|
||||||
|
||
|
Home > Policies software |
Related keywords: Group Policies |
|
|
471. | Image2PDF Pilot 1.32 (colorpilot.com) | ||
Batch conversion utility that converts TIFF, JPG, BMP, PNG image files to PDF. You can set security settings for generated PDF, document information. You are able to preview images and set page order. Batch conversion utility that converts TIFF, JPG, BMP, PNG image files to PDF. You can set security settings | |||
Updated: 9, 2005 | Rating: 0 | Author: Rais Garifoulline | Size: 1672 kb | Demo Go to category: Graphic Apps > Converters & Optimizers Similar programs | |||
472. | ActMon Password Recovery XP 4.03 (iopus.com) | ||
The newest version of this popular password recovery utility decrypts and displays the passwords behind the asterisks on ALL Windows systems. It works automatically on Web pages, Windows 9x/NT and Windows 2000/XP systems. Windows systems allow a convenient storage of frequently used passwords, such as the | |||
Updated: 9, 2005 | Rating: 685 | Author: Team ActMon | Size: 315 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
473. | IsSearch 1.1.9 (screenresources.com) | ||
immerse into digital era, information becomes the center of our life's meaning. But there is something even more valuable then the information itself: the ability to find required information fast! Data capacity of modern hard drives is dozens times higher then their predecessors had only a couple | |||
Updated: 9, 2005 | Rating: 0 | Author: Screenresources | Size: 1111 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
474. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
475. | Keyboard Monitor 1.7 (tropsoft.com) | ||
are pressed until turned off. Use it to ensure that your child's (or spouse's!) chat room and email activities are on the up and up. Recorded information and access to the Keyboard Monitor are safely password protected. Keyboard Monitor can be run as an invisible background process | |||
Updated: 9, 2005 | Rating: 76 | Author: Silvio Kuczynski | Size: 133 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
476. | LinkFerret-Remote Capture Agent 3.10.447.0 (baseband.com) | ||
LinkFerret-Remote is an efficient, easy to use, low cost, high performance Ethernet/802.11B/G monitoring tool. Network admins may use it in scripts to periodically sample network traffic. Non-technical personnel can capture files and automatically forward results. It can even be invoked by other programs. Its | |||
Updated: 9, 2005 | Rating: 16 | Author: David Ebert | Size: 1220 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
477. | DVD and CD Cover Print 3.3.0 (northcardinal.com) | ||
Print from any twain compatible device. * Templates for DVD's and CD's. * Ability to have templates with 1 2 or 3 panels. * Built in editor allows text/images to be placed anywhere on any panel with user defined opacity level. * Ability to put formatted text on spine in multiple image templates. * Support for European number formats (ie: 1,000.00) when | |||
Updated: 9, 2005 | Rating: 163 | Author: North Cardinal Software | Size: 5633 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
478. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
479. | Find Protected 2.0 (aks-labs.com) | ||
of employees' files to enforce an intelligent data security policy across their organizations. Find Protected was designed to search for and identify password protected files. With version 2.0 you can search for the following files: 1) Popular password protected archives, such as zip and rar. 2) Microsoft Office documents, including Word, Excel and Access files. 3) Secure | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
480. | FastSum 1.9 (fastsum.com) | ||
FastSum is an extremely fast utility for your files integrity control. The high accuracy and speed attains through the usage of a well-known and time-proved cryptographic algorithm, as a matter of fact FastSum is a Windows MD5 Checker. You do not have to be afraid of these unintelligible words, all you have | |||
Updated: 9, 2005 | Rating: 42 | Author: Kirill Zinov | Size: 424 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Policies software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|