|
||||||
|
||
|
Home > For the record software |
Related keywords: record, record streaming audio, Record, record music, record keystrokes, record radio, record audio, CD record, record phone conversations, phone call record |
|
|
791. | Hotkey Assistant 1.5 (spellway.com) | ||
means to control applications, windows, and other system components. For example, you can assign keyboard shortcuts forquick access to any application, file or folder, sound management, ejecting and closing the CD-ROM tray etc. All operations that manage power supply and logon are made available from keyboard. Moreover, window manipulations are easier as you can configure | |||
Updated: 9, 2005 | Rating: 0 | Author: Spellway Ltd | Size: 765 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
792. | IIPwr Package 2.00 (iipwr.com) | ||
to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities (such as keystrokes, active applications, passwords, visited websites, emails, chats etc.) and periodically sends the data to your email. KeySpy's seamless installation makes it perfect | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
793. | LockTheFile 1.8 (okosoft.com) | ||
eyes and ears, as many files as you need, without any limites. The core functions of this program are: Strong encryption alghorytm; Handy user interface; Ability to send locked files to your friends by email; Ability to unlock received files; Ability to lock/unlock files "on the fly"; Store administrative password at the secured place; Scan hard disk | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Maltsev | Size: 1808 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
794. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
formatting a drive is enough to actually delete data, you may be in for a big surprise. There are plenty of free tools that can be used by anyone and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
795. | EldoS KeyLord 4.0 (eldos.org) | ||
is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information tree and export data to plain text file. You can configure information records to "expire" so that you are notified when it's time to go and change password or acount info. KeyLord integrates | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
796. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print the information tree and export data to plain text file. You can configure information records to "expire" so that you are notified when it's time to go and change password or acount info. EldoS KeyLord lets you | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
797. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
Monitoring is the most dependable, powerful, capable, and very affordable, Internet monitor in the world. It records all Internet activity including all web surfing and instant messaging on MSN, AOL, Yahoo! and ICQ. E.M. records any file downloads and streaming content and all emails including POP3 and I/M usernames and PASSWORDS. E.M. searches for and | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
798. | EndTask Pro 2.00.0123 (products.asynchrony.com) | ||
The Pro edition of the EndTask family includes tools for blocking pop-up ads, managing tasks, monitoring system performance, monitoring your Internet connection and much more. Unlike other pop-up blockers, ours won't kill pop-up windows you want. Our unique software hides pop-ups and just | |||
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
799. | Energy Spy 1.5 (spyutilites.com) | ||
reboot, logoff, poweroff, standby, and hibernate a certain time on the local. It also supports command line options that allow power-off to be used in batch scripts. You can set a keyboard shortcut for any action - shutdown, reboot, logoff, poweroff, standby, and hibernate. In addition, Energy Spy can automatically terminate applications if they are not responding and many | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitriy Gorin | Size: 769 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
800. | EzSearch 3.6 (soft9000.com) | ||
is a tool on a mission: Besides saving you the trouble of reviewing millions of files, there are some other features that you might be interested in; . EzSearch works in the background: Once you start a file-search, you can flip to another program and continue to work on other projects. You can get back to work, play a game, surf the web, or even work on the | |||
Updated: 9, 2005 | Rating: 0 | Author: R. Nagy | Size: 1763 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
|
Home > For the record software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|