|
||||||
|
||
|
Home > That software |
|
|
691. | Shutdown Monster 4.0.4 (mosolyorszag.hu) | ||
software is a shutdown timer. This means, that you can make your computer shut down at a specified time. You can set a countdown, type in an exact date and time, or even specify a file to check periodically. This software is a shutdown timer. This means, that you can make your computer shut down at a specified time. You can set a countdown, type in an exact date and time, or | |||
Updated: 2, 2006 | Rating: 48 | Author: David Ebert | Size: 1349 kb | Freeware Go to category: System Utilities > Automation Tools Similar programs | |||
692. | Set Point 1.4.04 (easydesksoftware.com) | ||
Set Point can be set to not run if the next restore point is not that day. Set Point can also be set to shut down after creating a new System Restore point, so as not to use any resources. This is the tool Microsoft forgot to include with their System Restore. Automate setting System Restore Points | |||
Updated: 2, 2006 | Rating: 0 | Author: Easy Desk Software | Size: 1626 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
693. | Server Maintenance Portal 3.2 (absolutedynamics.com) | ||
Asset Management Software that collects hardware and software assets across the network. SMP also works with Microsoft Baseline Security Analyzer to determine the security state of your Windows systems. Integrated with MBSA 2.0. Disk space monitoring and reporting. Easy-to-navigate web pages. Flexible | |||
Updated: 2, 2006 | Rating: 0 | Author: Donnie Byerley | Size: 764 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
694. | SecureWord 1.5 (secureword.com) | ||
such as logins, passwords and files. Taking into consideration that somewhat similar programs exist, let us explain you why you should choose SecureWord and in what ways we enhanced and developed our program for your convenience. We are using modern and secure encryption algorithms. The main method, used in SecureWord is AES, Advanced Encryption Standard- the one, accepted by | |||
Updated: 2, 2006 | Rating: 0 | Author: Pavel Sokolov | Size: 548 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
695. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
696. | Search 3.1 (simes.clara.co.uk) | ||
utility will quickly and easily find those files containing piece(s) of text. It allows boolean combination (AND/OR/AND NOT) and remembers your previous searches to save you re-entering commonly used configurations. It can show you the lines from the file that matched, and you can simply drag the matched files to the application of your choice. Handy-dandy text file search | |||
Updated: 2, 2006 | Rating: 0 | Size: 956 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
697. | RPN Engineering Calculator 6.3.2 (j-a-associates.com) | ||
be used for register arithmetic; Lastx, retrieves the last number that was used; Drop, deletes the number in x-reg and Drops the number in y-reg into x-reg; xy, exchanges the values in the x-reg and y-reg; xВІ; square root of x; 1/x; and 8 constants involving pi are on all but the Binary keypad. Standard, Engineering and Trig keypads also have a function to convert between polar and | |||
Updated: 2, 2006 | Rating: 0 | Author: Jim Allen | Size: 1466 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
698. | RoboTask 2.4 (robotask.com) | ||
files or write complicated scripts, as it uses a visual interface that allows you to simply select and combine actions to fit your needs. The extensive support for conditional actions allows you not only to create automated tasks, but to execute them automatically if certain conditions apply (e.g. if a file is moved, if your Internet connection cuts off, etc.). RoboTask can run as an | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoWise Software | Size: 3265 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
699. | RegSnap 5.8.1920 (lastbit.com) | ||
is a tool that can help you analyze changes made to the Windows Registry|RegSnap helps you find and analyze changes made to the System Registry}{With it, you can view, explore and compare saved snapshots and learn which keys were modified, deleted, or added|You can view, explore and compare saved registry snapshots and find which keys were modified, deleted, or added}{You can also | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 768 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
700. | Registry First Aid 4.3.1 (rosecitysoftware.com) | ||
4.3 - It's faster, finds more problems than others and is even easier to use! People's Choice Winner 2003 Shareware Industry Conference! Tired of Windows crashing? Sick of having software lock up on you or taking forever to load? The problem could be all of those incorrect registry entries caused by software installations and un-installations that went awry! Not all | |||
Updated: 2, 2006 | Rating: 16 | Author: Konstantin Golovatsky | Size: 1739 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
|
Home > That software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|