|
||||||
|
||
|
Home > Product information software |
|
|
661. | DigiSecret 2.0 (tamos.com) | ||
supports drag-and-drop operations. You can also share sensitive information with your associates who don't even have to have DigiSecret installed -- all one needs to know is the passphrase, which protects the self-extracting archive. The program allows you to customize the caption of your SFX archive and incude a hyperlink. If the recipient of the information is online and | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Riedel | Size: 2573 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
662. | Digital MediaRescue Professional 3.9 (objectrescue.com) | ||
the storage media. Of course you don't want to lose your significant information and there it is our MediaRescue Pro is ready easily, quickly and absolutely reliably reconstruct the lost multimedia data. Recover lost MP3, WMA, JPEG, PNG, GIF, AVI, MOV, WAV, MIDI and other multimedia files from whole | |||
Updated: 2, 2006 | Rating: 293 | Author: Konstantin Romanovsky | Size: 1454 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
663. | DLL Explorer 3.0 (realsol.com.au) | ||
state of the operating system with regards to the use of EXE's, DLL's, OCX's, etc. can be displayed at any time. For example to show the state before and after running a particular program. It can help you to see which modules the program uses. Both 32-bit and 16-bit modules are shown. It can be used as a handy tool to know which files are used by your | |||
Updated: 8, 2004 | Rating: 0 | Author: Mark Weston | Size: 969 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
664. | DLL Show 2000 5.3 (gregorybraun.com) | ||
to see the DLLs that process uses. DLL Show displays comprehensive information about all running processes including memory load, priority and the DLLs they depend upon. DLL Show can also be used to display a list for all DLL and OCX modules installed on your system. DLL Show can be configured to | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 444 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
665. | DLOCK2 2.01 (eBible.org) | ||
Full source code and documentation of the algorithm and the master's thesis it is based on are included. It compiles with Gnu C++ and other compilers, so it can be adapted to many operating systems. Version 2.01 is the same as the original DLOCK2, except recompiled for the Win32 command line (for long filename support) and author contact information has been updated. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Johnson | Size: 573 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
666. | DriveCryptPlusPack 1.0c (securstar.de) | ||
allows you to secure your disk(s)(including removable media) with a powerful and proven encryption algorithm(AES-256) at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
667. | DriveScrubber 2.0a (iolo.com) | ||
and security of private, personal, confidential, or proprietary information. Once a drive has been wiped with DriveScrubber, no attempts (regardless of their level of sophistication) will be able to recover any data that previously existed thereon. Most people believe that when a drive is formatted, all information within is permanently and irrecoverably gone. The | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
668. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
669. | EF File Catalog 0.996 (efsoftware.com) | ||
* Unlimited external description plugging support * Extract CD information from CDDB (freedb.org and local) * Fast search/search for dupes functions with wildcards, filtering support * Detailed informations * User interface with multi language support * Exports to text, CSV, HTML Limitations: * 30-day trial * Not all Units are saved to disc * Nag screen Shareware | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 955 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
670. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
|
Home > Product information software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|