|
||||||
|
||
|
Home > Recruiting software |
Related keywords: consultants recruiting resumes |
|
|
81. | Serial Logger Service 1.0 (muconsulting.com) | ||
Records all data received on a serial port to a file on a disk. It was originally designed to record telephone traffic data from a corporate phone system (PBX) for later analysis. For this reason, it was designed to be very robust and includes features to notify an administrator if no data is received in a | |||
Updated: 9, 2005 | Rating: 0 | Author: Claudio Fahey | Size: 450 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
82. | Password Spectator Lite 1.401 (refog.com) | ||
sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at home and no one can overlook your password. You've been entering your password several times, then chose "remember my login and password" option and finally forgot your password. Then your computer crashes or you need to re-type this password for one reason or another, but you don't | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 1116 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
83. | Password Spectator Pro 3.10 (refog.com) | ||
sometimes this feature becomes more of a pain, rather than help. Let's say you are using computer at home and no one can overlook your password. You've been entering your password several times, then chose "remember my login and password" option and finally forgot your password. Then your computer crashes or you need to re-type this password for one reason or another, but you don't | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 1410 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
84. | Privilege Master 1.0 (shareware-promotion.com) | ||
As every IT manager knows, security is a trade-off between usability and the level of protection required. For example, to prevent users making unauthorised configuration changes to their system, users are normally given only basic security rights to their system. This is fine until the user has a legitimate | |||
Updated: 9, 2005 | Rating: 16 | Author: Blue Square Software Blue Square Software | Size: 9085 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
85. | Magic Folders XP 04.04.2 (pc-magic.com) | ||
and normal access to all your folders and the files within. There's no need to un-hide each file or folder individually. And Magic Folders is totally transparent. No one need know your invisible folders/files even exist. If you wish you can establish 5 different accounts so everyone using your computer can create their own invisible folders that only they have access to. Keep | |||
Updated: 9, 2005 | Rating: 243 | Author: Scott Chaney | Size: 649 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
86. | Npust eMail address Creator 6.8 (npust.com) | ||
is used world wide by Job Posters, WebMasters, Real Estate Agents, Recruiters, and anyone else who needs to increase the number of their recepients when doing bulk email postings. This software can easily divide your file with a list of email addresses into two parts - file with names and file with domains and then compose them together again with all possible combinations. It makes | |||
Updated: 9, 2005 | Rating: 0 | Author: GARY KUO | Size: 392 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
87. | HDD Temperature Pro 1.4.206 (hddtemp.com) | ||
users who have only single hard-drive and is totally free. Using S.M.A.R.T. technology included in all modern HDDs, HDD Temperature checks and monitors the temperature of your hard drives; you can also set the maximum value of drive temperature so that you will be warned should this temperature be exceeded. S.M.A.R.T. stands for "Self-Monitoring, Analysis and Reporting | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuri Alexandrov | Size: 2409 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
88. | File Monster 2.6.7 (nstarsolutions.com) | ||
file name with a randomly generated name and it changes the file's creation date. It can even erase pesky hidden files, system files, and read-only files. Don't leave sensitive data on your computer: deleted files are the first place many computer savvy people will look when they are trying to discover sensitive information on your computer. Some important questions you have to | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
89. | FileMap by BB 4.0.4 (dogkennels.net) | ||
Don't become complacent with Internet security. There could be times when your firewall is out-smarted allowing files to be secretly installed to hard disk through no fault of your own. For other reasons, files in the windows and system directories will mysteriously grow over time. If you had a record of | |||
Updated: 9, 2005 | Rating: 30 | Author: Bernie Madigan | Size: 144 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
90. | FileName Pro 1.1.2 (jermar.com) | ||
FileName Pro, a professional grade batch file naming utility. Whether you have a few or thousands of files to rename, FileName Pro can rename your files in seconds. Name files using any combination of file naming schemes. Name using dates and times, series style or even random names. Exclude and add text | |||
Updated: 9, 2005 | Rating: 45 | Author: Jerry Rawdon | Size: 2019 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Recruiting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|