|
||||||
|
||
|
Home > Keyboarding software |
Related keywords: Keyboarding Skills, keyboarding programs |
|
|
161. | Children's Desktop and Browser 1.04 (childrensdesktop.com) | ||
your Child and your computer ChildSoft's "Safe Desktop Technology" protects your computer from wandering mouse clicks and stray key presses. ChildSoft's Children's Browser gives you complete control over your child's use of the Internet. You choose what your child sees and does. Children's Desktop & Browser are now | |||
Updated: 3, 2005 | Rating: 60 | Author: Chris Runyan | Size: 4100 kb | Demo Go to category: Home & Hobby > Other Similar programs | |||
162. | DexTrauma 1.0 (traumaware.com) | ||
You can setup the controls to your preference as well, using the keyboard or a joystick. Unlike other games that use a cube, DexTrauma uses six cones. This means that instead of only being able to view 3 sides of a cube at a time, you can see all six of the cones at once, resulting in advanced thinking and game play. Think your fast? How good is your hand-eye coordination? If | |||
Updated: 3, 2005 | Rating: 0 | Author: Jason Fullmer | Size: 3165 kb | Demo Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
163. | Cetus War 1.1 (novelgames.com) | ||
If you don't have a joystick, don't worry, you can also use the keyboard to play this game. There are a total of 6 stages. You can try the first one and a half stages for free in the trial version. The aim of this game is to control Whalie to shoot the enemies. When the enemies are shot, items may appear and you can control Whalie to take them so that he becomes more | |||
Updated: 3, 2005 | Rating: 16 | Author: Peter Lee | Size: 1900 kb | Demo Go to category: Games & Entertainment > Other Similar programs | |||
164. | Port Magic 1.0 (purenetworks.com) | ||
your Internet gateway every time you want to play a game. That's where Port Magic comes in - it automatically configures your Internet gateway to enable you to connect with friends and fellow players. Port Magic's easy-to-use interface takes all the complexity out of configuring your network to play multiplayer games Key features of Port Magic include: o) | |||
Updated: 3, 2005 | Rating: 82 | Size: 2647 kb | Demo Go to category: Games & Entertainment > Other Similar programs | |||
165. | Dogs and Fishes 1.1 (softtanks.com) | ||
Save your dog from wild cats, dinos & fishes. Kill the fishes for high score. Find new levels where you will meet big dinosaurs. Nice background music and response timing will make you enjoy this game for hours together. New Version of the game will have multiplayer feature to play online with your Nice background music and response timing will make you enjoy this game for hours together. New Version of the game wi | |||
Updated: 3, 2005 | Rating: 0 | Author: Sanjay Sharma | Size: 1400 kb | Demo Go to category: Games & Entertainment > Action Similar programs | |||
166. | HieroNote 3.0 (hieronote.com) | ||
Also type and print the phonetic hieroglyphic signs right from your keyboard. Includes: The Hieroglyphic Alphabet Tutorial; The Hieroglyphic Determinatives Tutorial; Hieroglyphic Word Processor, create, print and save your hieroglyphic creations; Decipher hieroglyphs on artifacts from | |||
Updated: 3, 2005 | Rating: 21 | Author: I DeCarlo | Size: 2901 kb | Demo Go to category: Education > Other Similar programs | |||
167. | Ghost Installer Studio 3.7.1 (ginstall.com) | ||
Ghost Installer Studio 3.7 offers full support for Microsoft's cutting-edge Visual Studio .NET 2003 as well as Borland's complete line of development tools: Delphi, C++Builder, and JBuilder. New: 11 Project Wizards - more than in any other installation tool - take developers step-by-step through the Setup Design for their Visual Basic.NET, Visual C#.NET, Visual | |||
Updated: 3, 2005 | Rating: 96 | Author: gInstall Corp. | Size: 10503 kb | Demo Go to category: Development > Install & Setup Similar programs | |||
168. | Computers Hall 2.11 (ruslan.odessa.ua) | ||
the client there is a window which to remove it is impossible or the keyboard, a mouse is locked; · The program remembers and uses the price for 1 hour of games and 1 hour of the Internet; · Roundoff of the sum of payment; · Return of the rest of money; · From one sight it is visible, what computer | |||
Updated: 3, 2005 | Rating: 16 | Author: Ruslan Scherbatuk | Size: 1798 kb | Demo Go to category: Business > Other Similar programs | |||
169. | e-Xpressor Real MIDI Accompaniment Maker 1.20 (e-xpressor.com) | ||
e-Xpressor is harmony recognition software creating ready chord progression to a tune. Easy and friendly interface. Accessible to all. No musical learning is required. Just load MIDI tune and you get real instrumental accompaniment like a musician which plays chords to a song by ear. e-Xpressor is | |||
Updated: 3, 2005 | Rating: 201 | Author: Sergiy Maruta | Size: 1199 kb | Demo Go to category: Audio & Multimedia > Other Similar programs | |||
170. | PC Tattletale Parental Control & Surveillance Software 7.4.01 (pctattletale.com) | ||
It runs automatically in the background, or you can use it's built-in scheduler to monitor only during the hours your children use the family PC. PC Tattletale is back by an iron clad money back guarantee too! New parental control & internet monitoring software makes it easy to record everything your child does and helps to protect them when they go online. Hidden recording | |||
Updated: 8, 2004 | Rating: 0 | Author: Don Schnure | Size: 230134 kb | Demo Go to category: System Utilities > Other Similar programs | |||
171. | Downloadz Master 2.8 (otiumation-inc.com) | ||
to surf and download materials Set time limits for DownloadZ Master's Internet connection Set limits on how many pages DownloadZ Master will surf on each site Select the type of materials and files to be downloaded Set size limitations on downloaded files Comes with a complete log of activities | |||
Updated: 8, 2004 | Rating: 0 | Size: 23022 kb | Demo Go to category: System Utilities > Other Similar programs | |||
172. | Ghost Keylogger 3.80 (keylogger.net) | ||
Would you like to know what people are doing on your computer? Ghost Keylogger is an invisible easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
173. | HiP 3.02 (alcsoft.narod.ru) | ||
Capabilities and advantages HiP 3.02: · Concealment of icons of the appendices in system tray; · Start with Windows; · Start with given delay after start of a Windows; · Start in a stealth mode; · Information output about an occurrence and title of the appendix of a hidden icon; · Call at | |||
Updated: 8, 2004 | Rating: 0 | Author: Yuri Hvostenko | Size: 1350 kb | Demo Go to category: System Utilities > Other Similar programs | |||
174. | Paragon Hard Disk Manager 5.5 (paragon.ru) | ||
affords everything you may need for managing hard disks; it’s suitable for both everyday and rare needs, for either inexperienced user or advanced professional. Repartitioning of hard disk. At any time you can easily and safely change partitioning of your hard disk, change parameters of partitions. All modern and usually used file systems and operating systems are supported | |||
Updated: 8, 2004 | Rating: 0 | Size: 8045 kb | Demo Go to category: System Utilities > Other Similar programs | |||
175. | PCTattletale 4.0 (aidsoft.com) | ||
Don't think of it as spyware because PCTattletale is an internet monitoring tool used as a parental control when childrren go online, use instant messaging, chat rooms or anytime children are online. PC Tattletale Internet monitoring software automatically records: All Email - both in AND outbound mail, all | |||
Updated: 8, 2004 | Rating: 0 | Author: Don Schnure | Demo Go to category: Security & Privacy > Other Similar programs | |||
176. | PestPatrol 3.0 (safersite.com) | ||
The biggest threats to your network security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Keyboarding software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|