|
||||||
|
||
|
Home > Access levels software |
Related keywords: access, Access, access control, levels, ms access, remote access, microsoft access, MS Access, Microsoft Access, restrict access |
|
|
501. | Super Sexy Women ScreenSavers Vol. 7 7 (shareware4you.tripod.com) | ||
Super Sexy Women Screensaver Vol. 7 The evaluation version of this software is shows all images and workes 5 days. http://www.shareware4you.cc CONTENTS -------- Description System Requirements Configuring the Screen Saver How to Purchase Contacting SHAREWARE4YOU Uninstalling Super Sexy Model on your desktop! This screen saver contains 14 amazing images and 2 sounds All pictures in resolution 800*600 pix. and High Color (24-bit) | |||
Updated: 9, 2005 | Rating: 0 | Author: Chanatda Maneesiri | Size: 762 kb | Shareware Go to category: Desktop > Similar programs | |||
502. | Super Sexy Women ScreenSavers Vol. 8 8 (shareware4you.tripod.com) | ||
Super Sexy Women Screensaver Vol. 8 The evaluation version of this software is shows all images and workes 5 days. http://www.shareware4you.cc CONTENTS -------- Description System Requirements Configuring the Screen Saver How to Purchase Contacting SHAREWARE4YOU Uninstalling Super Sexy Model on your desktop! This screen saver contains 14 amazing images and 2 sounds All pictures in resolution 800*600 pix. and High Color (24-bit) | |||
Updated: 9, 2005 | Rating: 0 | Author: Chanatda Maneesiri | Size: 740 kb | Shareware Go to category: Desktop > Similar programs | |||
503. | 12Ghosts Shredder 7.10 (12ghosts.com) | ||
Overwrite files, drag and shred, DoD conform, Wipe Disk. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover files from your disk! Nobody will even find out the previous name or file size. The file can be overwritten | |||
Updated: 9, 2005 | Rating: 251 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
504. | 1st Files Privacy Tool 2.4 (privacywindows.com) | ||
Tool can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : 'Hidden', 'Read Only', 'Full Control'. It works with any Windows platforms : 9.x/ME/NT/2000/XP . 1st Files Privacy Tool | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Mihailov | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
505. | 1st Security Agent 6.14 (softheap.com) | ||
an administrative support for controlling which users are allowed to access your computer and the level of access each user may have. You can choose to restrict access to lots of Control Panel applet functions, including Display, Network, Passwords, Printers, System, Add/Remove | |||
Updated: 2, 2006 | Rating: 42 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
506. | 1st Security Agent Pro 6.14 (softheap.com) | ||
system security utility to secure Windows PC and restrict access to its key features. 1st Security Agent Pro offers an administrative support for controlling access to your PC and changing user access level. Password-protect and restrict access to Control Panel applet functions, including Display, Network, Passwords, Printers, System, Add/Remove | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
507. | 1st TurboRun 2.0 (turborun.com) | ||
all this unnecessary. One mouse click and website or document is accessed. This is how the program works. It sits in the system tray and when you need to access any document, URL or file, you simply start entering its name. You don't have to enter the entire name - only a small part. The program immediately shows files or URL bookmarks that match the name. If there are | |||
Updated: 9, 2005 | Rating: 0 | Author: Green Parrots Software | Size: 751 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
508. | Absolute Key Logger 2.5.283 (lastbit.com) | ||
or bad connection). In any of these or similar cases, you can access log file to restore text data you just typed. Absolute Key Logger employs unique algorithms that prevents losing text data even when unexpected critical system shutdowns happen. - find forgotten passwords and logins (just look through the log file to find what you need) - have full control of your computer | |||
Updated: 9, 2005 | Rating: 82 | Author: Vitas Ramanchauskas | Size: 613 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
509. | Access Administrator 4.14 (softheap.com) | ||
and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
510. | Access Administrator Pro 4.14 (getfreefile.com) | ||
Access Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
511. | Access Administrator Pro 4.14 (softheap.com) | ||
Access Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
512. | Access Lock 2.83 (softheap.com) | ||
Access Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
513. | Access Lock 2.83 (getfreefile.com) | ||
Access Lock is an easy-to-use system-tray security utility you can use to secure your desktop when you are away from your computer. Just configure the program, define a password and double click the Access Lock system-tray icon every time you need to disable and hide your desktop. While it is | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
514. | Active Kill Disk - Hard Drive Eraser 2.0 (killdisk.com) | ||
from any computer that can be started using a DOS floppy disk. Access to the drive's data is made on the physical level via the Basic Input-Output Subsystem (BIOS), bypassing the operating systems logical drive structure organization. Regardless of the operating system, file systems or type of machine, this utility can destroy all data on all storage devices. Thus it does | |||
Updated: 9, 2005 | Rating: 985 | Author: LSoft Technologies Inc. | Size: 252 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
515. | active Printer 1.5 (activePrinter.com) | ||
