|
||||||
|
||
|
Home > Novel software |
|
|
661. | Geek Superhero 1.3 (geeksuperhero.com) | ||
Geek Superhero watches your computer for changes, immediately notifying you when a setting is altered to confirm you want to keep or reject the change. This catches many of the modifications made by a virus, trojan or worm; protecting your computer from harm. (A "Computer Setting Firewall" is an excellent | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Burford | Size: 2548 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
662. | GetDataBack for FAT 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, FAT or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted... Recover even when Windows doesn't | |||
Updated: 9, 2005 | Rating: 1267 | Author: Ragnhild Fesel | Size: 2811 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
663. | GetDataBack for NTFS 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, MTF or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a software failure, files were accidentally deleted... Recover even when Windows doesn't | |||
Updated: 9, 2005 | Rating: 1729 | Author: Ragnhild Fesel | Size: 2789 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
664. | GoodBye Spy 4.01 (tekeffect.com) | ||
Advanced spyware removal and real time monitoring utility. GoodBye Spy is a multi-adware removal program, which supports the removal of spyware, adware, Brotherware, and more. It scans your registry, memory, and drives, then allows you to remove these unwanted files from your system. To offer greater | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 608 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
665. | Hara-Kiri 2.02 (cyteg.com) | ||
"Hara-Kiri" (ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
666. | HS SoBigRemover 1.2 (haysoft.com) | ||
This software must be used to detect large number of SoBig viruses in an email account and delete them remotely without the need of downloading any of them to your machine. SoBig virus is large sized email so it uses network traffic when receiving to your machine. This software can be an indispensable tool to | |||
Updated: 9, 2005 | Rating: 0 | Author: Cenker Sisman | Size: 576 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
667. | Iconic Tray 1.21 (iconictray.com) | ||
tray is easy: simply right-click (or middle-click) on the window's "Minimize" button. Anytime you want to view the minimized windows, just open the Iconic Tray icon to see a menu list - click on a window in the list and it's back on screen again. It really is that easy. Of course, if you had chosen to minimize to the system tray, just restore your window as you would any other | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Nikitin | Size: 47 kb | Shareware Go to category: Desktop > Other Similar programs | |||
668. | Identity Knight 1.3 (fspro.net) | ||
on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature, allowing you to enter your credentials once and let the program do the rest. On the other hand, though, Internet Explorer stores this information in an unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
669. | IntraMail 2003.01.20 (dplanet.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
670. | KeyIt! 2.0 (keyit.com) | ||
programs, and surf the web with just keystrokes. But that's not all. You can also download additional modules from our website which cater to specific tasks. For exmple, with our InternetStuff module, you have instant access to ten search engines, an encyclopedia, dictionary, thesaurus, auction search, or a stock quote, all simply by typing 'wwww'. With our | |||
Updated: 9, 2005 | Rating: 0 | Author: Kevin O'Donnell | Size: 2574 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
|
Home > Novel software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|