|
||||||
|
||
|
Home > Limiting software |
Related keywords: limiting internet access, limiting program access, limiting computer access |
|
|
421. | New Dominoes 2.0 (newdominoes.nichdia.com) | ||
New Dominoes is to get a highest score among any other players in a limited games/match. You can choose 10, 15 or 25 games in a match or 100, 250, 500 points in a match or you can specify how many games/points in a match . This Shareware version offers a 14 day trail. A challenging dominoes game with new & improved A.I, graphics, sounds, music & animations. Single / partnership game | |||
Updated: 9, 2005 | Rating: 0 | Author: Didi Sutadi | Size: 5029 kb | Shareware Go to category: Games & Entertainment > Board Similar programs | |||
422. | mobile4you 2.1.2.77 (outlook4team.com) | ||
automatic updates. After trial expires, the program will work with limited functionality. System tray utilities checks, alerts, set up reminders.Forwards e-mail and reminders to other e-mail address, pager or cellular | |||
Updated: 9, 2005 | Rating: 0 | Size: 4081 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
423. | MyOdd Desktop Application 2.10 (myoddweb.com) | ||
system. With a higher level of security you can prevent or simply limit the use of any application, (even if you are not the administrator). For example could prevent your kid from playing games after 8:00 pm so they can do their homework… You can take screen shots on regular basis to see what | |||
Updated: 9, 2005 | Rating: 0 | Author: Simon Goodman | Size: 2537 kb | Freeware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
424. | Child Control 2005 7.153 (salfeld.com) | ||
optimal parental control for all Windows-PCs (incl. XP). Set time limits for the PC and/or the Internet and block/filter unwanted Internet contents. Limit access to internal Windows components and personal folders. A protocol informs you at any time as to what happened on your computer and when. Access is protected via password. Several safety steps for young computer freaks | |||
Updated: 9, 2005 | Rating: 16 | Author: Dierk Salfeld | Size: 3703 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
425. | Network Searcher 3.5.1 (bgsoft.net) | ||
shares and resources. In addition, with Network Searcher, you can limit your search to subnetworks, by setting the IP range, or applying a number of filters (from file types or extensions to the date of creation). The program does not hog system resources and supports all common file operations | |||
Updated: 9, 2005 | Rating: 0 | Author: BGSoft BGSoft | Size: 692 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
426. | NetWorx 3.2 (softperfect.com) | ||
of network problems, ensure that you don't exceed the bandwidth limits specified by your ISP, or track down suspicious network activity characteristic of Trojan horses and hacker attacks. The program allows you to monitor all your network connections or a specific network connection (such as Ethernet or PPP) only. The software also features a system of highly customizable visual and | |||
Updated: 9, 2005 | Rating: 16 | Author: Andrey Kotov | Size: 982 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
427. | New Folder Here 1.0 (camtech2000.net) | ||
menu. Windows does have the command 'New/Folder' although very limited on where you can create a folt usually takes a while for the 'New' menu to expand. Create them anywhere instantly with this little utility. Examples when right clicking and creating a New Folder on: My Documents Folder: Creates 'New Folder' inside My Documents My Documents\MyFile.txt: Creates 'New | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Campbell | Size: 377 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
428. | Hermetic Stego 5.17 (hermetic.ch) | ||
differs from others of this sort in two respects: 1. There is no limit on the size of the file to be hidden because Hermetic Stego can hide a message file, not just in a single BMP image file, but in a set of them -- as many images as needed to contain the message file. 2. The bits of the message are inserted into the bytes of the image files randomly and in such a way as to | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
429. | Hot CPU Tester Pro 4.2.2 (opusware.net) | ||
testing modules intentionally stress all components to their maximum limits to assess their integrity. Unstable parts cannot endure these pressures and will fail the tests, allowing the opportunity for an upgrade or exchange before the PC is released into a production environment. It is recommended that Hot CPU Tester should run for at least six hours to fully check the system. If a | |||
Updated: 9, 2005 | Rating: 1599 | Author: Damon Chitsaz | Size: 1639 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
430. | Internet Explorer Password 3.0.189 (lastbit.com) | ||
Internet Explorer Password is a password recovery program for IE Content Advisor. Content Advisor was initially designed as a security feature and a tool to monitor website ratings to prevent minors from accessing adult websites. Since the rating technology never became widespread, this feature is basically | |||
Updated: 9, 2005 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 61 kb | Demo Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Limiting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|