|
||||||
|
||
|
Home > How software |
|
|
631. | Easy Registry Optimizer 1.1 (pixocom.com) | ||
Optimizer can make your computer run faster and with less errors. How does Easy Registry Optimizer achieve this? Windows and programs query the registry for information constantly. It goes without saying that querying a registry with fewer entries is faster. Besides passing invalid information to Windows and programs causes system halt and slowdowns. Furthermore compressing the | |||
Updated: 9, 2005 | Rating: 57 | Author: Pixocom Marketing | Size: 675 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
632. | Easy Sticky Note 2.00 (8848soft.com) | ||
You can schedule one-time or recurring events, and you can control how far in advance you are notified. Have you ever placed little sticky notes on your monitor to remind yourself of upcoming events or things you need to do? Easy Sticky Note lets you stick notes on your monitor electronically. The notes can be moved or resized, and | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Wang | Size: 810 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
633. | EHusBook 2.4 (kroxus.com) | ||
in different printers including printer drivers like fax. Calculates how many papers needed. This program helps to easily print brochures, leaflets, books directly from Microsoft Word 2000/XP. Eliminates brochure printing mistakes, saves your time and | |||
Updated: 9, 2005 | Rating: 0 | Author: Oybek Umarov | Size: 400 kb | Freeware Go to category: System Utilities > Printer Similar programs | |||
634. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
635. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
Opening a PDF with this password will restrict you based on how the PDF was password protected (printing may be disabled, for instance). Encrypt PDF software allows you to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) existing | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
636. | EtherScout 1.10 (globalpatrol.net) | ||
what Web sites are most commonly visited through your network; how much network traffic users are generating per day, week, or month; and how much traffic each protocol is generating and by whom. You can even write your own reports using HTML and SQL, allowing you to extract the exact information you need to see. Centralized Internet traffic logging and analysis, combined | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1216 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
637. | EZ Wizard 3.0 (microtech.doe.gov) | ||
of ENERGY STAR, which can turn off your monitor, your computer's most consuming component, during idle time. To easily activate the ENERGY STAR capabilities of your system, run the EZ Wizard. If you aren't already using ENERGY STAR, the program will ask if you want to activate it. If you do | |||
Updated: 9, 2005 | Rating: 0 | Author: David Ensign | Size: 86 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
638. | FastSum 1.9 (fastsum.com) | ||
be afraid of these unintelligible words, all you have to know is – how to run FastSum. You can rectify the errors occurring while data transfer. For example: Network transfers, CD-R and DVD burning, software errors and much more. FastSum calculates short and strong digests of your data via MD5 algorithm to use it as references checksums for ulterior data integrity verification | |||
Updated: 9, 2005 | Rating: 42 | Author: Kirill Zinov | Size: 424 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
639. | File Locator 1.0 (amicutilities.com) | ||
can't find the file you are looking for, even though you know it's someplace there on your computer! How many times did you tried to locate some files using the Windows XP's built-in search feature and failed? Not to mention that under older versions of windows would be even harder to | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexandru Marias | Size: 1467 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
640. | File Monster 2.6.7 (nstarsolutions.com) | ||
file name with a randomly generated name and it changes the file's creation date. It can even erase pesky hidden files, system files, and read-only files. Don't leave sensitive data on your computer: deleted files are the first place many computer savvy people will look when they are trying to discover sensitive information on your computer. Some important questions you have to | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > How software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|