|
||||||
|
||
|
Home > Retriever software |
|
|
531. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
Icon Lock-iT XP provides strong file encryption and security for Windows XP, 2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
532. | IsSearch 1.1.9 (screenresources.com) | ||
The world is becoming more and more complicated day after day. As we immerse into digital era, information becomes the center of our life's meaning. But there is something even more valuable then the information itself: the ability to find required information fast! Data capacity of modern hard drives is | |||
Updated: 9, 2005 | Rating: 0 | Author: Screenresources | Size: 1111 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
533. | Easy Registry Optimizer 1.1 (pixocom.com) | ||
Registry is the database where Windows and programs save and retrieve data. How does removing invalid registry entries speed up my PC? Windows and programs query the registry for information constantly. It goes without saying that querying a registry with fewer entries is faster. Besides passing invalid information to Windows and programs causes system halt and slowdowns. Which | |||
Updated: 9, 2005 | Rating: 57 | Author: Pixocom Marketing | Size: 675 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
534. | Finders Keepers 2.02.2 (yadudigital.com) | ||
Finders Keepers(tm) can search files, replace text, index entire hard drives for instant text retrieval, view or launch any found files, zip found files, and edit the found ASCII text files. Search files 4 ways: plain-text search, regular expressions, approximate, and sound-alike. Find words even if they | |||
Updated: 9, 2005 | Rating: 0 | Author: Yadu Digital Inc. | Size: 2275 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
535. | Cresotech PocketLANce 1.15.50 (cresotech.com) | ||
This application provides a unique easy-to-use option of locating, retrieving and moving/copying network files via conventional ActiveSync connection, network card or even mobile phone/modem. PocketLANce also opens far-reaching possibilities of remote mobile network access via mobile phone or modem | |||
Updated: 9, 2005 | Rating: 0 | Author: Cresotech, Inc. | Size: 328 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
536. | Crime Catcher 2.1 (crime-catcher.com) | ||
Crime Catcher is software for your webcam that allows your computer to act as a security system. The software will monitor for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Every single pixel being monitored for change. Hide Crime | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
537. | CSSS 2.2 (sarbash.com) | ||
Use your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save money and don't buy signalling device; This software for you! What is CSSS? The CSSS program - Computer Sound Security System. The - to guard your home, office or any location; - to eavesdrop; - to save money and don't buy signalling device; This software for you | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 2640 kb | Demo Go to category: System Utilities > Other Similar programs | |||
538. | Daily Backup 2.08 rel b (softwaremeister.com) | ||
restore your files, Daily Backup uses a reverse retrieval scheme: it retrieves the most current version of a file first, and skips this file in the other (older) archives. puts files into zip archives: as soon as a file is changed (or created), at fixed time periods, when the system is idle, or on shutdown. see the generations of files; go back to a previous generation whenever you | |||
Updated: 9, 2005 | Rating: 43 | Author: Thomas Gawehns | Size: 1319 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
539. | Data Stash 1.5 (skyjuicesoftware.com) | ||
you can hide sensitive document files into a bitmap file, and retrieve them later. Opening the bitmap file would only show the image of the bitmap, and not the files that are stored in it. You can hide files into .exe, .com, .mpg, and so on. Hide your files easily and discreetly! Data Stash is a clever little steganographic security tool that allows you to hide sensitive data | |||
Updated: 9, 2005 | Rating: 0 | Author: Chooi Guan Lim | Size: 384 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
540. | DefPrin 1.72 (insync-software.co.uk) | ||
Checks that your default printer is the one you want and not that one in the Business Centre where you were working yesterday, so the confidential report you are about to print need not be read by all your colleagues or competitors. An absolute godsend for mobile laptop users. Here's a little story to | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Newman | Size: 523 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
|
Home > Retriever software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|