|
||||||
|
||
|
Home > Police software |
Related keywords: police agency, pc police |
|
|
471. | Image2PDF Pilot 1.32 (colorpilot.com) | ||
Batch conversion utility that converts TIFF, JPG, BMP, PNG image files to PDF. You can set security settings for generated PDF, document information. You are able to preview images and set page order. Batch conversion utility that converts TIFF, JPG, BMP, PNG image files to PDF. You can set security settings | |||
Updated: 9, 2005 | Rating: 0 | Author: Rais Garifoulline | Size: 1672 kb | Demo Go to category: Graphic Apps > Converters & Optimizers Similar programs | |||
472. | ActMon Password Recovery XP 4.03 (iopus.com) | ||
The newest version of this popular password recovery utility decrypts and displays the passwords behind the asterisks on ALL Windows systems. It works automatically on Web pages, Windows 9x/NT and Windows 2000/XP systems. Windows systems allow a convenient storage of frequently used passwords, such as the | |||
Updated: 9, 2005 | Rating: 685 | Author: Team ActMon | Size: 315 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
473. | IsSearch 1.1.9 (screenresources.com) | ||
immerse into digital era, information becomes the center of our life's meaning. But there is something even more valuable then the information itself: the ability to find required information fast! Data capacity of modern hard drives is dozens times higher then their predecessors had only a couple | |||
Updated: 9, 2005 | Rating: 0 | Author: Screenresources | Size: 1111 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
474. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
475. | Keyboard Monitor 1.7 (tropsoft.com) | ||
Police the activities that take place on your computer with this handy program. Turn it on and it records all the keys that are pressed until turned off. Use it to ensure that your child's (or spouse's!) chat room and email activities are on the up and up. Recorded | |||
Updated: 9, 2005 | Rating: 76 | Author: Silvio Kuczynski | Size: 133 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
476. | LinkFerret-Remote Capture Agent 3.10.447.0 (baseband.com) | ||
LinkFerret-Remote is an efficient, easy to use, low cost, high performance Ethernet/802.11B/G monitoring tool. Network admins may use it in scripts to periodically sample network traffic. Non-technical personnel can capture files and automatically forward results. It can even be invoked by other programs. Its | |||
Updated: 9, 2005 | Rating: 16 | Author: David Ebert | Size: 1220 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
477. | DVD and CD Cover Print 3.3.0 (northcardinal.com) | ||
Print from any twain compatible device. * Templates for DVD's and CD's. * Ability to have templates with 1 2 or 3 panels. * Built in editor allows text/images to be placed anywhere on any panel with user defined opacity level. * Ability to put formatted text on spine in multiple image templates. * Support for European number formats (ie: 1,000.00) when | |||
Updated: 9, 2005 | Rating: 163 | Author: North Cardinal Software | Size: 5633 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
478. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
479. | Find Protected 2.0 (aks-labs.com) | ||
Find Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
480. | FastSum 1.9 (fastsum.com) | ||
FastSum is an extremely fast utility for your files integrity control. The high accuracy and speed attains through the usage of a well-known and time-proved cryptographic algorithm, as a matter of fact FastSum is a Windows MD5 Checker. You do not have to be afraid of these unintelligible words, all you have | |||
Updated: 9, 2005 | Rating: 42 | Author: Kirill Zinov | Size: 424 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Police software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|