|
||||||
|
||
|
Home > Get file software |
Related keywords: file, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE, file compare |
|
|
911. | CastlePaste PRO 1.50.2p (castlesoft.co.nz) | ||
cut and paste when you can simply paste ? How often do you get a sense of deja vu while typing, and think "I've typed that before" ? Do you wish that there was an easy way to paste the things that you commonly type ? Do you have more than one email signature ? Do you cut and paste from standard documents all the time ? Well, it is time to stop worrying and wishing. The answer to | |||
Updated: 9, 2005 | Rating: 0 | Author: Castle Software | Size: 1630 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
912. | CDuke 2.1 (CDuke.com) | ||
and tutorials. This is how CDuke works – insert a CD, select files to place onto a CD, press a button – that’s it! Easy, isn’t it? The progress bar shows how much time has passed since the process had started and how much time is left for it to be completed. But the advantages of CDuke do not stop here. Importantly, the program comes with an autopilot-like feature | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Buzaev | Size: 2900 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
913. | CryptoExpert 2005 PE 6.02 (cryptoexpert.com) | ||
and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to the volume file. Attempts to read from this volume are also intercepted, and the relevant data is | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
914. | CryptoExpert 2006 Professional 6.4.3 (cryptoexpert.com) | ||
on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
915. | Data Destroyer 7.31 (hermetic.ch) | ||
Windows 'deletes' a file it does not actually destroy the contents of the file but rather simply unlinks the file from the file directory system, leaving the contents of the file in the disk sectors. This data will remain there until the operating system uses those sectors | |||
Updated: 2, 2006 | Rating: 16 | Author: Peter Meyer | Size: 1826 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
916. | Easy Desktop Keeper 1.63 (getfreefile.com) | ||
to save, restore, manage and lock your desktop layout including files and folders located on your desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout, every time you reboot your PC, the program will restore your desktop icons and bring them back to their original positions as well as return your old wallpaper and screen | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 841 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
917. | Outlook Extractor 2.0 (mazepath.com) | ||
extracted, including multiple recipients, with NO DUPLICATES! You get a clean mailing list, saved in a simple text file which is perfect to import or even cut and paste into your favorite program, mailing list manager, word processor, or spreadsheet! Save your time and let Outlook Extractor | |||
Updated: 9, 2005 | Rating: 0 | Author: William Smith | Size: 1897 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
918. | EmailObserver 5.2.2 (softsecurity.com) | ||
to your secret email address, so that the real recipient will not get it at all. So you have an overall control over all outgoing emails sent by a monitored user. EmailObserver is a suitable tool for: - Parents concerned about their children's computer activity, i.e. what kind of messages they send by email, who they communicate with etc. - Spouses concerned about their | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
919. | GoldenSection Notes 3.0 (tgslabs.com) | ||
to your needs. The software comes complete with built-in help files. GSNotes’ Help features are clear, concise, and have simple explanations including pictures of the toolbars, windows, and other components of the program. GSNotes can contain an unlimited number of project files and enclosed documents. It features customizable toolbars and message dialogs, user-defined | |||
Updated: 2, 2006 | Rating: 0 | Author: Sergey Harper | Size: 5050 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
920. | HDD Temperature 1.3 (siguardian.com) | ||
are many reasons why hard-drives get damaged, and overheating is probably the most common one. If you remember your physics lessons well, you know that spinning something at several thousand revolutions per minute causes heat, plenty of heat. That is why servers and computers have coolers, fans and other gadgets that prevent overheating. But as fans get plugged, coolers | |||
Updated: 9, 2005 | Rating: 0 | Author: Yuri Alexandrov | Size: 1016 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Get file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|