|
||||||
|
||
|
Home > Night software |
Related keywords: One Night at McCool apos s, Night Before Christmas Screen Saver, Night Before Christmas, the Night Before Christmas, night sky, stary night, night city |
|
|
511. | EndTask Pro 2.00.0123 (products.asynchrony.com) | ||
reminder that notifies the user to walk around and take a break. It's important to relax and protect your invaluable health! A UNIQUE pop-up blocker, task manager, System/Internet connection monitor and more! Avoid killing the pop-ups you want. Pop-ups are hidden, you can take a peek and decide whether to show them, or wait and they will be blocked after a few | |||
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
512. | Enforcer 6.2 (posum.com) | ||
Enforcer provides security for systems that are accessible to many people and require a consistent configuration and a consistent, limited selection of services such as public displays or computer labs. It is also great for limiting users to the webpages you approve such as on a VPN or for childproofing | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1566 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
513. | ENVY 1.00 (radiks.net) | ||
ENVY is a batch file enhancement utility for MS-DOS, Win95,Win98, NT batch files. ENVY will work under Windows NT/2000 if COMMAND.COM is used as the batch processor. ENVY is a stand-alone program that provides 38 new subcommands for use in batch files ( spanning string-manipulation, mathematics, command-processors. Environment variables can be manipulated with many of the new commands | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Lawless | Size: 24 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
514. | Eraser 5.3 (tolvanen.com) | ||
space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like. The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
515. | EugeneShutdown 1.00 (eugenesoft.com) | ||
EugeneShutdown is a system utility for Windows 9x/ME/NT/2000/XP operating systems that allows to automatically shutdown, power off, reboot or log off current user at a specific time on your local computer and initiate shutdown of remote computer. The program provides the following key features: ability to | |||
Updated: 9, 2005 | Rating: 34 | Author: Eugene Konovalov | Size: 641 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
516. | Eyes Care 1.0 (paqtool.com) | ||
Eyes Care is designed for the computer users to protect eyes while using computers, especially for those who usually keep sitting in front of a computer for more than 1 hour. While using computers, either playing games or designing or programming, users are always "forgetting" the time. It is dangerous | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor He | Size: 723 kb | Shareware Go to category: Desktop > Similar programs | |||
517. | f2xml 1.0 (boulderwall.com) | ||
or TEXT based reports on your file system or removable storage (CD's, floppy disks, etc). The HTML and TEXT based output provide self contained reports. The XML format allows for further analysisthrough XSLT to provide whatever details you need from your file system. GUI, command line and DLL interface are provided. f2xml provides detailed information on what is stored on your | |||
Updated: 9, 2005 | Rating: 86 | Author: David Metcalfe | Size: 600 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
518. | File Monster 2.6.7 (nstarsolutions.com) | ||
file name with a randomly generated name and it changes the file's creation date. It can even erase pesky hidden files, system files, and read-only files. Don't leave sensitive data on your computer: deleted files are the first place many computer savvy people will look when they are trying to discover sensitive information on your computer. Some important questions you have to | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
519. | FileName Pro 1.1.2 (jermar.com) | ||
FileName Pro, a professional grade batch file naming utility. Whether you have a few or thousands of files to rename, FileName Pro can rename your files in seconds. Name files using any combination of file naming schemes. Name using dates and times, series style or even random names. Exclude and add text | |||
Updated: 9, 2005 | Rating: 45 | Author: Jerry Rawdon | Size: 2019 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
520. | FolderMatch 3.3.8 (foldermatch.com) | ||
two files. Winner of the 2002 and 2003 Shareware Industry Awards, it's a MUST-HAVE tool for keeping files and folders in sync as well as powerful insurance against loss of valuable data. Who can benefit from FolderMatch? Everyone who maintains multiple copies of files or folders: With users working at multiple locations, it's hard to keep all of the computers | |||
Updated: 9, 2005 | Rating: 0 | Size: 3740 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Night software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|