|
||||||
|
||
|
Home > Wanted software |
Related keywords: Most Wanted Iraquis, Iraqi Most Wanted Deck of Playing Cards, Iraq s 55 Most Wanted |
|
|
401. | Stealth Folder Hide XP 9.3 (folder-hider-stealth.com) | ||
Hide any folder on your PC. With Stealth Folder, folders and files can't be deleted, viewed, modified, or run. Stealth Folder Operates in Stealth mode, special hotkey is required to pull it up. Stealth Folder is not visible in Start, Toolbar, Taskbar, Add/Remove Programs or CTL ALT DEL.. Stealth Folder is | |||
Updated: 2, 2006 | Rating: 0 | Author: Ben Nelson | Size: 540 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
402. | StatWin Pro 7.1 (statwin.com) | ||
StatWin is a comprehensive computer activity monitoring solution for individuals and businesses. It gives you valuable statistics. It lets you analyze how effectively you or your employees are using computers. The software counts aggregate operation time, average operation time per day and per run for a given | |||
Updated: 2, 2006 | Rating: 16 | Author: Vitaly Dvorak | Size: 1320 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
403. | SQL2000Print 1.10.78 (starprint2000.com) | ||
Document your Microsoft SQL Server 2000 database by printing its objects (tables, views, Stored Procedures, etc.) in your own custom style. You can print Database Roles, Defaults, File Groups, FullText Catalogues, Log Files, Rules, Stored Procedures, System Datatypes, Tables, Transaction Logs, User Defined | |||
Updated: 2, 2006 | Rating: 0 | Author: Joginder Nahil | Size: 3695 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
404. | Spy Lantern Keylogger 5.1 (spy-lantern.com) | ||
Spy Lantern Keylogger is a spy software intended for monitoring all aspects of user activity. It allows you to see what exactly they are doing on your PC. You can see every keystroke they've typed in every application. This means that you can get every reply they've done in online chat, every e-mail they've | |||
Updated: 2, 2006 | Rating: 70 | Author: Eric Nilsson | Size: 1370 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
405. | Space Hound 32 3.0.583 (fineware.com) | ||
Sniff out wasted space with The Best Duplicate File Finder available. Space Hound 32 eliminates duplicate and unused files that are cluttering up your hard drive and causing problems. Make your operations faster because your system doesn't have to look through thousands of unnecessary files to find the ones | |||
Updated: 2, 2006 | Rating: 0 | Author: Al Meadows | Size: 4980 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
406. | SmartVersion 2.0 (smartversion.com) | ||
of the original file. For example, as a landscape designer, you may want to use Smart Version to create several versions of your landscape project with proposed changes. They can be emailed to your client for a review and feedback. Only the first version of the file has the size of the original project. Then, as you both move along with the project, you email each other only Smart | |||
Updated: 2, 2006 | Rating: 0 | Author: Gilles Vollant | Size: 343 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
407. | 1-Click SignupShield Suite 4 (protecteer.com) | ||
password and a disposable email address for every web site you want to sign-up to. It fills the sign-up form for you and then encrypts and stores the generated passwords and email addresses for later use during sign-in. SignupShield's disposable email address service forwards emails sent to a disposable address, to your real inbox protecting you from spam. SignupShield tracks your | |||
Updated: 2, 2006 | Rating: 0 | Author: Protecteer LLC | Size: 3000 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
408. | Set Point 1.4.04 (easydesksoftware.com) | ||
apart or select everyday to create one. Select the time of day you want System Restore Points to be created, or tell Set Point how many minutes after bootup to create one. Set Point will do the rest. You will never be left without a current restore point. Set Point can be set to not run if the next restore point is not that day. Set Point can also be set to shut down after | |||
Updated: 2, 2006 | Rating: 0 | Author: Easy Desk Software | Size: 1626 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
409. | ABC Security Protector 5.23 (getfreefile.com) | ||
up like the F5, F6 and F8 keys. The program is very useful if you want to disable the lowlevel access to your system. It's easy to use, excellent online help is also available. Try our password and security tools, free downloads. This nice free security utility enables you to protect your PC by | |||
Updated: 2, 2006 | Rating: 39 | Author: Ixis Ltd | Size: 563 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
410. | Security Administrator 10.14 (softheap.com) | ||
Restrict access to your PC with Security Administrator. This password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your desktop. You can deny access to each individual component of several Control Panel applets | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Wanted software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|