|
||||||
|
||
|
Home > Hyperlink software |
Related keywords: hyperlink resume, MultiMedia Soft Italy development software components Picture control Animation Hyperlink Frame Led |
|
|
871. | JoinLine 1.9 (WindowsUtilities.com) | ||
JoinLine fixes text files with long fixed length records and unwanted line wraps. Spreadsheets and database programs import individual text records with data on the same line. However, sometimes text lines are wrapped before the end of the record. If these records always wrap to the same number of lines, then | |||
Updated: 9, 2005 | Rating: 71 | Author: Frank Snyder | Size: 1799 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
872. | Journal Macro 1.84 (keyboard-macro-recorder.com) | ||
Journal Macro is an easy-to-use mouse and keyboard macro recorder, player and editor designed to help you eliminate repetitive operations. It is the easiest way to make working in Windows faster, easier, and more productive. You can use Journal Macro to automate your repetitive tasks. Using this time-saver | |||
Updated: 9, 2005 | Rating: 118 | Author: Edwin Geng | Size: 1000 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
873. | Keyboard Logger 1.1 (panterasoft.com) | ||
Do you want to know what your children, spouse or significant other type on your computer when you are away from it? The Keyboard Logger key logger records every keystroke made on your computer on every window, even on password protected boxes. This key logger is completely undetectable and starts up whenever | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleksey Cherkasskiy | Size: 45 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
874. | Keyboard Monitor 1.7 (tropsoft.com) | ||
are pressed until turned off. Use it to ensure that your child's (or spouse's!) chat room and email activities are on the up and up. Recorded information and access to the Keyboard Monitor are safely password protected. Keyboard Monitor can be run as an invisible background process | |||
Updated: 9, 2005 | Rating: 76 | Author: Silvio Kuczynski | Size: 133 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
875. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
876. | EldoS KeyLord 4.0 (eldos.org) | ||
information records to "expire" so that you are notified when it's time to go and change password or acount info. KeyLord integrates with your web browser and helps you store login information not in insecure Windows Password Storage (for which browsers and crackers exist), but in encrypted KeyLord file. EldoS KeyLord lets you arrange confidential information (passwords, account | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
877. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
information records to "expire" so that you are notified when it's time to go and change password or acount info. EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, print it and store it in secure encrypted file. You can store any data including files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
878. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
879. | EndTask Pro 2.00.0123 (products.asynchrony.com) | ||
reminder that notifies the user to walk around and take a break. It's important to relax and protect your invaluable health! A UNIQUE pop-up blocker, task manager, System/Internet connection monitor and more! Avoid killing the pop-ups you want. Pop-ups are hidden, you can take a peek and decide whether to show them, or wait and they will be blocked after a few | |||
Updated: 9, 2005 | Rating: 16 | Author: Osama Abdel-Karim | Size: 1507 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
880. | Energy Spy 1.5 (spyutilites.com) | ||
Energy Spy is a small program to schedule a shutdown, reboot, logoff, poweroff, standby, and hibernate a certain time on the local. It also supports command line options that allow power-off to be used in batch scripts. You can set a keyboard shortcut for any action - shutdown, reboot, logoff, poweroff | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitriy Gorin | Size: 769 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
|
Home > Hyperlink software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|