|
||||||
|
||
|
Home > Item software |
Related keywords: item card, item count, item tracking, list item control, item analysis, list item net |
|
|
691. | Search and Recover 3.0d (iolo.com) | ||
hard or floppy drive, any drive format, and can even recover deleted items from digital cameras, MP3 players, USB flash drives, and other portable devices! Features include: - Easily find and recover deleted, damaged, or destroyed items like files, folders, email, songs, pictures, videos | |||
Updated: 2, 2006 | Rating: 35 | Author: iolo technologies | Size: 4607 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
692. | SearchMaestro 1.2.0 (searchmaestro.co.uk) | ||
time using the Find What and Replace With boxes. Found and replaced items are coloured and highlighted for easier viewing. The ActiveX COM interface builds upon the functionality in the graphical user interface. For example, the find and replace functionality allows you to retrieve detailed file | |||
Updated: 3, 2005 | Rating: 0 | Author: Paul Wood | Size: 2765 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
693. | SecurDesk! 5.32 (cursorarts.net) | ||
access to important materials, to hide confusing and irrelevant items from selected users, to simplify training tasks, etc. SecurDesk! is a complete replacement for the Windows default Explorer.exe desktop/file manager shell. SecurDesk! Features Include: a desktop interface which can be custom designed; Logging of system usage; Enhanced file management with optional | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
694. | Security Administrator 10.14 (softheap.com) | ||
access. Hide your desktop icons, individual drives, Start menu items, or even the entire taskbar. You can also apply password protection to Windows and restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees. Security restrictions can be applied universally or to specific users. You'll find the program | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
695. | SecurityPlus 4.33 (softbytelabs.com) | ||
Secured Access list. By using this option you may prevent access to items such as e-mail, company accounting records, programming source files and image files. SecurityPlus is a powerful encryption and decryption utility with a file viewer, thumbnails, slideshow and program selector, runs in the tray and offers full privacy of images, other files, and applications using on the fly | |||
Updated: 9, 2005 | Rating: 0 | Author: M. Purkhardt | Size: 568 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
696. | SendTo Magic 3.0.3 (sendtomagic.com) | ||
too! Do you want to add more programs to your SendTo folder? It's easy: select the program executable in Windows Explorer, select 'Create Shortcuts...' from the SendTo menu, and use the 'SendTo' item in the 'Other Places' group jump to your SendTo folder. No more hunting your hard drive for that pesky SendTo folder. SendTo Magic runs on: Windows 95/98/ME/2000/NT4/XP SendTo | |||
Updated: 9, 2005 | Rating: 16 | Author: Donovan Dunning | Size: 1586 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
697. | Service Center Manager (SCM) - Server 2.0 (alarit.com) | ||
2nd – "Estimating", where "Repairs" investigated to be done on this item – and so on. Here is brief list of stages: - receiving; - estimating (defects and repair pricing); - customer approval; - dry-out (if needed); - repairing (in-house or subcontracted); - quality check; - shipping back to customer. Each Equipment is accounted by it's | |||
Updated: 9, 2005 | Rating: 0 | Author: Max Zotov | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
698. | Service Center Operator 2.3 (newageit.com) | ||
to 2nd "Estimating", where "Repairs" investigated to be done on this item and so on. Here is brief list of stages: receiving; estimating (defects and repair pricing); customer approval; dry-out (if needed); repairing (in-house or subcontracted); quality check; | |||
Updated: 8, 2004 | Rating: 0 | Author: Matthew Jacobson | Size: 224 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
699. | Service Core Manager (SCM) - Server 2.3 (alarit.com) | ||
2nd – "Estimating", where "Repairs" investigated to be done on this item – and so on. Here is brief list of stages: - receiving; - estimating (defects and repair pricing); - customer approval; - dry-out (if needed); - repairing (in-house or subcontracted); - quality check; - shipping back to customer. Each Equipment is accounted by it's | |||
Updated: 9, 2005 | Rating: 0 | Author: Rachel Guillermo | Size: 22 kb | Commercial Go to category: Servers > Other Server Applications Similar programs | |||
700. | AB Commander XP 6.7 (winability.com) | ||
maintaining close integration with the standard Windows shell. /It-s just a very good file-management tool that puts Explorer to shame/ - ZDNet / Hotfiles.com review. AB Commander has the following features: - The main window of AB Commander hosts two panels, independently displaying the contents of | |||
Updated: 9, 2005 | Rating: 67 | Author: Andrei Belogortseff | Size: 1127 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Item software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|