|
||||||
|
||
|
Home > I software |
|
|
461. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
downloads and streaming content and all emails including POP3 and I/M usernames and PASSWORDS. E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
462. | EndTask Pro 2.00.0123 (products.asynchrony.com) | ||
connection was active for all types of Internet connections; i.e. the system was sending/receiving bytes. Also includes a Tracker bar which is a bar similar to windows taskbar that displays vital information such as your System performance and Internet speed in a small histogram. On shutdown, EndTask Pro will remind you if you forgot any media in any of your drives. Internet | |||
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
463. | ENVY 1.00 (radiks.net) | ||
comparsions, date & time functions, random numbers, file I/O, and text parsing ) ENVY is able to alter environment variables in the parent COMMAND.COM environment, greatly simplifying many programming tasks which must be accomplished via a batch file. ENVY is well-suited to address frequent problems such as needing to build a filename or directory name from the | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Lawless | Size: 24 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
464. | eXtended Task Manager 1.95 (warecase.com) | ||
workstation management allows the user to manage his workstation, i.e. log off or restart the workstation, run, stop or pause the services, etc. While these features can generally be accessed by the user, XTM provides access to all features in one, easy to implement, menu. The Warecase eXtended Task Manager (XTM) is an extended windows task manager and performance monitoring tool | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Ritter | Size: 2464 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
465. | File Spy 3.0 (soft9000.com) | ||
competitive job offers pending, he exclaimed: "It's not fair, I've worked on my time for them, but they will no longer let me work on their time, for me!" So I wrote File Spy: File Spy allows you to scour your disks and change file time stamps. For example, if you work from 8 AM to 5 PM, you can program File Spy to change the date and time of any files that it encounters to | |||
Updated: 9, 2005 | Rating: 0 | Author: R. Nagy | Size: 1484 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
466. | FontDings 2 (forumsoftware.com) | ||
FontDings V2.0 is the big brother of the Windows Character Map. When the program first runs, you select any font, installed or not and it will display on-screen, the full character set of the selected font. You can Bold or Italicize the selected font. But the main utility is the printing feature of | |||
Updated: 8, 2004 | Rating: 0 | Author: I DeCarlo | Size: 2160 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
467. | Fping 2.13 (kwakkelflap.com) | ||
be shown due to the structure of the IP header (RFC 792). Why did I write my own ping program? There are two main reasons: a) It wanted to know how the ping program worked. I found it really intriguing and was very curious and b) There was a need for a better ping program here at the lab | |||
Updated: 2, 2006 | Rating: 1313 | Author: Wouter Dhondt | Size: 50 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
468. | Hermetic Stego 5.17 (hermetic.ch) | ||
without the use of a user-specified stego/encryption key, so that (i) the presence of the hidden file is undetectable (even by forensic software using statistical methods) and (ii) if a user-specified stego key is used then the hidden file can be extracted only by someone, using this software, who knows that stego key. Hermetic Stego allows two operations: (i) hiding a | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
469. | Hide Files 3.4 (hide-files.biz) | ||
partition root folders without damage of operational system itself (i.e. your computer will continue to work normally). - Invisibility of hidden files over network. - Locking of hidden files or folders to prevent access to them via list of most recently used files. Hide Files allows you to select any | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
470. | HS CleanDisk Pro 5.00 (haysoft.com) | ||
Windows system optimizer which cleans hard-disk and system registry, tunes-up system specific settings , checks folder usages, optimizes memory and uninstalls software no longer wanted MAINTENANCE * Cleans drives from files left aside and unused. * Cleans system registry from uninstalled software junks | |||
Updated: 8, 2004 | Rating: 42 | Author: Cenker Sisman | Size: 1207 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > I software |
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|