|
||||||
|
||
|
Home > Keyboard keys software |
Related keywords: keyboard, keys, Keyboard, hot keys, midi keyboard, keyboard monitor, keyboard macro, keyboard utility, keyboard logger, virtual keyboard |
|
|
211. | CryptIt 1.301 (SinnerComputing.com) | ||
rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Glina | Size: 33 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
212. | Cool Info FX 5.0 (tometasoftware.com) | ||
its detail, Network Administrators love it for the automation, CEO's love it for the price. Tometa Software, www.tometasoftware.com The Best System Information, Spy, Analysis, Auditing and Inventory Utility. Easy exporting to database and other formats including SQL & XML. Computers can use a central database to have a central network inventory of all systems on the | |||
Updated: 2, 2006 | Rating: 16 | Author: Luke Richey | Size: 12954 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
213. | Cool Info FX 5.0 (tometasoftware.com) | ||
its detail, Network Administrators love it for the automation, CEO's love it for the price. Tometa Software, www.tometasoftware.com The Best System Information, Spy, Analysis, Auditing and Inventory Utility. Easy exporting to database and other formats including SQL & XML. Computers can use a central database to have a central network inventory of all systems on the | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 12954 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
214. | Compare It! 3.85 (grigsoft.com) | ||
Powerful file compare and merge utility. Features: build-in editor with syntax highlighting, undo and wordwrap; highlights changes within lines; editing or fast by-difference merging; printing; html and text reports; zip support; Unicode support; search and replace with regular expressions; manual line | |||
Updated: 2, 2006 | Rating: 16 | Author: Igor Green | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
215. | ChrisTV Standard 4.80 (chris-tv.com) | ||
Cards with Video IN. Great Image quality and very easy to use. Key Features : TimeShifting, Recording using any audio/video codecs installed on user's PC and MPEG Recording, advanced recording settings, Advanced Scheduler, Radio FM support, channel autoScan with fine tuning, customize each channel properties, support for dscaler deinterlace directshow filter, zoom | |||
Updated: 2, 2006 | Rating: 697 | Author: Cristian Ciplea | Size: 2777 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
216. | ChrisTV Professional 4.80 (chris-tv.com) | ||
Cards with Video IN. Great Image quality and very easy to use. Key Features : Recording using any audio/video codecs installed on user's PC and MPEG Recording, advanced recording settings,TimeShifting, FFDSHow support, Advanced Scheduler, Radio FM support, Recording Profiles, Sleep Timer, channel autoscan with fine tuning, customize each channel properties, support for | |||
Updated: 2, 2006 | Rating: 1271 | Author: Cristian Ciplea | Size: 2820 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
217. | ChatBlocker 2.6 (exploreanywhere.net) | ||
to ensure that they do NOT take place. When coupled with ChatBlocker's powerful security features, it's powerful stealth mode feature, and remote log viewing capabilities (via e-mail) - it makes ChatBlocker must have for any parent, employer, or anyone else looking to moderate Internet chat's! ChatBlocker is a desktop parental control application for moderating and | |||
Updated: 2, 2006 | Rating: 0 | Author: Bryan Hammond | Size: 1555 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
218. | BlazingTools Perfect Keylogger Lite 1.15 (blazingtools.com) | ||
computer? Some applications of the keylogger: - Monitor children’s activity for parents - Monitor what programs opened and when - Recall what you wrote some time ago - Special purposes Features: - Invisible in Task Manager List - Logging texts typed in every application (including passwords and other | |||
Updated: 2, 2006 | Rating: 75 | Author: BlazingTools Software | Size: 172 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
219. | BlazingTools Smart Type Assistant 1.42 (blazingtools.com) | ||
of names of days, pasting large text pieces with one click, keyboard scoring, extended Clipboard (Clipboard history), system management hotkeys and more! Make your typing faster and more productive - let your keyboard be as smart as you! Features: -Autoreplace (expanding short keywords into full phrases) Examples: BTW -> By the way; withb -> With best regards; i@ -> | |||
Updated: 2, 2006 | Rating: 0 | Author: BlazingTools Software | Size: 384 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
220. | BKS 3.2.4.30 (backup2001.com) | ||
any change, or rename it. A very nice tool if you own an USB memory key. BKS synchronizes computers, disks and folders. Files can be copied, compressed or encrypted With the Incrmental mode synchronization is done at the light speed. With File Access Manager you now copy any file in use including SQL | |||
