|
||||||
|
||
|
Home > Cool software |
Related keywords: cool java menu, cool clock, cool keys, cool edit, cool java, cool javascript, Cool Watermark, cool special effects, cool menu, cool text |
|
|
831. | Hara-Kiri 2.02 (cyteg.com) | ||
"Hara-Kiri" (ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
832. | HDD Temperature 1.3 (hddtemperature.com) | ||
causes heat, plenty of heat. That is why servers and computers have coolers, fans and other gadgets that prevent overheating. But as fans get plugged, coolers stop working, or too many hard-drives get added - the risk of "frying" your HDDs and losing data increases drastically. So how do you | |||
Updated: 3, 2005 | Rating: 48 | Author: Yuri Alexandrov | Size: 1016 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
833. | HDD Temperature Pro 1.4.206 (hddtemp.com) | ||
causes heat, plenty of heat. That is why servers and computers have coolers, fans and other gadgets that prevent overheating. But as fans get plugged, coolers stop working, or too many hard-drives get added - the risk of "frying" your HDDs and losing data increases drastically. So how do you | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuri Alexandrov | Size: 2409 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
834. | Heidi R. Stealthy (TM) 2.0 (owendigital.com) | ||
you can now EXCLUDE app windows of your choice from being hidden. Cool list box shows you the currently open, visible application windows on your PC. Just check the ones you want to exclude! Hide the 'naughty' stuff, and leave your 'work' apps open! Heidi R. Stealthy (TM) resides on your system tray | |||
Updated: 8, 2004 | Rating: 0 | Size: 1172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
835. | Hide Files 3.4 (hide-files.biz) | ||
You have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best way to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
836. | IconChanger 3.5 (shelllabs.com) | ||
are supported as well. You'll be surprised by how many amazingly cool icons you already have on your computer hard-drive and didn't even know about. The program can be activated in a variety of ways, including via contextual menu. The interface of this application is Explorer-like, making it easy to navigate and use. Other advantages of Icon Changer include file type filtering | |||
Updated: 2, 2006 | Rating: 434 | Author: Marat Maksyutov | Size: 1128 kb | Shareware Go to category: Graphic Apps > Icon Tools Similar programs | |||
837. | IDEM File Synchronization 2.2i (peccatte.karefil.com) | ||
Automation software to replicate directories and synchronize files, backup documents or distribute data automatically, mirroring important folders from a Windows NT/W2K/XP server toward another, checking a list of source folders at regular time intervals and updating target folders with new or modified files | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2203 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
838. | Identity Knight 1.3 (fspro.net) | ||
Modern computer technologies evolve with blazing speed. As we emerge into a new digital era, we tend to trust machines with virtually every aspect of our life. Development of secure network communication technologies opens new horizons of electronic business. However, it also plays a trick on our perception data. Your credit card numbers, SSN, driver license and e-mails can be stolen easily! Download Identity Knight, the unique credentials protection software, today | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
839. | Internet Explorer Password 3.0.189 (lastbit.com) | ||
Internet Explorer Password is a password recovery program for IE Content Advisor. Content Advisor was initially designed as a security feature and a tool to monitor website ratings to prevent minors from accessing adult websites. Since the rating technology never became widespread, this feature is basically | |||
Updated: 9, 2005 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 61 kb | Demo Go to category: Security & Privacy > Password Managers Similar programs | |||
840. | JIT Scheduler 8.30 (gibinsoft.net) | ||
JIT Scheduler is the task scheduler for Windows 95/98/Me/NT 4/2000/2003/XP, it provides the easy way to create and launch tasks in specified day and time. JIT Scheduler supports 4 types of tasks: Application, Document, System Shutdown or just Message (Remind). This means, that you can open document (e.g | |||
Updated: 2, 2006 | Rating: 42 | Author: Igor V. Polyakoff | Size: 678 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
|
Home > Cool software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|