|
||||||
|
||
|
Home > Sector software |
Related keywords: bad sector |
|
|
441. | SynchroFolder 2.11 (synchrofolder.chat.ru) | ||
The main purpose of this program product is to provide opportunity to synchronize contents of operating system folders. You may use it to synchronize folders on main and backup file servers, on mobile and office computers, on hard disk and removable media and in many other cases. Using SynchroFolder together | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Merzlikin | Size: 2338 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
442. | SynchroPass 1.00 (smsoft.ru) | ||
Most of Microsoft Windows operating systems give an opportunity for user to change domain password from his/her workstation, but only in case the workstation is a member of this domain. If the workstation can't join a domain (in particular, in case it is Windows XP Home Edition workstation), if there are | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Merzlikin | Size: 727 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
443. | System Cleaner 4.94f (oxisoft.com) | ||
internet surfing can build up over time, slowing down your system's performance and leaving a trail of your web browsing habits for anyone to see! System Cleaner enables you to clean up your whole system, so giving you back valuable disk space and protect you privacy within seconds! - Delete junk and obsolete files Safely scan and remove many different garbage files on your | |||
Updated: 9, 2005 | Rating: 0 | Author: Steven Martins | Size: 1300 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
444. | System Locker 2.40 (egtsoft.com) | ||
You can use System Locker to restrict access to your PC. It's attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop on system lock and provides an informative message to other users. You can set start/stop times for users to limit their access to your PC. Any action performed by System | |||
Updated: 9, 2005 | Rating: 0 | Author: Rick Skinner | Size: 863 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
445. | System Shield 2.1c (iolo.com) | ||
Most people believe that when a file is deleted, it is permanently and irrecoverably "gone". The error in this belief is that it relies on some basic assumptions that are very far from the truth. Realistically, the following must be true in order for a file to be irrecoverably deleted: 1. The data | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
446. | Thinstall Studio 1.94 (aidsoft.com) | ||
automatic Framework download/install if missing from the user's computer. Thinstall allows developers to securely pack an entire application suite into a single EXE file that is able to run directly without decompressing to disk. Software Developers can use Thinstall to protect and hide their data files from prying | |||
Updated: 9, 2005 | Rating: 16 | Author: Jonathan Clark | Size: 1327 kb | Demo Go to category: System Utilities > Other Similar programs | |||
447. | TK8 Safe 2.5 (tk8.com) | ||
TK8 Safe is the password manager with features that covers all aspects of storing and using sensitive information. You can keep all user names, passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
448. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
Top Secret Crypto Gold includes Top Secret Chat and Top Secret Journal, along with file and e-mail encryption. Includes the Sentry Spell Checking Engine for spell checking of your e-mail, journal, and chat messages. Conduct an encrypted peer-to-peer, computer to computer, secure chat over the Internet | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
449. | Total Control 2.3 (icxr.com) | ||
on "system secure" principles, which means that respects your system's safety by performing several tests before applying any changes, while providing the ability to restore your system at any time. Change the way Windows looks, customize your system's behaviour, add/hide menus, customize Internet Explorer, configure and speed your browsers and connections, fix Windows | |||
Updated: 9, 2005 | Rating: 0 | Author: Panos Koutsoukeras | Size: 2356 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
450. | Total Text Security 1.0 (softsphere.com) | ||
Are you afraid that your boss reads your e-mail letters and ICQ messages? Are you afraid that when intercepting your correspondences, your competitors could strike at your business? Do you want to be sure the message you received was sent by your partner, and not by somebody else? Then you should use Total | |||
Updated: 9, 2005 | Rating: 0 | Author: Iliahu Rabinovich | Size: 463 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Sector software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|