Updated: 2, 2006 | Rating: 16 | Author: RD Technologies | Size: 4664 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
221. | BlazingTools Perfect Keylogger 1.6.1.0 (blazingtools.com) | ||
a remote surveillance tool made specially for beginners. With this key logger you can receive keystrokes, chats, websites, screenshots and passwords from any PC by email or FTP. Remote surveillance with Perfect Keylogger - as easy as never before! Some applications of the keylogger: parental control; | |||
Updated: 2, 2006 | Rating: 1445 | Author: BlazingTools Software | Size: 540 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
222. | Axessh Windows SSH Client 3.2 (labf.com) | ||
Axessh is a Windows SSH client. It is a superb terminal emulator/telnet client for Windows. It provides SSH capabilities to Axessh without sacrificing any of existing functionality. Furthermore, Axessh has been developed entirely outside of the USA, and can be sold anywhere in the world (apart from places | |||
Updated: 2, 2006 | Rating: 16 | Author: LabF LabF | Size: 3059 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
223. | AutoShutdown 4.7 (barefootinc.com) | ||
hibernate your computer based on date/time, idle computer time, hot keys or a manually triggered command. AutoShutdown can also monitor battery level in a notebook computer and act while there is still power available. Systems running Windows 2000 and XP can have AutoShutdown also automatically lock | |||
Updated: 2, 2006 | Rating: 2602 | Author: Don Metzler | Size: 902 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
224. | Atom Time Synchronizer 3.7.9 (lmhsoft.com) | ||
time between computers, and can also act as a time server. Key Features: 1. Synchronize time with NIST atomic time servers 2. Synchronize time bewteen computers 3. Can act as a time server 4. Proxy support: Socks4/Socks4A/Socks5/HTTP 5. Support SNTP (the Simple Network time protocol) 6. Support the TIME protocol 7. Can be invoked at the command line, and called in | |||
Updated: 2, 2006 | Rating: 130 | Author: - - | Size: 663 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
225. | Ardamax Keylogger 2.4 (ardamax.com) | ||
Ardamax Keylogger is a small, easy-to-use keylogger that captures user activity and saves it to a logfile. The logfile can be viewed as a text or web page. Use this tool to find out what is happening on your computer while you're away, maintain a backup of your typed data automatically or use it to monitor logfile. The logfile can be viewed as a text or web page. Use this tool to find out what is happening on your computer while you're away | |||
Updated: 2, 2006 | Rating: 12034 | Author: Maxim Frolov | Size: 286 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
226. | Advanced Security Level 6.1 (softfolder.com) | ||
icons, local and network drives; disable Start Menu items, DOS, boot keys, Registry editing, taskbar, task manager and network access; lock screen with password; and much more. You can apply password protection for Windows and restrict users from running specific applications. Security restrictions can be applied to all or just for specific user. Advanced Security Level supports the | |||
Updated: 2, 2006 | Rating: 16 | Author: SoftFolder Inc | Size: 1065 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
227. | Advanced Security Administrator 10.14 (getfreefile.com) | ||
Printers, System and Internet Options. You can disable your boot keys, context menus, DOS windows, Registry editing, Internet and Network access. Hide your desktop icons, individual drives, Start menu items, or even the entire taskbar. You can also apply password protection to Windows and restrict users to running specific applications only, Control Internet Usage, view statistics of | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
228. | Advanced Security Administrator 10.14 (softheap.com) | ||
Printers, System and Internet Options. You can disable your boot keys, context menus, DOS windows, Registry editing, Internet and Network access. Hide your desktop icons, individual drives, Start menu items, or even the entire taskbar. You can also apply password protection to Windows and restrict users to running specific applications only, Control Internet Usage, view statistics of | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
229. | Advanced Registry Tracer 2.04 (elcomsoft.com) | ||
of system and software tweaks. Safely test your Registry using ART's filters that you can customize (and save) for any particular experiment. If you don't like a change, simply use ART's undo function to quickly bring the Registry right back to exactly the way it was before you made the change | |||
Updated: 2, 2006 | Rating: 706 | Author: Vladimir Katalov | Size: 1733 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
