|
||||||
|
||
|
Home > Shared resources software |
Related keywords: resources, human resources, shared, Resources, shared mailbox, human resources software, Educational Resources, System Resources, GDI Resources, system resources |
|
|
1. | !Chilkat Zip ActiveX Control 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 16 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
2. | @KeyLogger Home 2.10 (activity-tracker.com) | ||
dollars every year - this stealth-monitoring utility provides the PC's equivalent of the security camera (and much more), increasing productivity dramatically, while causing no disruption to working practices or draining network resources and keeping those phone bills down. @KeyLogger Home helps | |||
Updated: 8, 2004 | Rating: 48 | Author: Konstantin Romanovsky | Size: 959 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
3. | Change Folder Icons 5.6 (nesoft.org) | ||
Icon" from popup menu. You can search for icons in all types of resource files starting with the selected folder. Also you can: -select an icon from any type of resource files; -export all icons from resource files into .ico-files; -change an icon for a drive (HDD, FDD | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Lyapunov | Size: 904 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
4. | Change Folder Icons 6.0 (nesoft.org) | ||
You can search for icons with specified parameters in all types of resource files starting with the selected folder. Also you can: - select an icon from any type of resource files; - export all icons from resource files into .ico-files; - change an icon for a drive (HDD, FDD | |||
Updated: 9, 2005 | Rating: 105 | Author: Andrew Lyapunov | Size: 953 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
5. | Change Folder Icons 6.1 (nesoft.org) | ||
You can search for icons with specified parameters in all types of resource files starting with the selected folder. Also you can: - select an icon from any type of resource files; - export all icons from resource files into .ico-files; - change an icon for a drive (HDD, FDD | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Lyapunov | Size: 1092 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
6. | Change Folder Icons 7.5 (nesoft.org) | ||
Explorer; - make your own libraries from found icons. What's new in version 7.5. Now you can: - drag-and-drop groups of files and folders at once to the list of found icons; - manually write/edit/delete the "path for icons..." in "Settings" window; - make all necessary actions with found icons using right mouse click (2 new menu items are added: * Icon actions: actions for | |||
Updated: 9, 2005 | Rating: 107 | Author: Andrew Lyapunov | Size: 1653 kb | Shareware Go to category: Desktop > Icons Similar programs | |||
7. | Chilkat Compression ActiveX Control 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
8. | Chilkat Data Compression ActiveX 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
9. | Chilkat File Compression ActiveX 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
10. | Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
11. | Chilkat Zip ActiveX - Affordable Zip ActiveX 9.3.0 (zip-compression.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Active X Similar programs | |||
12. | Chilkat Zip ActiveX Compression Component 9.3.0 (chilkatsoft.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
13. | Chilkat Zip Compression .NET Class 9.3.0 (chilkatsoft.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
14. | Chilkat Zip Compression C++ Library 9.4.0 (chilkatsoft.com) | ||
Allows you to open a Zip that is stored in your program's memory. This was created to allow programs to access Zips loaded from sources such as a database (an Oracle BLOB for example). Includes a robust set of events that allow you to closely monitor the progress while zipping and unzipping. Has the ability to abort any zip or unzip operation while in progress. AES Encryption | |||
Updated: 9, 2005 | Rating: 82 | Author: Matt Fausey | Size: 7800 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
15. | Essential NetTools 4.0 (tamos.com) | ||
network tools for diagnosing networks and monitoring your computer's network connections. NetStat: displays the list of your computer's network connections, information on open TCP and UDP ports, IP address, and connection states. The program can map open ports to the owning application. NBScan: a powerful and fast NetBIOS scanner. This tool features parallel scanning, which | |||
Updated: 9, 2005 | Rating: 267 | Author: Andrew Riedel | Size: 3192 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
16. | LAN Spider 2.1.0.17 (lanspider.com) | ||
Spider goes through your local area network to search the shared directories for certain files: documents, drawings, music & video files and many others. LAN Spider features include: Fast multi-thread search. LAN Spider is the fastest file searching utility: tests shows 300-500% increased performance over against all other utilities on the market. Archives support. LAN Spider unpacks | |||
Updated: 9, 2005 | Rating: 0 | Author: Maxim Nukin | Size: 985 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
17. | PC Activity Monitor Net 6.3 (spy-soft.biz) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. Even when parents are outside of the home they can remotely monitor children's PC activity using this software. A security service could monitor employee's PC activity from any Internet host in the world to prevent industrial | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corp. | Size: 981 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
18. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
19. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
20. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a search condition.It is a powerful management tool for users and companies | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Shared resources software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|