|
||||||
|
||
|
Home > Recorded software |
|
|
881. | Tweaking Toolbox XP 1.60 (tweakingtoolbox.com) | ||
The utility for any serious Windows tweaker! Change hundreds of registry settings from Windows XP, improving appearance, performance and functionality. Prevent others from changing your settings, increase Windows security. Lock down Control Panel applets, Internet Explorer options, even choose which | |||
Updated: 9, 2005 | Rating: 0 | Author: Arie Slob | Size: 953 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
882. | uICE 2.34 (mediatexx.com) | ||
uICE enables complete control of your Windows system with handheld remote controls, standard and multimedia keyboards, wireless or wired. Use uICE to remote-control multimedia applications like Windows Media Player, Winamp/Sonique or other MP3 players, your favorite DVD/DivX video player like WinDVD or | |||
Updated: 9, 2005 | Rating: 1956 | Author: Christian Mueller | Size: 3861 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
883. | Ultimate Spy Personal 1.5 (raheel.yi.org) | ||
your workstation in your absence. A greatly appreciated, FREE tool. Records all the keystrokes, with advanced filter settings. Runs in super stealth mode. Auto starts with windows. Not even visible in Run registry. Includes Log Analyser to view log. Home Edition is also available which is best | |||
Updated: 9, 2005 | Rating: 0 | Author: Raheel Hameed | Size: 1156 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
884. | Undelete 3.0 (execsoft.com) | ||
records and database files are accidentally deleted every day. Before Undelete, system administrators had to slog through backup tapes, hoping no corruption or gap made the file unrecoverable. Backups were really designed for catastrophic data-loss recovery, not individual file recovery. Undelete changes all that. It provides a cost-effective, instant-recovery solution that | |||
Updated: 9, 2005 | Rating: 0 | Author: Colleen Toumayan | Size: 5000 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
885. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
e.g. faxes, photocopiers and other associated equipment, can also be recorded manually in the program. Using numerical ID or anti-theft labels simplifies checks and affords increased security. Updating during log-in. Vidamic Netlog automatically makes a network inventory directly from the server. The IT Manager receives a range of information from each local client, including | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
886. | Virtual Personality+ 4.01 (triplebit.com) | ||
that wish to filter crank calls. Supports 24 individual voices recording. No one will recognize you , not even your own mother. You can cause your voice to mimic any from a cast of 24 different personalities, representing voice sources of boys, girls, men or women. Each of the 24 personality-icons on the screen can be linked to a different name and/or voice, simply by a mouse | |||
Updated: 9, 2005 | Rating: 0 | Author: Izack Lesher | Size: 1728 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
887. | Remote Keylogger 2.7 (aidsoft.com) | ||
Record every keystroke in a computer and send it to you via email. The log-file includes the title of the application that typed in and the date and time while typing. Record every keystroke in a computer and send it to you via email. The log-file includes the title of the application that typed in and the date and time while typing. | |||
Updated: 9, 2005 | Rating: 998 | Author: Fly Lange | Size: 115 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
888. | RemoteKeys 8.7.2 (freewarehits.de) | ||
The buttons may be assigned with the help of the integrated macro recorder and an integrated timer can activate these buttons. Additional features include an image memory and a clipboard history function. RemoteKeys is always at hand in the systemtray, can be individually configured (button-, form-, fontsizes and -colours), is network-able, offers database access and requires no | |||
Updated: 9, 2005 | Rating: 0 | Author: Detlev Schaefer | Size: 1582 kb | Freeware Go to category: System Utilities > Automation Tools Similar programs | |||
889. | #Remove Access Security 3.0 (e-tech.ca) | ||
The user can then add, delete and modify data, which means that records can be permanently destroyed or changed without anyone's knowledge. 'Remove Access Security' is a must-have for all database administrators and power users. Due to the immense potential this software has, it is not offered for downloading off the internet yet, but can be purchased online for US$199. 'Remove | |||
Updated: 9, 2005 | Rating: 1996 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
890. | SafeLogon 2.0 (gemiscorp.com) | ||
SafeLogon is a multi-user and password-based access control utility that enhances and complements the Windows built-in logon and authentication system. In other words, SafeLogon allows you to protect your system at home and office from unauthorized access. SafeLogon is fully configurable and allows its | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 2291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Recorded software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|