|
||||||
|
||
|
Home > Simply software |
|
|
731. | Crime Catcher 2.1 (crime-catcher.com) | ||
in realtime. Mask out areas which could cause false alarms; Simply paint out areas which you do not want to be included for motion detection. Produce reports on captured images; Reports can be produced on captured images in HTML. Custom motion effects; Test for movement to allow you tune the settings to ensure movement detection is sensitive enough / too sensitive | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
732. | Crypto 2000 4.2 (gregorybraun.com) | ||
is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can be configured to optionally place its program icon in the taskbar notification tray. Crypto is a small, easy to use, file encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 413 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
733. | CyArc - File Archive and Recovery 1.1 (cywarp.com) | ||
in an important project as you develop it. Alternatively you can simply set it up on your My Documents area to copy each new file you create or update. If you have two disks you can use CyArc to make its copies onto a separate disk so in the event of a hard disk failure you have copies of updated and new files. The output is suitable for both backup and archive. Take copies of files | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hall | Size: 2256 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
734. | Describer 5.4.3 (describer.kuzbass.net) | ||
Windows Explorer add-in tool makes viewing and storing file notes simply as never before. Select a file (or folder) in Windows Explorer window and your comments - in your own words, will appear. Improve your Windows Explorer with the new 'Describer' feature - you will enjoy using this small easy to use | |||
Updated: 9, 2005 | Rating: 0 | Author: Moveax | Size: 424 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
735. | Easy Desktop Keeper 1.63 (softheap.com) | ||
Internet as well as provide different users with their own desktops. Simply place your icons wherever you want them on your desktop, select desired wallpaper and screen saver, double click program's tray icon and click the Save button to create a new desktop layout file. If your icons ever get moved or | |||
Updated: 2, 2006 | Rating: 68 | Author: Ixis Ltd | Size: 841 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
736. | Desktop Scout 4.0 (globalpatrol.net) | ||
any program, document or web site based on the current user. You can simply deny access altogether, impose a time restriction, or require a password to access anything in the secured list. The program incorporates a high level of security and data privacy measures. Access to the program and logs is restricted by an administrator password, network traffic is encrypted to prevent | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
737. | DevSolutions SecureFile 3.1 (devsolutions.net) | ||
a self-decryption archive. The encrypted file can be decrypted simply by double clicking the archive with the given password for symmetric key mechanism and no input is necessary for certificate based decryption.. DevSolutions SecureFile also can be used to create a EncryptionArchive file. The encryption archive can be extracted by ArchiveExtractor utility comes with this setup | |||
Updated: 2, 2006 | Rating: 0 | Author: Customer Cell | Size: 1486 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
738. | DiamondCS ProcessGuard 3.150 (diamondcs.com.au) | ||
that these layers of security can easily be rendered null and void simply by terminating or modifying the host process. For example, a trojan could simply terminate your personal firewall before attempting to transmit your personal details over the Internet, effectively rendering the firewall | |||
Updated: 9, 2005 | Rating: 0 | Author: DiamondCS Support | Size: 1922 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
739. | Disk and Registry Alert 2.09 (softdd.com) | ||
you can also view any registry keys that are added or deleted. Simply run the self-extracting file to install. (Runs on all Windows systems). Uninstaller which will track, view, and save any changes done to your pc. Capture before and after snapshots of both your hard drive and registry, showing all files and programs that were added or removed whenever you install or uninstall | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftDD Software | Size: 707 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
740. | Drawganizer 2.03 (drawganizer.com) | ||
tasks, typically performed using the Microsoft Windows Explorer, simply by making a DRAWING of what you want to do. Interact with the drawing by dropping files onto it or stepping through the actions or run it hidden in the background. Save time by avoiding repetitive mouse clicking and associated potential errors. Apply multiple filters to individual directories for the exact files | |||
Updated: 3, 2005 | Rating: 0 | Author: Don Robinson | Size: 3328 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Simply software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|