|
||||||
|
||
|
Home > Depends on software |
|
|
471. | uICE 2.34 (mediatexx.com) | ||
for controlling a Windows PC from the distance, it provides On-Screen Displays and an On-Screen Menu similar to TV sets and DVD/VCR devices. Its versatility in application and system control comes from its large collection of actions both for common Operating System procedures and application input simulation, especially its advanced and powerful PostMessage action and | |||
Updated: 9, 2005 | Rating: 1956 | Author: Christian Mueller | Size: 3861 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
472. | Virtual Personality+ 4.01 (triplebit.com) | ||
You speak into the PC microphone and the new voice is heard on your computer speakers or on the telephone at the other end of the line. Ideal for private investigators and for businesses or individuals that wish to filter crank calls. Supports 24 individual voices recording. No one will recognize you , not even your own mother. You can cause your voice to mimic any from | |||
Updated: 9, 2005 | Rating: 0 | Author: Izack Lesher | Size: 1728 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
473. | Registry Analyst 1.2 (yavsoft.com) | ||
them. The detailed log and backup files help you to keep track on what was changed in the registry and allow you to restore all information that was removed fast and easy. Does your computer's work is slow? Does your system crashes often? The Registry Analyst introduces a solution to this problems. It analyzes the system registry, finds invalid entries and fixes | |||
Updated: 9, 2005 | Rating: 0 | Author: Yavsoft Corporation | Size: 440 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
474. | SecurDesk! LV 5.32 (cursorarts.com) | ||
and much more. You may also specify applications to launch both on system startup and shutdown, or on a time-delayed basis. A handy task manager applet is included which can replace the Windows Task Bar and Tray. Relocatable anywhere on the screen, and can even switch applications into their own virtual desktop space. A Password/Info keeper option gives you instant | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 3168 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
475. | Secure Password Store 0.91 (lmphotonics.com) | ||
Features: - Multiple databases - Encrypted database file that is only accessible by a user specified password. This user password is used as the encryption / decryption key and is not stored anywhere. - Each record consists of : Name, Version, Serial Number, Registered To, Password, Date, Web address, Supplier, and Comment fields. - "Registered To" and "Password" fields are | |||
Updated: 9, 2005 | Rating: 0 | Author: Mark Empson | Size: 627 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
476. | Service Center Manager (SCM) - Server 2.0 (alarit.com) | ||
goes to 2nd – "Estimating", where "Repairs" investigated to be done on this item – and so on. Here is brief list of stages: - receiving; - estimating (defects and repair pricing); - customer approval; - dry-out (if needed); - repairing (in-house or subcontracted); | |||
Updated: 9, 2005 | Rating: 0 | Author: Max Zotov | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
477. | Service Core Manager (SCM) - Server 2.3 (alarit.com) | ||
goes to 2nd – "Estimating", where "Repairs" investigated to be done on this item – and so on. Here is brief list of stages: - receiving; - estimating (defects and repair pricing); - customer approval; - dry-out (if needed); - repairing (in-house or subcontracted); | |||
Updated: 9, 2005 | Rating: 0 | Author: Rachel Guillermo | Size: 22 kb | Commercial Go to category: Servers > Other Server Applications Similar programs | |||
478. | ShyFile - File and Email Security 6.24 (shyfile.net) | ||
as a key. A File Shredder is included to thoroughly delete a file on your hard drive in a way no un-delete tool could ever restore it again. ShyFile works independently from all your web based email accounts and desktop email applications. Create secure files that carry your encoded contents. Use your | |||
Updated: 9, 2005 | Rating: 16 | Author: John Bettels | Size: 4419 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
479. | OSL2000 Boot Manager 8.80 (osloader.com) | ||
boot and manage up to 100 independent OSs in your computer. Runs on Windows 95/NT/98/ME/2000/XP. The program can be installed in less than a minute. The Windows installer now creates a complete emergency disk for easy uninstall. Free technical support is available at http://www.osloader.com. The boot menu recognizes all partitions and automatically configures itself during every boot | |||
Updated: 9, 2005 | Rating: 263 | Author: Vijai Amarnath | Size: 178 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
480. | Panda Security Demo 3.0.2.0 (pandasecurity.com) | ||
being removed from your company or personal computer. You can limit, depending on who accesses a computer, the use of certain files or directories. You can keep users from accessing the Control Panels or any other configuration tools on their systems. And you can prevent users from | |||
Updated: 9, 2005 | Rating: 0 | Author: Armando Bernal | Size: 6010 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Depends on software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|