Active Printer is a small but mighty printer utility from Palick Soft. The idea behind this ingenious tool is brilliantly simple - after installation, Active Printer icon appears in your system tray and lets you choose your active printer (the printer you are about to use) with just one mouse click. No need | |||
Updated: 9, 2005 | Rating: 55 | Author: Yuri Alexandrov | Size: 436 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
516. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
of information theft crimes are conducted without having network access to target machine. Most of us prefer not to turn computer off while we are away for coffee or going to the lavatory or have to attend a meeting in a conference room next door. That is the point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at your | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
517. | Actual Window Rollup 3.8 (actualtools.com) | ||
Actual Window Rollup is the new and completely innovative way to resolve the problem of minimizing windows! Usually, we minimize windows to the task bar which is not very convenient; just imagine that you work with 7-8 applications simultaneously. What's the result? The task bar is so cluttered that it is | |||
Updated: 2, 2006 | Rating: 60 | Author: Michael Tretyakov | Size: 1677 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
518. | AcuteFinder 1.3 (hugmot.is) | ||
AcuteFinder is a handy shareware utility that finds duplicate files on your computer. You can then delete the extra copies or move them to an archive directory, saving a lot of disk space and reducing clutter. AcuteFinder does not only take into account items like file name, size or timestamp, but reads | |||
Updated: 2, 2006 | Rating: 149 | Author: Ingolfur Tryggvason | Size: 2504 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
519. | Advanced CATaloguer 2.3.50 (evgenysoft.com) | ||
using the size and date limits - all this without physically accessing the disks. When a file is located, you can view its properties, open it, or launch Windows Explorer to its parent folder. ACAT`s allow the all file management functions, enabling users to perform operations (move, copy, delete) on groups of certain files (for example, a user can find all documents, modified | |||
Updated: 9, 2005 | Rating: 28 | Author: Evgeny Software | Size: 1275 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
520. | Advanced Find and Replace 2.3 (abacre.com) | ||
Advanced Find and Replace is exactly what the name implies. It's fast, easy to use, and a great time-saver for programmers and Webmasters in particular. This powerful utility lets you perform text searches on your local computer as if you were using an Internet search engine. It features support for | |||
Updated: 9, 2005 | Rating: 235 | Author: Roman Vasin | Size: 836 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
521. | Advanced Font Viewer 2.61 (styopkin.com) | ||
The program's name itself shows what AFV can actually do. It is a specialized tool for fast searching for the best variant of font among the fonts you have. The easy-to-use interface allows beginners to quickly master the program, while the professionals will definitely enjoy everyday working with it. As | |||
Updated: 3, 2006 | Rating: 16 | Author: Alexander Styopkin | Size: 1026 kb | Shareware Go to category: Graphic Apps > Font Tools Similar programs | |||
522. | Advanced NT Security Explorer 2.0 (elcomsoft.com) | ||
program is very actual for NT/2000/XP workstations, where users can access a hard drive from other computer in the network and copy a SAM registry key, where password hashes are stored. Also, users can sniff a network and recover password hash from sniffer results. ANTExp will help you in your way to | |||
Updated: 9, 2005 | Rating: 475 | Author: Vladimir Katalov | Size: 1417 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
523. | Advanced Office XP Password Recovery Pro 2.42 (elcomsoft.com) | ||
applications (all versions up to Office 2002/XP): Word, Excel, Access (including user-level passwords and owner info), Project, Money, PowerPoint, Publisher, Visio, Backup, Schedule+, Mail. Can also reset MS Internet Explorer (3/4/5) Content Advisor password, and open password-protected VBA projects (created in any application) via the backdoor. Most passwords are being | |||
Updated: 9, 2005 | Rating: 1884 | Author: Vladimir Katalov | Size: 1958 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
524. | Advanced Office XP Password Recovery Std 2.42 (elcomsoft.com) | ||
applications (all versions up to Office 2002/XP): Word, Excel, Access (share-level passwords only), Money. Can also reset MS Internet Explorer (3/4/5) Content Advisor password. Most passwords are being recovered instantly: for MS Access; for MS Word/Excel 95 and older; for MS Word/Excel 97/2000/XP: password to save, document protection password, workbook and sheet | |||
Updated: 9, 2005 | Rating: 279 | Author: Vladimir Katalov | Size: 1888 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
525. | Advanced Security Administrator 10.14 (getfreefile.com) | ||
your computer and restrict access to Internet with Security Administrator. This nice password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
526. | Advanced Security Level 6.1 (softfolder.com) | ||
Security Level is the best computer security application for Windows-based computers. It gives you an excellent administrative support to control the user access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets including Display, Network, Passwords, Printers, System | |||
Updated: 2, 2006 | Rating: 16 | Author: SoftFolder Inc | Size: 1065 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
527. | Agent Password 1.8 (agentpassword.com) | ||
Agent Password is your trusted password informer. The program is intended for automatic saving of all logins and passwords entered. It can be used not only as password keeping software but as a password spy, too. The manufacturer is not responsible for any inappropriate use of the program. We simply | |||
