|
||||||
|
||
|
Home > Exact software |
Related keywords: exact time, exact time atomic clock, exact time of day |
|
|
961. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
Icon Lock-iT XP provides strong file encryption and security for Windows XP, 2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
962. | IIPwr Package 2.00 (iipwr.com) | ||
don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities (such as keystrokes, active | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
963. | inGoogle Optimizer 1.0 (ingoogle.com) | ||
of your web site for top positions in Google. InGoogle lets you see exactly what Googlebot sees when spidering your pages, giving you unfair advantage and control over your ranking in Google. inGoogle's technology is used by top SEOs around the world and is now available at a fraction of the cost | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Remacle | Size: 1549 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
964. | InsideCAT Lite Edition 2.20 (insidecat.com) | ||
MP3 WMA OGG AVI). Powerful search funtions, four text searchings (exact, wilcards, superwilcards, fuzzy). It makes compilations of files from all your disks. Five ways to open files directly. Four configurable printing functions. Two database exporting functions. Easy to use. Intuitive (similar to Windows Explorer). Very fast. It works with hundreds of disks and millions of files | |||
Updated: 3, 2005 | Rating: 0 | Author: Victor Garcia Tascon | Size: 1373 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
965. | InstantRecovery Personal Edition 4.1 (novastor.com) | ||
backup and InstantRecovery backup, and Presto! Everything is back exactly like you like it! Network support is available with InstantRecovery Professional version. Easily and quickly perform an image backup of a hard drive or partition directly to CD-R, CD-RW, hard disk, removable, or tape drive! Make an exact copy of your hard drive and save it as a file, too! Now works with | |||
Updated: 3, 2005 | Rating: 68 | Author: Mike Dunham | Size: 16429 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
966. | InstantRecovery Professional Edition 4.1 (novastor.com) | ||
backup and InstantRecovery backup, and Presto! Everything is back exactly like you like it! Easily and quickly perform an image backup of a hard drive or partition directly to CD-R/RW, hard disk, tape, USB hard drive, FireWire drives and more! Supports all Intel-compatible operating systems such as Windows, Linux, Unix, DOS, OS2 and | |||
Updated: 3, 2005 | Rating: 44 | Author: Mike Dunham | Size: 16426 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
967. | IsSearch 1.1.9 (screenresources.com) | ||
indexing and multiple document format support IsSearch can find exactly what you are looking for within a blink of an eye. Search results are displayed in the list, while clicking any item in the list shows the item in built-in viewer. The search term is highlighted so that eye-scanning the results take less time. IsSearch powers fast searches within text files, MS Word | |||
Updated: 9, 2005 | Rating: 0 | Author: Screenresources | Size: 1111 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
968. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Jetico Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events as well as from malicious programs "living" secretly inside your computer's memory and hard drive | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
969. | Key Transformation 5.289 (softboy.net) | ||
Key Transformation can customize your keyboard layout, change any key on the keyboard to other keys. Its on-screen-keyboard ( soft keyboard ) is very easy to use. Want the F1 key to type B? Want the D key to type f? Want the Shift+Enter key to press Table? Want Shift+1 to type a Sentence? Want an exchange | |||
Updated: 3, 2006 | Rating: 570 | Author: Zhang Yan | Size: 767 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
970. | Keyboard Express 3.1 (keyboardexpress.com) | ||
Keyboard Express is a Windows keyboard macro utility. It allows you to issue just about any series of keystrokes to your windows applications with the touch of a key. These keystrokes can manually be entered in and assigned to over 700 hot keys. In addition, keystrokes can be captured “on the fly” as you are | |||
Updated: 2, 2006 | Rating: 0 | Author: Stan Jones | Size: 3044 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
|
Home > Exact software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|