|
||||||
|
||
|
Home > 3 in a bed software |
|
|
681. | Frigate3 3.33 (Frigate3.com) | ||
that are easier to use and offer more options. Take Frigate 3, for example. This is a two-pane file manager, the format that is extremely convenient when it comes to working with files. The program supports plug-ins for Total Commander (formerly Windows Commander) and has folder synchronization feature with FTP support. Since most file manager users are | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexander Buzaev | Size: 9643 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
682. | Geomancy 2.0.0 (tarot-deutung.de) | ||
Earth is the ancient method of divination. Our programm generates a series of random odd and even numbers and builds from the 16 possible combinations of points 16 geomantic figures. Each figure relates to correspondent field of activity and can appear in one of 12 astrological houses plus 3 non-astrological. The programm user "sows" or casts figures and gets | |||
Updated: 9, 2005 | Rating: 202 | Author: Mario Krsnic | Size: 2035 kb | Shareware Go to category: Home & Hobby > Astrology / Biorhythms / Mystic Similar programs | |||
683. | GREPPES Text Tools 2.4 (isvs.tripod.com) | ||
are GREP's that Edit with many options. They are programming or admin tools for Investigation and Change of any files on ANY PC's that use MS-DOS. They are oriented towards English byte characters but can be adapted for other languages to include UNICODE double bytes. PDGREPPE is Pattern Definition GREP with Pattern Editing FGREPPE is Fast or Fixed GREP | |||
Updated: 9, 2005 | Rating: 0 | Author: Anunga Muhummud | Size: 321 kb | Freeware Go to category: System Utilities > Text/Document Editors Similar programs | |||
684. | Hara-Kiri 2.02 (cyteg.com) | ||
(ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed, The files in a determined folders will be completely | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
685. | Hermetic Stego 5.17 (hermetic.ch) | ||
Stego is a steganography program which allows you to encrypt and hide a message (the contents of any computer file) in another file so that the addition of the message to the container file will not noticeably change the appearance of that file. If the file which has been hidden is deleted then there is no indication that it even exists, but it can still be | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
686. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive contents protected at all times. This makes it possible for professionals or enthusiasts to protect sensitive data while in transit | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
687. | Identity Knight 1.3 (fspro.net) | ||
computer technologies evolve with blazing speed. As we emerge into a new digital era, we tend to trust machines with virtually every aspect of our life. Development of secure network communication technologies opens new horizons of electronic business. However, it also plays a trick on our perception of the Internet. As we rely on secure technologies, we tend to neglect basic | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
688. | IntraMail 2003.01.20 (dplanet.ch) | ||
exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are extremely well protected against local hackers and | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
689. | JvCrypt 1.0 (vandaveer.com) | ||
is a powerful encryption and compression utility that allows you to create encrypted files and text messages with up to 448-bit encryption using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
690. | Logbook 1.7 (home.t-online.de) | ||
or children-control. After installation you can see a small clock icon in the taskbar. If you click this icon (right mouse button) you can see: - how long are you working (session duration) - detailed logbook for current and previous month - global summary (for each month total time for each user) Format of one line of detailed logbook | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 34 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > 3 in a bed software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|