|
||||||
|
||
|
Home > Product information software |
|
|
431. | NookNak 2004 V1.0.0 (nakware.com) | ||
mute music when you want to talk to someone or hide confidential information quickly and easily. You can also use NookNak to disable and re-enable screen saving easily and start your favorite program with the same ease. With NookNak you can now have music while you work. You can use it to quickly mute music when you want to talk to someone or hide confidential information | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Erceg | Size: 567 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
432. | GreatCrypt 2.0 (miraxus.com) | ||
encryption tool that provides an absolute protection of any digital information. It allows you to protect the privacy of your sensitive files by encrypting them with the latest in encryption technology that is the strongest and fastest 512-bit key algorithm CHAOS!. This is the most secure form of encryption available on the market today. GreatCrypt provides the highest level of | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
433. | GRL RealHidden 1.0 (grltechnology.com) | ||
hidden file, usually operates exactly like the original file. This product gives you the power to send and receive files that contain hidden information, and the security of knowing that even if the files are intercepted a third-party probably would not know that they contained hidden | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
434. | Hara-Kiri 2.02 (cyteg.com) | ||
3. You are a secret agent and have dealings with confidential information... Suddenly enemies burst into your headquarters... You, don't stopping skirmish :-), are clicking on "Hara-Kiri" shortcut or press hot key and... even tortures will not help them to profit by important secrets... "Hara-Kiri" is a radical way to keep your confidential data away from unauthorized access by | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
435. | HSLAB Sys Monitor Lite 1.0 (hs-lab.com) | ||
permanently monitor behind parameters of the system and gather the information with an interval per one second. The information, collected by sensors is transmited to the processing unit. The processing unit prepares the information for visualization and transmits it to display unit. The display unit displays the stored information in user-friendly form. Also | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Golub | Size: 2202 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
436. | Identity Knight 1.3 (fspro.net) | ||
on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature, allowing you to enter your credentials once and let the program do the rest. On the other hand, though, Internet Explorer stores this information in an | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
437. | IsSearch 1.1.9 (screenresources.com) | ||
and more complicated day after day. As we immerse into digital era, information becomes the center of our life's meaning. But there is something even more valuable then the information itself: the ability to find required information fast! Data capacity of modern hard drives is | |||
Updated: 9, 2005 | Rating: 0 | Author: Screenresources | Size: 1111 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
438. | kaztrix DataBuilder 1.0 (telangelix.com) | ||
contact-management program or need a simple tool to organize data on products, personnel, or just about anything else. You can also catalogue fully searchable database(s) and put it on the Web. Unlike any other programs, KazTrix® DataBuilder requires no CGI scripting or any other plug-ins on | |||
Updated: 9, 2005 | Rating: 0 | Author: Kasra Meshkin | Size: 13670 kb | Commercial Go to category: Business > Databases & Tools Similar programs | |||
439. | Keyboard Monitor 1.7 (tropsoft.com) | ||
are pressed until turned off. Use it to ensure that your child's (or spouse's!) chat room and email activities are on the up and up. Recorded information and access to the Keyboard Monitor are safely password protected. Keyboard Monitor can be run as an invisible background | |||
Updated: 9, 2005 | Rating: 76 | Author: Silvio Kuczynski | Size: 133 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
440. | KeyboardTest 2.2 (passmark.com) | ||
image of a keyboard. Each time a key is pressed a variety of state information is updated in the window. Although desktop keyboards can be quickly and cheaply replaced, this is not the case for laptop computers where the keyboard is integrated into the computer itself. The failure of even a single key | |||
Updated: 9, 2005 | Rating: 37 | Author: David Wren | Size: 696 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Product information software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|