|
||||||
|
||
|
Home > Crisscross software |
|
|
471. | Image2PDF Pilot 1.32 (colorpilot.com) | ||
Batch conversion utility that converts TIFF, JPG, BMP, PNG image files to PDF. You can set security settings for generated PDF, document information. You are able to preview images and set page order. Batch conversion utility that converts TIFF, JPG, BMP, PNG image files to PDF. You can set security settings | |||
Updated: 9, 2005 | Rating: 0 | Author: Rais Garifoulline | Size: 1672 kb | Demo Go to category: Graphic Apps > Converters & Optimizers Similar programs | |||
472. | ActMon Password Recovery XP 4.03 (iopus.com) | ||
The newest version of this popular password recovery utility decrypts and displays the passwords behind the asterisks on ALL Windows systems. It works automatically on Web pages, Windows 9x/NT and Windows 2000/XP systems. Windows systems allow a convenient storage of frequently used passwords, such as the | |||
Updated: 9, 2005 | Rating: 685 | Author: Team ActMon | Size: 315 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
473. | IsSearch 1.1.9 (screenresources.com) | ||
The world is becoming more and more complicated day after day. As we immerse into digital era, information becomes the center of our life's meaning. But there is something even more valuable then the information itself: the ability to find required information fast! Data capacity of modern hard drives is | |||
Updated: 9, 2005 | Rating: 0 | Author: Screenresources | Size: 1111 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
474. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Jetico Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events as well as from malicious programs "living" secretly inside your computer's memory and hard drive | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
475. | Keyboard Monitor 1.7 (tropsoft.com) | ||
Police the activities that take place on your computer with this handy program. Turn it on and it records all the keys that are pressed until turned off. Use it to ensure that your child's (or spouse's!) chat room and email activities are on the up and up. Recorded information and access to the | |||
Updated: 9, 2005 | Rating: 76 | Author: Silvio Kuczynski | Size: 133 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
476. | LinkFerret-Remote Capture Agent 3.10.447.0 (baseband.com) | ||
LinkFerret-Remote is an efficient, easy to use, low cost, high performance Ethernet/802.11B/G monitoring tool. Network admins may use it in scripts to periodically sample network traffic. Non-technical personnel can capture files and automatically forward results. It can even be invoked by other programs. Its | |||
Updated: 9, 2005 | Rating: 16 | Author: David Ebert | Size: 1220 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
477. | DVD and CD Cover Print 3.3.0 (northcardinal.com) | ||
DVD and CD Cover Print allows you to print your CD and DVD cover art easily and accurately. This software tool allows the user to load CD or DVD cover art and print it to standard size specifications or user defined specifications. This is an easy and quick way for the user to printout DVD or CD covers that | |||
Updated: 9, 2005 | Rating: 163 | Author: North Cardinal Software | Size: 5633 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
478. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
Employee Monitoring is the most dependable, powerful, capable, and very affordable, Internet monitor in the world. It records all Internet activity including all web surfing and instant messaging on MSN, AOL, Yahoo! and ICQ. E.M. records any file downloads and streaming content and all emails including POP3 | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
479. | Find Protected 2.0 (aks-labs.com) | ||
Find Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
480. | FastSum 1.9 (fastsum.com) | ||
FastSum is an extremely fast utility for your files integrity control. The high accuracy and speed attains through the usage of a well-known and time-proved cryptographic algorithm, as a matter of fact FastSum is a Windows MD5 Checker. You do not have to be afraid of these unintelligible words, all you have | |||
Updated: 9, 2005 | Rating: 42 | Author: Kirill Zinov | Size: 424 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Crisscross software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|