|
||||||
|
||
|
Home > Minimal software |
|
|
71. | Barroco 0.9 (aolej.com) | ||
file name. You can't restore file without correct password. Minimal password length is 6 characters. Error correction The BARROCO CODE has built-in error correction. Data can be successfully recovered after random changes, printing defects or missing part of document. Error correction can be set in few steps. There are three redundancy levels as additional option | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Olej | Size: 990 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
72. | 1st Evidence Remover 2.14 (getfreefile.com) | ||
can be easily extracted and used against you by any person with a minimal computer knowledge including your spouse and children, your boss, colleagues and the police. When you delete your files using the Delete command, Windows does not actually delete the files but places them to the hidden RECYCLER | |||
Updated: 2, 2006 | Rating: 190 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
73. | Audio Caller ID 1.5 (beiley.com) | ||
and your modem will dial the number for you. Audio Caller ID uses minimal system resources and stays out of your way while you're working. The task try icon quickly shows you the number of new calls. With Audio Caller ID, you'll never again have to get up to find out who's calling. Audio Caller ID speakers, email you when specified | |||
Updated: 9, 2005 | Rating: 124 | Author: Mark Beiley | Size: 310 kb | Shareware Go to category: Communications > Telephony Similar programs | |||
74. | AUTOption 6.0 (pollensoftware.com) | ||
to enable users to create professional autorun CD menus with minimal time and effort. To make a menu the user has the option of using a friendly wizard to walk them through the process or using the menu editor to edit menus in an interactive environment. AUTOption sports 15 styles of button placement animation, use of your own background image, minimize and exit controls, a | |||
Updated: 9, 2005 | Rating: 0 | Author: Janet | Size: 1018 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
75. | Boss Everyware 2.85 (bosseveryware.com) | ||
program, powerful log analyzer and deployment utility. It takes minimal system resources and writes logs in common database | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexander Jmerik | Size: 3077 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
76. | DCPP 2.7 (securstar.com) | ||
and automatic encryption provides a high degree of security with minimal impact on users. Boot protection prevents subversion of the operating system (via floppy boot-up, for example) or the introduction of rogue programs while sector by sector encryption makes it impossible to copy individual files | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
77. | DRemote 1.0 (products.asynchrony.com) | ||
very light weight and doesn't overload your PC. It takes a very minimal part of your computer resources - memory, processor and network bandwidth - thus allowing other applications to also work smoothly. Cool application ! DRemote comes with a very easy to use and intuitive user interface | |||
Updated: 8, 2004 | Rating: 165 | Author: Shawn Roach | Size: 1057 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
78. | DriveCryptPlusPack 1.0c (securstar.de) | ||
and automatic encryption provides a high degree of security with minimal impact on users. Boot protection prevents subversion of the operating system (via floppy bootup, for example) or the introduction of rogue programs while sector by sector encryption makes it impossible to copy individual files for brute force attacks. DCPP safeguards the operating system and the important system | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
79. | Evidence Destructor 2.14 (emailarms.com) | ||
your computer unprotected, and can be recovered by people with some minimal knowlege of computers. It can even affect you when you least suspect it. If you, for example, let your kids download some stuff from the internet. They may download a virus or a malicious program or pictures or other offensive | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
80. | Evidence Exterminator 2.14 (softstack.com) | ||
files and in the Windows registry? Did you know that anybody with a minimal computer knowledge including your spouse and children, your boss and the police can easily extract detailed information about your activities and use it against you? Did you also know that when you delete your files using the | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Minimal software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|