|
||||||
|
||
|
Home > 3 in a bed software |
|
|
421. | MirrorFolder 3.0 (techsoftpl.com) | ||
mirroring and automatic synchronization of folders/drives from a local drive to another local/network/removable drives. It can be used on standalone computers as well in a networked environment for mirroring files on remote computer through LAN. Key features: * Fully integrated with Windows. It has simple, intuitive and flexible user interface through property | |||
Updated: 9, 2005 | Rating: 0 | Author: Somnath Kundu | Size: 1045 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
422. | My BootDisk 2.71 (zhangduo.com) | ||
based systems such as Windows NT4, Windows 2000, Windows XP will not be out of luck. My Boot Disk provides the solution of booting up Windows NT/2000/XP with only one floppy disk. This enables users to troubleshoot multiple operating system boot crash and boot files damage cases. My Boot Disk | |||
Updated: 9, 2005 | Rating: 42 | Author: Duo Zhang | Size: 569 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
423. | OkPress 2.1 (azuredesktop.com) | ||
is a shell enhancements utility for automatic message boxes or application dialog boxes closing. Just click a mouse button anywhere and the active dialog box will be closed. In addition you can Minimize all windows at once, Quickly shutdown or reboot the system with no additional confirmation, Quickly logoff - Allows you to restart Windows Shell without | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Tsaplin | Size: 138 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
424. | Geomancy 2.0.0 (tarot-deutung.de) | ||
Earth is the ancient method of divination. Our programm generates a series of random odd and even numbers and builds from the 16 possible combinations of points 16 geomantic figures. Each figure relates to correspondent field of activity and can appear in one of 12 astrological houses plus 3 non-astrological. The programm user "sows" or casts figures and gets | |||
Updated: 9, 2005 | Rating: 202 | Author: Mario Krsnic | Size: 2035 kb | Shareware Go to category: Home & Hobby > Astrology / Biorhythms / Mystic Similar programs | |||
425. | GREPPES Text Tools 2.4 (isvs.tripod.com) | ||
are GREP's that Edit with many options. They are programming or admin tools for Investigation and Change of any files on ANY PC's that use MS-DOS. They are oriented towards English byte characters but can be adapted for other languages to include UNICODE double bytes. PDGREPPE is Pattern Definition GREP with Pattern Editing FGREPPE is Fast or Fixed GREP | |||
Updated: 9, 2005 | Rating: 0 | Author: Anunga Muhummud | Size: 321 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
426. | Hara-Kiri 2.02 (cyteg.com) | ||
(ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed, The files in a determined folders will be completely | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
427. | Hermetic Stego 5.17 (hermetic.ch) | ||
Stego is a steganography program which allows you to encrypt and hide a message (the contents of any computer file) in another file so that the addition of the message to the container file will not noticeably change the appearance of that file. If the file which has been hidden is deleted then there is no indication that it even exists, but it can still be | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
428. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive contents protected at all times. This makes it possible for professionals or enthusiasts to protect sensitive data while in transit | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
429. | Identity Knight 1.3 (fspro.net) | ||
computer technologies evolve with blazing speed. As we emerge into a new digital era, we tend to trust machines with virtually every aspect of our life. Development of secure network communication technologies opens new horizons of electronic business. However, it also plays a trick on our perception of the Internet. As we rely on secure technologies, we tend to neglect basic | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
430. | IntraMail 2003.01.20 (dplanet.ch) | ||
exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are extremely well protected against local hackers and | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > 3 in a bed software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|