|
||||||
|
||
|
Home > Identification software |
Related keywords: name tags identification, language identification, character set identification, file identification |
|
|
51. | Space Hound 32 3.0.583 (fineware.com) | ||
be examined by the user. Several primary displays guide you in identifying files which are duplicated, obsolete, and even help find files which may have been forgotten. Space Hound 32 provides the tools to assist you in determining which files fall into these categories. In addition to helping you "sniff out" wasted and nonproductive disk space, the program provides excellent | |||
Updated: 2, 2006 | Rating: 0 | Author: Al Meadows | Size: 4980 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
52. | OE-Mail Recovery 1.7.7 (oemailrecovery.com) | ||
folder in Outlook Express. OE-Mail Recovery reads .dbx files and identifies e-Mails stored in them. The recovered messages can be viewed and saved as the message files in the .eml format. The recovered messages can be opened by Microsoft Outlook Express and easy moved/copied to its folders. The program has a wizard for easy Outlook Express Recovery. With the wizard's help you'll | |||
Updated: 2, 2006 | Rating: 925 | Author: Victor Bobrov | Size: 944 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
53. | Fast Cleaner 4.7 (eshinesoft.com) | ||
Folder and Direct Deletion. 4. Engine Technology to identify garbage files and ignore important files, which ensures secure cleaning up of your harddisks and smooth running of your system. 5. Value-added functions for advanced users to perform manual disk cleanup. 6. Secure cleaning and exclude options! 7. User-friendly and Wizard Interface! Very easy to use! 8 | |||
Updated: 2, 2006 | Rating: 0 | Author: Jerry Jones | Size: 3577 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
54. | Delenda 2.415 (peccatte.karefil.com) | ||
identifies files older than x days based on file creation, modification, last accessed date and deletes or moves them to archive folders. You can replicate folder structure when moving files and leave a shortcut in source folder after files transfer to archiving location. 3 methods for deletion or move tasks: - delete old files immediatly - delete files and send files to | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
55. | cPWD 2.6 (absolutedynamics.com) | ||
Target multiple Administrator accounts based on the Security Identifier Descriptor (SID). Dynamically generate and apply C2-Compliant random passwords. Rename the local administrator account. Update services configured to logon with domain credentials. History kept on all system changes made with cPWD. A powerful Information Security Management tool that will protect the local | |||
Updated: 2, 2006 | Rating: 0 | Author: Donnie Byerley | Size: 725 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
56. | Broken Cross Disk Manager 3.81 (broken-cross.com) | ||
description, a comment, an image thumbnail or other information, to identify them more easily. Add password-protection to protect items in your database. To search for files, you can open multiple search dialogs with options for date, size and categories. The fast search function supports as well | |||
Updated: 2, 2006 | Rating: 0 | Author: Kevin Fucik | Size: 893 kb | Shareware Similar programs | |||
57. | Broken Cross Disk Manager 3.81 (bcdm.broken-cross.com) | ||
description, a comment, an image thumbnail or other information, to identify them more easily. Add password-protection to protect items in your database. To search for files, you can open multiple search dialogs with options for date, size and categories. The fast search function supports as well | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin Fucik | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
58. | Batch Rename .EXE 1.0.48 (stintercorp.com) | ||
remove spaces, and change capitalization, insert formatted dates and identification numbers. Use the replace feature to correct and edit collective naming errors, or unwanted tagging. If your working with MP3 files enjoy build-in Tag Reading support to extract track number, artist and album information to use in the filename. If you're looking for more advanced functionality such as | |||
Updated: 2, 2006 | Rating: 16 | Author: SoftTech InterCorp | Size: 977 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
59. | Anti-keylogger 7.1.1 (anti-keyloggers.com) | ||
steal your sensitive information, passwords, logins, PIN (Personal Identification Number) etc. Anti-keylogger works transparently for the user and silently, asking the user no questions thus excluding user's probability of error when making a decision. Anti-keylogger for Windows 2000/XP provides every computer with strong protection against most types of the keylogging software, both | |||
Updated: 2, 2006 | Rating: 107 | Author: Raytown Corporation LLC | Size: 2979 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
60. | Anti-keylogger 7.1.1 (anti-keyloggers.com) | ||
steal your sensitive information, passwords, logins, PIN (Personal Identification Number) etc. Anti-keylogger works transparently for the user and silently, asking the user no questions thus excluding user's probability of error when making a decision. Anti-keylogger for Windows 2000/XP provides every computer with strong protection against most types of the keylogging software, both | |||
Updated: 2, 2006 | Rating: 82 | Author: Raytown Corporation LLC | Size: 2979 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
|
Home > Identification software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|