|
||||||
|
||
|
Home > Technologies software |
Related keywords: conversion technologies, ADS Technologies, comet video technologies, Kryloff Technologies, neuropower technologies GmbH |
|
|
711. | LinkFerret-Remote Capture Agent 3.10.447.0 (baseband.com) | ||
tool. Data can be captured using the advanced LinkFerret technology and stored in a trace file to be examined off-line with other protocol analyzers. Remote is an efficient, easy to use, low cost, Ethernet/802.11B/G capture agent. Network admins may use it in scripts to periodically sample and store network traffic. Non-technical personnel can capture files and automatically | |||
Updated: 9, 2005 | Rating: 16 | Author: David Ebert | Size: 1220 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
712. | Lock Folder 5.0 (realclicks.com) | ||
by the US Government. This and others innovative and reliable technologies provide the safest way to store your information well protected against hacker attacks, malicious software and dishonest employees. Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
713. | DustBuster 2.8.2 (casperize.com) | ||
taking space on your hard drive. Based on a "fuzzy logic" scanning technology, DustBuster cleans over 1500 different types of useless temp files and directories in a single click, detecting and deleting all these unneeded files automatically. This will increase hard disk space on Windows 98/ME/2000/XP. The integrated SensibleScan search engine does not interfere with system files or | |||
Updated: 9, 2005 | Rating: 179 | Author: Casper&McAlba Casper&McAlba | Size: 302 kb | Freeware Go to category: System Utilities > System Maintenance Similar programs | |||
714. | Easy Remover 2004 Lite 3.0 (r4u-soft.com) | ||
Applications, StartUp Manager, Task Manager and Privacy Manager. It's new and one of the best ways to totally control your computer and make system more stable. You can easily and safely uninstall programs, allows you to inspect and control the programs that run automatically on startup, lists and | |||
Updated: 9, 2005 | Rating: 0 | Author: R4U Soft | Size: 3946 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
715. | Easy Remover 2004 Pro 3.0 (r4u-soft.com) | ||
happen). In a few seconds you can easily clean up your browser's cache, temporary Internet files, delete cookies, History files, typed URL's, list of Recent Documents or Downloaded files, favorites and empty Recicle Bin. Doing this, you clean up your Internet traces, and protect your privacy | |||
Updated: 9, 2005 | Rating: 0 | Author: R4U Soft | Size: 3074 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
716. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of backup copies of the confidential information instead of accident-sensitive pkzip, arj etc | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
717. | Find Protected 2.0 (aks-labs.com) | ||
Find Protected designed to search for password protected files on local disks and across a network. This product addresses the security problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
718. | EndTask Pro 2.00.0123 (products.asynchrony.com) | ||
pop-ups will be automatically blocked after a few seconds. The technology is invisible to sites that try to detect and foil blockers. Its design isn't based on a specific browser so it will work on most computers. There is no need to install any proxy servers or plug-ins. The Pro edition includes common features such as a "White list" and the classic "Instant-Blocker". Our task | |||
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
719. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
a serial port from a PC or a terminal. Also there is a lot of the technologies in the market allowing to operate remotely the consecutive devices through the network TCP/IP. These solutions contain, both software and the hardware. Our company as well has the like solution: it is a product for the | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
720. | EzCrypt+ 2.01 (kmgi.com) | ||
data as simple as a mouse click. KMGI is a leading Internet technologies company whose innovations have been acclaimed as "The cutting edge" (CNN) and "The Future of the Internet" (Forbes). EzCypt+ adds Encrypt option to your mouse’s right button menu. Just enter your password, and your file will be converted into self-expendable password-protected file. For you | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Konanykhin | Size: 616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Technologies software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|