|
||||||
|
||
|
Home > Core software |
Related keywords: core competencies, core level programming, Dublin Core, At the Earths Core |
|
|
681. | TextHarvest 3.10.00 (members.aol.com) | ||
TextHarvest is ... a simple text file filter; a programmable data conversion and extraction utility; a report mining converter. Copy, delete, parse, change (edit or reformat) records from ASCII or EBCDIC text or binary files. Reformat flat files from Windows, Unix or Mac, including fixed record length and | |||
Updated: 9, 2005 | Rating: 2737 | Author: Timothy Canada | Size: 1142 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
682. | Tweaking Toolbox XP 1.60 (tweakingtoolbox.com) | ||
Windows XP system performance, by selecting to keep the Windows XP core system in memory, and not paged to disk (advisable only if you have 512MB RAM or more). You can also optimize the CPU and memory usage for Programs, System cache or background services. You can also use Tweaking Toolbox XP to add “unremovable” Windows components (such as Microsoft Messenger) to “Add or | |||
Updated: 9, 2005 | Rating: 0 | Author: Arie Slob | Size: 953 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
683. | Ultimate Spy Personal 1.5 (raheel.yi.org) | ||
Ultimate Spy Personal Edition is a sophisticated keyboard spying tool / keylogger and activity monitor that lets you see what others are doing on your workstation in your absence. A greatly appreciated, FREE tool. Records all the keystrokes, with advanced filter settings. Runs in super stealth mode. Auto | |||
Updated: 9, 2005 | Rating: 0 | Author: Raheel Hameed | Size: 1156 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
684. | Undelete 3.0 (execsoft.com) | ||
Company records and database files are accidentally deleted every day. Before Undelete, system administrators had to slog through backup tapes, hoping no corruption or gap made the file unrecoverable. Backups were really designed for catastrophic data-loss recovery, not individual file recovery. Undelete | |||
Updated: 9, 2005 | Rating: 0 | Author: Colleen Toumayan | Size: 5000 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
685. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
Automatic inventory. Vidamic Netlog is a smart inventory program that automatically generates a completed inventory card for each computer/client. Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
686. | Virtual Personality+ 4.01 (triplebit.com) | ||
A professional telephone - internet voice changer voice changer utility. High quality natural voice. Pitch and frequency independent controls. Works with your PC speakers as well as over a telephone line or with internet applications like yahoo chat. Works with the PC speakers as well as over a telephone | |||
Updated: 9, 2005 | Rating: 0 | Author: Izack Lesher | Size: 1728 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
687. | Remote Keylogger 2.7 (aidsoft.com) | ||
Record every keystroke in a computer and send it to you via email. The log-file includes the title of the application that typed in and the date and time while typing. Record every keystroke in a computer and send it to you via email. The log-file includes the title of the application that typed in and the date and time while typing. | |||
Updated: 9, 2005 | Rating: 998 | Author: Fly Lange | Size: 115 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
688. | RemoteKeys 8.7.2 (freewarehits.de) | ||
RemoteKeys can automate complex control systems, but also simple jobs like inserting text passages into Word and EMails, filling out (internet-) forms with recurring phrases etc. To do this simply click onto one of the 2500 buttons, which can be freely assigned and labeled. The macros can also be released by | |||
Updated: 9, 2005 | Rating: 0 | Author: Detlev Schaefer | Size: 1582 kb | Freeware Go to category: System Utilities > Automation Tools Similar programs | |||
689. | #Remove Access Security 3.0 (e-tech.ca) | ||
'Remove Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety | |||
Updated: 9, 2005 | Rating: 1996 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
690. | SC-KeyLog Free 2.25 (soft-central.net) | ||
SC-KeyLog is a powerful, invisible keylogger that captures all users activity and saves it to an encrypted logfile. The software logs all typed keystrokes, button mouse-clicks, window titles, the date and time of entered characters/mouse-clicks, system information and logged on usernames in stealth. An | |||
Updated: 9, 2005 | Rating: 7925 | Author: Alexander van Trijffel | Size: 407 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
|
Home > Core software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|