|
||||||
|
||
|
Home > Computer configuration software |
Related keywords: computer, computer security, configuration, computer game, Computer, configuration management, computer software, computer backup, computer games, software configuration management |
|
|
491. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
492. | East-Tec File Shredder 1.0 (east-tec.com) | ||
hard disk, easy to be recovered by anyone that has access to your computer. East-Tec File Shredder securely destroys (shreds) sensitive and private files beyond recovery. Simply drag and drop files to the shredder icon on your desktop, or select the files you want to destroy directly from the Windows | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
493. | Easy File Protector 4.14 (softstack.com) | ||
File Protector also provides password protection, user-dependent configurations, and user validation at login. Easy File Protector a password protected security utility to restrict access to files and folders by user-defined time schedule. Files and folders become undeletable, unrenamable, unreadable, unmodifiable, and | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
494. | ECSync 1.0 (EUROCOMP.info) | ||
program that saves and synchronizes data and files on any Windows computer. Easy synchronization of files on notebook, desktop and server. Data can be on internal or external disk or other storage device. Extensive options for configuration. Tasks can be stored in profiles for individual copying processes. Can be automated with Windows Task Scheduler for periodic tasks. Runs | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Osthege | Size: 5007 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
495. | EF System Monitor 3.20 (efsoftware.com) | ||
space, hard disk usage, date, time, user name, etc. about all the computers running on your network. * When you run the EF System Monitor under Windows NT, Windows 2000 or XP, you can use the advanced services provided by these Windows platforms, like process and thread surveillance, advanced I/O port | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 851 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
496. | Find Protected 2.0 (aks-labs.com) | ||
such as PGP disk. Use Find Protected to inspect local or remote computers for password protected files. After selecting the types of protected files that you want to find and the location to search in, you run the scan. The result of the inspection is a list of discovered password protected files. Date and Size filters in Find Protected allow you to speed-up the search process | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
497. | EndTask Pro 2.00.0123 (products.asynchrony.com) | ||
Its design isn't based on a specific browser so it will work on most computers. There is no need to install any proxy servers or plug-ins. The Pro edition includes common features such as a "White list" and the classic "Instant-Blocker". Our task management software, like antivirus and firewall | |||
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
498. | Enforcer 6.2 (posum.com) | ||
systems that are accessible to many people and require a consistent configuration and a consistent, limited selection of services such as public displays or computer labs. It is also great for limiting users to the webpages you approve such as on a VPN or for childproofing individual systems. It | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1566 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
499. | ESBUnitConv Pro 5.2 (esbconsult.com) | ||
Intensity, Luminance, Luminous Flux, Density, Angular Velocity, Computer Storage, Data Rates and Radioactivity. Includes Log of conversions, Scaling, Value Swapping, Clipboard Support, integrated help, printing, full customization and much more. Users can also choose between English International (Default) and English (US). Optimized for Windows XP in 800x600 (or better) and | |||
Updated: 2, 2006 | Rating: 0 | Author: Glenn Crouch | Size: 1424 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
500. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close - it is not a problem to pull out the USB HASP KEY from one computer and to insert into another. There is a problem when the computers are located in different premises, or it is worse than that, in different cities (two sub-units | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
|
Home > Computer configuration software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|