|
||||||
|
||
|
Home > Fern software |
|
|
981. | Heidi R. Stealthy (TM) 2.0 (owendigital.com) | ||
coworkers, roommates, casual onlookers and passersby. When it's safe once again, another single mouse-click returns your PC or laptop to its prior state. You can repeat this cycle as often as needed! One mouse-click, and your open, visible application windows can be hidden from your desktop, taskbar, and the ALT+TAB keystroke combination. Additionally, the CTRL+ALT+DEL keystroke | |||
Updated: 8, 2004 | Rating: 0 | Size: 1172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
982. | Maxus SE 3.05 (neurobridge.com) | ||
the specified time. Notwithstanding all the variety of the program's capabilities, it is very intuitive and easy to use. All features are controlled via well-structured context menus and there is no learning curve in using Maxus SE even for the least experienced users. A progressive multifunctional tool that saves time and money when managing your Internet connection and performing | |||
Updated: 8, 2004 | Rating: 42 | Author: NeuroBridge | Size: 1383 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
983. | Omniquad Messenger Chat Recorder 1.0 (omniquad.com) | ||
Instant Messaging (IM) is a great way to communicate over the Internet. Yahoo and MSN messengers make it so easy to talk to friends and co-workers online. But the very fact that it is easy makes for a very peculiar difficulty. How to keep track of all that was said. So many threads of conversation make it | |||
Updated: 8, 2004 | Rating: 549 | Author: Daniel Sobstel | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
984. | ChildSafe 3.0 (webroot.com) | ||
that enables parents to watch as much or as little of their children's computer and Internet activity as they see fit. The unique "Block-On-Demand" function enables parents to block access to specific web sites, which they deem inappropriate, offensive, or dangerous. ChildSafe 3.0 features support for | |||
Updated: 8, 2004 | Rating: 16 | Author: Steve Thomas | Size: 1561 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
985. | Clean Star Sp@ce S@ver System 2.0c (infoexchg.com) | ||
to remove specific file types as determined by the user/user's software. All identified files are placed in the Windows Recycle Bin for user review & confirmation. It is easy and safe to use on all Win 95/98/ME/XP/NT/2000 systems. Clean Star removes excess files left by software installations, web browsers, and printer activity. Removes common temporary files and is user | |||
Updated: 8, 2004 | Rating: 0 | Author: I EA | Size: 1555 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
986. | Data Destroyer 1.5 (braintwist-studios.com) | ||
But deleting files with Windows merely removes the file system's pointer to the file, all the data remains on your hard drive or floppy disk. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
987. | Downloadz Master 2.8 (otiumation-inc.com) | ||
to surf and download materials Set time limits for DownloadZ Master's Internet connection Set limits on how many pages DownloadZ Master will surf on each site Select the type of materials and files to be downloaded Set size limitations on downloaded files Comes with a complete log of activities | |||
Updated: 8, 2004 | Rating: 0 | Size: 23022 kb | Demo Go to category: System Utilities > Other Similar programs | |||
988. | Ghost Keylogger 3.80 (keylogger.net) | ||
Would you like to know what people are doing on your computer? Ghost Keylogger is an invisible easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
989. | Message Pattern Extractor 2.10 (xyz3.com) | ||
MPX is a highly configurable Pattern Recognition and Manipulation Utility for Emails and Files. It allows the user to define unlimited combinations and sequences of patterns, and actions to perform when patterns are recognized. It accepts input from stored emails (via MAPI) and/or files. It can generate | |||
Updated: 8, 2004 | Rating: 0 | Author: Jim Miller | Size: 1751 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
990. | Online Services Center 2.3 (itlaurel.com) | ||
shipping back to customer. Each Equipment is accounted by it's Model, Model Group, Manufacturer and Serial Number, and can have one or more Accessories (also available for repair). Repair pricing are automatically calculated by Rates assigned to each Model, Accessory depending on Defect found. As already mentioned, OSC has great "Reports" section, covering all kinds of | |||
Updated: 8, 2004 | Rating: 0 | Author: Janice Petros | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
|
Home > Fern software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|