Updated: 8, 2004 | Rating: 251 | Author: Pavel Mikhailov | Size: 902 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
528. | Aha Password and Info Manager 7.03.01 (fronture.com) | ||
the information securely in your computer or our network server and access it from anywhere on the glove. Instead of typing or inconvenient copy-and-paste, you can just press hot key (Ctrl+1 for ID, Ctrl+2 for Password, Ctrl+3 through Ctrl+9 for your other data) or drag-and-drop. When you work with several windows at the same time, as you switch from a window to another, for example | |||
Updated: 9, 2005 | Rating: 0 | Author: Edward Kang | Size: 281 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
529. | AllWebMenus NetObjects Fusion component 1.0 (likno.com) | ||
for the perfect integration for creating web menus of infinite levels in fusion. The component allows for the creation and placement of any cross-browser DHTML / Javascript menu created with AllWebMenus in the easiest and visual way so that the menus can be created in minutes with no programming required. The popup menus are fully functional in DHTML enabled browsers and are highly | |||
Updated: 9, 2005 | Rating: 42 | Author: Likno Software | Size: 269 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
530. | AlmerBackup 4.8 (almersoft.com) | ||
If you ever lost your data, there is no need to persuade you that having reliable backup software is an absolute necessity. Backup software not only protects your data, but also keeps old versions of your files and makes finding documents easy. AlmerBackup is regarded by the industry experts as one of the | |||
Updated: 2, 2006 | Rating: 86 | Author: Max Fadeev | Size: 1477 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
531. | AMI Font Wrangler 2.0d (mindworkshop.com) | ||
AMI Font Wrangler is the TrueType font manager that makes it easy to batch install, remove, rename, and copy fonts. You can quickly browse and weed installed and downloaded fonts, print a contact sheet, and resolve typeface name conflicts. If you install fonts in Windows, you will find that keeping track of | |||
Updated: 9, 2005 | Rating: 0 | Author: Alchemy Mindworks | Size: 1973 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
532. | Audio Caller ID 1.5 (beiley.com) | ||
Audio Caller ID keeps you in control of all your incoming phone calls. Audio Caller ID is very easy to use. It will announce a caller's name over your computer speakers, email you when specified calls are received, and even block calls you choose. Audio Caller ID uses the latest text to speech engines, so speakers, email you when specified calls are received, block calls you choose, publish your call log to the web, and dial the phone for you | |||
Updated: 9, 2005 | Rating: 124 | Author: Mark Beiley | Size: 310 kb | Shareware Go to category: Communications > Telephony Similar programs | |||
533. | Automatic Wallpaper Changer 2.3.5 (homepage.ntlworld.com) | ||
for the best possible reults. After resizing you can apply various levels of sharpening to further improve image quality. You can further refine the list of files to display by filtering on file date or age and by file name. For example all files whose name begins 'XMAS' which you've created in the | |||
Updated: 9, 2005 | Rating: 444 | Author: Steve Murphy | Size: 2747 kb | Freeware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
534. | ABCSpell for Outlook Express 7.1.3.2 (spellchecker.com) | ||
- a Spelling option in your Tools menu - a Thesaurus so you can access synonyms, antonyms and related words - an Online Merriam-Webster Word Lookup Easy to Use ABCSpell for Outlook Express plugs right into your application, so it works invisibly -- like part of the program! There's nothing to learn -- you just check spelling by clicking the Spelling button in the Outlook Express | |||
Updated: 2, 2006 | Rating: 39 | Author: Isota | Size: 4710 kb | Demo Go to category: Communications > Other E-Mail Tools Similar programs | |||
535. | Back2Life 2.32 (GrandUtils.com) | ||
for Windows. Looking similar to Windows Explorer, it provides access to erased files and folders that are beyond the reach of the Recycle Bin. No special skills are needed - treat erased files and folders just like normal ones. Back2Life supports: - Recovery of files on normal and reformatted drives - Operating systems: MS Windows 95/98/Me and NT/2000/XP - Disk types: local | |||
Updated: 9, 2005 | Rating: 606 | Author: Alex Mokrov | Size: 253 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
536. | Back4Win 5.0.0.2 (back4win.com) | ||
This backup utility is reliable, and easy to use. Powerful arrangement of backup size - spanning disks, predefined disk size to suit CDR CDRW media etc. Can restore from a disk which has lost the directory reference (most ZIP programs cannot do this). Does not have 4Gb and 65535 file limit of other ZIP backup | |||
Updated: 9, 2005 | Rating: 251 | Author: Alistair George | Size: 1778 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
537. | Back4WinXP 5040 (back4win.com) | ||
Burn backup discs to CD-R and CD-RW with this full-featured utility. Featuring: Basic and Expert modes. Restore from damaged backups, or even spanned backups with missing or damaged disks (directory disk is not needed). Stealth mode which automatically saves files as they are changed, keeping each version | |||
Updated: 9, 2005 | Rating: 86 | Author: Alistair George | Size: 1246 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
538. | BackUp32 2.0 (soft-one.com) | ||
