|
||||||
|
||
|
Home > Internet optimizer software |
Related keywords: internet, Internet, internet explorer, Internet Explorer, optimizer, internet privacy, internet security, internet marketing, INTERNET, internet spy |
|
|
401. | System LifeGuard 2.0 (neobytesolutions.com) | ||
to keep your PC running in perfect condition. Every time you use the internet or run programs on your computer - unwanted files and procedures are stored on your hard-disc.Regular computer use accumulates old material that begins to slow down the operation of your hardware and software. So just like | |||
Updated: 9, 2005 | Rating: 0 | Author: NeoByte Solutions | Size: 3273 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
402. | System Shield 2.1c (iolo.com) | ||
Most people believe that when a file is deleted, it is permanently and irrecoverably "gone". The error in this belief is that it relies on some basic assumptions that are very far from the truth. Realistically, the following must be true in order for a file to be irrecoverably deleted: 1. The data | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
403. | SYT Save Your Time 3.0 (moodysoft.com) | ||
resources anywhere on your computer, your network or over the internet. Favorits are anything you use everyday: files, folders, programs, documents, web addresses, ftp locations, music, movies, games, graphics. Open them or get there with a click. Easy maintenance of Favorites which are stored as a collection of shortcuts in a folder. Drop in any shortcut and you'll see it | |||
Updated: 9, 2005 | Rating: 0 | Author: George Lechintan | Size: 636 kb | Shareware Go to category: Graphic Apps > Font Tools Similar programs | |||
404. | Task Lock 6.2 (posum.com) | ||
Task Lock provides a simple and effective way to password protect specified applications for Windows no matter how they are executed. Its security is easy to configure and requires little to no modifications to your current system configuration. Administrator functions are enabled for site licenses. Task | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Jernigan | Size: 1232 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
405. | TimeRanger 1.6.0 (codexcel.com) | ||
system clock aligned with the time server of your choice, over the Internet. Included is a list of more than one hundred Atomic time servers worldwide to choose from. "Accounts Keeper" keeps track and cumulates every second spent doing any user defined task. Enter an hourly rate and it will calculate | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Taverney | Size: 1300 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
406. | TK ChildLock! 1.0 (competent-software.com) | ||
ChildLock! you can limit an user's log on or log off times. Define when users can log on to your PC. If a specified user is already logged on your system on a non-logon-time, it is possible to log him off automatically. I.e. parents can control their children, so that they cannot be logged on to the computer after 7 p.m. So the parents can be sure their children don't surf on the | |||
Updated: 9, 2005 | Rating: 0 | Author: Timo Kosiol | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
407. | Top Secret Crypto Gold 4.10.000 (topsecretcrypto.com) | ||
encrypted peer-to-peer, computer to computer, secure chat over the Internet. Maintain an encrypted journal, or diary, of you daily thoughts, ideas, notes, etc. Free for personal private use. Commercial use requires an inexpensive license. Five new spell checking dictionaries: Danish, French, German, Italian, and Spanish. Now easy to use with any e-mail program including Yahoo | |||
Updated: 9, 2005 | Rating: 16 | Author: MacGregor Phillips | Size: 3321 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
408. | Trouts Talking Internet Clock 2.3 (chemware.co.nz) | ||
* Make sure your computer has the right time - Synchronize with Internet Atomic Clocks and Time Servers or set it offline. Automatically adjusts for daylight savings. The list of 50 or so NTP Servers is fully editable. * See what time it is somewhere else in the World - up to extra individual 10 Time Zone Clocks * Clocks can be any Shape, Size, Color, Effects... * Dynamic Icons | |||
Updated: 9, 2005 | Rating: 39 | Author: Bruce Levett | Size: 947 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
409. | Turbo Memory 2.4 (turbomemory.com) | ||
Optimize your cache to act as a ram booster and boost computer speed. Discover extreme pc speed with Internet software solutions. Windows fills up your computer's memory (RAM)and finally RAM is filled with unnecessary application and system data. Turbo Memory RAM Booster recovers your | |||
Updated: 9, 2005 | Rating: 0 | Author: Jaime laurente | Size: 42654 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
410. | Tweaki...for Power Users 4.3.1 (jermar.com) | ||
Tweaki is your Swiss Army knife of utilities. Configure, secure and optimize Windows, MS Office and Internet Explorer. Add productivity enhancements like right click functions that allow you to print the contents of a folder or drive, copy a path to the clipboard -long or short, or create a new | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Rawdon | Size: 3596 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
