|
||||||
|
||
|
Home > Software > System Utilities > Other > New |
|
|
81. | LANMessage Pro 4.00 (dimaware.com) | ||
LANMessage Pro is a powerful tool for communicating with other people on your network. It provides a means of communication that is faster than e-mail and is easier than yelling down the hallway. On all networks traffic is a concern, but LANMessage Pro has that taken care of. LANMessage Pro uses the built in | |||
Updated: 2, 2006 | Rating: 42 | Author: Dima Sokoletsky | Size: 284 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
82. | Keylogger Pro 1.7 (exploreanywhere.net) | ||
KeyloggerPro is an advanced, low level stealth keystroke monitoring application that will secretly record and backup all keystrokes typed on your PC. It offers a wide variety of features including the ability to view keystrokes remotely by having the program send keystrokes to a specified email address every | |||
Updated: 2, 2006 | Rating: 257 | Author: Bryan Hammond | Size: 886 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
83. | KGB Spy 3.93 (refog.com) | ||
KGB Spy Software is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
84. | Junk-Out for Outlook 2003/2002/2000 1.0 (theofficemaven.com) | ||
Junk-Out keeps junk mail out of your Microsoft Outlook Inbox, using a combination of statistical methods (Bayesian filtering) and information you provide, to show only e-mail messages you want to see. The more you use Junk-Out, the better it gets at distinguishing useful e-mail, and getting junk out of your | |||
Updated: 2, 2006 | Rating: 0 | Author: Mike Craven | Size: 10536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
85. | Internet History Eraser 5.5 (internet-history-eraser.com) | ||
Internet History Eraserallows you to easily delete the files that accumulate from Web surfing. It provides features specifically for Internet Explorer, Netscape, Opera and a number of other Internet software programs. Not only will you protect your privacy, you'll free up valuable disk space as well. With | |||
Updated: 2, 2006 | Rating: 0 | Author: Kevin | Size: 1460 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
86. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
Infiltrator is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom for vulnerabilities, security holes and exploits, and information enumerations. Infiltrator can reveal security holes and alert the user | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
87. | IdentaFone Multi-Line Caller ID Software 3.99 (identafone.com) | ||
A virtual telephone assistant that works with your multi-line Caller ID hardware from Rochelle, TCI, Zeus Phonstuff Inc, or YES Telecom for monitoring up to 100+ lines. By using your local network, only one Caller ID box is required, allowing several workstations to have the same detailed status of callers | |||
Updated: 2, 2006 | Rating: 0 | Author: IdentaFone Software | Size: 2752 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
88. | Hide Files & Folders 2.4 (softstack.com) | ||
Hide Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
89. | Golden Eye 4.11 (monitoring-spy-software.com) | ||
Have you ever wondered what your children doing on the Internet? Who they talk to and what pictures they see? Are you suspecting your husband or wife is cheating on you? who they email ? what movies they see? who they chat with ? Do you want to know what your employees are doing during work hours? Golden | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin | Size: 1490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
90. | FinalRecovery File Undelete Software 2.0 (finalrecovery.com) | ||
FinalRecovery is a powerful and convenient data recovery solution. It was developed to recover deleted data from hard disks, floppy disks, PCMCIA-attached digital camera cartridges, compactflashs & memory sticks which were formatted in FAT12, FAT16, FAT32 and NTFS file systems. It supports Win9x, ME, Windows | |||
Updated: 2, 2006 | Rating: 0 | Author: Steven Fang | Size: 1874 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
91. | FinalRecovery File Undelete Software 2.0 (finalrecovery.com) | ||
FinalRecovery is a powerful and convenient data recovery solution. It was developed to recover deleted data from hard disks, floppy disks, PCMCIA-attached digital camera cartridges, compactflashs & memory sticks which were formatted in FAT12, FAT16, FAT32 and NTFS file systems. It supports Win9x, ME, Windows | |||
Updated: 2, 2006 | Rating: 0 | Author: Steven Fang | Size: 1874 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
92. | File & Folder Protector 2.33 (softheap.com) | ||
Protect Files and Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
93. | ExcelFIX Excel File Recovery 5.13 (cimaware.com) | ||
ExcelFIX recovers damaged and corrupt MS Excel files in all its versions including 95, 97, 2000, XP, and 2003, creating new trouble free files exactly as the original. ExcelFIX runs as a Windows 95/98/2000/NT/XP application. It extracts texts, numbers, formulas, formats, and images (and other embedded | |||
Updated: 2, 2006 | Rating: 57 | Author: David Cimadevilla | Size: 5149 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
94. | Evidence Destructor 2.14 (emailarms.com) | ||
When you are working on your computer performing the day to day activity like surfing the Internet, paying your bills online and logging into the websites with passwords, your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures you | |||
Updated: 2, 2006 | Rating: 0 | Author: emailarms emailarms | Size: 1177 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
95. | Event Log Watchdog 3.0 (keroonsoftware.com) | ||
Event Log Watchdog monitor's your Windows Event Logs and notifies you via Email or Syslog when a new event is logged. You can define which Event Logs you wish to monitor and what types of events you wish to receive Email notification of. One license per machine. Event Log Watchdog monitor's your Windows Event | |||
Updated: 2, 2006 | Rating: 0 | Author: Rob Rhodes | Size: 7224 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
96. | Easy File Protector 4.14 (softstack.com) | ||
Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
97. | DFIncBackup 1.22 (dfincbackup.com) | ||
DFIncBackup is the personal backup program for incremental backup files to zip archives. Features: * Incremental backup of files. It saves only changed files to make the backup file size smaller. * Can backup to removable disks (floppy, CDRW, ZIP, etc), local hard disk, network. * Internal packer | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrei Gueranitchev | Size: 1555 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
98. | Desktop Resetter 1.7.2 (nouturn.com) | ||
Calling all shortcut and icon junkies!!! .....do your icons tend to move with no help from you? Do you find it frustrating to always have to put them back? Want to do restore everything with a few clicks? Desktop Resetter to the rescue! Just hit "remember" for each resolution and with a click of a button | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Damato | Size: 809 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
99. | Dark Files 3.3.1.1 (mybestsoft.com) | ||
Dark Files can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 9.x/ME/NT/2000/XP . Dark Files can work with | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
100. | Cursor Hider 1.4.4 (softexe.com) | ||
Cursor Hider helps you to work more productively. It removes the mouse pointer (the mouse cursor does not cover the entered text) while you are working with the keyboard and returns the pointer with any mouse action. Real example: You are going to visit aweb site with forms to fill in. At first you type the | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Software > System Utilities > Other > New |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|