after archiving, mirroring directories over the network, different levels of logging, support for plugin modules to extend functionality, support for different configurations and configuration groups, configurations execution once in N days, OS commands execution before and after archiving, support | |||
Updated: 9, 2005 | Rating: 0 | Author: Vsevolod Vasilyev | Size: 2663 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
539. | BackUpTime 1.4 (backuptime.com) | ||
We have created BackUpTime just for that reason – to provide you with a way to securely store your most important data. Hey, if you work around computers, you know how often surprises happen. And even when computer works fine, well, then our memory can fail us. Can you easily remember where you placed some | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 706 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
540. | BitZipper 4.1 SR-1 (bitzipper.com) | ||
Z, ZIP and ZOO files; no third-party products are needed. You can access almost every compressed file with just this one tool. No need for additional software applications; no wasted expense. Another one of BitZipper's strengths is that it comes with four user interfaces, to provide solutions for new and power users: A very friendly Wizard interface for new users, a Windows | |||
Updated: 9, 2005 | Rating: 124 | Author: Brian Rasmusson | Size: 2714 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
541. | BlazingTools Perfect Keylogger 1.6.1.0 (blazingtools.com) | ||
Perfect Keylogger is a remote surveillance tool made specially for beginners. With this key logger you can receive keystrokes, chats, websites, screenshots and passwords from any PC by email or FTP. Remote surveillance with Perfect Keylogger - as easy as never before! Some applications of the keylogger | |||
Updated: 2, 2006 | Rating: 1445 | Author: BlazingTools Software | Size: 540 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
542. | BoostXP 2.00 (systweak.com) | ||
a start-up manager and more. The program gives you instant access to hidden Windows XP settings. For example, you can make the Windows taskbar transparent, tweak several types of desktop settings, customize the Start menu, and enable several hidden performance options that are otherwise difficult to find and change. It is a utility suite, that lets you tweak many Windows | |||
Updated: 9, 2005 | Rating: 0 | Author: Shrishail Rana | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
543. | Burn to the Brim 2.0 (members.ams.chello.nl) | ||
(without missing anything). Folders can be split up to a set level for more versatile splitting options. The first priority of the program is to fill the media as well as possible, second is to minimize the number of items (so the larger, harder to fit items have preference and more items to choose from are left for the next burn). Users can define their own custom disk | |||
Updated: 3, 2005 | Rating: 0 | Author: Elwin Oost | Size: 316 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
544. | Captain Mnemo Pro 1.4 (captainmnemo.com) | ||
Computers play significant role in our everyday life. We rely on tireless machines in almost every aspect of our business and private life. Everything from important corporate budget planning to vacation photos comes digital. And as we enjoy this new electronic world we sometimes seem to forget how many | |||
Updated: 8, 2004 | Rating: 116 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
545. | Cartagio Pro 1.0.3.86 (missiontrek.com) | ||
aside the distracting features of the web (saving them for later access if you wish), and concentrate on the task at hand. All the while, everywhere you go is organized in association with your goal, you sign post along the way for later access by yourself or those who'll follow in your footsteps. Cartagio helps you focus, organize and record your thoughts, and share your | |||
Updated: 9, 2005 | Rating: 42 | Author: John Moetteli | Size: 4532 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
546. | CCM Wizard 3.1 (dntsoft.com) | ||
fast access to your favorite commands from the right-click menu. CCM Wizard provides fast access to your favorite commands from right-click menu. It allows you to customize the available right click options in the context menu of files, folders or desktop. You can choose from 25 predefined commands or easily create your own. Creating custom menus is simple, just use the drag | |||
Updated: 9, 2005 | Rating: 22 | Author: Nicolae Tatomir | Size: 640 kb | Shareware Go to category: Desktop > Other Similar programs | |||
547. | CD Finder 2.0 2.0 (members.iweb.net.au) | ||
Have you ever wanted a simple way of searching through all your CD-ROM's? If you regularly backup files onto blank CDROM's or burn numerous MP3CD's you will understand where I am coming from. CD Finder 2.0 can quickly and easily search through all of your CDROM's for a specific file or folder in a matter of | |||
Updated: 8, 2004 | Rating: 0 | Author: Adam Lyttle | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
548. | Changes Saver 2.0 (enins.com) | ||
A user can view and use any previous file version at any moment. Access to versions through | |||
Updated: 9, 2005 | Rating: 0 | Author: Nikolay Enin | Size: 1330 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
549. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
of chat partners you may create or edit. Every chat partner can be accessed in micro-seconds using alphabet index buttons or by a powerful built-in search engine which allows you to search through key personal details just as quickly. Stop writing down on paper your secret information and stop relying | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
550. | Clipboard Express 3.2.7 (cheqsoft.com) | ||
