|
||||||
|
||
|
Home > Shared resources software |
Related keywords: resources, human resources, shared, Resources, shared mailbox, human resources software, Educational Resources, System Resources, GDI Resources, system resources |
|
|
1. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
2. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
3. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
4. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
5. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
6. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
7. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
8. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
9. | Audio Sliders 4.1 (codesector.com) | ||
features needed for playing Audio CDs while using minimal system resources. It can read track information used by the Windows CD Player, and uses the same hot-keys as the external players. Large On Screen Display (OSD) with semi-transparent background pops up when a hot-key is pressed, and indicates the volume level or song name and playback position. This interactive display also | |||
Updated: 2, 2006 | Rating: 76 | Author: Jackie Ray | Size: 1279 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
10. | Change Folder Icons 5.6 (nesoft.org) | ||
Icon" from popup menu. You can search for icons in all types of resource files starting with the selected folder. Also you can: -select an icon from any type of resource files; -export all icons from resource files into .ico-files; -change an icon for a drive (HDD, FDD | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Lyapunov | Size: 904 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
11. | Change Folder Icons 6.0 (nesoft.org) | ||
You can search for icons with specified parameters in all types of resource files starting with the selected folder. Also you can: - select an icon from any type of resource files; - export all icons from resource files into .ico-files; - change an icon for a drive (HDD, FDD | |||
Updated: 9, 2005 | Rating: 105 | Author: Andrew Lyapunov | Size: 953 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
12. | Change Folder Icons 6.1 (nesoft.org) | ||
You can search for icons with specified parameters in all types of resource files starting with the selected folder. Also you can: - select an icon from any type of resource files; - export all icons from resource files into .ico-files; - change an icon for a drive (HDD, FDD | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Lyapunov | Size: 1092 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
13. | Change Folder Icons 7.5 (nesoft.org) | ||
Explorer; - make your own libraries from found icons. What's new in version 7.5. Now you can: - drag-and-drop groups of files and folders at once to the list of found icons; - manually write/edit/delete the "path for icons..." in "Settings" window; - make all necessary actions with found icons using right mouse click (2 new menu items are added: * Icon actions: actions for | |||
Updated: 9, 2005 | Rating: 107 | Author: Andrew Lyapunov | Size: 1653 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
14. | Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
15. | WinZip Compatible Compression ActiveX 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
16. | LAN Spider 2.1.0.17 (lanspider.com) | ||
Spider goes through your local area network to search the shared directories for certain files: documents, drawings, music & video files and many others. LAN Spider features include: Fast multi-thread search. LAN Spider is the fastest file searching utility: tests shows 300-500% increased performance over against all other utilities on the market. Archives support. LAN Spider unpacks | |||
Updated: 9, 2005 | Rating: 0 | Author: Maxim Nukin | Size: 985 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
17. | Essential NetTools 4.0 (tamos.com) | ||
network tools for diagnosing networks and monitoring your computer's network connections. NetStat: displays the list of your computer's network connections, information on open TCP and UDP ports, IP address, and connection states. The program can map open ports to the owning application. NBScan: a powerful and fast NetBIOS scanner. This tool features parallel scanning, which | |||
Updated: 9, 2005 | Rating: 267 | Author: Andrew Riedel | Size: 3192 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
18. | Chilkat Compression ActiveX Control 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
19. | Chilkat Data Compression ActiveX 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
20. | Chilkat File Compression ActiveX 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
|
Home > Shared resources software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|