|
||||||
|
||
|
Home > Keyboarding software |
Related keywords: Keyboarding Skills, keyboarding programs |
|
|
21. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
22. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
23. | Keyboard Sounder 1.32 (aldzsoft.com) | ||
3D sound effect when a keyboard button or mouse key is pressed. Features: support to play animation when the button is pressed. Multi schemes, built-in 6 sound schemes - Typewriter,Typewriter2, Fight, Gun, Abe, Mix. Each scheme consists of 15 keyboard and 3 mouse button's events Supports to toggle schemes by hotkey and to provide powerful Hotkey Editor Support | |||
Updated: 3, 2006 | Rating: 0 | Author: aldz lan | Size: 2213 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
24. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
25. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
26. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
27. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
28. | WinCatalog Standard 1.53 (wincatalog.com) | ||
WinCatalog Standard takes cataloging to the next level. This software is as easy-to-use and friendly as the Light version, but at the same time it is much more powerful and functional. Many features of this program were inspired by users' requests and feedback. WinCatalog Standard makes managing your | |||
Updated: 3, 2006 | Rating: 42 | Author: Michael Rusakov | Size: 1667 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
29. | Apex SQL Code 3.1 (apexsql.com) | ||
Apex SQL Code is a Rapid Application Development (RAD) Code Generation tool for Microsoft® SQL Server© 7 or 2000 that enables you to automatically generate thousands of lines of perfect ASP, VB, C#, SQL (and more) code in just seconds The key feature of Apex SQL Code is Template based code generation that | |||
Updated: 3, 2006 | Rating: 16 | Author: Apex SQL tools | Size: 6032 kb | Shareware Go to category: Development > Other Similar programs | |||
30. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
the password manager directly from the tray menu; a virtual keyboard created in order to prevent any key logger software from stealing your passwords; a shredder that helps you destroy beyond recovery files, folders and internet traces; a locker that allows you to password protect certain applications; the ability to create self-decrypting packages and mail them to your friends | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
31. | Dekart Private Disk 2.07 (dekart.com) | ||
by Dekart Private Disk is transparently encrypted with Dekart's NIST-certified implementation of AES 256-bit -the strongest encryption algorithm available today. Powerful, reliable and flexible AES-256 disk encryption program. Hides your programs and data, and exclusively restricts access to them. Provides 100% protection of your private | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
32. | Advanced Anti Keylogger 3.7 (anti-keylogger.net) | ||
dangerous feature of all spy software is recording of computer user's keystrokes for the purpose of monitoring computer activity. While you are typing out your password and credit card details online it is possible a hacker can be recording your every keystroke on his computer with the right spy | |||
Updated: 2, 2006 | Rating: 132 | Author: Eric Nilsson | Size: 783 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
33. | EXECryptor 2.3.7 (softcomplete.com) | ||
PellesC, Visual Basic, PowerBASIC, IBASIC, PureBasic. All SDK's and samples are available. Powerful software tool used for an application code protection from reverse engineering, analysis and modifications, based on a brand new metamorphing code transformation technology, that provides with strong software | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
34. | Power Clock 6.03 (powerclock.com) | ||
Power Clock, the ultimate employee time clock. Power Clock replaces the outdated mechanical time clock used in most businesses. It has many features that even the most advanced mechanical time clock can't duplicate. Now there is no reason to use an outdated mechanical device. Easy to use and familiar | |||
Updated: 2, 2006 | Rating: 0 | Author: Robbie Fletcher | Size: 3716 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
35. | EMS IB Manager 4.1 (ems-hitech.com) | ||
EMS SQL Manager for InterBase/Firebird is a powerful tool for InterBase and Firebird administration and development. SQL Manager 2005 is compatible with any Firebird version up to 2.0 and InterBase version up to 7.5 and supports all of the latest features including trigger messages, BLOB filters, and so on | |||
Updated: 2, 2006 | Rating: 0 | Author: EMS Software Development | Size: 13885 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
36. | Advanced Encryption Package 2006 4.2.9 (secureaction.com) | ||
vary, however, in terms of how difficult the process is. AEP2006's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without needing AEP2006 or any other software. The program includes a file shredder that wipes the contents of your original | |||
Updated: 2, 2006 | Rating: 105 | Author: SecureAction Research, LLC | Size: 2558 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
vary, however, in terms of how difficult the process is. AEP2006 PRO's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without needing AEP2006 PRO or any other | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
38. | CDCheck 3.1.11 (elpros.si) | ||
the program helps you determine whether your data is safe before it's too late. The program also provides extremly fast binary compare for effectively checking that file transfers (burning, copying...) were accomplished successfully and alerts you of differences. Besides that CDCheck supports creation and checking of MD5, CRC-32, SHA... hashes in SFV, MD5 and CRC file formats. This | |||
Updated: 2, 2006 | Rating: 1217 | Author: Mitja Perko | Size: 1400 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
39. | Encrypt PDF (Secure PDF) 2.2 (toppdf.com) | ||
Encrypt PDF software is a very flexible and powerful program, Encrypt PDF software allows you to encrypt (using standard 40-bit or 128-bit supported by Acrobat Reader 5.0 and up) existing PDFs, set permissions, add user and owner password. For example you can encrypt a PDF without to allow to print it. The | |||
Updated: 2, 2006 | Rating: 0 | Author: verypdf verypdf | Size: 759 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
40. | Secure Password Manager 2.2.1.1 (securekit.com) | ||
Do you ever forget your password? Secure Password Manager is a desktop utility that spares you the trouble of filling in your logins, passwords, and other personal data manually. You can automatically fill in password in ANY application (IE, Netscape, Opera, ICQ, MSN...) . Secure Password Manager | |||
Updated: 2, 2006 | Rating: 0 | Author: securekit kit | Size: 1327 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Keyboarding software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|