230. | AcuteFinder 1.3 (hugmot.is) | ||
use, but corporate users have 15 days to evaluate. Free trial-key on request. AcuteFinder finds duplicate files on your computer. You can then delete or move the files to an archive directory, saving a lot of disk space. Fast and easy way to clean up your disks. Great tool for network administrators. Free | |||
Updated: 2, 2006 | Rating: 149 | Author: Ingolfur Tryggvason | Size: 2504 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
231. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at your monitor and he has it all! Introducing Active Screen Lock, the unique security application by DMVSoft, allowing you to do whatever you want to do when you are away from the computer | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
232. | Active Keyboard 3.1 (drive-software.com) | ||
applications, documents, and URLs, and over 80 other actions to hot keys - Create shortcut keys supporting both mouse and keyboard macros - Minimize any window to the system tray with this utility - Hide application windows by using a hotkey or an icon in the system tray - Control your Winamp player - Open, Play and Close your CD-ROM - Lock and Unlock your | |||
Updated: 2, 2006 | Rating: 144 | Author: Dmitri Drive | Size: 914 kb | Shareware Go to category: Desktop > Other Similar programs | |||
233. | Active Keys 2.31 (softarium.com) | ||
true? No! Softarium.com is here ready to offer its amazing Active Keys software that will turn your ordinary keyboard into full-blown remote controller for your entire system. That's right! No more miles of mouse moves and injured wrists, no more hassle and interface havocs! Just total control of your entire Windows system using any keyboard at hand! Active | |||
Updated: 2, 2006 | Rating: 613 | Author: Softarium.com Softarium.com | Size: 1628 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
234. | Active Key Logger 3.0 (winsoul.com) | ||
Key Logger this is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Key Logger on your computer, it will allow you to make program settings for tracking activities on your computer. If you enable "Run Active Key Logger when windows start" then the program will run | |||
Updated: 2, 2006 | Rating: 242 | Author: Alex Atushev | Size: 703 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
235. | Cursor Hider 1.4.4 (softexe.com) | ||
does not cover the entered text) while you are working with the keyboard and returns the pointer with any mouse action. Real example: You are going to visit aweb site with forms to fill in. At first you type the URL in the browser's address bar - www.softexe.com. What do you think about the dot behind softexe? To be or not to be (already typing)? For URL checking you have | |||
Updated: 2, 2006 | Rating: 0 | Author: Nickolas Smith | Size: 279 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
236. | Acronis Privacy Expert Suite 9.0 (acronis.com) | ||
and other malicious programs. Our latest version, 9.0, adds key new features to ensure that your PC is not infected with malware: - Rootkit removal automatically detects rootkits and enables users to remove these programs - Quarantine places detected spyware items to the quarantine store before removal - Enhanced malware shield allows you to set the level of protection you | |||
Updated: 2, 2006 | Rating: 169 | Author: Acronis | Size: 4335 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
237. | Access Lock 2.83 (getfreefile.com) | ||
to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only thing is available in this mode is a pop-up password-entry dialog with an input area for the password that restores your desktop to working condition. Access Lock enables | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
238. | Access Lock 2.83 (softheap.com) | ||
to disable and hide your desktop. While it is locked, the system keys and taskbar are disabled and the mouse cursor is trapped, unauthorized password entries are met with an audio alert and logged to disk. The only thing is available in this mode is a pop-up password-entry dialog with an input area for the password that restores your desktop to working condition. Access Lock enables | |||
Updated: 2, 2006 | Rating: 99 | Author: Ixis Ltd | Size: 795 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
239. | Access Manager for Windows 6.14 (softstack.com) | ||
Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific | |||
Updated: 2, 2006 | Rating: 55 | Author: IM Soft | Size: 913 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
240. | Access Administrator 4.14 (softheap.com) | ||
protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while the user "Admin" has | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Keyboard keys software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|