|
||||||
|
||
|
Home > Used software |
|
|
861. | wodSSH 2.3.7.0 (weonlydo.com) | ||
with remote console-type services. Most commonly, it will be used for Telnet based servers (running on UNIX OS), but wodSSH does even more: it allows you to communicate encrypted (and secured, of course) with SSH1 and SSH2 (secure-shell) servers, as well as any other non-encrypted server (such as SMTP or POP3). For ones that don't know - the SSH transport layer is a secure low | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1231 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
862. | wodSSHServer 1.3.0.0 (weonlydo.com) | ||
protocol provides strong encryption of data, and authentication of users over insecure networks, such as Internet. Using it is really easy. Add it to your form (or create instance on the fly), use internal methods to generate pair of keys for the server (or import existing ones from other | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1368 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
863. | wodSSHTunnel 1.5.0.0 (weonlydo.com) | ||
previous request. Basically, to understand what happens: instead of using direct connections to the server, through insecure internet,you would connect to your SSH server using encrypted connection, and SSH server would connect to services you require. Usually, most of those services will | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1317 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
864. | CPUSpy 1.044 (SinnerComputing.com) | ||
most AMD (tm), Intel (tm) and Transmeta (tm) processors. This can be used to compare between processors features such as bus speed, maximum frequency, cache sizes, release dates, codename, and transistor count. Interesting facts are also included for most major models. A OS database is also included | |||
Updated: 2, 2006 | Rating: 42 | Author: Andrew Glina | Size: 51 kb | Shareware Go to category: System Utilities > Benchmarking Similar programs | |||
865. | Note Studio for Windows 3.1.1 (dogmelon.com.au) | ||
has found that people become much better organized when they start using Note Studio. Customers report that it is actually fun to make notes. The result? People make more notes, and their notes are actually useful. Note Studio was originally developed for handheld Palm devices. Dogmelon has learnt a lot of lessons for portable devices which apply equally to laptop or tablet PCs. An | |||
Updated: 2, 2006 | Rating: 0 | Author: Ant Wiese | Size: 10105 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
866. | Mp3 Tag Assistant Professional 2.7 (assistanttools.com) | ||
Features: * Supports UNICODE symbols in MP3 tags. You can use symbols of your national alphabet in WMA/MP3 tags (diacritic symbols, umlauts, hieroglyphs, etc.) * Supports advanced MP3 tags and all basic MP3 tags (more than 35 tags) * Supports ID3v1 and ID3v2 MP3 tags, WMA metadata * Freedb (CDDB) support * Playlist operations (create, open, change, save) * Quickly create | |||
Updated: 2, 2006 | Rating: 0 | Author: Roman U. Kondratiev | Size: 3152 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
867. | Silver Key 3.3 (filecryption.com) | ||
some software just to decrypt your file. No problem here if you are using Silver Key! Right-click the file or folder you wish to send and select the “Create EXE Parcel” command. Silver Key compresses and encrypts your data and adds a small decryptor program. Your correspondent doesn’t need to install any decrypting program because the parcel already contains all the needed | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
868. | ieSupportManager 1.50 (iecomputersystems.ie) | ||
and a comprehensive suite of reports. ieSupportManager allows users to add to and search its knowledgebase and prioritise, sort and filter issues to suit their own preferred view. It also allows the user to identify unusual issues track trends and provides a comprehensive suite of reports. Easy to install and simple to use for both support staff and end users | |||
Updated: 2, 2006 | Rating: 0 | Author: Stephen McNamee | Size: 14336 kb | Demo Go to category: System Utilities > Other Similar programs | |||
869. | WinTools.net Classic 6.5 (wintools.net) | ||
features the following tools: Clean Uninstaller - This tool is used for both correctly removing software and for monitoring changes made to the hard drive, MS Windows registry and system files during program installations. Scan Files - This tool is used for periodic cleaning of your hard drive from dead references, junk and obsolete files produced by different software | |||
Updated: 2, 2006 | Rating: 0 | Author: Ruslan Smekalov | Size: 722 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
870. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
when they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Used software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|