|
||||||
|
||
|
Home > Task explorer software |
Related keywords: explorer, task, Explorer, internet explorer, Internet Explorer, task manager, Task, task scheduler, windows explorer, explorer replacement |
|
|
71. | 1st Choice Zip 4.6 (ftppro.com) | ||
Choice Zip looks and feels just like Windows Explorer, except you can also transfer files to and from Zip Archives. It's features include: Drag-and-Drop: You won't have to learn any new commands. Simply drag files from your local computer to any Zip Archive. Copy Entire Folders: Unlike | |||
Updated: 9, 2005 | Rating: 0 | Author: Sabine Schmidt | Size: 449 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
72. | 1st Security Agent 6.14 (softheap.com) | ||
the DOS prompt, boot keys, real DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop icons, and much more. You can apply password protection to Windows and restrict users to running specific applications only. Security restrictions can be applied universally or just to | |||
Updated: 2, 2006 | Rating: 42 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
73. | 1st Security Agent Pro 6.14 (softheap.com) | ||
the DOS prompt, boot keys, DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop icons, apply password protection to Windows and restrict users to running applications. Due to support of the multiuser environment, security restrictions can be applied universally or just to specific users. Built-in Internet Explorer Security enables you to | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
74. | Absolute GIF Optimizer 1.01 (pcbit.com) | ||
If you want to go ahead, just select Optimize to carry out the task. Many of the files will be significantly smaller with no difference in quality. Absolute GIF Optimizer uses efficient non-destructive algorithm to optimize GIF images. It means that optimized images will appear in client's Internet browser in exactly the same way, but they will be significantly smaller. Absolute | |||
Updated: 9, 2005 | Rating: 42 | Author: Andreas Ehrenberg | Size: 482 kb | Shareware Go to category: Graphic Apps > Converters & Optimizers Similar programs | |||
75. | Absolute Key Logger 2.5.283 (lastbit.com) | ||
absence or to see whether your employees are using computers for tasks unrelated to work. Since this software records every single keystroke, there is no way to cheat it. AKL is a small program that records all keystrokes into a log file. You can use it to: - restore lost typed text in documents and web forms - find forgotten passwords and logins - have full control of your | |||
Updated: 9, 2005 | Rating: 82 | Author: Vitas Ramanchauskas | Size: 613 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
76. | Accessor 1.7 (nesoft.org) | ||
Accessor provides a quick access to main Windows functions, folders and documents. What's new in version 1.7: 1. New Items are added into Main Menu, such as: - Find Files and Folders, - Empty Recycle Bin, - Clear Documents History, - Formatting Floppy Disk. 2. Now original file icons are displayed creation of favourite folders list, access to Control Panel contents, quick termination of programs, process administration, CD-ROM control and many others | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleksey Skopin | Size: 554 kb | Shareware Go to category: Desktop > Other Similar programs | |||
77. | Advanced Encryption Plug-In for Windows Explorer 4.0.2 (secureaction.com) | ||
with .ZIP files with using a power of standard Microsoft Windows Explorer! It integrates into Windows Explorer and allows you to work with your important files using Explorer's context menu. It is easy as 1-2-3! Encrypting files with using strong encryption algorithms: Advanced Encryption Standard (Rijndael), Blowfish, DES, CASTt. All algorithms are industrial | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 879 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
78. | Advanced Security Level 6.1 (softfolder.com) | ||
disable Start Menu items, DOS, boot keys, Registry editing, taskbar, task manager and network access; lock screen with password; and much more. You can apply password protection for Windows and restrict users from running specific applications. Security restrictions can be applied to all or just for | |||
Updated: 2, 2006 | Rating: 16 | Author: SoftFolder Inc | Size: 1065 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
79. | Advanced XP Tweak 2.52 (tweakinternals.com) | ||
XP Tweak allows you to fine-tune your Windows XP and Internet Explorer easily and safely. It is the best way to tweak and optimize your Windows XP system. Advanced XP Tweak gives your system the look you want, and optimizes its performance for the tasks you do most often, while cutting CPU and RAM expenses on the tasks you are unlikely to perform. Here are just a few | |||
Updated: 9, 2005 | Rating: 59 | Author: Tweak Internals | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
80. | AJC Directory Synchronizer 2.3.4 (ajcsoft.com) | ||
mp3 player etc. Wizards make it very easy to setup your synchronize task which can be saved as a project for quick regular use. Built in archiving system makes it easy to recover files if you make a mistake. The file information is visually presented in a familiar Windows explorer style | |||
Updated: 2, 2006 | Rating: 102 | Author: Andrew Cutforth | Size: 2114 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Task explorer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|