|
||||||
|
||
|
Home > Burn in software |
|
|
461. | PC PhoneHome 3.0 (pcphonehome.com) | ||
location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the local police and then notify the PC PhoneHome Command and Tracking Center, which will provide full tracking and recovery support. When the stolen computer goes online it will send a stealth message to the pre-determined e-mail address | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
462. | PhotoCDuke 1.01 (cduke.com) | ||
is a new easy-to-use CD burning application which is suitable for both beginners and advanced users. Handles photoes easily. A must have for every digital camera owner. One click, easy-to-use interface No additional stupid questions - insert a blank CD, select files to write, burn it! A new built-in Photo Viewer is added. You write your photoes on CD using | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Buzaev | Size: 2800 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
463. | ProBot 2.5.0 (nethunter.cc) | ||
software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. ProBot is easy to integrate into network environment. Engine includes an embedded Web server called Remote Web Console, which allows to control and configure the | |||
Updated: 9, 2005 | Rating: 49 | Author: Andrei Birjukov | Size: 2225 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
464. | ProBot SE 2.3.0 (nethunter.cc) | ||
to keep track of all activity occurring on a computer. In addition to keystrokes and mouse clicks, it detects access to applications, folders and files on connected drives. It also watches over keylogging in NT console windows. The detailed event log is kept securely in encrypted binary files that may be later referred by the system administrator or computer | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
465. | R-Wipe & Clean 5.1 (r-tt.com) | ||
or secure erase algorithms. All files and folders may be combined in wipe lists to erase them in a single procedure. Supports both the FAT and NTFS file systems. All separate wiping and cleaning tasks can be combined in one or more erasing procedures launched immediately or at predefined times or events as a background task. New R-Wipe & Clean 5.1 includes Popup | |||
Updated: 9, 2005 | Rating: 381 | Size: 1607 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
466. | Random Event Sounds XP 5.0 (ztec-software.com) | ||
Event Sounds resides in the sys tray and will randomize the sounds associated with common system events like close program, minimize, maximize, start windows, etc. as well as other programs like AOL, Quicken, Windows Explorer, Windows Messenger, etc. It will also randomize Windows Screensaver and Desktop Wallpaper files. You can make a list of your favorite sounds for each event | |||
Updated: 9, 2005 | Rating: 132 | Author: Lucas Barlow | Size: 1565 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
467. | Recent Documents 2002 2.0 (recentdocuments.com) | ||
type, by date or by folder. You can have document references stored in categories you define based on rules that make sense for the way you work. Or you can use the powerful searching facilities to track down that elusive file. Recent Documents will save you time and frustration by keeping track of documents you have been working with, and will help you find them again easily. It | |||
Updated: 9, 2005 | Rating: 0 | Author: Colin Messitt | Size: 1302 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
468. | MacPhoneHome 3.0 (pcphonehome.com) | ||
location to a pre-determined e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the local police and then notify the PC PhoneHome Command and Tracking Center, which will provide full tracking and recovery support. When the stolen computer goes online it will send a stealth message to the pre-determined e-mail address | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
469. | BulletProof Server 2.15 (digitalcandle.com) | ||
options, such as resuming upload / download, viewing server activity in real time, ban, kick, anti hammering, ratio, quota groups management, event manager, real time statistics generator, top 10 user, virtual directories, Chat and more. Both individuals and companies small to large who have their own | |||
Updated: 9, 2005 | Rating: 3198 | Author: Andrew Connell | Size: 1229 kb | Shareware Go to category: Network & Internet > FTP Clients Similar programs | |||
470. | Music Playlist Utility 1.0 (comcen.com.au) | ||
files to CD media. A big problem is that when you create and burn your playlist to CD/DVD the titles are sorted alpahbetically but your player and the songs are never listed in the same order that they existed in the playlist. If you are making a disc for a party, you usually don't want all songs of the same artist to play sequentially nor may you want songs to play | |||
Updated: 9, 2005 | Rating: 112 | Author: Bruce Cologon | Size: 378 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
|
Home > Burn in software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|