|
||||||
|
||
|
Home > Solitaire software |
Related keywords: solitaire game, solitaire games, solitaire card games, interactive solitaire, solitaire card, solitaire cards, peg solitaire, double solitaire, solitaire puzzles, network solitaire |
|
|
911. | StormWindow 98 5.14 (cetussoft.com) | ||
Cetus StormWindow [TM] for Windows 98 will allow the authorized user to add several types and degrees of protections to the desktop and system of a Windows 98 computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows 98 computer. Examples of desktop protections | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
912. | StormWindow Me 6.02 (cetussoft.com) | ||
Cetus StormWindow [TM] for Windows Me will allow the authorized user to add several types and degrees of protections to the desktop and system of a Windows Me computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows Me computer. Examples of desktop protections | |||
Updated: 9, 2005 | Rating: 16 | Author: Cetus Software | Size: 1476 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
913. | StormWindow NT 2.14 (cetussoft.com) | ||
Cetus StormWindow [TM] for Windows NT will allow the authorized user to add several types and degrees of protections to the desktop and system of a Windows NT computer. Intelligent use of StormWindow security measures will allow secure use of any shared Windows NT computer. Examples of desktop protections | |||
Updated: 9, 2005 | Rating: 0 | Author: Cetus Software | Size: 1283 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
914. | Surf Spy 2.10 (bysoft.se) | ||
Surf Spy is an invisible tool that monitors the Internet activity on your computer. It captures the link (URL) of every visited web site and stores it to a password protected encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
915. | System LifeGuard 2.0 (neobytesolutions.com) | ||
System LifeGuard 2 is the complete solution for the protection and management of your PC. This simple to use product is designed to be used frequently to keep your PC running in perfect condition. Every time you use the internet or run programs on your computer - unwanted files and procedures are stored on | |||
Updated: 9, 2005 | Rating: 0 | Author: NeoByte Solutions | Size: 3273 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
916. | Thinstall Studio 1.94 (aidsoft.com) | ||
Thinstall allows developers to securely pack an entire application suite into a single EXE file that is able to run directly without decompressing to disk. Software Developers can use Thinstall to protect and hide their data files from prying eyes, prevent disassembly of their EXE or DLL files, and create | |||
Updated: 9, 2005 | Rating: 16 | Author: Jonathan Clark | Size: 1327 kb | Demo Go to category: System Utilities > Other Similar programs | |||
917. | ThmIndxr 01.22 (L5Software.com) | ||
ThmIndxr(tm) (pronounced "thumb indexer") is a Windows application that was written specifically to simplify the process of creating "index" pages for collections of digital images. Whether you're a novice computer user or a seasoned Web professional, you'll find ThmIndxr(tm) is a useful tool that can help | |||
Updated: 9, 2005 | Rating: 0 | Author: Fred Koschara | Size: 1988 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
918. | TimeRanger 1.6.0 (codexcel.com) | ||
TimeRanger lets you define any type and any number of events to be timed. It will alert you visually and audibly or run any program when events reach due time. You can define absolute or relative time events to be repeated daily, weekly, monthly or yearly. Recurring events are automatically adjusted to their | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Taverney | Size: 1300 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
919. | TK8 Safe 2.5 (tk8.com) | ||
TK8 Safe is the password manager with features that covers all aspects of storing and using sensitive information. You can keep all user names, passwords, secret notes and serial numbers in one secured database file. The file is encrypted and not available to anyone else. TK8 Safe password manager not | |||
Updated: 9, 2005 | Rating: 0 | Author: Tonis Kask | Size: 3487 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
920. | Too Many Secrets 0.3.1 (fdsoftware.it) | ||
With TMS you can store your password, authentication code, gaming code and organize them in a 2 level tree-structure with categories (eg.: Internet, Gaming, Work, Personal) and subcategories (eg.: EMail, Mailing List, Online Magazines can be subcategories of the Internet category). The Password File are | |||
Updated: 9, 2005 | Rating: 0 | Author: Francesco Duranti | Size: 1948 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Solitaire software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|