|
||||||
|
||
|
Home > Configure a computer software |
Related keywords: computer, computer security, computer game, Computer, configure, computer software, computer backup, computer games, computer monitoring, computer animation software |
|
|
41. | File Backup Watcher Professional 2.7.3 (dswsoft.com) | ||
With information becoming the one and only true gold of our days, computers are getting more and more widespread. These days, all kinds of activities from home accounting to international corporation business processes are getting automated. According to latest studies, private data and business-critical information make up to 30 per cent of an average hard drive space. Losing this | |||
Updated: 2, 2006 | Rating: 0 | Author: Desktop Software | Size: 2552 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
42. | Egg 1.3 (SinnerComputing.com) | ||
for a countdown timer to prevent you toasting your clothes in the dryer or freezing soft-drink cans while you are "working" on your computer? Egg is an easy to use countdown timer, settable by second divisions from 1 second up to 45 days. While it features a compact window, common times are settable with only two clicks from a selection of 12 customisable | |||
Updated: 2, 2006 | Rating: 434 | Author: Andrew Glina | Size: 37 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
43. | Display Resolution Manager 3.7 (bytegems.com) | ||
Stop the squabbles with this program! Display Resolution Manager is a utility that allows multiple users sharing a computer to set their own display resolution, gamma, brigtness and contrast preferences. Display Resolution Manager will give you an opportunity to work with your favorite display resolution and color settings. Do you want a huge resolution with | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Kolesnichenko | Size: 618 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
44. | Dark Files 3.3.1.1 (mybestsoft.com) | ||
protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 9.x/ME/NT/2000/XP . Dark Files can work with Network folders and fully supports protection of removable media (such as floppies, CD Roms, DVD, ZIP and some SCSI and | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | Ardamax Keylogger 2.4 (ardamax.com) | ||
Keylogger is a small, easy-to-use keylogger that captures user activity and saves it to a logfile. The logfile can be viewed as a text or web page. Use this tool to find out what is happening on your computer while you're away, maintain a backup of your typed data automatically or use it to monitor your kids. Ardamax Keylogger Features: Hidden | |||
Updated: 2, 2006 | Rating: 12034 | Author: Maxim Frolov | Size: 286 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
46. | Access Lock 2.83 (getfreefile.com) | ||
you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
47. | Access Lock 2.83 (softheap.com) | ||
you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
48. | Subscribe Emails 2.23 (softstack.com) | ||
email requests, download email messages with the requests to your computer, get email addresses and sender names from them and create text files with subscribers wanting to subscribe or unsubscribe. Having got text files with emails, you can use them with any bulk mailer to add new subscribers and | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 659 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
49. | Private Shell SSH Client 2.1 (privateshell.com) | ||
Shell is an easy to configure SSH client for Windows. Autoconfiguration wizard helps you to setup basic and advanced SSH sessions. Even if you are not familiar with SSH, you can easily establish connections that use public key authentication and provide ssh tunneling for third-party applications (such as Oracle, MySQL, CVS, VNC, e-mal clients and other software). Private | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
50. | Power Email Verifier 3.0 (tecsoftware.biz) | ||
lists with no problem. Uses multithreading to verify emails at a very fast rate. Simulates the sending of email without sending any messages. Program supports the following file formats: delimited, text, csv - windows address book, and over 7 mail list formats. Verified email records are saved in the same format that they are imported in. Program comes completely | |||
Updated: 2, 2006 | Rating: 16 | Author: Terry Cowley | Size: 3314 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Configure a computer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|