411. | Tweaking Toolbox XP 1.60 (tweakingtoolbox.com) | ||
increase Windows security. Lock down Control Panel applets, Internet Explorer options, even choose which applications can or can't be run on the computer. You can change Windows XP system performance, by selecting to keep the Windows XP core system in memory, and not paged to disk (advisable only if you have 512MB RAM or more). You can also optimize the CPU and memory | |||
Updated: 9, 2005 | Rating: 0 | Author: Arie Slob | Size: 953 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
412. | User Control 2005 (salfeld.com) | ||
any undesired window title or any application / EXE-file. On the Internet you can define exactly which contents shall be allowed and which not. You can also explicitly allow only authorized applications and/or Internet addresses. Block the varied Windows systems areas (such as system control, setting on start menu, downloads from IE, Windows settings, etc.) with just a few | |||
Updated: 9, 2005 | Rating: 34 | Author: Dierk Salfeld | Size: 4027 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
413. | Remote Administrator 2.2 (radmin.com) | ||
in front of it. The remote computer can be located anywhere on the Internet or LAN. It is a complete remote control and remote access solution with all key features such as View and Control Modes, File Transfer and Telnet support included. Radmin is optimized for both high- and low-bandwidth connections, so even if connected via modem, you have 5-10 screen updates per second | |||
Updated: 9, 2005 | Rating: 257 | Author: Dmitri Znosko | Size: 1855 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
414. | #Remove Access Security 3.0 (e-tech.ca) | ||
that records can be permanently destroyed or changed without anyone's knowledge. 'Remove Access Security' is a must-have for all database administrators and power users. Due to the immense potential this software has, it is not offered for downloading off the internet yet, but can be purchased | |||
Updated: 9, 2005 | Rating: 1996 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
415. | Rocket Retriever 3.0 (pankhurst.com) | ||
Retriever organizes your computer's files into an easy to search list. Enter partial or full names to view all files with matching text in their names, ready to run or open. And pressing the Enter key on the entry runs the program, or launches your favorite program to let you view or edit the file. For example, typing in CAT lets you look for cat pictures, Once you've | |||
Updated: 9, 2005 | Rating: 0 | Author: David Pankhurst | Size: 707 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
416. | SafeOffice 1.1 (codetek.com) | ||
and malicious software that take advantage of flaws in common internet applications (web browsers, e-mail clients, instant messengers, etc.). SafeOffice is designed to protect you and your data from attacks in as unintrusive a manner as possible; and to allow each individual user on a computer to customize the security settings to his or her own personal preferences. The | |||
Updated: 9, 2005 | Rating: 0 | Size: 4875 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
417. | Secura Backup Professional 2.13 (cmfperception.com) | ||
securely send your most sensitive data to remote computers over the internet. Secura Backup is powerful professional backup software that specializes in 128 bit secure backups to local drives, network paths, FTP sites, CD/DVDs, and even E-Mail | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
418. | Credit Card Knight 1.3 (fspro.net) | ||
your credit card data from being stolen by carders. Most Internet Explorer users have autocomplete settings on. When you are shopping on-line and filling an order form, Internet Explorer saves the data you have entered into a safe place (Windows Protected Storage). Protected Storage, however, is not so safe and it is possible to read what it keeps. So your credut card data | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 776 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
419. | SerialIP Utilities 1.3 (fogsoft.com) | ||
1. Grant a remote access to any COM-port equipments across Internet, LAN or any TCP/IP connections. 2. Save information received from serial port into file on a disk of remote or local computers 3. Save information received from TCP/IP port into file on a disk of remote or local computers 4. Transfer data from serial ports to other serial ports between remote or local | |||
Updated: 9, 2005 | Rating: 0 | Author: Paul Lashin | Size: 1271 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
420. | Shred XP 2.00.10 (aidsoft.com) | ||
dates, sizes, and starting sectors as well as securely removing Internet trails including Internet Explorer's history, cache and typed URLs. Additionally, Shred XP securely removes system trails including Recent Documents List and temp directories. Also, Shred XP provides a 'tree' of choices so you can remove the trails left by other installed programs such as Windows | |||
Updated: 9, 2005 | Rating: 16 | Author: Gale-Force Software | Size: 3063 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Internet optimizer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|