|
||||||
|
||
|
Home > Estimates software |
|
|
91. | 12Ghosts ShutDown 7.10 (12ghosts.com) | ||
Shut down with one click or with one key stroke. Run maintenance programs, daily or at certain days of the week, for example scan disk and backup programs. Just one click, then leave your computer and it will power-off automatically after all programs finished. Initiate an "auto-logon as a different user" | |||
Updated: 9, 2005 | Rating: 147 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
92. | StrongDisk Pro 2.9 (strongdisk.de) | ||
StrongDisk creates protected disks inside your Windows system. With such disks you can work as with usual hard drive- The main difference is that all data written to the disk is encrypted "on fly", while the content of the protected disk is stored in common file with arbitrary name. In order to access | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
93. | Chilkat Zip Self-Extractor 8.1.0 (zip-compression.com) | ||
Create self-extracting ZIP files optionally with unbreakable AES encryption. The ChilkatZip Self-Extractor can safely encrypt the contents of your ZIP file with 128, 192, or 256-bit AES Encryption. To unzip, a user must provide the same password that was used when creating the self-extracting EXE. AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 300 kb | Freeware Go to category: Development > Other Similar programs | |||
94. | IntraMail 2003.01.20 (homepage.sunrise.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 0 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
95. | IT JPEG-Tester 1.25 (troegersoft.de) | ||
The program is able to find invalid jpegs, to remove unnecessary information out of the files and to find duplicate jpeg-files. The program IT JPEG-Tester is a tool to find invalid jpeg-files. The found files are listed in a box so that you can check if you really want to delete theese files. The program | |||
Updated: 9, 2005 | Rating: 0 | Author: Ingo Trцger | Size: 609 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
96. | DVD BACKUP XPRESS 2.6.0.0 (dvdbackupxpress.com) | ||
Make perfect-quality backup copies of all your DVD movies using your own dvd burner. Keep the same sound & video quality when you backup your DVD with all the special features, menus, subtitles, and languages included. Supports copy-protected DVDs, DVD-R, DVD-RW, DVD-R(W), DVD+R(W), DVD+R, DVD+RW, DVD-RAM | |||
Updated: 9, 2005 | Rating: 55 | Author: DVdbackup Xpress | Size: 5507 kb | Freeware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
97. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
98. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
99. | Registry Mechanic 3.0 (winguides.com) | ||
Registry Mechanic is an advanced registry cleaner for Windows that can safely clean and repair problems with your registry in a few simple mouse clicks! Easily fix problems with the Windows registry that are a common cause of crashes and errors. By using a registry cleaner regularly and fixing your registry | |||
Updated: 9, 2005 | Rating: 0 | Author: PC Tools | Size: 2369 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
100. | SecureWord 1.5 (cezeo.com) | ||
SecureWord was originally designed as the most convenient and fully functional program for storing important information such as logins, passwords and files. Taking into consideration that somewhat similar programs exist, let us explain you why you should choose SecureWord and in what ways we enhanced and | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Estimates software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|