|
||||||
|
||
|
Home > Shared resources software |
Related keywords: resources, human resources, shared, Resources, shared mailbox, human resources software, Educational Resources, System Resources, GDI Resources, system resources |
|
|
1. | Internet Watcher 2000 1.9c (internetwatcher.com) | ||
the first frame of animated images. In addition to saving network resources, Internet Watcher makes pages easier to read and quicker to print. The Parental Protection enhances the peace of mind of parents, teachers, and business owners by filtering web pages and ensuring that only appropriate content | |||
Updated: 9, 2005 | Rating: 0 | Author: D. Bernard | Size: 1347 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
2. | NetServe Web Server 1.0.45 (starlots.com) | ||
Web Server is a super compact Web Server and File Sharing application for Windows NT, 95, 98, 2000, and XP. It's HTTP Web Server can serve all types of files including html, gif and jpeg, actually any files placed in your NetServe directory can be served. New key features include Server-Side-Include (SSI) support and CGI/1.1 support giving you the choice of your | |||
Updated: 2, 2006 | Rating: 19 | Author: James Jones | Size: 3182 kb | Demo Go to category: Servers > Web Servers Similar programs | |||
3. | Chilkat Compression ActiveX Control 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
4. | Chilkat Data Compression ActiveX 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
5. | Chilkat File Compression ActiveX 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
6. | Chilkat Zip ActiveX Compression Component 9.3.0 (chilkatsoft.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
7. | Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
8. | !Chilkat Zip ActiveX Control 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 16 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
9. | Chilkat Zip Compression .NET Class 9.3.0 (chilkatsoft.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
10. | Chilkat Zip Compression C++ Library 9.4.0 (chilkatsoft.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 82 | Author: Matt Fausey | Size: 7800 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
11. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
12. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
13. | Essential NetTools 4.0 (tamos.com) | ||
network tools for diagnosing networks and monitoring your computer's network connections. NetStat: displays the list of your computer's network connections, information on open TCP and UDP ports, IP address, and connection states. The program can map open ports to the owning application. NBScan: a powerful and fast NetBIOS scanner. This tool features parallel scanning, which | |||
Updated: 9, 2005 | Rating: 267 | Author: Andrew Riedel | Size: 3192 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
14. | RSSOwl | RSS & RDF Newsreader 0.72b (rssowl.sourceforge.net) | ||
save selected information in various formats for offline viewing and sharing, and much more. Why "Owl"? The owl is a traditional symbol of wisdom, and a quiet, efficient hunter. You'll find RSSOwl's "big eyes" a big help when scanning the Web's vast array of RSS resources. Top10 | |||
Updated: 9, 2005 | Rating: 0 | Author: Benjamin Pasero | Size: 3000 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
15. | @KeyLogger Home 2.10 (activity-tracker.com) | ||
dollars every year - this stealth-monitoring utility provides the PC's equivalent of the security camera (and much more), increasing productivity dramatically, while causing no disruption to working practices or draining network resources and keeping those phone bills down. @KeyLogger Home helps | |||
Updated: 8, 2004 | Rating: 48 | Author: Konstantin Romanovsky | Size: 959 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
16. | LAN Spider 2.1.0.17 (lanspider.com) | ||
Spider goes through your local area network to search the shared directories for certain files: documents, drawings, music & video files and many others. LAN Spider features include: Fast multi-thread search. LAN Spider is the fastest file searching utility: tests shows 300-500% increased performance over against all other utilities on the market. Archives support. LAN Spider unpacks | |||
Updated: 9, 2005 | Rating: 0 | Author: Maxim Nukin | Size: 985 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
17. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. Even when parents are outside of the home they can remotely monitor children's PC activity using this software. A security service could monitor employee's PC activity from any Internet host in the world to prevent industrial | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
18. | xSharez scanner 3.0 (tools-for.net) | ||
Scanner can do for you: - Audit B and C classes networks for the shared resources availability with different usernames and passwords. - Get an in-depth information about scanned computers, such as operating system, NetBIOS name, Workgroup, User name, Mac address. - Mount shared resources that are found by the program as network drives or simply browse them | |||
Updated: 9, 2005 | Rating: 2634 | Author: Vadim Markov | Size: 1087 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
19. | WinZip Compatible Compression ActiveX 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
20. | Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
21. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
22. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
23. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
24. | Change Folder Icons 5.6 (nesoft.org) | ||
Icon" from popup menu. You can search for icons in all types of resource files starting with the selected folder. Also you can: -select an icon from any type of resource files; -export all icons from resource files into .ico-files; -change an icon for a drive (HDD, FDD | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Lyapunov | Size: 904 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
25. | Change Folder Icons 6.0 (nesoft.org) | ||
You can search for icons with specified parameters in all types of resource files starting with the selected folder. Also you can: - select an icon from any type of resource files; - export all icons from resource files into .ico-files; - change an icon for a drive (HDD, FDD | |||
Updated: 9, 2005 | Rating: 105 | Author: Andrew Lyapunov | Size: 953 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
26. | Change Folder Icons 6.1 (nesoft.org) | ||
You can search for icons with specified parameters in all types of resource files starting with the selected folder. Also you can: - select an icon from any type of resource files; - export all icons from resource files into .ico-files; - change an icon for a drive (HDD, FDD | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Lyapunov | Size: 1092 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
27. | Change Folder Icons 7.5 (nesoft.org) | ||
Explorer; - make your own libraries from found icons. What's new in version 7.5. Now you can: - drag-and-drop groups of files and folders at once to the list of found icons; - manually write/edit/delete the "path for icons..." in "Settings" window; - make all necessary actions with found icons using right mouse click (2 new menu items are added: * Icon actions: actions for | |||
Updated: 9, 2005 | Rating: 107 | Author: Andrew Lyapunov | Size: 1653 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
28. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
29. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
30. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
31. | NetServe Web Server 1.0.45 (netxsolutions.co.uk) | ||
Web Server is a super compact Web Server and File Sharing application for Windows NT, 95, 98, 2000, and XP. It's HTTP Web Server can serve all types of files including html, gif and jpeg, actually any files placed in your NetServe directory can be served. New key features include Server-Side-Include (SSI) support and CGI/1.1 support giving you the choice of your | |||
Updated: 2, 2006 | Rating: 0 | Author: James Jones | Size: 3182 kb | Demo Go to category: Servers > Web Servers Similar programs | |||
|
Home > Shared resources software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|