|
||||||
|
||
|
Home > Keyboard keys software |
Related keywords: keyboard, keys, Keyboard, hot keys, midi keyboard, keyboard monitor, keyboard macro, keyboard utility, keyboard logger, virtual keyboard |
|
|
31. | Intellisys Project Desktop 3_00 (webintellisys.com) | ||
Print out HTML/PDF reports, task-lists and Gantt charts. Has all the key functionality of MS Project, without the complexity. Runs on Mac, Linux, Unix and Windows. Features include automatic scheduling, dependencies between projects, Gantt charting, customizable HTML/PDF reports, customizable working | |||
Updated: 3, 2006 | Rating: 0 | Author: Intellisys Support | Size: 18455 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
32. | WireKeys 3.4.1 (wiredplane.com) | ||
manager that helps you to work in Windows. Hot key oriented with extensive tray menu support. The real "One for all" application. Some features: Additional clipboards, Screenshot helper, task manager. Can minimize any application to tray and more. Every action can be connected to the incredible hotkeys including multimedia keys (mmkeys). WireKeys allows user to automate | |||
Updated: 3, 2006 | Rating: 16 | Author: WiredPlaneWiredPlane.com | Size: 2490 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
33. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
34. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
35. | Keyboard Sounder 1.32 (aldzsoft.com) | ||
3D sound effect when a keyboard button or mouse key is pressed. Features: support to play animation when the button is pressed. Multi schemes, built-in 6 sound schemes - Typewriter,Typewriter2, Fight, Gun, Abe, Mix. Each scheme consists of 15 keyboard and 3 mouse button's events Supports to toggle schemes by hotkey and to provide powerful Hotkey Editor | |||
Updated: 3, 2006 | Rating: 0 | Author: aldz lan | Size: 2213 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
37. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
38. | Free Asmw Eraser Pro 3.4 (asmwsoft.com) | ||
features include a secure file-shredder, scheduled cleanups, Boss Key, and support for Netscape and Opera. Asmw Eraser Pro completely implements the US Department of Defense DOD 5220.22-M and NSA clearing and sanitizing standards, You can then completely overwrite files with random characters making them unrecoverable by undelete or un-erase utilities giving you confidence that once | |||
Updated: 3, 2006 | Rating: 91 | Author: asmwsoft | Size: 1700 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
39. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
40. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
41. | UninsHs 2.1.0.92 (han-soft.com) | ||
This extension program for Inno Setup allows you to add repair, modify and remove support to your applications with minimal effort. It is very small because use Assemble. Please read the readme file included in the package for further instructions on how to use UninsHs with your own application setups | |||
Updated: 3, 2006 | Rating: 391 | Author: JING YU HAN | Size: 26 kb | Freeware Go to category: Development > Install & Setup Similar programs | |||
42. | WinCatalog Standard 1.53 (wincatalog.com) | ||
WinCatalog Standard takes cataloging to the next level. This software is as easy-to-use and friendly as the Light version, but at the same time it is much more powerful and functional. Many features of this program were inspired by users' requests and feedback. WinCatalog Standard makes managing your | |||
Updated: 3, 2006 | Rating: 42 | Author: Michael Rusakov | Size: 1667 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
43. | 1KeyTools GetEmAll Kyb IE 2.00 (1keytools.com) | ||
to learn. Benefits over other offline browser tools: Uses keys within the browser itself and on on all message screens for fast easy navigation. Creates lists of links chosen and remembers link text and their sources. Will determine which links on a page are already available offline. Don't sit waiting for your computer. Make your computer wait for you. Get selected links | |||
Updated: 3, 2006 | Rating: 16 | Author: David Gardner | Size: 3216 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
44. | ezPower POS (Point of Sale) 8.4 (denverresearch.com) | ||
and cost-effective point of sale solution. Touch Screen, Scanner or Keyboard/Mouse operation. Network compatible, Process Sales and Manage Inventory. Track Sales, Commissions, Sales Staff, Cashiers, Vendors and Customers. Products can be sold or rented, have a vendor, category, department and | |||
Updated: 3, 2006 | Rating: 126 | Author: Ronald Lowrance | Size: 764 kb | Demo Go to category: System Utilities > Other Similar programs | |||
45. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
the password manager directly from the tray menu; a virtual keyboard created in order to prevent any key logger software from stealing your passwords; a shredder that helps you destroy beyond recovery files, folders and internet traces; a locker that allows you to password protect certain applications; the ability to create self-decrypting packages and mail them to your | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
46. | Dekart Private Disk 2.07 (dekart.com) | ||
backups of the contents of the disk, and of the encryption key. This makes disaster recovery a simple process. All the information protected by Dekart Private Disk is transparently encrypted with Dekart's NIST-certified implementation of AES 256-bit -the strongest encryption algorithm available today. Powerful, reliable and flexible AES-256 disk encryption program. Hides | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
47. | PRTG - Paessler Router Traffic Grapher 5.2.0.574 (paessler.com) | ||
the network. Understanding bandwidth and resource consumption is the key to better network management: Avoid bandwidth and server performance bottlenecks; Find out what applications or what servers use up your bandwidth; Deliver better quality of service to your users by being proactive; Reduce costs | |||
Updated: 2, 2006 | Rating: 16 | Author: Dirk Paessler | Size: 9813 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
48. | BPS Spyware and Adware Remover 9.3.0.0 (bulletproofsoft.com) | ||
