|
||||||
|
||
|
Home > Best file share software |
Related keywords: file, File, share, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
591. | StormWindow 95 4.55 (cetussoft.com) | ||
use of StormWindow security measures will allow secure use of any shared Windows 95 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of desktop changes; hiding individual drives in My Computer and Explorer; hiding the Start Menu Settings Folders (Control Panel and | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1457 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
592. | StormWindow 98 5.14 (cetussoft.com) | ||
use of StormWindow security measures will allow secure use of any shared Windows 98 computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of desktop changes; hiding individual drives in My Computer and Explorer; hiding the Start Menu Settings Folders (Control Panel and | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
593. | StormWindow Me 6.02 (cetussoft.com) | ||
use of StormWindow security measures will allow secure use of any shared Windows Me computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of desktop changes; hiding individual drives in My Computer and Explorer; hiding the Start Menu Settings Folders (Control Panel and | |||
Updated: 9, 2005 | Rating: 16 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
594. | StormWindow NT 2.14 (cetussoft.com) | ||
use of StormWindow security measures will allow secure use of any shared Windows NT computer. Examples of desktop protections include: protecting individual desktop icons; hiding individual Start Menu program groups and links; preventing the saving of desktop changes; hiding individual drives in My Computer and Explorer; hiding the Start Menu Settings Folders (Control Panel and | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1283 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
595. | StrongSearch 1.3.1 (kraslabs.com) | ||
their computers into networks and prompt their employees to use shared resources, searching for files over LAN becomes an increasingly difficult task. Frequently, people do not remember the exact file names, which results in a horrendous amount of time spent waiting for the search results. Plus there are other issues, like searching through hidden shares | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Startsev | Size: 1434 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
596. | Surf Spy 2.10 (bysoft.se) | ||
visited web site and stores it to a password protected encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are away. In the stealth mode, Surf Spy does not show up in the system tray, task bar, or task list. Surf Spy is compatible | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
597. | System Monitor 1.4.1 (rundegren.com) | ||
anywhere on your network. You can also search remote computers for files, folders or running processes and delete or terminate these with ease. By adding rules that will be triggered when certain conditions are met for a specified resource on a computer, you can have notifications sent through | |||
Updated: 2, 2006 | Rating: 0 | Author: -- -- | Size: 860 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
598. | TEXTools 2.2 (fireflysoftware.com) | ||
convert between CSV, comma-delimited, tab-delimited and fixed-width files, extract logfile data, manipulate XML data, convert between PC, Mac and Unix text files, edit mailing lists, extract email addresses, maintain lists of keywords, format source code, automate interactive processes -- all | |||
Updated: 9, 2005 | Rating: 571 | Author: Barry Block | Size: 1026 kb | Shareware Go to category: Development > Other Similar programs | |||
599. | Time Organizer V 1.0 1.0 (techotek.tripod.com) | ||
powerful alarm/chime clock. It is fully Mp3 Compatible and plays Mp3 files for alarms and chimes (It plays a unique Mp3 file every hour as per the user's wish!) The calendar must also be a treat to the user. Schedules are marked green while diary entries are marked blue. Options | |||
Updated: 9, 2005 | Rating: 0 | Author: Vinodh Kumar | Size: 4611 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
600. | Trash it! 1.71 (trashituninstaller.com) | ||
for Microsoft Windows. If you try out various pograms from CD's or the net, and if you are tired of having them mess up your hard drive with files you don't really need, then Trash it! is for you. Use Trash it! to free up your hard drive of files that you have no need for, thus leaving more space for the files that you really need. Just run Trash it! once | |||
Updated: 8, 2004 | Rating: 42 | Author: Mustafa Lokhandwala | Size: 1691 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Best file share software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|