|
||||||
|
||
|
Home > Entire software |
|
|
441. | Brooks INTELLIscribe LPR Client 3.2.0.36 (brooksnet.com) | ||
merges Windows network printing with TCP/IP printing elevating the entire print environment. A handy wizard interface allows you to add as many virtual printers as you like and to associate real remote printers with the virtual printers. INTELLIscribe runs in the background from the system tray, seamlessly redirecting the virtual printer output to the remote printers. INTELLIscribe | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Tomasetti | Size: 5277 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
442. | Chaperone 4.0 (css-software.com) | ||
a similar schedule for Windows itself can control access to the entire computer. Additional features increase security by disabling Registry tools, preventing program installations, denying access to the control panel, and more…. Chaperone fully supports multiple users. Each user can have their own access rights, or can use the same rights as other users. These user accounts | |||
Updated: 9, 2005 | Rating: 16 | Author: Kevin Whynot | Size: 2395 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
443. | Click Clock 2.0.0 (elegantpie.com) | ||
is a clock and calendar for one month, and a calendar showing the entire year for any year. By double-clicking on the program you can change its size and appearance, hence the name ClickClock. The clock can automatically synchronize the computer clock with any atomic clock time server on the internet. All of the event times, such as sunrise and sunset, are accurate to within 1 minute | |||
Updated: 9, 2005 | Rating: 42 | Author: Michael Robinson | Size: 6599 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
444. | Clone Hunter 1.2 (yavsoft.com) | ||
a solution for this problem! With this handy tool, you can scan your entire hard drive or selected folders only, locate identical files using different search criteria and remove those files from your system. To avoid the mistake in deletion, the program can keep a detailed log file. Features | |||
Updated: 9, 2005 | Rating: 0 | Author: Yavsoft Corporation | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
445. | CompuApps DriveWizard V1.37 (compuapps.com) | ||
Firewire, PCMCIA and parallel Supports large IDE hard disks Upgrades entire hard drive or selected partitions and expands partitions proportionately on your new drive Option to convert Fat16 partition type to Fat32 partition type while upgrading Option to create extra partitions in the free space on | |||
Updated: 3, 2005 | Rating: 0 | Author: Jothi Kumar Govindaraju | Size: 291840 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
446. | Innovatools ComputerWatermark 1.5 (computerwatermark.com) | ||
your name and address (or any other information you want) on the entire free surface of your disk drives. The existing files are not modified in any way. When the police or other law enforcement personnel recovers a stolen computer, they will try to find the original owner (that means you). However, in most cases, all your original files with your information are deleted by the thief | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Dominic | Size: 1119 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
447. | CryptoForge 3.2.5 (cryptoforge.com) | ||
wipe -with the built-in file shredder- files of any type, as well as entire folders and drives, from within Windows Explorer or My Computer with right-click ease. The text encryption module includes a secure text editor allows you to create, encrypt, and decrypt documents in a way that they can be sent | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
448. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
but also in all lower folders (this is useful for encrypting an entire project which has files in subfolders). After you have specified the conditions of the encryption or decryption operation and instructed the program to perform the operation the conditions are checked and any errors or exceptional conditions (such as the non-existence of the specified input files or lack of | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
449. | DCPP 2.7 (securstar.com) | ||
disk encryption and pre-boot authentication. Able to protect the entire computer including the operating system, in real time. DCPP also works with the Aladdin USB-Token at a pre-boot | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
450. | Personal Desktop Spy 2.10 (spyarsenal.com) | ||
that captures screenshots of the active application window or the entire desktop at the predefined time intervals varying from 1 second to several hours and saves the recorded images to a specified directory on the hard drive. The images can later be viewed with the built-in image viewer or any external software (Desktop Spy Agent can save screenshots either as Windows bitmaps or in | |||
Updated: 9, 2005 | Rating: 0 | Author: Mikhail Kalinskiy | Size: 615 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Entire software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|