|
||||||
|
||
|
Home > Command line software |
Related keywords: line, command, on line, off line reader, Line, off line, Command, line count, line graph, line chart |
|
|
441. | Identity Knight 1.3 (fspro.net) | ||
on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature, allowing you to enter your credentials once and let the program do the rest. On the other hand, though, Internet Explorer stores this information in an unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
442. | JetStart 3.0 (codesector.com) | ||
programs and documents by typing few letters. You can execute system commands (e.g. Restart or Shutdown) as well or use it as a command line replacement. Place your most used information in the handy toolbar. Just single mouse click to open any file or multiple files at once. Full drag | |||
Updated: 2, 2006 | Rating: 0 | Author: Jackie Ray | Size: 540 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
443. | JvCrypt 1.0 (vandaveer.com) | ||
using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one step. You have the option of creating a single encrypted zip file for each file selected or combining all of your selected files to a | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
444. | Kaspersky Anti-Virus Personal 5.0 (kaspersky.com) | ||
running on your computer. Improved Kaspersky; Anti-Virus Scanner command line. Ensures the retention of recoverable data when the program is preset to delete infected objects. Quarantine. An easy-to-use tool allows isolation of infected files that can be later restored. In combination with | |||
Updated: 6, 2005 | Rating: 184 | Author: Andrey Shepelev | Size: 13475 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
445. | Magic File Renamer 5.3b (mfr.queryweb.com) | ||
to be very flexible, user friendly and highly customizable. MFR's MP3-specific features make it ideal for MP3 collectors, but if you are a musician, graphic artist, digital camera user, programmer, system administrator or file collector of any kind, MFR might just be what you need. Magic File Renamer is an heavy duty file renamer, suitable also for renaming masses of files and | |||
Updated: 3, 2005 | Rating: 16 | Author: David Ohana | Size: 1251 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
446. | Message Pattern Extractor 2.10 (xyz3.com) | ||
execute SQL * Count words/keywords in the various sources * Count lines * Swap bytes MPX can be configured to perform a practically limitless variety of tasks. Configurable Pattern Recognizer / Manipulator for EMails and Files. User defines patterns in terms of sets; defines a state machine in terms of patterns and actions. Accepts input from stored emails and/or files. Generates | |||
Updated: 8, 2004 | Rating: 0 | Author: Jim Miller | Size: 1751 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
447. | exeJ 1.01 (bysoft.se) | ||
is a command line tool that creates a "batch-like" executable (.exe file) for your java application. The command line used to start your java application is wrapped in the generated executable and the user can simply start the java application with a double-click. The generated .exe is Windows 95/98/ME/NT/2000/XP compatible. The target system must have JavaSoft | |||
Updated: 9, 2005 | Rating: 48 | Author: Roger Karlsson | Size: 200 kb | Freeware Go to category: Development > Other Similar programs | |||
448. | Laser Squad Nemesis 3.09 (lasersquadnemesis.com) | ||
for which players need to plan and issue orders to their troops. Command options include opportunity fire, rules of engagement, and various special unit abilities. There is an accurate 'line of sight' system, and the terrain is destructible, with interactive features such as lockable doors, force fields and power cells. The Game features four races. The Laser Marines are the | |||
Updated: 2, 2006 | Rating: 42 | Author: Nick Gollop | Size: 6124 kb | Shareware Go to category: Games & Entertainment > Strategy & War Games Similar programs | |||
449. | ModemTest 1.3 (passmark.com) | ||
computer. It allows the modem to be tested in addition to the phone line the modem is connected to. ModemTest provides a method for system integrators and computer repair centers to test both internal and external modems. By a process of elimination, home users can also use the ModemTest to help isolate Internet connection problems to a faulty modem, or phone line or their ISP | |||
Updated: 9, 2005 | Rating: 0 | Author: David Wren | Size: 587 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
450. | Mouse and Key Recorder 5.7 (kratronic.com) | ||
in any window, but it also contains more than 130 additional commands. These commands allow controlling the macro run (loops, conditions, goto, variables, etc.), manipulating files (delete, rename, etc.), starting or switching to programs, manipulating cursors, reading/writing files, logging your keystrokes, etc, etc. The Mouse and Key Recorder activities are stored in a | |||
Updated: 2, 2006 | Rating: 16 | Author: John Krauer | Size: 3737 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
|
Home > Command line software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|