|
||||||
|
||
|
Home > Postscript software |
|
|
511. | BurnInTest Pro 5.0 (passmark.com) | ||
BurnInTest is a software tool that simultaneously exercises all of the major components of a computer, to test for endurance and reliability. The user can select the hardware components to test and individually adjust the load placed on each one via slide bars. Each test reports results to its own window and | |||
Updated: 2, 2006 | Rating: 128 | Author: David Wren | Size: 2345 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
512. | CDuke 2.1 (coolutils.com) | ||
a CD, select files to place onto a CD, press a button – that’s it! Easy, isn’t it? The progress bar shows how much time has passed since the process had started and how much time is left for it to be completed. But the advantages of CDuke do not stop here. Importantly, the program comes with an autopilot-like feature that controls disk usage and prevents CD from becoming | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Buzaev | Size: 2900 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
513. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
"tap-dancing" required when you cannot remember a chat partner's details. So, with this in mind this software was created. No more jotting down peronal chat partner information on loose pieces of paper or yellow stickies. Have your database open and ready whenever you go online. Add new chat | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
514. | COM Port Toolkit 3.6 (compt.ru) | ||
an integrated serial communications testing toolkit. It sends user's data to and receives one from a device and records all transfers to a log. You can test equipments serial communications protocol by hand: feed it input, check the output. You can write or use a script written by other developers to automate some specific tasks: CRC calculations, special transfer rules, outgoing | |||
Updated: 3, 2006 | Rating: 16 | Author: Michael Golikov | Size: 1199 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
515. | Comm-Logger 1.0 (wcscnet.com) | ||
for archive purposes, data import, or any other use. Comm-Logger's graphics interface allows for easy and intuitive use. Comm-Logger's command line interface can be started from the scheduler, startup, or anywhere else. It has a silent mode that does not display copyright or anything else | |||
Updated: 9, 2005 | Rating: 132 | Author: Egberto Willies | Size: 5303 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
516. | CryptoExpert 2005 PE 6.02 (secureaction.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
517. | CryptoExpert 2003 Professional 2.87 (cryptoexpert.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
518. | CryptoExpert 2006 Professional 6.4.3 (secureaction.com) | ||
CryptoExpert uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
519. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
Cryptosystem ME6 is a Windows program which uses a symmetric key encryption system to encrypt information in either a single file or in multiple files (at once) so that it cannot be read by those not knowing the key. Data is encrypted using a key which is from 16 to 64 characters long, and which can be either | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
520. | DeviceLock 5.73 (ntutility.com) | ||
administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Postscript software |
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|