BPS Spyware/Adware Remover is a program that eliminates all adwares, spywares, viruses, Dialers, and hijackers that might exist on your PC. BPS Spyware/Adware Remover is a program that uses a database with tens of thousands fingerprints of spyware adware, trojans and worms that can be updated automatically to | |||
Updated: 2, 2006 | Rating: 122 | Author: BulletProof Soft | Size: 8238 kb | Demo Go to category: System Utilities > Other Similar programs | |||
49. | PrintAdapters 2.1.0.2 (winformreports.co.uk) | ||
style editing which is fully integrated with Visual Studio .NET. Key product features include: * Use the appropriate PrintAdapter component in place of the standard .NET PrintDocument class so easily add multipage printing of the ListView, TreeView and RichTextBox control's contents to a .NET application. Also prints DataTable and DataView using the same styling options | |||
Updated: 2, 2006 | Rating: 0 | Size: 1176 kb | Commercial Go to category: Development > Other Similar programs | |||
50. | EXECryptor 2.3.7 (softcomplete.com) | ||
It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents illegal creation of keygen. EXECryptor supplies you with one-touch trial technology that allows to turn your full-feature application in 'try-before-you-buy' version in a few moments without changing | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
51. | Power Clock 6.03 (powerclock.com) | ||
Power Clock, the ultimate employee time clock. Power Clock replaces the outdated mechanical time clock used in most businesses. It has many features that even the most advanced mechanical time clock can't duplicate. Now there is no reason to use an outdated mechanical device. Easy to use and familiar | |||
Updated: 2, 2006 | Rating: 0 | Author: Robbie Fletcher | Size: 3716 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
52. | EMS IB Manager 4.1 (ems-hitech.com) | ||
so clear in use that even a newbie will not be confused with it. Key Features: - Latest InterBase and Firebird versions support; - Powerful and easy-to-use graphical user interface; - Rapid database management and navigation; - Easy management of all InterBase/Firebird objects; | |||
Updated: 2, 2006 | Rating: 0 | Author: EMS Software Development | Size: 13885 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
53. | MP3 Converter - rm,asf,mpg,wmv,mp3,ogg 4.1.21 (avconverter.com) | ||
can convert RM,RMVB,WMV,AVI,MPEG,MOV,QT to MP3,WAV,AVI,WMA,OGG. Key Features: 1. Edit MP3 ID3 v1/v2 tag info. 2. Multiple OGG compressor Vorbis,FLAC,Speex,Theora. 3. Sample Rate(48K,44.1K,32K,22K,16K,8K), Stereo/Mono and Bit Rate(8kb/sec - 320kb/sec), customize the size of target audio file. 4 | |||
Updated: 2, 2006 | Rating: 414 | Author: Done Stephen | Size: 1108 kb | Shareware Go to category: Audio & Multimedia > Encoders & Decoders Similar programs | |||
54. | MP3 Converter - rm,asf,mpg,wmv,mp3,ogg 4.1.21 (avconverter.com) | ||
can convert RM,RMVB,WMV,AVI,MPEG,MOV,QT to MP3,WAV,AVI,WMA,OGG. Key Features: 1. Edit MP3 ID3 v1/v2 tag info. 2. Multiple OGG compressor Vorbis,FLAC,Speex,Theora. 3. Sample Rate(48K,44.1K,32K,22K,16K,8K), Stereo/Mono and Bit Rate(8kb/sec - 320kb/sec), customize the size of target audio file. 4 | |||
Updated: 2, 2006 | Rating: 3514 | Author: Done Stephen | Size: 1108 kb | Shareware Go to category: Audio & Multimedia > Encoders & Decoders Similar programs | |||
55. | SecureBlackbox.NET 4.3 (secureblackbox.com) | ||
to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.), including Windows Certificate Storages and cryptography hardware (USB cryptotokens, smartcards). * PGPBlackbox - clean-room implementation of all PGP algorithms and standards with support for | |||
Updated: 2, 2006 | Rating: 48 | Author: EldoS Corporation | Size: 8799 kb | Commercial Go to category: Development > C / C++ / C-sharp Similar programs | |||
56. | Advanced Encryption Package 2006 4.2.9 (secureaction.com) | ||
vary, however, in terms of how difficult the process is. AEP2006's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without needing AEP2006 or any other software. The program includes a file shredder that wipes the contents of your original | |||
Updated: 2, 2006 | Rating: 105 | Author: SecureAction Research, LLC | Size: 2558 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
57. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
vary, however, in terms of how difficult the process is. AEP2006 PRO's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without needing AEP2006 PRO or any other | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
58. | SecureBlackbox (VCL) 4.3 (secureblackbox.com) | ||
to several packages: * PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.), including Windows Certificate Storages and cryptography hardware (USB cryptotokens, smartcards). * PGPBlackbox - clean-room implementation of all PGP algorithms and standards with support for | |||
Updated: 2, 2006 | Rating: 16 | Author: EldoS Corporation | Size: 42127 kb | Commercial Go to category: Development > Delphi Similar programs | |||
59. | CDCheck 3.1.11 (elpros.si) | ||
you exactly where the problems are. Files on CDs, zip drives, USB keys etc. can get damaged in a number of ways, so the program helps you determine whether your data is safe before it's too late. The program also provides extremly fast binary compare for effectively checking that file transfers (burning, copying...) were accomplished successfully and alerts you of differences | |||
Updated: 2, 2006 | Rating: 1217 | Author: Mitja Perko | Size: 1400 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
60. | Encrypt PDF (Secure PDF) 2.2 (toppdf.com) | ||
source PDF must be an unencrypted PDF. Acrobat Reader will show a key in the bottom status bar if the PDF is encrypted. There two passwords you can apply to a PDF. The first is the owner password. Opening a PDF with this password will allow you full access to the PDF when a user password has been assigned as well. This means that even if printing was disabled you will still be | |||
Updated: 2, 2006 | Rating: 0 | Author: verypdf verypdf | Size: 759 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Keyboard keys software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|