|
||||||
|
||
|
Home > File cleaner software |
Related keywords: file, cleaner, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
21. | PicturePlayer 3.10.00 (picture-player.com) | ||
for use on floppy disk - Optional: Scrambler for protecting image files. Its main use: - Slide shows - Picture CD/DVDs - Picture floppy disks - Picture presentation featuring images set to music - Picture presentations with background music - Corporate presentations - Product catalogs - Vacation photos - Work instructions - Speeches - Degree work | |||
Updated: 3, 2006 | Rating: 0 | Author: Klaus Schwenk | Size: 5080 kb | Shareware Go to category: Graphic Apps > Viewers Similar programs | |||
22. | ABC Amber PowerPoint Converter 2.02 (thebeatlesforever.com) | ||
Partial Features List: - reads PPT (PowerPoint presentations) files and converts them to PDF (doesn't require Adobe Acrobat to be installed), HTML, RTF (MS Word doesn't need to be installed), HLP, DOC (Word 6.0/95/97-2002), WRI (Windows Write 3.0/3.1), WPD (WordPerfect 5.0/5.1 for DOS/5.x for Win/5.1-5.2 secondary, 5.0 secondary, WordPerfect 4.1/4.2), MCW (Word for Macintosh | |||
Updated: 3, 2006 | Rating: 253 | Author: ProcessText Group | Size: 1233 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
23. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
24. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
25. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
26. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
27. | Free Asmw Eraser Pro 3.4 (asmwsoft.com) | ||
your cache, cookies, history, visited URLs, typed URLs, index.dat, Clean Forms Passwords data, temp folders and more. The cookie-cleaning and typed URLs feature allows you to specify which item to keep, so that you don't erase your important login cookies or URLs. It supports free plug-ins to extend cleaning features to support popular programs such as ACDSee, Acrobat | |||
Updated: 3, 2006 | Rating: 91 | Author: asmwsoft | Size: 1700 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
28. | ABC Amber Outlook Express Converter 4.14 (thebeatlesforever.com) | ||
important emails, newsletters, newsgroups mails organized in one file (as hypertext system). It is a very useful tool which converts your emails from MS Outlook Express to any document format (CHM, PDF, HTML, RTF, HLP, TXT, DOC, etc.) easily and quickly. All you have to do is select required messages, choose document format to convert and click "Save As" button. Currently our | |||
Updated: 3, 2006 | Rating: 120 | Author: ProcessText Group | Size: 1364 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
29. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
30. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
31. | UninsHs 2.1.0.92 (han-soft.com) | ||
It is very small because use Assemble. Please read the readme file included in the package for further instructions on how to use UninsHs with your own application setups. Features : 1. Very small. 2. Easy to use. 3. Support Multiple language. 4. You can add own language. This extension program for Inno Setup allows you to add repair, modify and remove support to your | |||
Updated: 3, 2006 | Rating: 391 | Author: JING YU HAN | Size: 26 kb | Freeware Go to category: Development > Install & Setup Similar programs | |||
32. | JamDTA Komponente fГјr Delphi 3.3 (jam-software.com) | ||
for Delphi and C++ Builder that allows you to build DTA / DTAUS files that contain standardized information about money tranfers (wire transfers) between German banks. TJamDTA is a component for Delphi and C++ Builder that allows you to build DTA / DTAUS files that contain standardized information about money tranfers (wire transfers) between German | |||
Updated: 3, 2006 | Rating: 16 | Author: Joachim Marder | Size: 715 kb | Demo Go to category: Development > Delphi Similar programs | |||
33. | Masker 7.0.6 (softpuls.com) | ||
files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, BLOWFISH, RIJNDAEL 256-bit, TWOFISH) The encrypted | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
34. | iNetAdviser Professional 4.5.13 (offliner.com) | ||
(Internet, Hard Drive, CDs). Program allows you to gather graphic files (digital photos, images, etc) from the pages you visit. And you can gather images from the visited pages both in manual and in auto-mode. Also iNetAdviser is capable to download pictures from Internet without visiting sites using web site's addresses, image's URL masks or powers of several search | |||
Updated: 3, 2006 | Rating: 0 | Author: Alex Akimov | Size: 4299 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
35. | CapiDog 1.45 (shamrock.de) | ||
for expensive 0900 numbers. Also allows a d-channel trace into a file. Requires an AVM, Gerdes, or Scitel ISDN adapter due to the necessary CAPI 2.0 extensions. An English language version is available here: http://www.shamrock.de/english.htm ISDN monitor program showing busy channels in system tray and pops up a window showing the calling, called and redirecting numbers when a call | |||
Updated: 3, 2006 | Rating: 0 | Author: Shamrock Software GmbH | Size: 280 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
36. | Dekart Private Disk 2.07 (dekart.com) | ||
Disk Firewall mechanism - a unique technology that makes your files as safe as they could possibly be. Disk Firewall shields files from viruses and other malware even if your antivirus or antispyware program fails to protect the system. Now you can create a white-list of applications, only these programs will be allowed to access the contents of the encrypted drive. This | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | BPS Spyware and Adware Remover 9.3.0.0 (bulletproofsoft.com) | ||
gives the user the ablitiy to automatically remove all the infected files or just some of them. BPS Spyware/Adware Remover allows the user to choose either a full system scan or select a specific folder to scan for known data mining, aggressive advertising, hijacking, and tracking components. It is | |||
Updated: 2, 2006 | Rating: 122 | Author: BulletProof Soft | Size: 8238 kb | Demo Go to category: System Utilities > Other Similar programs | |||
38. | Aurigma Image Uploader 3.5 (aurigma.com) | ||
3 thumbnails, so you need not generate them on the server. Non-image files can be also uploaded. It retrieves data to server in standard multipart/form-data format, so files can be handled by any script or platform: ASP, ASP.NET, Perl, PHP, ColdFusion, JSP, etc. Features: * Easy | |||
Updated: 2, 2006 | Rating: 1677 | Author: Fedor Skvortsov | Size: 2593 kb | Shareware Go to category: Development > Active X Similar programs | |||
39. | ABC Amber Excel Converter 2.04 (thebeatlesforever.com) | ||
Converter was developed to help you convert your XLS (MS Excel) files to any format you wish (DBF, CSV, XML, PDF, HTML, CHM, RTF, HLP, DOC, and many more) easily and quickly. The software supports a batch conversion, a run from command line, more than 50 languages. Batch conversion ability allows you to convert a unlimited number of XLS files at a time. Important note: MS | |||
Updated: 2, 2006 | Rating: 84 | Author: ProcessText Group | Size: 1173 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
40. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
you encrypt files because you don't want others to see them, but sometimes you want to send someone an encrypted file. Most if not all encryption programs allow you to do so--they vary, however, in terms of how difficult the process is. AEP2006 PRO's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > File cleaner software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|