|
||||||
|
||
|
Home > Mask software |
Related keywords: file mask, Mask Edit, depth mask, mask edits, mask based attack |
|
|
1. | 12Ghosts FileDate 7.10 (12ghosts.com) | ||
modified, and last accessed to single files or complete folders. Mask the time you really created a document, or hide the time you last accessed it. You can preserve date modified for a complete folder tree easily, for example after restoring files from a backup. Features a graphical user interface with an optimized date and time control. Command line support for automated software | |||
Updated: 9, 2005 | Rating: 763 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
2. | 1st Email Searcher 2.08 (softstack.com) | ||
a magic filter by selecting allowed dodomains, file types and masks, and the program will grab only those emails, which match the criteria of the filter. 1st Email Searcher helps you to search for email addresses in files and folders located on a PC or on the Internet, and place emails to text files. The program lets you find all emails you have on your PC, grab only those of them | |||
Updated: 2, 2006 | Rating: 99 | Author: IM Soft | Size: 615 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
3. | 32-bit RYSO EasyThumbs 1.01 (ryso.com) | ||
web pages. 6. Wizard can automatically rename images by a name mask (a batch renaming). 10. Supports many image formats. It also allows for converting and resizing images through use of advanced algorithms, which was earlier available only in full-fledged image editors. 11. After creating a Web gallery(or galleries) you can get back to the starting point by using "UNDO" feature | |||
Updated: 3, 2005 | Rating: 693 | Author: Leonid Ryso | Size: 536 kb | Shareware Go to category: Graphic Apps > Gallery & Cataloging Tools Similar programs | |||
4. | Able Graphic Manager 2.4.5 (graphicregion.com) | ||
convert and print). There is an opportunity to select files using mask (*). Image acquisition from TWAIN scanners with full control of the scanner capabilities. Image processing (Equalize, Contrast, RGB, HSV, HSL, FFT, convert to 24 bit, gray and B&W). Copy to clipboard and Crop functions. Effects (Negative, bump map, lens, wave, morph, user filters). Watermark drawing. Viewing | |||
Updated: 2, 2006 | Rating: 91 | Author: Graphic Region | Size: 2313 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
5. | Accent EXCEL Password Recovery 2.40 (passwordrecoverytools.com) | ||
three search methods: a brute-force attack, an attack by an enhanced mask, an enhanced dictionary-based attack. The enhanced mask allows you to specify the range of possible values individually for each position in the password that will be generated. The enhanced dictionary-based attack allows | |||
Updated: 2, 2006 | Rating: 1000 | Author: Denis Gladysh | Size: 734 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
6. | Accent OFFICE Password Recovery 2.40 (passwordrecoverytools.com) | ||
Ever thought: "If I were a hacker...?" No, I don't mean you'd rob banks via the Internet. Being a hacker, though, you'd never have to re-write an annual report just because of a lost password for an Office document. You'd never have to wait if your colleague forgot to send you the info needed to open an Excel | |||
Updated: 2, 2006 | Rating: 1940 | Author: Denis Gladysh | Size: 734 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
7. | Accent WORD Password Recovery 2.30 (passwordrecoverytools.com) | ||
known as attacks: a brute-force attack, an attack by an enhanced mask, and an enhanced dictionary-based attack. Accent WORD Password Recovery contains a complete set of features for making it easier and faster to break passwords. The enhanced mask provides a visual means for specifying possible values for each position in the password that will be generated, which reduces | |||
Updated: 9, 2005 | Rating: 1001 | Author: Denis Gladysh | Size: 616 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
8. | Account Safe 1.04 (aidsoft.com) | ||
retrives forgotten passwords from password fields which are masked with asterisks (*) or other special characters. Account Safe stores information for all your accounts in a secure encrypted archive. You only need to remember one password to have access to the information for all of your usernames and passwords. Also stores server information and up to 1024 | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Overton | Size: 861 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
9. | Ace IntraSearch 1.3 (ecrew.org) | ||
more detailed scan using a great amount of parameters: files regular mask, searching strings, file attributes, size and dates. With the big number of details you'll find every file you want in your network! The result of a search is displayed in a list. Each item can be opened for view, executed | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Chernyadyev | Size: 686 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
10. | Active Task Manager 1.61 (orionsoftlab.com) | ||
week or month. You can set a process priority and a CPU affinity mask for a task. Running as a Windows service, this software runs the scheduled tasks even on a logged off computer. The tray icon menu lets you start any task manually. Other applications can interact with ATM via ActiveX Automation | |||
Updated: 2, 2006 | Rating: 0 | Author: Andy Panichkin | Size: 790 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
|
Home > Mask software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|