|
||||||
|
||
|
Home > Messenger software |
Related keywords: instant messenger, MSN Messenger, lan messenger, windows messenger, LAN messenger, Instant messenger, Instant Messenger, AOL Instant Messenger, LAN Messenger, ct messenger |
|
|
311. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
312. | Dupli Find 4.0 (rlvision.com) | ||
Dupli Find locates duplicate lines in textfiles, Excel spreadsheets and Word documents. Found duplicates are reported and can be easily removed from the file. Custom scripts can be used to narrow down the search for better results. Dupli Find can also be used as a general text utility that provides many | |||
Updated: 2, 2006 | Rating: 48 | Author: RL Vision | Size: 807 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
313. | DriveSitter 1.4 (otwesten.de) | ||
diagnostic and background monitoring tool. Based on the well proven S.M.A.R.T. (Self Monitoring Analysis and Reporting Technology), it constantly analyzes up to 30 health aspects per HDD and optionally displays its temperature in the system tray. DriveSitter reliably detects and forecasts up to 70% of all sudden HDD crashes before they occur: You will be alerted of unhealthy | |||
Updated: 2, 2006 | Rating: 16 | Author: Oliver Marr | Size: 1095 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
314. | DMUSB 2.8.0 (flenik.com) | ||
offers some remote administration features, such as viewing a client's screen or executing commands on it. You may also run external programs and - in the case of console applications - redirect their output back to the local machine. DMUSB suits all networking environments, offering 365/7/24 data | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Cassos | Size: 3709 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
315. | DeviceLock 5.73 (ntutility.com) | ||
administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
316. | DeviceLock 5.73 (protect-me.com) | ||
administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices | |||
Updated: 2, 2006 | Rating: 0 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
317. | DeepBurner 1.7 (deepburner.com) | ||
DeepBurner is an advanced and extremely powerful CD and DVD burning package that comes absolutely for FREE. It removes the hassle of making CDs, DVDs, and autoruns. It even makes it easy for you to create and print your own labels and booklets. DeepBurner supports a very wide range of internal and external | |||
Updated: 2, 2006 | Rating: 46 | Author: Maxim Afanasjev | Size: 2671 kb | Freeware Go to category: Audio & Multimedia > CD Burners Similar programs | |||
318. | CryptIt 1.301 (SinnerComputing.com) | ||
Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
319. | Cool Info FX 5.0 (tometasoftware.com) | ||
its detail, Network Administrators love it for the automation, CEO's love it for the price. Tometa Software, www.tometasoftware.com The Best System Information, Spy, Analysis, Auditing and Inventory Utility. Easy exporting to database and other formats including SQL & XML. Computers can use a central database to have a central network inventory of all systems on the | |||
Updated: 2, 2006 | Rating: 16 | Author: Luke Richey | Size: 12954 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
320. | Cool Info FX 5.0 (tometasoftware.com) | ||
its detail, Network Administrators love it for the automation, CEO's love it for the price. Tometa Software, www.tometasoftware.com The Best System Information, Spy, Analysis, Auditing and Inventory Utility. Easy exporting to database and other formats including SQL & XML. Computers can use a central database to have a central network inventory of all systems on the | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 12954 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Messenger software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|