|
||||||
|
||
|
Home > Desktop pc software |
Related keywords: desktop, Desktop, desktop utility, desktop enhancements, desktop publishing, desktop decoration, desktop management, active desktop, desktop tools, Desktop Publishing |
|
|
491. | WinINSTALL 8.6 (mkt.ondemandsoftware.com) | ||
8.6 and the Desktop Availability Suite 8.6 are the most easy-to-use, single solution for MSI Packaging, Patch Management, Software Distribution, Asset Management, License Compliance checking. WinINSTALL8.6 and DAS 8.6implements an award-winning software packager and a proven infrastructure for managing desktops. A PC Migration engine is included with DAS 8.6. An | |||
Updated: 3, 2005 | Rating: 1254 | Author: Paul Pieske | Size: 200195 kb | Demo Go to category: System Utilities > Other Similar programs | |||
492. | Note-it Post-it Notes 1.00 (bysoft.se) | ||
your ideas, just like the paper Postit Notes floating on your desktop. In other words it is the perfect replacement of the classic yellow sticky note on your desktop. With sticky notes reminders on your PC desktop you will never forget the most important meetings, ideas and thoughts. Note-it Post-it Notes is implemented in the cross-platform language Java an | |||
Updated: 8, 2004 | Rating: 2966 | Author: Roger Karlsson | Size: 200 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
493. | eCount 1.0.1 (athnetix.com) | ||
to count target hits. It runs on a Windows 95/98/Me/2000/NT4.0/XP PC. The RF transmitter has a working range of well over 350+ feet. There can be either single or dual display's allowing one or two competitor's to compete. The transmitter comes with a normally open sensor and magnet. As a | |||
Updated: 8, 2004 | Rating: 0 | Author: Keith Thompson | Size: 9 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
494. | Heidi R. Stealthy (TM) 2.0 (owendigital.com) | ||
Heidi R. Stealthy (TM) allows you to instantly conceal your current PC or laptop activities from your friends, family, coworkers, roommates, casual onlookers and passersby. When it's safe once again, another single mouse-click returns your PC or laptop to its prior state. You can repeat this cycle as often as needed! One mouse-click, and your open, visible application | |||
Updated: 8, 2004 | Rating: 0 | Size: 1172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
495. | Cresotech DesktopSafe Lite 1.12 (cresotech.com) | ||
Pro, you can easily export/import your data to and from your Pocket PC - just connect your Pocket PC to desktop PC and access Files menu. Use Export to Pocket PC option to transfer your data to Pocket PC or Import from Pocket PC option to acquire the data file from Pocket PC. To handle your confidential records on Pocket PC, you | |||
Updated: 8, 2004 | Rating: 0 | Author: Cresotech, Inc. | Size: 3192 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
496. | Portal-VADO 1.1 (gandersoft.com) | ||
Portal-VADO is a Drag and Drop Cataloging, Managing and Retrieval Software. Portal-VADO provides customized catalog entries and descriptions with each file. Visit www.gandersoft.com for help and details. Help is not included in the program file. Quick graphics preview is supported without having to open | |||
Updated: 8, 2004 | Rating: 0 | Author: Al Boyd | Size: 2341 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
497. | @KeyLogger Home 2.10 (activity-tracker.com) | ||
is the highly flexible, all-round desktop security monitoring solution used by concerned parents, small businesses, and "Fortune 500" companies alike. @KeyLogger is also popular for many special tasks like software usability testing or scientific studies of PC usage. So how do you know what your staff, children, spouse or significant other type on your computer when | |||
Updated: 8, 2004 | Rating: 48 | Author: Konstantin Romanovsky | Size: 959 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
498. | Cresotech PocketSafe 1.32 (cresotech.com) | ||
CRESOTECH POCKETSAFE provides the comfortable management and secure storage of passwords, nicknames, credit card, bank account and document data as well as other confidential information. The records in database are stored encrypted and password-protected. The mobile world requires mobile solutions with data | |||
Updated: 8, 2004 | Rating: 0 | Author: Cresotech Team | Size: 310 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
499. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
user-defined word filter is detected resulting in the capture of the desktop image in standard JPEG format for further investigation. Screens may be captured for every detection encountered or just capture the last detection. HWPE 2 is invisible on the task lists in Windows, and other stealth options | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
500. | encryptX SecurDataStor Premium 6.0 (encryptx.com) | ||
This file encryption program supports all primary forms of PC-based storage media (e.g. USB flash memory devices, CD-R/RW discs, DVD, Iomega™ Zip® and Jaz® disks, and floppy disks). Written in C++ to maximize performance and minimize footprint, the program can encrypt large volumes of data in moments. Microsoft verified for Windows XP. Strong file encryption software for | |||
Updated: 8, 2004 | Rating: 107 | Author: David Duncan | Size: 490000 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Desktop pc software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|