to any web addresses stored. Sits in your system tray for easy access. Full System Tray Iconic left and right click functioning Displays the clipboard's contents for easy reference. Counts characters in the clipboard memory automatically - just click the form and it does the rest! Use Clipboard Express Pro as temporary or permanent storage. Includes 150 storage locations. Each | |||
Updated: 9, 2005 | Rating: 0 | Author: David Hingston | Size: 3845 kb Go to category: System Utilities > Clipboard Tools Similar programs | |||
551. | Complete Cleanup 4.83 (softdd.com) | ||
As you browse the internet many websites store information about your browsing habits on your computer. Every webpage you browse is also stored on your machine, and this can allow anyone who shares your computer with you to snoop and view what type of websites you have been visiting. Complete Cleanup displays | |||
Updated: 2, 2006 | Rating: 42 | Author: SoftDD Software | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
552. | Innovatools ComputerWatermark 1.5 (computerwatermark.com) | ||
With Innovatools ComputerWatermak you get a real chance to recover your computer in case it gets stolen, or make sure you have a proof in any dispute over the ownership of your computer or disk(s). Innovatools ComputerWatermark writes your name and address (or any other information you want) on the entire | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Dominic | Size: 1119 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
553. | Cool Find 1.14 (coolfilesearch.com) | ||
date and time term search including date and time of creating file, accessing file and modifying file. - New search in search results is supported. - Cool Find can show summary info of mp3 files, PDF files and office files . - Support thumbnail view of image files - Support Drag, Drop and Copy of files, including those in compressed file. You can extract files from compress | |||
Updated: 2, 2006 | Rating: 0 | Author: Cui Ying Jie | Size: 1528 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
554. | Cresotech Easystart 2.0 (cresotech.com) | ||
with indication of the general time of its use, frequency of its access and other details. Its powerful context search engine allows you to locate any program, form the list of programs and service files on your computer, sort them by name, time of work, last access time or launch number - just | |||
Updated: 9, 2005 | Rating: 0 | Author: Cresotech, Inc. | Size: 1508 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
555. | Dark Files 3.3.1.1 (mybestsoft.com) | ||
can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 9.x/ME/NT/2000/XP . Dark Files can work with Network folders and fully supports protection of removable media (such as floppies, CD | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
556. | DCPP 2.7 (securstar.com) | ||
a powerful and proven encryption algorithm (AES-256) at the sector level, ensuring that only authorized users may access it. The encryption algorithm used by DCPP is a trusted, validated algorithm chosen by the National Institute of Standards and Technology (NIST) and slated to be the cryptographic standard for years to come. AES-256 is a FIPS-approved symmetric encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 5411 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
557. | Personal Desktop Spy 2.10 (spyarsenal.com) | ||
or in the industry standard JPEG format with custom compression level). This tiny and smart spy software can be used at home to control what the members of your family do on the PC when you are not watching. It is also a great employee monitoring and surveillance tool that can help you prevent the misuse of corporate resources and other, more serious, incidents. The program loads on | |||
Updated: 9, 2005 | Rating: 0 | Author: Mikhail Kalinskiy | Size: 615 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
558. | DeviceLock 5.73 (ntutility.com) | ||
gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
559. | DocCommander 1.20.10 (utilityplanet.com) | ||
InternetExplorer); SuperRecent technology stores links to recently accessed documents. You can easily pick up a file you've been using a week or month ago! One-click access to system Favorites folder. All your bookmarks and links are easily accessible there; Available in four European languages; Works with all versions of Windows including Windows XP! DocCommander replaces | |||
Updated: 9, 2005 | Rating: 0 | Author: Denis Sheverdyaev | Size: 896 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
560. | DriveCryptPlusPack 1.0c (securstar.de) | ||
a powerful and proven encryption algorithm(AES-256) at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a FIPS-approved symmetric encryption algorithm that may be | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 2779 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
561. | DVD and CD Cover Print 3.3.0 (northcardinal.com) | ||
to be placed anywhere on any panel with user defined opacity level. * Ability to put formatted text on spine in multiple image templates. * Support for European number formats (ie: 1,000.00) when defining template sizes/printer margins. DVD and CD Cover Print allows you to print your CD and DVD cover art easily and accurately. This software tool allows the user to load CD | |||
Updated: 9, 2005 | Rating: 163 | Author: North Cardinal Software | Size: 5633 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
562. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to your hard disk, you may actually give him access to the information that the disk used to contain. Backup copies of your financial records or business plans, your private files and e-mail messages, and all your other sensitive documents can easily fall into the wrong hands. East-Tec FormatSecure 2005, in | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
563. | EditExt 5.5b (alcodasoftware.com) | ||
