|
||||||
|
||
|
Home > Modified software |
Related keywords: Modified Plessey |
|
|
531. | Cryptainer LE Free Encryption Software 6.0.1 (cypherix.co.uk) | ||
behaves as a standard windows drive. The files can be read, viewed, modified, as well as moved from one place to another. Any kind of file - from word and excel documents to movies and pictures, can be encrypted. You can also send secure email attachments. It runs on all 32 bit versions of Windows (Windows 95, Windows 98, Windows ME, Windows 2000, Windows 2003 Server as well as | |||
Updated: 9, 2005 | Rating: 144 | Author: Cypherix Cypherix | Size: 2719 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
532. | CSDiff 5.0 (componentsoftware.com) | ||
reports. · Edit mode allows to accept, reject or manually edit any modifications. · Change detection by line, by word or by character. · Smart white-space difference analysis option. · Analysis of MS-Word documents. (MS-Word required) · Sophisticated folder difference analysis sorted by any key. · Support of compressed folders (ZIP files) for comparison between archived | |||
Updated: 9, 2005 | Rating: 97 | Author: David Matyas | Size: 1332 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
533. | Dark Files 3.3.1.1 (mybestsoft.com) | ||
hide them or prevent others from deleting, renaming, executing, or modifying your files in any way. The Wildcard feature allows you to specify which files you want to protect (for example, all EXE or DLL files). The file system protection works independently of the program , so if you even close the program the file protection will still work. Built-in support for multiple user | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
534. | Database Tour Pro 5.0.5.629 (raritet.com.ua) | ||
manipulate the data in the most convenient way. -Creating, deleting, modifying BDE aliases. -Command line support for most important operations like exporting, query executing etc. -Searching and replacing text. -Importing data to table from another table or a query. -Exporting data from any open table or query to another database or file (with format conversion). -Copying data to | |||
Updated: 2, 2006 | Rating: 203 | Author: Vitaliy Levchenko | Size: 1741 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
535. | DBF Viewer PRO 4.0.1 (legendsoft.com) | ||
access to DBFs. DBF Viewer Pro not only lets you view, print, and modify the structure and contents of DBFs, but it lets you create them from scratch, apply query filters, and encrypt/decrypt tables. Given any table, it can generate the Delphi/Apollo code needed to create the table and indexes. This new version includes: Expresssion Builder used throughout the app; SQL support; | |||
Updated: 3, 2005 | Rating: 203 | Author: Kevin Boswell | Size: 4517 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
536. | dbfUtils 2.1.2.1 (aidsoft.com) | ||
is a convenient, full-featured utility for viewing, editing, modifying, converting and exporting DBF-format databasesIt allows you to add, delete, recall, sort, zap, pack records, view and edit tables, get detailed database information. It includes a hex viewer to view records, memos or the whole table.dbfUtils includes: Complete Statistics for numeric fields, Data Dictionary and | |||
Updated: 9, 2005 | Rating: 215 | Author: Del Geist | Size: 3068 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
537. | Delenda 2.415 (peccatte.karefil.com) | ||
identifies files older than x days based on file creation, modification, last accessed date and deletes or moves them to archive folders. You can replicate folder structure when moving files and leave a shortcut in source folder after files transfer to archiving location. 3 methods for deletion or move tasks: - delete old files immediatly - delete files and send files to | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
538. | Desktop Lock 6.1 (toplang.com) | ||
Desktop etc. after your desktop was locked by the software, none can modify your document, access your computer or use programs on your | |||
Updated: 9, 2005 | Rating: 0 | Author: Cui Jiugang | Size: 604 kb | Shareware Go to category: Desktop > Other Similar programs | |||
539. | Personal Desktop Spy 2.10 (spyarsenal.com) | ||
the hot key, he or she will not be able to disable the snooper or modify any of its settings. Spy software for monitoring the activity of users on a PC by automatic capturing of desktop/active application screenshots and saving them to a specified directory on the hard drive. May be used for parental control or employee monitoring | |||
Updated: 9, 2005 | Rating: 0 | Author: Mikhail Kalinskiy | Size: 615 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
540. | DiamondCS ProcessGuard 3.150 (diamondcs.com.au) | ||
can easily be rendered null and void simply by terminating or modifying the host process. For example, a trojan could simply terminate your personal firewall before attempting to transmit your personal details over the Internet, effectively rendering the firewall useless and leaving the user with a false sense of security. Likewise, it could modify your antivirus program by | |||
Updated: 9, 2005 | Rating: 0 | Author: DiamondCS Support | Size: 1922 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Modified software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|