|
||||||
|
||
|
Home > Commodities software |
|
|
851. | Automatic Wallpaper Changer 2.2.3 (educesoft.com) | ||
Wallpaper is a windows wallpaper changer. Point it towards a folder containing graphics files and it will select one at random or sequentially and display it as wallpaper. Auto tile/centre based on graphic/screen size and user settings is an option. The period between changes is between 1 and 100 containing graphics files and it will select one at random or sequentially and display it as wallpaper | |||
Updated: 9, 2005 | Rating: 120 | Author: Dave Wilson | Size: 47 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
852. | Big Crocodile 3.10 (sowsoft.com) | ||
Big Crocodile is a powerful, secure password manager. Storage of all your passwords, logins and hyperlinks in a securely encrypted file. Big Crocodile can automatically insert the passwords into the windows that require them. Password generator with advanced functions, multi file interface, special password | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Sinitsyn | Size: 556 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
853. | C++ Editor 1.9 (ua1zcl.com) | ||
standard editor of IDE (Integrated Development Environment). Editor's main purpose is to edit source code files outside IDE with multiple opened copies of program when programmer needs to find, replace or compare source code. The program may compile the file using for this purpose the Microsoft VC | |||
Updated: 9, 2005 | Rating: 745 | Author: Alexander Klimansky | Size: 254 kb | Shareware Go to category: Development > Source Editors Similar programs | |||
854. | CD-DVD Lock 2.01 (softheap.com) | ||
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them. You can gain | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
855. | Clone 2.0.1 (newtonsoftware.co.uk) | ||
Clone allows you to backup your files. Clone can be run as either a screen saver or as a standard windows utility. Run as a screensave, clone backups up the data that is important to you while you take a break from your computer. This ensures you have a copy of your most important files backed up. Clone | |||
Updated: 9, 2005 | Rating: 82 | Author: Tim Newton | Size: 3846 kb | Demo Go to category: System Utilities > Other Similar programs | |||
856. | Deductus disk catalog 1.49 (aolej.com) | ||
Deductus is disk catalog and personal full-text search engine with explorer-like interface. Allows you to search your disk collection, text files, HTML files, documents and MP3s. You can store information about hundreds of all kind of media like local disks, network disks, CD ROMs, ZIP disks and other | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Olej | Size: 1300 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
857. | FileMonkey 9.07 (homepage.ntlworld.com) | ||
The FileMonkey file operations package automates common file management tasks which would otherwise be tedious and time consuming. Main features of FileMonkey include: Perform search and replace on multiple file contents, file names or names. Rename files or folders to match a sequence. Split, join, or merge | |||
Updated: 9, 2005 | Rating: 0 | Author: monkey job | Size: 1508 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
858. | Mutilate File Wiper 2.92 (home.att.net) | ||
is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE OR FLOPPY DISK. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate securely | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
859. | NotesImp 1.5.2 (notesimp.com) | ||
of a menu and tool bar. Commands are accessed through main window's menu, right-click context menus or the tray icon. NotesImp works under Windows 9x, ME, NT4, 2000 and XP. NotesImp is handy and low resource consuming organizer with tree like hierarchical structure of notes and ability to protect your data using encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Nextriver Software | Size: 1055 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
860. | PAL Keylogger Pro 1.01 (palsol.com) | ||
PAL Keylogger will secretly record EVERY keystroke on any computer including passwords and will record websites visited. All this discreetly and will silently email all the logs to you! PAL Keylogger will secretly record EVERY keystroke on any computer including passwords and will record websites visited. All this discreetly and will silently email all the logs to you! | |||
Updated: 9, 2005 | Rating: 42 | Author: Christian Champion | Size: 1150 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Commodities software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|