|
||||||
|
||
|
Home > Time attendance software |
Related keywords: time, real time, Time, time tracking, time management, time zone, attendance, world time, time clock, time server |
|
|
471. | 7TOOLS VIRTUAL CD EMULATOR 3.0 (pad.paragon.ag) | ||
physical ones. They work with hard disk performance, which is ten times faster than the best physical CD drives. They are silent, consume no power, don't take time for CD swapping and speeding-up. 7tools Virtual CD emulator - universal virtual CD drive. This program allows you to create up to | |||
Updated: 9, 2005 | Rating: 875 | Author: Kirill Podgorny | Size: 6052 kb | Demo Go to category: System Utilities > Other Similar programs | |||
472. | Absurd Terminator 2.9 (nesoft.org) | ||
2) Right-click icon in system tray 3) Button or menu in Terminator's window. 4) Use command line parameters: /shutdown /restart /logoff. How to terminate program.In main Terminator's window you can use other keys and do following other actions: - - refresh list of tasks - or - hide | |||
Updated: 9, 2005 | Rating: 134 | Author: Alexey Rykov | Size: 304 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
473. | Accent EXCEL Password Recovery 2.40 (passwordrecoverytools.com) | ||
from the original passwords, but they will be valid. To reduce the time of searching for a password to a workbook, the program has three search methods: a brute-force attack, an attack by an enhanced mask, an enhanced dictionary-based attack. The enhanced mask allows you to specify the range of | |||
Updated: 2, 2006 | Rating: 1000 | Author: Denis Gladysh | Size: 734 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
474. | Accent OFFICE Password Recovery 2.40 (passwordrecoverytools.com) | ||
work. You think that these hacker guys are all geniuses? That's a myth. Stop watching those fairy tale hacker movies! The usual hacker is just a next-door teenager that learned how to apply some password-cracking algorithms. And the truth is that you can do exactly the same thing. The theory is | |||
Updated: 2, 2006 | Rating: 1940 | Author: Denis Gladysh | Size: 734 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
475. | Accent WORD Password Recovery 2.30 (passwordrecoverytools.com) | ||
position in the password that will be generated, which reduces the time of recovery. The enhanced dictionary-based attack provides you with a dictionary manager and mechanisms for transforming the passwords being read. Accent WORD Password Recovery searches the list of the specified dictionaries one by one and can transform passwords by changing their case, interchanging adjacent | |||
Updated: 9, 2005 | Rating: 1001 | Author: Denis Gladysh | Size: 616 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
476. | Access Boss 2.2 (fspro.net) | ||
to effectively restrict access to a PC for certain users based on time factor. All you have to do is install Access Boss under an Administrator account, run the program and choose which users' access time should be restricted. To do so, you simply mark the required hour(s) of any day of | |||
Updated: 2, 2006 | Rating: 175 | Author: FSPro Labs | Size: 933 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
477. | Access Lock 2.83 (softheap.com) | ||
a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only thing | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
478. | Access Lock 2.83 (getfreefile.com) | ||
a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only thing | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
479. | Acronis Privacy Expert Suite 9.0 (acronis.com) | ||
Privacy Expert Suite provides you with proactive, real time protection against malware; including spyware parasites, rootkits, adware, keyloggers, hidden dialers, browser hijackers, and other malicious programs. Our latest version, 9.0, adds key new features to ensure that your PC is not infected with malware: - Rootkit removal automatically detects rootkits and enables users to | |||
Updated: 2, 2006 | Rating: 169 | Author: Acronis | Size: 4335 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
480. | Active Backup Expert 1.92 (backuptool.com) | ||
or differential backup method. Enabling file inclusion on the date-time basis, you will back up the new and changed files only. Having configured the backup-set only once, you are free to create as many backup copies as you wish. Just press the Backup button or click the shortcut on the Desktop. The Command-line support provides you with the ability to get unattended backups by using | |||
Updated: 2, 2006 | Rating: 16 | Author: Andrey Panichkin | Size: 1531 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Time attendance software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|