|
||||||
|
||
|
Home > Echo software |
Related keywords: echo reverse, Echo Effect |
|
|
891. | RunAs Professional 3 (mast-computer.de) | ||
RunAs Professional is a substitute for Microsoft's command runas. RunAs Professional solves the problem that normal runas does not support the commandline parameter password. Now you can use RunAs Professional to install software, use it in batch skripts and much more. If you use RunAs Professional RunAs Professional solves the problem that normal runas does not support the commandline parameter password. RunAs Professional has a lot of more features too | |||
Updated: 9, 2005 | Rating: 0 | Author: Steffen Epple | Size: 111 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
892. | SafeBox Industry 1.0 (aidsoft.com) | ||
SafeBox Industry is a new and powerfull file encryption solution. This application can also provide a strong protection, quite good compression, self-decrypting archives, good presentation (use skins form, splash screen), which may be used for secure distribution package.Features : Create Self-Decrypting | |||
Updated: 9, 2005 | Rating: 16 | Author: Ionworx Technology | Size: 439 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
893. | SafeLogon 2.0 (gemiscorp.com) | ||
SafeLogon is a multi-user and password-based access control utility that enhances and complements the Windows built-in logon and authentication system. In other words, SafeLogon allows you to protect your system at home and office from unauthorized access. SafeLogon is fully configurable and allows its | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 2291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
894. | Scratchboard 6.1 (gammadyne.com) | ||
Scratchboard is an essential, time-saving personal organizer that is designed to provide rapid access to your important information. This information can be arranged in a "tree" structure, not unlike a hard drive. The user can easily work their way through the tree to find what they need. Each branch of | |||
Updated: 3, 2006 | Rating: 0 | Author: Greg Wittmeyer | Size: 2211 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
895. | Search and Recover 3.0d (iolo.com) | ||
An arsenal of powerful tools designed to allow you to quickly recover deleted or destroyed files, folders, songs, pictures, videos, programs, critical system components, web pages, and even email messages in Microsoft Outlook and Outlook Express, Netscape, and Eudora. It works with any hard or floppy drive | |||
Updated: 2, 2006 | Rating: 35 | Author: iolo technologies | Size: 4607 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
896. | Search32 8.1 (anetsoft.com) | ||
Search 32 is designed for quickly retrieving word and word combinations from text files that can be 10 GB and more in size. It has a file viewing window which highlights the found text and it allows the use of wildcards and BOOLEAN operators for searching. Before searching you should create index files (very | |||
Updated: 3, 2005 | Rating: 0 | Author: Anet Soft | Size: 1374 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
897. | Secure HTML Lock 1.3.2 (submitad.com) | ||
Lock html, cryptate and protect your webpages from theift! Make your website secure and prevent theft of your html source code. Secure HTML Lock is easy and fast to use, no html knowledge needed. Several bonus features included like email address protector and popup generator. You know how much energy and | |||
Updated: 9, 2005 | Rating: 0 | Author: Stefan Fahlberg | Size: 3991 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
898. | SecureFile 2.0 (securefile.tripod.com) | ||
SecureFile is an encryption and compression program that allows you to encrypt and decrypt files using symmetric key and asymmetric key mechanism. It creates a self-decryption archive which can be decrypted at the other end without any dependencies. It incorporates powerful Blowfish algorithm and | |||
Updated: 9, 2005 | Rating: 0 | Author: Chandra Sekhar Achary | Size: 714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
899. | Security Folder 2.0 (everstrike.com) | ||
These days computers are everywhere. Reliable and tireless machines replace human beings at dull routine tasks in almost every area. Each day we tend to rely more and more on electronics as storage media and information processing and distribution systems. A decade ago, our puny hard drives contained hardly | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Davids | Size: 534 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
900. | SHA1files 1_6 (users.skynet.be) | ||
SHA1files is a 32 bits console application that computes the SHA1 digest of files under Windows. The main applications are    - the detection of any change in files (typically a web server directory to make sure no file has been altered - integrity check)    - the detection of duplicate files files under Windows | |||
Updated: 3, 2005 | Rating: 76 | Author: Christophe DAVID | Size: 36 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Echo software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|