|
||||||
|
||
|
Home > Vectors software |
|
|
181. | Acronis Privacy Expert Suite 9.0 (acronis.com) | ||
Acronis Privacy Expert Suite provides you with proactive, real time protection against malware; including spyware parasites, rootkits, adware, keyloggers, hidden dialers, browser hijackers, and other malicious programs. Our latest version, 9.0, adds key new features to ensure that your PC is not infected with | |||
Updated: 2, 2006 | Rating: 169 | Author: Acronis | Size: 4335 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
182. | Attachment Executive 2003 (MADSolutions.com) | ||
Replace attachments in e-mail messages with hyperlinks to greatly increase the ability to access attachments while working in and out of Microsoft Outlook. Attachment Executive consists of three parts: an Attachment Wizard to set up rules to automatically handle attachments based on conditions; an Attachment | |||
Updated: 9, 2005 | Rating: 0 | Author: MADSolutions | Size: 2508 kb | Demo Go to category: Communications > E-Mail Clients Similar programs | |||
183. | ABCSpell for Outlook Express 7.1.3.2 (spellchecker.com) | ||
so it works invisibly -- like part of the program! There's nothing to learn -- you just check spelling by clicking the Spelling button in the Outlook Express toolbar, or right-click on a word to open the Thesaurus or Merriam-Webster Word Lookup. Works Automatically You can tell ABCSpell to always check spelling before sending, so you'll never forget to spell-check a message | |||
Updated: 2, 2006 | Rating: 39 | Author: Isota | Size: 4710 kb | Demo Go to category: Communications > Other E-Mail Tools Similar programs | |||
184. | BackRex Expert Backup 2.5 (backsettings.com) | ||
face it! We all live in the age of Information Technologies. Day after day we become more and more dependent on information. Not only our financial data and job-related information moved from paper to computer, our day planners, diaries, address books and even calendars are now all-digital. The process of our life relies heavily on machines that are tireless and accurate in | |||
Updated: 9, 2005 | Rating: 16 | Author: BackRex Software | Size: 656 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
185. | CD-Cover 1.1 (cadkas.de) | ||
Print you own CD Covers for your Audio and Data CDs or DVDs! You can open a picture or scan a cover and add text, notes and graphic objects. Then you can print it out as CD cover or CD label. The program has some function to retouch the scanned picture too. Print you own CD Covers for your Audio and Data CDs | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian A.D. Kassler | Size: 720 kb | Demo Go to category: System Utilities > Other Similar programs | |||
186. | ComfortAir HVAC Software 4.0 (comfortair-software.com) | ||
ComfortAir HVAC software is designed to be used by engineers, architects, contractors and energy auditors to calculate and analyse heating and air conditioning loads in all types of buildings. Input and output units can be set independently to English or Metric units. The program contains weather and other | |||
Updated: 2, 2006 | Rating: 79 | Author: Claon Rowe | Size: 1580 kb | Demo Go to category: System Utilities > Other Similar programs | |||
187. | Recovery for Excel 3.0.0543 (officerecovery.com) | ||
Recovery for Excel adds a Recover selection right into Excel's File menu. The program fits conveniently and seamlessly into Excel making it a natural both for beginners and pros. Recovers cell data: text and numbers as well as formulas. Restores formatting. Restores structure of multi-sheet files. The new Recovery for Excel is capable of recovering corrupted files with password | |||
Updated: 2, 2006 | Rating: 0 | Author: Recoveronix | Size: 951 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
188. | Ghost Keylogger 3.80 (keylogger.net) | ||
Would you like to know what people are doing on your computer? Ghost Keylogger is an invisible easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
189. | Icon Lock-iT XP 3.3 (iconlockit.com) | ||
machine to another. Now included with Icon Lock-iT XP is Moon Valley's Security Suite which includes a Password Assistant and System Security Check. These new features will help the user construct a computing environment free of external threats. Includes many features designed for home users, shared computers, and the mobile professional. The self-decryptor lets you send or | |||
Updated: 9, 2005 | Rating: 298 | Author: Phillip Hansen | Size: 4401 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
190. | Job Search Career Kit Software 9.00 (gelb.com) | ||
Net-Temps, HotJobs; the Corporate Career Sites; the Nation's top Newspaper companies like Knight-Ridder, Gannett and the Tribune Company; the National News classifieds from USA Today, the Wall Street Journal, Financial Times and Regional Newspapers like the LA and NY Times, Washington Post, Boston Globe, etc. You never miss the majority of open positions that are devoted to | |||
