|
||||||
|
||
|
Home > Do list software |
Related keywords: list, mailing list, to do list, List, mailing list manager, distribution list, watch list, drop down list, password list, task list |
|
|
531. | Compendium-TA 1.3 (compendiumdev.co.uk) | ||
For modelling what? Novels, Articles, WebSites, Systems. What do you | |||
Updated: 9, 2005 | Rating: 0 | Author: Alan Richardson | Size: 6600 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
532. | Complete Registry Cleaner 3.0 (abexo.com) | ||
is a database where Windows and programs store their data. Why do I need to clean the registry? When data changes i.e. you delete a file, the registry doesn't remove the invalid data, thus in this case a reference to a non-existent file remains in the registry. As the registry gets filled with invalid data, Windows and programs consume more system resources to search the | |||
Updated: 9, 2005 | Rating: 170 | Author: Abexo Marketing | Size: 789 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
533. | CopyProf 1.40 (time-river.com) | ||
Full registered version allows operations logging and outputting a list of files that cannot be processed with current software configuration (do not comply with given file masks or attributes etc.). It also allows using logical search expressions based on file attributes and running an external | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrey Sobolev | Size: 156 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
534. | Cresotech Easystart 2.0 (cresotech.com) | ||
now. Hair-of-the dog solution is to install one more program to do this job: a compact skinnable tool CRESOTECH EASYSTART is recommended. This powerful tool is really an easy way to locate, start and monitor any program on your computer with indication of the general time of its use, frequency of its access and other details. Its powerful context search engine allows you to locate | |||
Updated: 9, 2005 | Rating: 0 | Author: Cresotech, Inc. | Size: 1508 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
535. | Crime Catcher 2.1 (crime-catcher.com) | ||
for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Every single pixel being monitored for change. Hide Crime Catcher completely from view! Can appear in the system tray, taskbar, both, or neither - completely hidden from view! Email notifications with attachments Have emails of what the webcam has | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
536. | Date Reminder 1.1.0.0 (webxpace.com) | ||
ever forget an important date again! Create a list of all your important dates - anniversaries, things to do, events, memories, etc. - and this little program will remind you whenever that date comes. When it is run, it will pop a reminder with all events that occur on the present day. You can sort all events alphabetically, and order all the dates, by clicking on the header | |||
Updated: 9, 2005 | Rating: 0 | Author: Jose Falcao | Size: 143 kb | Freeware Go to category: Business > PIMS & Calendars Similar programs | |||
537. | DefPrin 1.72 (insync-software.co.uk) | ||
Windows Default Printer to one that is actually there if he wants to do any printing. One day he happily clicks on the Print button in his word processor program to print out a confidential report he has been preparing for his boss about the reorganization they have been planning. Unfortunately | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Newman | Size: 523 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
538. | Dekart Private Disk 2.07 (dekart.com) | ||
program fails to protect the system. Now you can create a white-list of applications, only these programs will be allowed to access the contents of the encrypted drive. This feature protects your data from external threats, as well as internal ones: group leaders can be sure that employees are able to access sensitive information while doing their job, but they cannot copy it | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
539. | Delenda 2.415 (peccatte.karefil.com) | ||
on the same disk or toward a network drive. Once set up, let it do the work for you automatically. It can remove the contents of sub-folders and read-only files. There is an option to delete all files of a folder only if all the files are obsolete (i.e. no files are deleted if there exists a file of the folder which is not obsolete). A log file can be activated to report the | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
540. | Desktop Resetter 1.7.2 (nouturn.com) | ||
all shortcut and icon junkies!!! .....do your icons tend to move with no help from you? Do you find it frustrating to always have to put them back? Want to do restore everything with a few clicks? Desktop Resetter to the rescue! Just hit "remember" for each resolution and with a click of a button you can sit back and watch everything fly back into place! Desktop | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Damato | Size: 809 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Do list software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|