Spell Check as you type, AutoCorrect as you type and easily access the Thesaurus and Definitions Dictionary. ActiveSpell underlines misspelled words as you type. EditExt can also be used as a Notepad replacement and more. New: Dictionary Update Wizard automates downloading and installing additional spelling dictionaries. Some of the benefits of EditExt include: Syntax | |||
Updated: 2, 2006 | Rating: 0 | Author: Ken Hale | Size: 11682 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
564. | Find Protected 2.0 (aks-labs.com) | ||
and rar. 2) Microsoft Office documents, including Word, Excel and Access files. 3) Secure file stores, such as PGP disk. Use Find Protected to inspect local or remote computers for password protected files. After selecting the types of protected files that you want to find and the location to | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
565. | EZ Password Secure 1.2 (esmarttools.com) | ||
Key features: Encrypted database. The encrypted database can be accessed only with the entry password you set. Others have no possibility to access the encrypted database without the entry password. One-Click fast launch. Launch an associated URL directly from EZ Password Secure | |||
Updated: 9, 2005 | Rating: 0 | Author: Yunqing Feng | Size: 628 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
566. | f2xml 1.0 (boulderwall.com) | ||
of all files stored on CD's, or floppy disks such that they can be accessed without re-loading the media (eg for large music collections archived to CD). For example, when you write a new CD, run f2xml against the CD to list the contents as a web page. Save that to a 'CD' folder so that you can | |||
Updated: 9, 2005 | Rating: 86 | Author: David Metcalfe | Size: 600 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
567. | FarBurned Plugin 1.2 beta (littleartefacts.com) | ||
as though it is usual file panel. FarBurned Plugin uses ASPI to access CD drives. Key features: - ISO 9660, Joliet and DOS-compatible images - Mode 1 and Mode 2 form 1 tracks - buffer underrun protection - test write - multisession support - no temporary files is created to burn CD-R and CD-RW discs - export single-session images to .iso files | |||
Updated: 8, 2004 | Rating: 0 | Author: Vasily Mishagin | Size: 46 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
568. | FastOpen XP 3.0 (piquest.com) | ||
XP offers a quick and simple solution for accessing your important files,folders and web links. FastOpen XP has many features to help you manage a menu of files, folders and web address, and can display an unlimited number of menu items. The menu is available from an icon in the tray bar area or from button next to the Start menu. Here are some of the most popular features of | |||
Updated: 9, 2005 | Rating: 0 | Author: Omer Paran | Size: 1700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
569. | File & Folder Protector 2.33 (softheap.com) | ||
password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access to the file or folder | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
570. | File Finder 1.0 (atensoftware.com) | ||
Once the file is found, the user can open it by double-clicking, or access other functions from a context-menu by right-clicking. File Finder is especially useful when you don't know the exact name of the file you want. A search is performed on each keystroke, so you can perform searches as fast as you can type. File Finder provides a highly efficient interface for quickly locating | |||
Updated: 9, 2005 | Rating: 0 | Author: Shailesh Humbad | Size: 74 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
571. | File-Ex 3.0 (file-ex.com) | ||
File Open and Save-As Dialog Extensions for Windows 95/98/NT/XP/2000. Enlarges the dialog, adds recent and favorite files/folders lists, set sorting and view defaults, file management functions, advanced Find function, and more. Adds file management functions like Find, Copy, Delete, Rename, and MakeDir to | |||
Updated: 9, 2005 | Rating: 0 | Author: Stan Spielbusch | Size: 441 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
572. | FileBox eXtender 1.91.01 (hyperionics.com) | ||
with FileBox eXtender buttons placed on standard Windows file boxes. Access your favorite and recently visited folders and documents with one mouse click or hot key. Make the file boxes bigger to see more folders and files. Optionally FileBX buttons can be also placed on Explorer windows or | |||
Updated: 2, 2006 | Rating: 0 | Author: Greg Kochaniak | Size: 631 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
573. | FileMonkey 10.22 (monkeyjob.com) | ||
start or end of file contents. Encrypt and decrypt files. Edit last accessed, created and modified date and time stamps. Increase or decrease date and time stamps. Extract text from within files. Trim (truncate) file and folder names and file contents. Wipe free space and erase files. Filter, sort | |||
Updated: 2, 2006 | Rating: 61 | Author: monkey job | Size: 2098 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
574. | FileWrangler 5.30 (cursorarts.net) | ||
folders and drives from file manager users, as well as to prevent access to various file management functions; - Wipe, normal delete, and recycle file deletion options; - Encrypt and decrypt files (trial version uses methods allowed under U.S. export regulations); - Preview file contents using the integrated viewer; - On-board editors: text, paint, html; - Backup and Restore | |||
Updated: 9, 2005 | Rating: 16 | Author: CursorArts Company | Size: 2893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
575. | Find In Context 2.00 (inetprivacy.com) | ||
