|
||||||
|
||
|
Home > Bulletproof software |
|
|
511. | HDD Temperature 1.3 (siguardian.com) | ||
There are many reasons why hard-drives get damaged, and overheating is probably the most common one. If you remember your physics lessons well, you know that spinning something at several thousand revolutions per minute causes heat, plenty of heat. That is why servers and computers have coolers, fans and | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuri Alexandrov | Size: 1016 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
512. | Internet Explorer Password 1.0 (thegrideon.com) | ||
IE Password is intend to recover passwords to websites which MS IE saves in it's cache. These passwords are used when Auto filling is on, when you say "Yes" to save your password for future use. It is real recoverer – it will show you a password, not just remove it. Another great feature of this | |||
Updated: 9, 2005 | Rating: 0 | Author: Maxim Tomashevich | Size: 450 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
513. | Miraplacid Publisher 5.2 (miraplacid.com) | ||
With Miraplacid Publisher software you can convert (print) any document to an image or web presentation. Anyone can open your document across a broad range of hardware and software, and it will look exactly as you intended - with layout, fonts, and images intact. No one can modify or copy and paste your | |||
Updated: 2, 2006 | Rating: 42 | Author: Miraplacid Software Development | Size: 3208 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
514. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
515. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
516. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor Netâ„¢ is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
517. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
518. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
519. | Ping Alarm 1.4 (Pingalarm.narod.ru) | ||
This small and convenient program is intended for watching for presence computers at the Net. The program sends the request with a specific interval, determined by the user to selected computer. If it is exist - works alarm and programm issues the message "Name_of_the_computer is exist ". Also alarm works | |||
Updated: 9, 2005 | Rating: 0 | Author: Roman Balabolko | Size: 290 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
520. | Security Folder 2.0 (security-folder.com) | ||
These days computers are everywhere. Reliable and tireless machines replace human beings at dull routine tasks in almost every area. Each day we tend to rely more and more on electronics as storage media and information processing and distribution systems. A decade ago, our puny hard drives contained hardly a | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 515 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Bulletproof software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|