|
||||||
|
||
|
Home > Stored software |
Related keywords: stored procedure, stored procedures |
|
|
881. | EasyConsole 1.2 (peccatte.karefil.com) | ||
use. Last 20 commands are memorized and you will be able to store 10 long most used or favorite command lines on 10 buttons to be launched with a click instead of typing again and avoiding fastidious repetitive commands. You may also type long DOS instructions with their parameters and memorize them (not only internal MSDOS commands) as well as launch your DOS Batch programs | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick Peccatte | Size: 1476 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
882. | ECBackup 2.0 (softcomplete.com) | ||
archivers. The applied technology of open keys allows safely to store a public key on the disk and guarantees impossibility of restoring of your private key from public. The special program ECExchange, included in the package ECBackup, allows easily and reliably to interchange files and correspondence in open and unguarded networks (LAN, Internet). ECBackup is a archiver with | |||
Updated: 9, 2005 | Rating: 0 | Size: 1199 kb Go to category: Security & Privacy > Encryption Tools Similar programs | |||
883. | ECSync 1.0 (EUROCOMP.info) | ||
storage device. Extensive options for configuration. Tasks can be stored in profiles for individual copying processes. Can be automated with Windows Task Scheduler for periodic tasks. Runs with and without user intervention. Creates log files. Very fast! A must for every notebook owner! ECSync! works | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Osthege | Size: 5007 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
884. | EldoS KeyLord 4.0 (eldos.org) | ||
registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
885. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree structure. You can drag information from EldoS KeyLord to other applications, print | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
886. | EldoS PKI Tools 1.2 (eldos.org) | ||
security and integrity. All you need is a certificate, which can be stored on USB Dongle or Smart Card. If you don't understand what certificate is - no problem. You will find comprehensive information about certificates and where to get them in EldoS PKI Tools documentation. You will be able to create a certificate yourself too. EldoS PKI Tools is a set of programs designed for | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
887. | Emsa DiskCheck 1.0.75 (e-systems.ro) | ||
accordingly with drive performance but also with the way data is stored on it, which obviously impacts on overall performance. Make sur you clean the CD or DVD before doing tests, to remove dirt and ensure tests are accurate. Freeware. Emsa Disk Check is a freeware dual-purpose utility, for disk | |||
Updated: 9, 2005 | Rating: 4036 | Author: Emsa Systems | Size: 185 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
888. | Encrypt PDF Command Line 2.1 (toppdf.com) | ||
Encrypt PDF software is a very flexible and powerful program, Encrypt PDF software allows you to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) existing PDFs, set permissions, add user and owner password. For example you can encrypt a PDF without to allow to print it. The | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 34 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
889. | Find Protected 2.0 (aks-labs.com) | ||
documents, including Word, Excel and Access files. 3) Secure file stores, such as PGP disk. Use Find Protected to inspect local or remote computers for password protected files. After selecting the types of protected files that you want to find and the location to search in, you run the scan. The | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
890. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
There is a number of the equipment controlled through a serial port from a PC or a terminal. Also there is a lot of the technologies in the market allowing to operate remotely the consecutive devices through the network TCP/IP. These solutions contain, both software and the hardware. Our company as well has | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
|
Home > Stored software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|