|
||||||
|
||
|
Home > Key fields software |
Related keywords: fields, custom fields, IBE LOG FIELDS, custom database fields, Text to fields, form fields |
|
|
51. | 1st Security Agent 6.14 (getfreefile.com) | ||
items, hide local and network drives, disable the DOS prompt, boot keys, real DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop icons, and much more. You can apply password protection to Windows and restrict users to running specific applications only. Security restrictions can be applied universally or just to specific users. 1st Security Agent also | |||
Updated: 2, 2006 | Rating: 214 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
52. | Taskbar Manager 3.0 (askarya.com) | ||
with Drag and Drop * Hide applications on taskbar * Use Hot key to hide multiple applications * Disable startup applications * Avoid annoying Startup programs * Schedule automatic System | |||
Updated: 2, 2006 | Rating: 928 | Author: Onkar Parhar | Size: 398 kb | Shareware Go to category: Audio & Multimedia > Encoders & Decoders Similar programs | |||
53. | Reg Organizer 3.1 (chemtable.com) | ||
performance. You can thoroughly search the Registry to find all the keys related to a certain application - Reg Organizer does this job quicker and better than other similar programs. Other Reg Organizer features include the ability to find and replace the Registry entries, automatic Registry cleanup, configuration files management (manages various types of configuration files | |||
Updated: 2, 2006 | Rating: 0 | Author: Konstantin Polyakov | Size: 1440 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
54. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
and encrypts backup files using a choice of encryption methods and key lengths: DES, TDES-128, AES-128, AES-192, AES-256, or Blowfish (up to 448 bit key length.) RBackup then sends backup files off-site to the RBackup Server through the Internet, Intranet, or direct dial-up modems. RBackup has many failsafe features, and conforms to standard backup methodology. RBackup can be | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
55. | PowerKey 2.11.01.22 (elcor.net) | ||
and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It also features secure deletion (Wipe) option providing you with the powerful tool designed to avoid restoration of sensitive data. It has in-built AntiPasswordSpy code which will remove the threat of your passwords being revealed providing you with a | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
56. | Paq Keylogger (family key logger) 5.0 (paqtool.com) | ||
keyloggers, family key logger keystroke logger is a keylogger spy program newly produced in 2003. It can log and spy all keyboard events and view it conveniently. It also has ability of invisibly monitor, password protect etc. This quickly updating spyware tool is suited for the investigative or spector needs of law enforcement, government, business, and private individuals. New | |||
Updated: 2, 2006 | Rating: 19 | Author: Victor He | Size: 470 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
57. | Network Clipboard and Viewer 1.0.0.20 (interdesigner.com) | ||
etc.). Easy access at any time with Win+C combination (Windows Start Key and C letter). - Enhanced Security with list of allowed computers on network, password enforced, Favorites computers access, remote users (authorized or blocked), etc. - Allows to compress remote clipboard information before transfer it to your computer, quick and easy! - Log for process. - Automatic Clear | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Serrano | Size: 2015 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
58. | Mouse and Key Recorder 5.7 (kratronic.com) | ||
Mouse and Key Recorder is an enhanced automation tool, which allows recording and replaying virtually every data input by keyboard and mouse. The Recorder not just records all keyboard and mouse activities in any window, but it also contains more than 130 additional commands. These commands allow controlling the macro run (loops, conditions, goto, variables, etc.), manipulating files | |||
Updated: 2, 2006 | Rating: 16 | Author: John Krauer | Size: 3737 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
59. | Macro Express 3.5e (macros.com) | ||
files, and creating reminders. Macros can be launched by hot keys, short keys, a window title, pop-up menu, or via a timed schedule. This version also supports the ability to send email. The email feature includes a built-in address book and a wizard that will prompt you for all options, including optional dial-up networking connection. Macro Express is an incredibly | |||
Updated: 2, 2006 | Rating: 0 | Author: Stan Jones | Size: 7222 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
60. | Lock My PC 3.4 (fspro.net) | ||
These days, computers are everywhere: from banks and government offices to shops and homes. We tend to rely on our machines more and more each day. We store our valuable data, personal and business-critical information, photos, credit card information, important phone numbers and vast amount of other private | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Key fields software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|