|
||||||
|
||
|
Home > Present software |
Related keywords: present value |
|
|
661. | EditPad Pro 5.4.5 (jgsoft.com) | ||
EditPad Pro is a powerful and versatile text editor or word processor, designed to make text editing as convenient as possible. Write and edit all your plain text files such as source code, scripts, web sites, logs, letters, memos, reports, articles, etc. Edit text documents more comfortably with EditPad | |||
Updated: 2, 2006 | Rating: 23 | Author: Jan Goyvaerts | Size: 1897 kb | Shareware Go to category: Development > Source Editors Similar programs | |||
662. | EDXOR 1.64 (members.ozemail.com.au) | ||
EDXOR is a versatile, convenient and optimal text editor and file processor that far surpasses the capabilities of other Notepad-like applications. It offers innovative clipboard handling, cryptographic options and logic text conversions, great for education, fun, or privacy. EDXOR is small, self-contained | |||
Updated: 9, 2005 | Rating: 0 | Author: Dariusz Stanislawek | Size: 35 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
663. | EF Duplicate Files Manager 3.21 (efsoftware.com) | ||
backups. After the EF Duplicate Files Manager locked the search, he presents the dupes in a clear, polychrome supported list, found in accordance with the criteria selected before. The coloured representation makes a simple and intuitive recognizing possible of similar files. They can now decide, what | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1854 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
664. | EldoS PKI Tools 1.2 (eldos.org) | ||
EldoS PKI Tools is set of programs designed for encryption and signing of files using X.509 certificates and for management of these certificates. 1. File Processor allows you to pack, unpack, sign, encrypt, verify signature and decrypt files using X.509 certificate right from Windows Explorer. It also | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
665. | Outlook Extractor 2.0 (mazepath.com) | ||
Don't waste your valuable time! Extract all email addresses from Microsoft Outlook. Choose your folders, everything is easy and automatic! Both From: and To: addresses are extracted, including multiple recipients, with NO DUPLICATES! You get a clean mailing list, saved in a simple text file which is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Smith | Size: 1897 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
666. | eMailMerge 4Outlook 1.21 (addins4outlook.com) | ||
to send with a few simple operations. This allows each message to be presented as an individually sent email, thus avoiding the sending of dull and dry messages and can help establish a personal and lasting relationship with your clients. The whole setup of the prepared messages minimizes the risk of | |||
Updated: 9, 2005 | Rating: 0 | Author: Addins4Outlook Addins4Outlook | Size: 694 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
667. | Emsa PC FlexInfo 1.0.57 (e-systems.ro) | ||
on items like CPU and memory load. The system information data is presented as text so it can be copied and pasted into documents. This program was designed with simplicity in mind, but usefulness for the user. The system information provides various informations about the local system ,like Operating System name and version, system folders, Service packs, cpu information, keyboard | |||
Updated: 9, 2005 | Rating: 0 | Author: Emsa Systems | Size: 353 kb | Freeware Go to category: System Utilities > Benchmarking Similar programs | |||
668. | ENVY 1.00 (radiks.net) | ||
ENVY is a batch file enhancement utility for MS-DOS, Win95,Win98, NT batch files. ENVY will work under Windows NT/2000 if COMMAND.COM is used as the batch processor. ENVY is a stand-alone program that provides 38 new subcommands for use in batch files ( spanning string-manipulation, mathematics, command-processors. Environment variables can be manipulated with many of the new commands | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Lawless | Size: 24 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
669. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
are not applicable in real life. In order to refuel this opinion we present here some examples of application of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
670. | f2xml 1.0 (boulderwall.com) | ||
find items from it later. Extract images from a file hierarchy and present as a web page, or set of web pages. Create web pages with thumbnail images, linking to the full images. Find all MP3 music files on your disk. Fast file searches looking for file names, sizes, those created in the last hour | |||
Updated: 9, 2005 | Rating: 86 | Author: David Metcalfe | Size: 600 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Present software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|