|
||||||
|
||
|
Home > That software |
|
|
821. | Desktop Resetter 1.7.2 (nouturn.com) | ||
lose their locations. Putting everything back is a tedious task, one that you'll never have to worry about again when you have Desktop Resetter to the rescue. You may also find this program useful if you play games or change resolutions frequently. Desktop Resetter is an easy-to-use program that | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Damato | Size: 809 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
822. | Easy Desktop Keeper 1.63 (getfreefile.com) | ||
select desired wallpaper and screen saver, double click program's tray icon and click the Save button to create a new desktop layout file. If your icons ever get moved or deleted by any user or after entering the safe mode or changing the screen resolution, just open the program and click the Load button to return your desktop to any previously saved state, or simply reboot your PC | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 841 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
823. | Deletor 3.1 (basta.com) | ||
or shredding files corresponding to file name patterns or extensions that you specify. Deletor also has support for filter packs, which allow you to store sets of your most commonly used file deletion specifications. Combine this with file date filtering and command line access to the program, and you | |||
Updated: 2, 2006 | Rating: 82 | Size: 458 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
824. | Delenda 2.415 (peccatte.karefil.com) | ||
files in one directory when they reach 7 days, transfer those that have more than 12 hours to another directory and move those documents not accessed during last 3 months to an archive folder on the same disk or toward a network drive. Once set up, let it do the work for you automatically. It can remove the contents of sub-folders and read-only files. There is an option to | |||
Updated: 2, 2006 | Rating: 203 | Author: Patrick Peccatte | Size: 2232 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
825. | DeepBurner 1.7 (deepburner.com) | ||
is an advanced and extremely powerful CD and DVD burning package that comes absolutely for FREE. It removes the hassle of making CDs, DVDs, and autoruns. It even makes it easy for you to create and print your own labels and booklets. DeepBurner supports a very wide range of internal and external (USB 2.0 and FireWire) CD and DVD writers. Burn any data, copy any disc, make backups | |||
Updated: 2, 2006 | Rating: 46 | Author: Maxim Afanasjev | Size: 2671 kb | Freeware Go to category: Audio & Multimedia > CD Burners Similar programs | |||
826. | Dark Files 3.3.1.1 (mybestsoft.com) | ||
settings the program will apply settings of the "Guests group" to that user. If you are looking for a solid file protection program, look no further. Dark Files can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
827. | Cursor Hider 1.4.4 (softexe.com) | ||
with forms to fill in. At first you type the URL in the browser's address bar - www.softexe.com. What do you think about the dot behind softexe? To be or not to be (already typing)? For URL checking you have to take mouse and move the mouse pointer to the side of the screen. With Cursor Hider the | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
828. | CryptIt 1.301 (SinnerComputing.com) | ||
file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
829. | cPWD 2.6 (absolutedynamics.com) | ||
powerful Information Security Management tool that will protect the local administrator account across the network. Search Active Directory. Target multiple Administrator accounts based on the Security Identifier Descriptor (SID). Dynamically generate and apply C2-Compliant random passwords. Rename the local administrator account. Update services configured to logon with domain | |||
Updated: 2, 2006 | Rating: 0 | Author: Donnie Byerley | Size: 725 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
830. | Crazy Ball 1.5 (sanapesoft.com) | ||
Ball is a compact and convenient toolbar that gives you the opportunity to launch the most frequently used applications from a highly unusually organized set of buttons. Adding, deleting or moving applications to or from the toolbar is as easy as drag-and-drop. And now you can have more Crazy Balls to run on the desktop at the same time. Crazy Ball is a compact and convenient toolbar | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexander Moshkov | Size: 389 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > That software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|