The fast and flexible proximity search algorithm and the file access engine of the program are specifically optimized for typical real-world search scenarios, where you modify the keywords and search the same collection of files again to get better results. You can search the files located in any folder on the hard drive of your Windows computer (or other computers connected to | |||
Updated: 9, 2005 | Rating: 0 | Author: iNetPrivacy Software | Size: 343 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
576. | Finders Keepers 2.02.2 (yadudigital.com) | ||
text safely across multiple files and folders. Choose from 4 levels of confirmation, including word by word. Changed files are backed up automatically. You can replace by regular expressions. You can use a password to disable replace functions for risky users, such as kids or new users. Index selected files or your entire hard drive to find a word with split-second text | |||
Updated: 9, 2005 | Rating: 0 | Author: Yadu Digital Inc. | Size: 2275 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
577. | FolderAccess 2.0 (lockfolder.net) | ||
and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
578. | GreatCrypt 2.0 (miraxus.com) | ||
available on the market today. GreatCrypt provides the highest level of security, and yet it is very easy to learn and use. It incorporates three components, which provide the absolute data protect and make the work to be pleasant: powerful and easy-to-use interface, high performance and strong encryption algorithm. The software allows you keep your private data in unbreakable | |||
Updated: 9, 2005 | Rating: 124 | Author: Bagrat Mirakian | Size: 638 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
579. | Hide Files 3.4 (hide-files.biz) | ||
Once files or folders are hidden, it is impossible to find them, or access and remove any file. Unhiding files or folders is as easy as hiding them - just one mouse click and they are visible and accessible to you again. If program folder or whole disks are hidden, itself program or Windows will | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
580. | Hide Files & Folders 2.4 (softstack.com) | ||
password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access to the file or folder | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
581. | HS CleanDisk Pro 5.00 (haysoft.com) | ||
* Shows graphical pie chart representation of folder usage and accessing all subfolders information via mouse click. * Shows free memory space above taskbar in specified intervals. FREE * Auto - update feature * Evaluate 15 days free. If it satisfies your needs, you should register REFERENCES * It has reached 90.000 downloads in CNET Download.com and 20.000 downloads in | |||
Updated: 8, 2004 | Rating: 42 | Author: Cenker Sisman | Size: 1207 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
582. | Identity Knight 1.3 (fspro.net) | ||
Holes in Internet Explorer software allowing 3rd party programs access to your private data surely help this number grow. So, is there a way to prevent identity theft? Yes! There is! Introducing Identity Knight: the unique credentials protection software that makes sure that no data from the IE AutoComplete list is left unprotected! Identity Knight scans the IE AutoComplete data | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
583. | Idex 3.10 (idexworld.com) | ||
Put them into a database and add Keywords, text searches and a three level hierarchical search to make them easy to locate in future. Idex builds thumbnail images automatically, and you can even add weblinks to each item. Then use the Idex plug-ins Pagebuilder and Webpublisher to publish your Idex | |||
Updated: 3, 2005 | Rating: 0 | Author: Martyn Tidd | Size: 21208 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
584. | IP Mailer 2004d (wappu.tv) | ||
and office/home so that you can find your computer for remote access regardless of the constantly changing IP address. If you use your computer remotely or need to have other people access some server functionality on your PC you can let them know what your IP address is automatically when it changes. IP Mailer can also optionally send you a daily email with the IP | |||
Updated: 9, 2005 | Rating: 151 | Size: 1600 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
585. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks every packet that comes in or out of your computer. Using configuration sets for Security Policy you | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
586. | Junk-Out for Outlook 2003/2002/2000 1.0 (theofficemaven.com) | ||
Junk-Out keeps junk mail out of your Microsoft Outlook Inbox, using a combination of statistical methods (Bayesian filtering) and information you provide, to show only e-mail messages you want to see. The more you use Junk-Out, the better it gets at distinguishing useful e-mail, and getting junk out of your | |||
Updated: 2, 2006 | Rating: 0 | Author: Mike Craven | Size: 10536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
587. | KbStart 1.7 (KbStart.com) | ||
provides lightning fast keyboard access to numerous resources by just by entering short abbreviations. These resources include the Windows Start Menu, Outlook Address Book, Web Favorites, Control Panels, and others. The abbreviations can match any character in the items name. For example you can type OEX to launch Outlook Express. KbStart uses a very powerful, adaptive | |||
Updated: 9, 2005 | Rating: 0 | Author: Brian Rice | Size: 1769 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
588. | KeyIt! 2.0 (keyit.com) | ||
tasks. For exmple, with our InternetStuff module, you have instant access to ten search engines, an encyclopedia, dictionary, thesaurus, auction search, or a stock quote, all simply by typing 'wwww'. With our EmailThings module, you can insert cool images into your e-mail and documents simply by typing 'myimages'. And best of all, the additional modules are free | |||
