|
||||||
|
||
|
Home > Watch software |
|
|
661. | Geek Superhero 1.3 (geeksuperhero.com) | ||
Superhero watches your computer for changes, immediately notifying you when a setting is altered to confirm you want to keep or reject the change. This catches many of the modifications made by a virus, trojan or worm; protecting your computer from harm. (A "Computer Setting Firewall" is an excellent description.) It includes other features to help you protect your computer from | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Burford | Size: 2548 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
662. | GetDataBack for FAT 2.31 (runtime.org) | ||
No matter what the disaster scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, FAT or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost | |||
Updated: 9, 2005 | Rating: 1267 | Author: Ragnhild Fesel | Size: 2811 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
663. | GetDataBack for NTFS 2.31 (runtime.org) | ||
No matter what the disaster scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, MTF or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost | |||
Updated: 9, 2005 | Rating: 1729 | Author: Ragnhild Fesel | Size: 2789 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
664. | GoodBye Spy 4.01 (tekeffect.com) | ||
Advanced spyware removal and real time monitoring utility. GoodBye Spy is a multi-adware removal program, which supports the removal of spyware, adware, Brotherware, and more. It scans your registry, memory, and drives, then allows you to remove these unwanted files from your system. To offer greater | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 608 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
665. | Hara-Kiri 2.02 (cyteg.com) | ||
"Hara-Kiri" (ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
666. | HS SoBigRemover 1.2 (haysoft.com) | ||
This software must be used to detect large number of SoBig viruses in an email account and delete them remotely without the need of downloading any of them to your machine. SoBig virus is large sized email so it uses network traffic when receiving to your machine. This software can be an indispensable tool to | |||
Updated: 9, 2005 | Rating: 0 | Author: Cenker Sisman | Size: 576 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
667. | Iconic Tray 1.21 (iconictray.com) | ||
Iconic Tray is a tiny utility which lets you minimize any window either to the system tray (notification area in Windows XP), or to a special new tray provided by Iconic Tray itself (see image). Whichever method you choose - bye bye those clogged up taskbars! Iconic Tray is very useful to hide seldom used | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Nikitin | Size: 47 kb | Shareware Go to category: Desktop > Other Similar programs | |||
668. | Identity Knight 1.3 (fspro.net) | ||
Modern computer technologies evolve with blazing speed. As we emerge into a new digital era, we tend to trust machines with virtually every aspect of our life. Development of secure network communication technologies opens new horizons of electronic business. However, it also plays a trick on our perception data. Your credit card numbers, SSN, driver license and e-mails can be stolen easily! Download Identity Knight, the unique credentials protection software, today | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
669. | IntraMail 2003.01.20 (dplanet.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
670. | KeyIt! 2.0 (keyit.com) | ||
And best of all, the additional modules are free! KeyIt works by watching what you type! When you type in a trigger word, KeyIt jumps into action by either replacing the word with text, rich text or an image, or by launching an application, or opening a website. KeyIt is very easy to configure and comes with a tutorial and sample file to help you get started. Empower your keyboard | |||
Updated: 9, 2005 | Rating: 0 | Author: Kevin O'Donnell | Size: 2574 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
|
Home > Watch software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|