|
||||||
|
||
|
Home > Army software |
Related keywords: army of usa, Army of USA, army screensaver, images of army, swiss army knife |
|
|
851. | Lockout Desktop Security 1.1.652 (dynamicdesigns.co.uk) | ||
The full-version retail price is Ј30. Some Of Lockout's Features Hide all control panel applets at the click of a button. Disable or restrict display, network, password, printer & system control panel settings. Hide all drives in 'My Computer' window. Disable any window / program from being displayed. Disable Ctrl + Alt + Delete while in protected | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Wilkinson | Size: 2857 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
852. | DVD to VCD SVCD MPEG AVI Converter 2.05 (dvd-converter.net) | ||
DVD to VCD SVCD MPEG AVI Converter -- Convert DVD to VCD,Convert DVD to SVCD,Convert DVD to MPEG,Convert DVD to AVI. DVD to VCD SVCD MPEG AVI Converter is an easy to use DVD copying and ripping software which can copy DVD to VCD/SVCD/MPEG/DIVX AVI files.DVD to VCD SVCD MPEG AVI Converter is an ideal method DVD to VCD SVCD MPEG AVI Converter is a DVD to AVI converter,DVD to VCD converter,DVD to SVCD converter,DVD to Mpeg converter | |||
Updated: 9, 2005 | Rating: 0 | Author: Simon Chang | Size: 1020 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
853. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
854. | ECBackup 2.0 (softcomplete.com) | ||
is a archiver with strong-security, based on open key technology. It's very like to PGP, but uses more reliable and efficient methods of compression and encoding. You have oppotunity to work with ECBackup from the command line but not only. ECBackup can be used for creation of backup copies of the | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
855. | EHusBook 2.4 (kroxus.com) | ||
EHusBook version 2.4. Prints brochures directly from Microsoft Word 2000/XP. It is more easy than before.Easy to use interface. Works as plug-in for Microsoft Word. Printing brochures only by clicking one button. Printer paper sorting method selection.Printing in different printers including printer drivers | |||
Updated: 9, 2005 | Rating: 0 | Author: Oybek Umarov | Size: 400 kb | Freeware Go to category: System Utilities > Printer Similar programs | |||
856. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
857. | enable Virtual Desktop 2.2.8 (enablesoftware.com) | ||
enable Virtual Desktop is the next generation virtual desktop from Enable Software. Features include: customizable desktop size, hotkey desktop switching, mouse and window selectors, fully customizable appearance (including different wallpaper/patterns/colors for each desktop). Customise the mini-window via | |||
Updated: 9, 2005 | Rating: 0 | Size: 3575 kb | Shareware Go to category: Desktop > Other Similar programs | |||
858. | Eraser 5.3 (tolvanen.com) | ||
The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
859. | EtherScout 1.10 (globalpatrol.net) | ||
EtherScout is an Internet traffic monitoring utility that sits in your network and records and analyzes traffic patterns of Internet usage. Reports can be generated in real time, showing detailed information on what users are doing, or trends of surfing behavior on your network. After collecting this | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1216 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
860. | EZ Wizard 3.0 (microtech.doe.gov) | ||
of ENERGY STAR, which can turn off your monitor, your computer's most consuming component, during idle time. To easily activate the ENERGY STAR capabilities of your system, run the EZ Wizard. If you aren't already using ENERGY STAR, the program will ask if you want to activate it. If you do | |||
Updated: 9, 2005 | Rating: 0 | Author: David Ensign | Size: 86 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
|
Home > Army software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|