|
||||||
|
||
|
Home > Network administration software |
Related keywords: network, Network, administration, network monitor, Administration, network monitoring, network management, remote administration, NETWORK, entertainment network |
|
|
51. | Excel Password 9.0.5351 (lastbit.com) | ||
Excel Password: recover ANY Excel password just within a few minutes regardless of the password length! Excel Password is a guaranteed password recovery tool, which comes in very handy if you forgot, lost, or misplaced your password for Excel documents. Such situation may also occur if someone who does not | |||
Updated: 3, 2006 | Rating: 685 | Author: Vitas Ramanchauskas | Size: 774 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
52. | fsMechanic 1.1 (freewebs.com) | ||
Server (FAT32). Recovered files can be saved on any (including network) disks visible by the host operating system. Allows save locked files (such as swap-file, Registry, $MFT, etc. ). Quick links to "My documents", "Shared documents", "My pictures", "My music". Recoverable files: That have been deleted bypassing Recycle Bin, or when Recycle Bin has been emptied | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexey Babenko | Size: 438 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
53. | NetSupport DNA 1.01 (aidsoft.com) | ||
large & small depend upon a collection of hardware and software networks, systems and databases to remain competitive and efficient.With such a high level of investment, it therefore follows that these IT assets must be properly managed and maintained to ensure both their availability and that they | |||
Updated: 9, 2005 | Rating: 0 | Author: Jenni Hilton | Size: 48828 kb | Demo Go to category: System Utilities > Other Similar programs | |||
54. | NeuroSolutions for MATLAB 2.00 (nd.com) | ||
NeuroSolutions for MATLAB neural network toolbox is a valuable addition to MATLAB's technical computing capabilities allowing users to leverage the power of NeuroSolutions (www.neurosolutions.com) inside MATLAB and Simulink. The toolbox features 15 neural models, 5 learning algorithms and a host of useful utilities integrated in an easy-to-use interface, which requires “next | |||
Updated: 2, 2006 | Rating: 832 | Author: NeuroDimension Incorporated | Size: 9833 kb | Demo Go to category: System Utilities > Other Similar programs | |||
55. | OfficePopup 2.12 (officepopup.com) | ||
sending messages to entire departments or individual users on your network. By default, OfficePopup allows your employees to send and receive messages. However, in case you would like to use OfficePopup to broadcast messages only, you can specify that during the installation. This way, you can be | |||
Updated: 9, 2005 | Rating: 42 | Author: Smart Software Development | Size: 1196 kb | Demo Go to category: System Utilities > Other Similar programs | |||
56. | Paragon CD-ROM Emulator Personal 3.0 (pad.paragon.ag) | ||
CD title. You can also use virtual CDs and virtual drives via the network Exceed performance of physical CD/DVD-ROM - the reading speed of a virtual drive is 200x. CD-ROM Emulator supports normal CD, DVD, and CD RAW subchannel reading methods, ignoring bad blocks, for emulation any CDs. In this | |||
Updated: 9, 2005 | Rating: 0 | Author: Konstantin Komarov | Size: 6285 kb | Demo Go to category: System Utilities > Other Similar programs | |||
57. | PEERNET File Conversion Center 2.6 (peernet.com) | ||
ZSoft DCX (*.dcx), Graphics Interchange Format (*.gif), and Portable Network Graphics (*.png) raster image files. You can also create non-searchable Adobe PDF (*.pdf) files with full encryption support. The File Conversion Center is a Microsoft Windows application that enables you to quickly and easily convert office documents, spreadsheets, web pages, PostScript files, and more into | |||
Updated: 9, 2005 | Rating: 0 | Author: PEERNET Support | Size: 9364 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
58. | PestPatrol 3.0 (safersite.com) | ||
biggest threats to your network security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
59. | Surf Spy 2.10 (bysoft.se) | ||
to a password protected encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are away. In the stealth mode, Surf Spy does not show up in the system tray, task bar | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
60. | TigerTerm 8.1e (tigerterm.com) | ||
with features yet simple to use. The high quality of TigerTerm's emulations together with its easy configuration and comprehensive user tools, make TigerTerm the ideal way for Windows users to connect to legacy and other host applications. TigerTerm provides accurate support for the following terminal types: VT420, VT320, VT220, VT100, VT52, SCO ANSI, Colour ANSI, Wyse 60 | |||
Updated: 9, 2005 | Rating: 42 | Author: Graeme Youngs | Size: 6260 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
|
Home > Network administration software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|