|
||||||
|
||
|
Home > Main software |
Related keywords: main window |
|
|
851. | Automatic Wallpaper Changer 2.2.3 (educesoft.com) | ||
of your original graphic currently being displayed is shown in the main window title bar and as tool tip text for the icon in the system tray. It can also randomly change the wallpaper once and then exit. A right click menu is available when hover the mouse over the icon in the system tray. You can | |||
Updated: 9, 2005 | Rating: 120 | Author: Dave Wilson | Size: 47 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
852. | Big Crocodile 3.10 (sowsoft.com) | ||
Big Crocodile is a powerful, secure password manager. Storage of all your passwords, logins and hyperlinks in a securely encrypted file. Big Crocodile can automatically insert the passwords into the windows that require them. Password generator with advanced functions, multi file interface, special password | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Sinitsyn | Size: 556 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
853. | C++ Editor 1.9 (ua1zcl.com) | ||
editor of IDE (Integrated Development Environment). Editor's main purpose is to edit source code files outside IDE with multiple opened copies of program when programmer needs to find, replace or compare source code. The program may compile the file using for this purpose the Microsoft VC compiler. Most effectively the editor can be used with a file search utility. The search | |||
Updated: 9, 2005 | Rating: 745 | Author: Alexander Klimansky | Size: 254 kb | Shareware Go to category: Development > Source Editors Similar programs | |||
854. | CD-DVD Lock 2.01 (softheap.com) | ||
faster than any other software using cryptooperation mechanisms. The main purpose of the program is to restrict an ability of copying data between removable media and hard disk drives as well as deny access to media itself. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
855. | Clone 2.0.1 (newtonsoftware.co.uk) | ||
checked and copied so you always know what the program is doing. Main Features 1) Backup files and directories to a defined location - as many as you like 2) Uses the date and time, file size or the archive attribute to determine if a file should be copied 3) Run as a standard windows utility | |||
Updated: 9, 2005 | Rating: 82 | Author: Tim Newton | Size: 3846 kb | Demo Go to category: System Utilities > Other Similar programs | |||
856. | Deductus disk catalog 1.49 (aolej.com) | ||
Search results can be exported to HTML, XLS, TXT formats. Main features: -Full-text word based search engine -Ultra-fast search in indexed disks -Search results are sorted by relevance -Transparent browsing in ZIP, RAR, ACE tar.gz, tar.Z, tar, gz archives -Support for multilanguage interface -Special read-only mode for Deductus stored od CD-ROM or read-only network shares | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Olej | Size: 1300 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
857. | FileMonkey 9.07 (homepage.ntlworld.com) | ||
tasks which would otherwise be tedious and time consuming. Main features of FileMonkey include: Perform search and replace on multiple file contents, file names or names. Rename files or folders to match a sequence. Split, join, or merge target files. Change attributes of files or folders. Change case (capitalization) of file or folder names. Search engine for keywords within | |||
Updated: 9, 2005 | Rating: 0 | Author: monkey job | Size: 1508 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
858. | Mutilate File Wiper 2.92 (home.att.net) | ||
Normal File Deletion is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE OR FLOPPY DISK. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
859. | NotesImp 1.5.2 (notesimp.com) | ||
the use of a menu and tool bar. Commands are accessed through main window's menu, right-click context menus or the tray icon. NotesImp works under Windows 9x, ME, NT4, 2000 and XP. NotesImp is handy and low resource consuming organizer with tree like hierarchical structure of notes and ability to protect your data using encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Nextriver Software | Size: 1055 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
860. | PAL Keylogger Pro 1.01 (palsol.com) | ||
PAL Keylogger will secretly record EVERY keystroke on any computer including passwords and will record websites visited. All this discreetly and will silently email all the logs to you! PAL Keylogger will secretly record EVERY keystroke on any computer including passwords and will record websites visited. All this discreetly and will silently email all the logs to you! | |||
Updated: 9, 2005 | Rating: 42 | Author: Christian Champion | Size: 1150 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Main software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|