|
||||||
|
||
|
Home > Example software |
|
|
751. | Emsa DiskCheck 1.0.75 (e-systems.ro) | ||
You can use it to do a full check of the surface of any disks, for example if you have just scratched a disk and want to see if it is still readable, or if you want to check all your cd library for time or usage related faults. You can also use it for drive benchmarking, easily comparing speeds through 'X' speed multiplier factor, in real conditions. You can also scan hard drives or | |||
Updated: 9, 2005 | Rating: 4036 | Author: Emsa Systems | Size: 185 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
752. | Encrypt PDF (Secure PDF) 2.2 (toppdf.com) | ||
up) existing PDFs, set permissions, add user and owner password. For example you can encrypt a PDF without to allow to print it. The button to print the file will be disabled in Acrobat Reader application, you also can encrypt a PDF allowing the user to read it only if he know the correct password | |||
Updated: 2, 2006 | Rating: 0 | Author: verypdf verypdf | Size: 759 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
753. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
up) existing PDFs, set permissions, add user and owner password. For example you can encrypt a PDF without to allow to print it. The button to print the file will be disabled in Acrobat Reader application, you also can encrypt a PDF allowing the user to read it only if he know the correct password | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
754. | Eraser 5.3 (tolvanen.com) | ||
scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like. The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
755. | Evidence Destructor 2.14 (emailarms.com) | ||
your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures you downloaded, all the pages and text you see, are being recorded by the system. It is done so when you log in to the web site later, you don't have to type a whole name and you don't have to complete forms and enter passwords again. In many cases it | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
756. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
in real life. In order to refuel this opinion we present here some examples of application of this technology. LetOs suppose you have purchased the software protected by USB HASP KEY, but you want this product to be used on several computers, but in different time. If the computers are located close | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
757. | eXtended Task Manager 1.95 (warecase.com) | ||
give fast solutions for sudden problems which may arise in a product's functioning. - Debugging and improving application development. - A rich workstation investigation tool. - White box testing sessions for the QA department. - Investigation tool for integration possibilities. - And much | |||
Updated: 2, 2006 | Rating: 0 | Author: Michael Ritter | Size: 2464 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
758. | f2xml 1.0 (boulderwall.com) | ||
or TEXT based reports on your file system or removable storage (CD's, floppy disks, etc). The HTML and TEXT based output provide self contained reports. The XML format allows for further analysisthrough XSLT to provide whatever details you need from your file system. GUI, command line and DLL interface are provided. f2xml provides detailed information on what is stored on your | |||
Updated: 9, 2005 | Rating: 86 | Author: David Metcalfe | Size: 600 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
759. | FastKey 3.0 (greensoftline.com) | ||
Updated: 8, 2004 | Rating: 16 | Author: Vladimir Agafonov | Size: 860 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
760. | FastSum 1.9 (fastsum.com) | ||
You can rectify the errors occurring while data transfer. For example: Network transfers, CD-R and DVD burning, software errors and much more. FastSum calculates short and strong digests of your data via MD5 algorithm to use it as references checksums for ulterior data integrity verification. FastSum is developed for easy processing of a huge files count and has usable | |||
Updated: 9, 2005 | Rating: 42 | Author: Kirill Zinov | Size: 424 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Example software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|