|
||||||
|
||
|
Home > Able software |
|
|
61. | TurboDemo 7.0 (turbodemo.com) | ||
minutes TurboDemo is easy-to-use. In just minutes you'll be able to record all screen activities and actions create amazing online demos and interactive tutorials. Add text call outs, balloons, narration and interactions without any programming knowledge. Software Demos and Tutorials those are so easy to create. It is so simple. In only 3 Steps: 1: Record and Capture your | |||
Updated: 2, 2006 | Rating: 128 | Author: Marc Schuler | Size: 14347 kb | Shareware Go to category: Audio & Multimedia > Presentation Tools Similar programs | |||
62. | Tray Safe 4.3 (fgroupsoft.com) | ||
access your PC or make a copy of your hard-drive, they won't be able to launch or hack the program. In addition, Tray Safe offers a wide choice of wold's most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password manager is just as convenient as it is secure. It works with all types of passwords, web (including custom templates for web-based | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
63. | Stealth Folder Hide XP 9.3 (folder-hider-stealth.com) | ||
Hider and Clear Tracks utility. With Stealth Folder you will be able to hide any folder in your PC. Stealth folder is password protected. Stealth Folder also comes with Clear Trac, which clears all PC and internet activity (files). Operating System: Win98/ME/NT40/2000 | |||
Updated: 2, 2006 | Rating: 0 | Author: Ben Nelson | Size: 540 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
64. | SafeSystem 2006 (gemiscorp.com) | ||
- No new programs will be freely downloaded from Internet. - It is able to make your files and folders truly invisible to all applications, no matter what file system (FAT, FAT32 or NTFS) your drive is formatted in. SafeSystem allows you to prevent access to your personal and important files and folders, as well as protect and guarantee the integrity and well functioning of your | |||
Updated: 2, 2006 | Rating: 0 | Author: GemiScorp | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
65. | Access Administrator 4.14 (getfreefile.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
66. | PrivacyKeyboard 7.1.1 (anti-hack.biz) | ||
Due to the PrivacyKeyboard, keystroke recording devices will not be able to detect your sensitive information too. Unlike the typical "antivirus" approach, The PrivacyKeyboard does not rely on pattern-matching, so it may work on new or unknown types of keylogging programs. The PrivacyKeyboard bucks various types of keylogging programs possibly included in any commercial, shareware | |||
Updated: 2, 2006 | Rating: 16 | Author: Raytown Corporation LLC | Size: 3238 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
67. | PrivacyKeyboard 7.1.1 (anti-keylogger.com) | ||
Due to the PrivacyKeyboard, keystroke recording devices will not be able to detect your sensitive information too. Unlike the typical "antivirus" approach, The PrivacyKeyboard does not rely on pattern-matching, so it may work on new or unknown types of keylogging programs. The PrivacyKeyboard bucks various types of keylogging programs possibly included in any commercial, shareware | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 3238 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
68. | PECompact 2.75 (bitsum.com) | ||
modules (EXE, DLL, SCR, etc..) substantially, while leaving them able to be run just as before. At runtime, compressed modules are rapidly decompressed in memory. Smaller (<50%) size usually means quicker load time. PECompact generally compresses files much smaller than if they had been compressed by modern data compression software such as RAR. This is accomplished by restructuring | |||
Updated: 2, 2006 | Rating: 2171 | Author: Jeremy Collake | Size: 914 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
69. | pdf stamp command line 2.0 (toppdf.com) | ||
Besides images, texts and graphics, PDF Stamp (PDF Watermark) is able to add links and notes. These processes can be realized in a determined number of pages with precise control over the size and position, the stamped text and/or images become a permanent part of each PDF document. There is no limit to the amount of stamps you could apply to a single document and no limit to the | |||
Updated: 2, 2006 | Rating: 0 | Author: X H | Size: 403 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
70. | PC LockUp 2.185 (softheap.com) | ||
apply password protection to Windows and restrict others from being able to use your PC while you are away. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and shows a picture, which you can change in the options. An allowed | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Able software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|