is a garbage file removing utility for Microsoft Windows operating systems. It searches for junk files and temp files that are of no use and are just taking space on your hard drive. Based on a "fuzzy logic" scanning technology, DustBuster cleans over 1500 different types of useless temp files and directories in a single click, detecting and deleting all | |||
Updated: 9, 2005 | Rating: 179 | Author: Casper&McAlba Casper&McAlba | Size: 302 kb | Freeware Go to category: System Utilities > System Maintenance Similar programs | |||
405. | Easy Remover 2004 Lite 3.0 (r4u-soft.com) | ||
Applications, StartUp Manager, Task Manager and Privacy Manager. It's new and one of the best ways to totally control your computer and make system more stable. You can easily and safely uninstall programs, allows you to inspect and control the programs that run automatically on startup, lists and controls all currently running processes, protects your privacy by deleting the | |||
Updated: 9, 2005 | Rating: 0 | Author: R4U Soft | Size: 3946 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
406. | Easy Remover 2004 Pro 3.0 (r4u-soft.com) | ||
is a very insecure place, and your browser can accept all kind of files from others(even if you do not want this to happen). In a few seconds you can easily clean up your browser's cache, temporary Internet files, delete cookies, History files, typed URL's, list | |||
Updated: 9, 2005 | Rating: 0 | Author: R4U Soft | Size: 3074 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
407. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of backup copies of the | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
408. | Find Protected 2.0 (aks-labs.com) | ||
Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
409. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
There is a number of the equipment controlled through a serial port from a PC or a terminal. Also there is a lot of the technologies in the market allowing to operate remotely the consecutive devices through the network TCP/IP. These solutions contain, both software and the hardware. Our company as well has | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
410. | EzCrypt+ 2.01 (kmgi.com) | ||
Internet" (Forbes). EzCypt+ adds Encrypt option to your mouse’s right button menu. Just enter your password, and your file will be converted into self-expendable password-protected file. For you, opening the file will be as easy as clicking the file and typing in your password, but for a hacker it would become an impenetrable fortress. “Encrypt | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Konanykhin | Size: 616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Temporary files software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|