Updated: 2, 2006 | Rating: 0 | Author: Gelb Organization | Size: 2260 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
191. | KeyRobot 5.0 (keyrobot.com) | ||
where you don't want Login or Form Helper to pop up to help, that's not a problem. When it appears, you can easily turn off the KeyRobot at that site by clicking on the box on the the KeyRobot screen. Master Password: You can password protect the KeyRobot for further protection. To set up a master password, just open the KeyRobot by clicking on the the KeyRobot icon in your | |||
Updated: 3, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 2300 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
192. | L-Nix 1.20a (cyber-matrix.com) | ||
L-nix is an interactive UNIX tutorial program that teaches beginner to advanced concepts of the UNIX operating system. L-nix includes a simple UNIX shell simulator allowing users to try out commands as they are learned. The L-Nix demo contains 10 modules:Introduction of UNIX, File characteristics, Korn | |||
Updated: 9, 2005 | Rating: 227 | Author: Cyber Matrix | Size: 614 kb | Demo Go to category: System Utilities > Other Similar programs | |||
193. | Remote Password Stealer 2.7 (findpassword.com) | ||
Remote Password Stealer is a special tool to track all the password-input events in the windows system, including Windows 98, Windows ME, Windows NT, Windows 2000 and Windows XP, the main purpose is to: 1. find out the forgotten password. Once you forget the password that you had entered before, you could | |||
Updated: 9, 2005 | Rating: 13644 | Author: David Williamson | Size: 116 kb | Demo Go to category: System Utilities > Other Similar programs | |||
194. | Macro Scheduler 8.0.1 (mjtnet.com) | ||
Macro Scheduler lets you create macros to control your Windows applications, automate software processes and assign tasks to scheduled events, desktop shortcuts or hotkeys. Perform complex tasks with a single mouse click, or schedule your computer to perform tasks while you are away. Power users will | |||
Updated: 2, 2006 | Rating: 148 | Author: Marcus Tettmar | Size: 3202 kb | Demo Go to category: System Utilities > Automation Tools Similar programs | |||
195. | Memory Booster 1.03.04 (memorybooster.softpedia.com) | ||
in the system tray so that you won't even be bothered by the program's main window. -Multiple options witch will make the program usage as easy as possible Buy now and you will get: -Full and non-limited version of this program -Free online support and troubleshooting -Immediate | |||
Updated: 8, 2004 | Rating: 416 | Author: Mare Septimiu Fabian | Size: 894 kb | Demo Go to category: System Utilities > Other Similar programs | |||
196. | PDF-Forms 2.0 (cadkas.de) | ||
Fill out PDF forms, save them and print them. You can add form fields to existing PDF files or fill out existing form fields. The program can also add comments to PDF files or highlight text in PDF files. Provide your customers with PDF forms they can fill out directly on the screen and print it out in | |||
Updated: 9, 2005 | Rating: 16 | Author: Christian A.D. Kassler | Size: 964 kb | Demo Go to category: System Utilities > Other Similar programs | |||
197. | PestPatrol 3.0 (safersite.com) | ||
The biggest threats to your network security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
198. | RebootIT 2.0 (lohja-associates.com) | ||
on a schedule. Best of yet, it does not require a technician. It's all automated. You can configure RebootIT remotely using the RebootIT Console. There are so many memory leaks caused by applications running, terminiating, opening and closing files causing your system to become unstable through time. With RebootIT, you can refresh your systems memeory and cache on a | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Lohja | Size: 546 kb | Demo Go to category: System Utilities > Other Similar programs | |||
199. | Search Backups 1.2.2 (ab-tools.de) | ||
With Search Backups you can manage your copies for security or other CDs / DVDs. For that the folder and file structure is being read and saved completely. After that you can move through the whole folder and file structer of all indexed CDs / DVDs the same as the CDs / DVDs were in you drive. Additionally | |||
Updated: 9, 2005 | Rating: 0 | Author: Andreas Breitschopp | Size: 1236 kb | Demo Go to category: System Utilities > Backup & Restore Similar programs | |||
200. | SignStation 2.00 (com-and.com) | ||
SignStation is an innovative application that lets you apply a digital signature to a file, verify the digital signature on a signed file, encrypt and decrypt files and manage certificates, among other functionalities like email, hash, and file management. Using a two-ways approach interface, SignStation | |||
Updated: 8, 2004 | Rating: 0 | Size: 5956 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Vectors software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|