|
||||||
|
||
|
Home > Removed software |
Related keywords: undelete accidentaly removed messages |
|
|
671. | Absurd Terminator 2.9 (nesoft.org) | ||
Absurd Terminator helps you to make some "absurdly" long and routine Windows functions quicker and more convenient. New in version 2.9: - now program work correctly in Windows'95 too; - protection scheme improved; - minor bugs fixed. Main functions:- Shutdown/Restart/Log off Windows with help of hot | |||
Updated: 9, 2005 | Rating: 134 | Author: Alexey Rykov | Size: 304 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
672. | Accent OFFICE Password Recovery 2.40 (passwordrecoverytools.com) | ||
Ever thought: "If I were a hacker...?" No, I don't mean you'd rob banks via the Internet. Being a hacker, though, you'd never have to re-write an annual report just because of a lost password for an Office document. You'd never have to wait if your colleague forgot to send you the info needed to open an Excel | |||
Updated: 2, 2006 | Rating: 1940 | Author: Denis Gladysh | Size: 734 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
673. | Access Folders 2.11 (shelltoys.com) | ||
the system tray. It's here where you can conveniently add and remove folder or sub-folder paths. The program can also integrate into Explorer's shell context menu, allowing you to quickly add folders with a right-click. You can also define file filters which will be applied to your Open/Save dialogs. Other options include the ability to have Access Folders loaded at every | |||
Updated: 9, 2005 | Rating: 30 | Author: Kirill Kirillov | Size: 1000 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
674. | Accessor 1.7 (nesoft.org) | ||
Office; - access to the Control Panel and it’s elements (add/remove programs, properties of the screen, modem, Internet and system); - termination of any running programs from popup menu in one click (Kill User Process); - process administration (termination/addition of the processes) allows to look through the available windows in system with the description of the | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleksey Skopin | Size: 554 kb | Shareware Go to category: Desktop > Other Similar programs | |||
675. | Ace Utilities 3.00 (acelogix.com) | ||
is a collection of tools to optimize your system performance and to remove unneeded files and internet tracks. It allows you to find and remove invalid registry entries, delete your application and internet history (plug-in support for 200+ external programs), manage your cookies and more. You can also see what programs start automatically with windows and optionally disable | |||
Updated: 2, 2006 | Rating: 248 | Author: Hari Krishnan | Size: 2189 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
676. | Acronis Privacy Expert Suite 9.0 (acronis.com) | ||
Rootkit removal automatically detects rootkits and enables users to remove these programs - Quarantine places detected spyware items to the quarantine store before removal - Enhanced malware shield allows you to set the level of protection you need (high, medium, or low) - Daily malware definition | |||
Updated: 2, 2006 | Rating: 169 | Author: Acronis | Size: 4335 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
677. | Active Cleaner 1.1 (difolders.com) | ||
or boss can open this movies? No, if you use Active Cleaner – it removes all usage tracks. Have you ever searched the Web for music? RIAA is watching you! Clear the listbox with last searches immediately! Using secure deletion method, of course -- by replacing byte after byte with random data for three times. Active Cleaner does it for just a few seconds. SAVE DISK SPACE. You | |||
Updated: 9, 2005 | Rating: 16 | Author: Dmitry Chestnykh | Size: 1262 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
678. | Cursor Hider 1.4.4 (softexe.com) | ||
Hider helps you to work more productively. It removes the mouse pointer (the mouse cursor does not cover the entered text) while you are working with the keyboard and returns the pointer with any mouse action. Real example: You are going to visit aweb site with forms to fill in. At first you type the URL in the browser's address bar - www.softexe.com. What do you think about | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
679. | ActivIcons 3.33 (cursorarts.net) | ||
the Windows desktop cache, replace various drive and folder icons, remove shortcut symbols, restore the desktop default icons, save/restore the positions of desktop icons, change or hide the Start button (limited under XP), replace the IE and OE logo animations, change Favorites icons, and more... Customize Windows' desktop icon and cursor attributes. Swap your custom icons for My | |||
Updated: 9, 2005 | Rating: 431 | Author: CursorArts Company | Size: 2263 kb | Freeware Go to category: Desktop > Icons Similar programs | |||
680. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
are completely inaccessible to unauthorized users. Files cannot be removed or manipulated by an unauthorized user or so called spyware "cleaner" applications or any other Windows software! View all computer activities with the built-in screenshot recorder. It displays the current window or program that is running on your computer. All information is stored in strongly encrypted | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Removed software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|