Updated: 9, 2005 | Rating: 0 | Author: Kevin O'Donnell | Size: 2574 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
589. | Knowledge Store 1.0.0 (kc7jho.com) | ||
we have decided to leave every part of your data intact in a simple access database enabling you to access the data you find so important. As you can see there is nothing standing in the way of taking The Knowledge Store out for a spin, support is available via E-Mail and ICQ with a rapid response time. The E-Mail address is [email protected] the IQC # is 3044899 user name | |||
Updated: 9, 2005 | Rating: 0 | Author: Nathan Johnson | Size: 10506 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
590. | LAN Find 3.1 (ihsoftware.net) | ||
to the specified criteria (name, type, size, date: created, accessed, modified). - Search selected networks, domains, groups, folders. - Save, sort, delete, unique your search results. You may use LAN Find for the following: - Create mp3 list of your LAN! - Create a list of recently added movies/clips! - Find useful documents you have missed! - Find software installs in | |||
Updated: 9, 2005 | Rating: 1263 | Author: Dmitry Veshkovich | Size: 927 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
591. | LAN Search Pro 7.0 (softperfect.com) | ||
includes the ability to search hidden network resources, restricted access resources, IP subnets, LAN FTP servers and much more. It comes with a built-in password manager to store your network logins for resources with restricted access. Besides the file searching capabilities, LAN Search Pro | |||
Updated: 9, 2005 | Rating: 48 | Size: 1080 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
592. | LanHunter 1.50 (waterfallsoft.com) | ||
files using wildcards. -Ability to search resources with limited access. -Ability to search individual computers or the whole network. -Ability to search through hidden network resources. -Flexible search settings (search for files by date, size and so on). -Ability to export search results | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Vdovin | Size: 1017 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
593. | LaptopLocate.net 2.9.2 (tometasoftware.com) | ||
Tometa LaptopLocate.net is a software utility that will monitor a computer's IP address to allow server administrators and general users to locate their computer. Using cutting edge technology, each time a computer that has LaptopLocate.net is turned on, the IP address of the computer is transmitted to a | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 4839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
594. | Lock Folder 5.0 (realclicks.com) | ||
and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
595. | PC LockUp 2.185 (getfreefile.com) | ||
time schedule and duration can be defined for each user to restrict access to your PC in definite hours. PC LockUp also supports monitor power save options and has some additional useful features like built-in password protected screen saver and network user validation feature for Windows logon to increase your security. You will find the program interface very easy to negotiate | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
596. | Locked! 4.7.8 (jcmatt.com) | ||
powered off or on, Locked! securely protects your computer against access by others. It's proprietary multi-level structure integrates deeply within the Windows architecture, working with and controlling access until you unlock it with a password. Entries from the keyboard and mouse are | |||
Updated: 2, 2006 | Rating: 0 | Author: James Matt | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
597. | Maverick Launch Centre 2.1.004 (skaro.net) | ||
and flexible launcher that can be configured to provide quick access to your documents, applications and games, etc. It combines ease of use with a myriad of features and utilities including a sophisticated alarm clock, a hex file viewer, an advanced font viewer, a file wiper (to irrevocably destroy files), a file toucher (to change dates), a file/disk profiler (to analyse disk | |||
Updated: 2, 2006 | Rating: 0 | Author: James Turner | Size: 1569 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
598. | ArchiDoc (3035) (canteco.net) | ||
gives any size enterprise the ability to quickly find, share and access all document types both scanned in paper and electronic files, from one easy screen. Sofisticated Security; Easy-to-install;Version Control;Team work;Office integration;Multy Language interface;Auditing and reporting. As well as | |||
Updated: 9, 2005 | Rating: 42 | Author: Aleks Kamyshan | Size: 3991 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
599. | Alloy 4.3.21.2005c (pgware.com) | ||
will then extract the files to the predefined directories for easy access to the main executable. Extracting is fast and efficient even when decompressing files. Most extraction can be handled in milliseconds with files as large as 9 Mb. The extraction of files is invisible to the user and allows the | |||
Updated: 3, 2006 | Rating: 191 | Author: PGWARE LLC | Size: 1403 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
600. | Laser Squad Nemesis 3.09 (lasersquadnemesis.com) | ||
with over 100 maps to choose from. Laser Squad Nemesis is a squad level, futuristic war game with each player controlling between 10 and 30 individual units. The unique game system is a hybrid of turn based and real time genres, allowing players fine control and the ability to review games with video style playback. Each turn consists of 10 seconds of real time action, for which | |||
Updated: 2, 2006 | Rating: 42 | Author: Nick Gollop | Size: 6124 kb | Shareware Go to category: Games & Entertainment > Strategy & War Games Similar programs | |||
|
Home > Access levels software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|