|
||||||
|
||
|
Home > Detecting software |
Related keywords: metal detecting software |
|
|
441. | Screenshot Export 1.0 (members.iweb.net.au) | ||
on the bottom right hand side of the screen). Once active, it will detect when the "Print Screen" button has been pressed. When you click the "Print Screen" button (to the right of the F12 key) Screenshot Export will prompt you for a filename and a filetype. Making it easier than ever before to take | |||
Updated: 8, 2004 | Rating: 0 | Author: Adam Lyttle | Size: 1572 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
442. | Trash it! 1.71 (trashituninstaller.com) | ||
more convenient for you, the Trash it! Scheduler can automatically detect when you are about to run an installation program, and offer to update the scan database for you. Theres no need to launch Trash it manually! After you finish installing the program, run Trash it! again and it will list the changes made by the installation. You can delete the program right then, or you can save | |||
Updated: 8, 2004 | Rating: 42 | Author: Mustafa Lokhandwala | Size: 1691 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
443. | VData 2.3 (edinaz.com) | ||
same device (disk,cdrom,floppy) or another device. Verify Data will detect bad, missing, or extra files or folders. This purpose of this program is verify/compare data. A single file may be compared with another single file. An entire disk or disk structure (folder with files and nested folders) may be compared with a copy on the same or a different | |||
Updated: 8, 2004 | Rating: 39 | Author: Edward Hofer | Size: 141 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
444. | BPS Spyware and Adware Remover 8.2.0.0 (bulletproofsoft.h4host.com) | ||
Spyware Remover is an Adware, SpyWare, Key Loggers, Trojans, Dialers, Hijackers, Trackware, Thiefware, Big Brotherware removal utility with multi-language support. It scans your memory (for active memory ad components, which are not stored on your hard drive and last only as long as the computer is powered | |||
Updated: 8, 2004 | Rating: 1064 | Author: Naglaa Elbanhawy | Size: 7383 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
445. | RegBlock Spy Blocker 1.01 (regblock.com) | ||
RegBlock protects your computer against the installation spy software software before they can do their dirty work. With the single click of a button RegBlock users can select from a wide variety of software to block from every being installed. No longer will you have to worry that your child has accidentally | |||
Updated: 8, 2004 | Rating: 0 | Author: Jan Hertsens | Commercial Go to category: Security & Privacy > Other Similar programs | |||
446. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
service. Screens may be captured when a user-defined word filter is detected resulting in the capture of the desktop image in standard JPEG format for further investigation. Screens may be captured for every detection encountered or just capture the last detection. HWPE 2 is invisible on the task lists in Windows, and other stealth options include hiding the HWPE program folder from | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
447. | HS CleanDisk Pro 5.00 (haysoft.com) | ||
relevant tasks to your operating system will be displayed. * Auto-detects low memory in the system and boosts performance by refreshing memory space. * Auto-runs at start-up, and surveys your system. * Increases free disk space INFORMATION * Shows Graphical System Information (CPU/Drives/Memory) * Shows graphical pie chart representation of folder usage and accessing all | |||
Updated: 8, 2004 | Rating: 42 | Author: Cenker Sisman | Size: 1207 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
448. | PestPatrol 3.0 (safersite.com) | ||
the entire corporate network. PestPatrol defeats the threat by detecting and eliminating: * Trojan horses: denial-of-service attack agents, remote access trojans (RATs), and more * Hacker tools: Password crackers, key loggers, port scanners, and more * Spyware: Rogue applications that phone home user and system information without permission. These pests create back doors | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Detecting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|