|
||||||
|
||
|
Home > Beyond software |
|
|
71. | 1 Clock Domain Multi Zone 1.0 (clockdomain.com) | ||
message as part of its alarm. A multi-zone desktop clock that goes beyond mere decoration! Our clocks don't just tell the time the old-fashioned way - they also jump, spin, explode, and perform a variety of animations accompanied by sound, adding a bit of spice to a drab desktop.They allow you to set an alarm (reminder) and send them as gifts that bear personalized messages or | |||
Updated: 3, 2005 | Rating: 466 | Author: Michael Ginzburg | Size: 1052 kb | Freeware Go to category: Desktop > Other Similar programs | |||
72. | Desktop Scout 4.0 (globalpatrol.net) | ||
documents, log off, restart or shutdown the computer remotely. Beyond surveillance, Desktop Scout allows you to block access to any program, document or web site based on the current user. You can simply deny access altogether, impose a time restriction, or require a password to access anything in the secured list. The program incorporates a high level of security and data | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
73. | DriveScrubber 2.0a (iolo.com) | ||
to ensure that ALL data on ANY drive is permanently disposed of, beyond ALL possible techniques of recovery. It works by using techniques independent of standard operating systems which allow it to begin wiping data at the absolute beginning of a drive and continue until the absolute end. This means that your drives will be scrubbed clean of all data that may be hiding in | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
74. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
computer and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
75. | East-Tec File Shredder 1.0 (east-tec.com) | ||
File Shredder securely destroys (shreds) sensitive and private files beyond recovery. Simply drag and drop files to the shredder icon on your desktop, or select the files you want to destroy directly from the Windows Explorer right-click menu. Your sensitive files will be gone for good and nobody will be able to recover your valuable corporate trade secrets, business plans, personal | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
76. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
wipes the data in order to eliminate all sensitive information beyond recovery. The product goes beyond U.S. Department of Defense security standards and provides protection against all methods and equipment of data recovery. East-Tec FormatSecure 2005 features a very intuitive wizard interface and can securely destroy all data on any floppy, CD/DVD-RW, ZIP or hard drive | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
77. | EF Duplicate Files Manager 3.21 (efsoftware.com) | ||
looks if desired in multiple drives or multiple paths for dupes. Beyond that it is able to analyze the contents of archive files. The most usual formats (RAR, ACE, ZIP and much more) are supported as well as in image files (IMG, ISO9660). Further different filters are available, with whose assistance you can limit the search to certain file types or the date or size of the files. A | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1854 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
78. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
from stealing your passwords; a shredder that helps you destroy beyond recovery files, folders and internet traces; a locker that allows you to password protect certain applications; the ability to create self-decrypting packages and mail them to your friends or business partners, you will be able to safely send the self-decrypting packages as zip files; a tool that allows you to | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
79. | KGB Free Key Logger 1.93 (refog.com) | ||
a well known, highly praised IT security oriented software that goes beyond recording keystrokes. While it was originally created for corporations and small businesses, it is becoming increasingly popular for home use as well. The main reason for that is extended capabilities of KGB Spy or KGB | |||
Updated: 2, 2006 | Rating: 2482 | Author: ReFog Software | Size: 1477 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
80. | KGB Spy 3.93 (refog.com) | ||
a well known, highly praised IT security oriented software that goes beyond recording keystrokes. While it was originally created for corporations and small businesses, it is becoming increasingly popular for home use as well. The main reason for that is extended capabilities of KGB Spy or KGB | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Beyond software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|