|
||||||
|
||
|
Home > Limited software |
Related keywords: starprint limited, time limited, diffusion limited aggregation |
|
|
761. | Network Searcher 3.5.1 (bgsoft.net) | ||
shares and resources. In addition, with Network Searcher, you can limit your search to subnetworks, by setting the IP range, or applying a number of filters (from file types or extensions to the date of creation). The program does not hog system resources and supports all common file operations | |||
Updated: 9, 2005 | Rating: 0 | Author: BGSoft BGSoft | Size: 692 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
762. | NetWorx 3.2 (softperfect.com) | ||
of network problems, ensure that you don't exceed the bandwidth limits specified by your ISP, or track down suspicious network activity characteristic of Trojan horses and hacker attacks. The program allows you to monitor all your network connections or a specific network connection (such as Ethernet or PPP) only. The software also features a system of highly customizable visual and | |||
Updated: 9, 2005 | Rating: 16 | Author: Andrey Kotov | Size: 982 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
763. | New Folder Here 1.0 (camtech2000.net) | ||
menu. Windows does have the command 'New/Folder' although very limited on where you can create a folt usually takes a while for the 'New' menu to expand. Create them anywhere instantly with this little utility. Examples when right clicking and creating a New Folder on: My Documents Folder: Creates 'New Folder' inside My Documents My Documents\MyFile.txt: Creates 'New | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Campbell | Size: 377 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
764. | Geek Superhero 1.3 (geeksuperhero.com) | ||
Geek Superhero watches your computer for changes, immediately notifying you when a setting is altered to confirm you want to keep or reject the change. This catches many of the modifications made by a virus, trojan or worm; protecting your computer from harm. (A "Computer Setting Firewall" is an excellent | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Burford | Size: 2548 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
765. | GiPo@DB_Utilities 4.4 (gibinsoft.net) | ||
GiPo@DB_Utilities is a set of utilities for Windows 95/98/ME/NT/2000/XP that provide an easy way to work with different OLE DB- and ODBC-compatible databases and data sources such as Microsoft SQL Server 7.0/2000, Oracle DBMS, Informix, MySQL, DB2, Microsoft Access, dBase, Paradox, FoxPro, Visual FoxPro and | |||
Updated: 9, 2005 | Rating: 16 | Author: Igor Artemov | Size: 2488 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
766. | GiPo@DB_Utilities 4.4 (gibinsoft.net) | ||
GiPo@DB_Utilities is a set of utilities for Windows 95/98/ME/NT/2000/XP that provide an easy way to work with different OLE DB- and ODBC-compatible databases and data sources such as Microsoft SQL Server 7.0/2000, Oracle DBMS, Informix, MySQL, DB2, Microsoft Access, dBase, Paradox, FoxPro, Visual FoxPro and | |||
Updated: 9, 2005 | Rating: 22 | Author: Igor Artemov | Size: 2488 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
767. | Hermetic Stego 5.17 (hermetic.ch) | ||
differs from others of this sort in two respects: 1. There is no limit on the size of the file to be hidden because Hermetic Stego can hide a message file, not just in a single BMP image file, but in a set of them -- as many images as needed to contain the message file. 2. The bits of the message are inserted into the bytes of the image files randomly and in such a way as to | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
768. | Hot CPU Tester Pro 4.2.2 (opusware.net) | ||
testing modules intentionally stress all components to their maximum limits to assess their integrity. Unstable parts cannot endure these pressures and will fail the tests, allowing the opportunity for an upgrade or exchange before the PC is released into a production environment. It is recommended that Hot CPU Tester should run for at least six hours to fully check the system. If a | |||
Updated: 9, 2005 | Rating: 1599 | Author: Damon Chitsaz | Size: 1639 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
769. | Internet Explorer Password 3.0.189 (lastbit.com) | ||
Internet Explorer Password is a password recovery program for IE Content Advisor. Content Advisor was initially designed as a security feature and a tool to monitor website ratings to prevent minors from accessing adult websites. Since the rating technology never became widespread, this feature is basically | |||
Updated: 9, 2005 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 61 kb | Demo Go to category: Security & Privacy > Password Managers Similar programs | |||
770. | Internet Explorer Toolbar Maker 3 (text-reader.com) | ||
You don't have to be a programmer to create your own Explorer bar. Explorer Bar (Band) Maker is a Windows tool (one-step wizard) that lets you create your own Explorer bar from any HTML page, picture or Macromedia Flash file. Usually, making Explorer bars includes COM programming, that can be complex Explorer Bar (Band) Maker is a Windows tool (one-step wizard) that lets you create your own Explorer bar from any HTML page, picture or Macromedia Flash file | |||
Updated: 9, 2005 | Rating: 0 | Author: Vadim Ivlev | Size: 322 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Limited software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|