|
||||||
|
||
|
Home > Log me in software |
|
|
71. | HSLAB Force Down 2.5 (hs-lab.com) | ||
and Restart; - Normal command Shutdown and Restart; - Command Log Off; - Accelerate shutdown automatically; - Start shutdown from command line; - Using "Hot Keys"; - Hook and execute a Windows shutdown; - Eject Removable media (if inserted). Also, some different external events can be processed: - Shutdown at selected day and time; - Shutdown when selected file exist or | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Golub | Size: 1666 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | LANMessage Pro 4.00 (dimaware.com) | ||
LANMessage Pro has that taken care of. LANMessage Pro uses the built in messenger service called net send. Net send does not require you to connect to a server like most instant messaging programs, so you free up valuable network bandwidth. LANMessage Pro lets you easily: • Send, Receive, Reply | |||
Updated: 9, 2005 | Rating: 0 | Author: Dima Sokoletsky | Size: 284 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
73. | EzSearch 3.6 (soft9000.com) | ||
of files, there are some other features that you might be interested in; . EzSearch works in the background: Once you start a file-search, you can flip to another program and continue to work on other projects. You can get back to work, play a game, surf the web, or even work on the files that | |||
Updated: 9, 2005 | Rating: 0 | Author: R. Nagy | Size: 1763 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
74. | FileSpy 3.0 (ic.net) | ||
who are using a specific file. It also allows viewing of the user's rights to the file/directory, how the file was opened, the user's network address, and the date and time the user logged in to the network. With FileSpy you can also send messages to selected network users and if you have administrative rights you can even clear their connection. Use FileSpy to monitor | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2014 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
75. | ClockWise 3.30a (rjsoftware.com) | ||
automate everything! You can schedule up to 200 external or built-in events! Run or close any program whenever you want. Built-in options include system reboot, shutdown, automatically setting the system time to the atomic clock at NIST or any Internet NTP server, connection or disconnection from the Internet and Active Desktop refresh. On-line timer log includes daily | |||
Updated: 9, 2005 | Rating: 42 | Author: Richard Joseph | Size: 761 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
76. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
and Stored ComputerSafe records unauthorized access violations in a protected event-log file with a time and date stamped description of the threat. The system records key stroke activity that may provide clues as to the intruder’s intentions or their identity. Notification Services – Theft Recovery ComputerSafe sends various types of remote notifications when | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
77. | Absurd Terminator 2.9 (nesoft.org) | ||
and routine Windows functions quicker and more convenient. New in version 2.9: - now program work correctly in Windows'95 too; - protection scheme improved; - minor bugs fixed. Main functions:- Shutdown/Restart/Log off Windows with help of hot keys or by one click on system tray | |||
Updated: 9, 2005 | Rating: 134 | Author: Alexey Rykov | Size: 304 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
78. | Access Denied 3.40 (johnru.com) | ||
by one mouse click. It can't be bypassed on Windows 95/98/ME. All unwanted people are kept out to your PC. Very flexible use: multi-user support(up to 450 users), password encryption, integration with your favorite screensaver, color's highlight log files with integrity test, setup of colored text for requesting passwords, possibility use Access Denied | |||
Updated: 9, 2005 | Rating: 58 | Author: Ivan Mayrakov | Size: 536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
79. | Advanced CheckSum Verifier 1.5.0 (irnis.net) | ||
SFV and MD5 checksum utility for Windows 95/98/Me/NT/2000/XP/2003. The handy and fast utility for protecting the integrity of files by using the CRC32 or MD5 checksum calculation algorithms. It will allow you to verify the accuracy of your data after you burn a CD or transfer a files over a network. Adding an little checksum file to your data files will allow in | |||
Updated: 9, 2005 | Rating: 530 | Author: Irnis Haliullin | Size: 348 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
80. | SS Mystery Forest - Animated Desktop Screensaver 3.1 (elefun-desktops.com) | ||
you ever been in a Magic Wood? How it is wonderful to wander among trees at pre-dawn o clock, to listen to a rustle of the foliage on trees, early trill of a nightingale and silent rustle of the butterflies who have risen before all in the Wood! After instant wood is filled with solar light. Easy wind plays with the leave of an unusual plant, which can be found only in | |||
Updated: 9, 2005 | Rating: 0 | Author: Elefun Multimedia | Size: 2232 kb | Shareware Go to category: Desktop > Similar programs | |||
|
Home > Log me in software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|