|
||||||
|
||
|
Home > Security software software |
Related keywords: software, security, Software, Security, RAD Software, free software, spy software, backup software, computer security, internet security |
|
|
401. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
402. | 007 Spy Software 3.86 (e-spy-software.com) | ||
Spy Software is a stealthy monitoring spyware which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
403. | StrongDisk Pro 3.0 (PhysTechSoft.com) | ||
tokens and smart cards. File keys also can be used as additional security measures. - Additional means against sensitive data leakage and system failures. - Supports NTFS, FAT32 and FAT16 protected disks. - Compatible with MS Windows 95/98/Me/NT/2000/2003/XP. StrongDisk Pro is the most proven and | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
404. | AB Password Generator 2.33 (ab_software.tripod.com) | ||
at your choice. The list can contain up to 999999 passwords. This software can generate random passwords with length between 1 and 999 characters. You can choose that your generated password to contain letters and/or numbers and/or symbols and/or your predefined text. Your specific text can be add at | |||
Updated: 3, 2005 | Rating: 605 | Author: AB Software | Size: 1572 kb | Shareware Similar programs | |||
405. | AB Screen Locker 3.62 (ab_software.tripod.com) | ||
the desktop icons are hidden too. If the system is restarted, this software will automatically load with Windows and your PC will be locked. The password used to lock and unlock the screen can contain any type of character with any length (but minimum 3). The application is loading very fast and it has a nice, friendly GUI. A small utility that allows you to lock your screen. Any key | |||
Updated: 3, 2005 | Rating: 569 | Author: AB Software | Size: 1510 kb | Shareware Similar programs | |||
406. | ABC CHAOS 2.71 (safechaos.net) | ||
ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. What can you do with ABC CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. | |||
Updated: 3, 2006 | Rating: 0 | Size: 438 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
407. | Captain Mnemo Pro 1.41 (refog.com) | ||
how many potential threats are out there. That is why computer security becomes the major issue these days. As a solution for ever increasing data security fears many programs and services offer password protection. And to be honest, password protected environments are becoming actually secure being supported by latest technology advancements such as rock-solid encryption | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 898 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
408. | Crime Catcher 3.0 (crime-catcher.com) | ||
Catcher is software for your webcam that allows your computer to act as a security system. The Professional Edition supports upto 4 webcams/input devices so security can be maximized. The webcam software will monitor for movement or motion. If motion is detected pictures will be taken of what the webcam can see! You can of course have other actions take place | |||
Updated: 9, 2005 | Rating: 0 | Author: Edward Torkington | Size: 4262 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
409. | Digital Patrol 5.00.10 (antiviraldp.com) | ||
Digital Patrol is an effective antivirus scanner and monitor capable of finding and deleting all known types of trojan programs, Internet worms, script viruses and other harmful programs. Digital Patrol finds and deletes computer viruses in your computer disks and memory. The program has a unique system of | |||
Updated: 9, 2005 | Rating: 0 | Author: Proantivirus Lab | Size: 3413 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
410. | File Shredder 2.0 (mazepath.com) | ||
with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not physically remove deleted files from your hard drive. You think they are gone, but they can be easily | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
411. | Mutilate File Wiper 2.92 (home.att.net) | ||
data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate securely deletes sensitive files. Use Mutilate to prevent attempts to recover sensitive deleted files from your hard drive by data recovery or forensic | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
412. | Password Security Vault 2.0 (hirtlesoftware.com) | ||
Security Vault stores your personal passwords as well as login names for Internet sites. Most Internet users have numerous web sites which they frequent that require memberships. Simply remember your password for this software and you can forget every other password since this program will keep track of them for you. Includes many handy features to make your web surfing a | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 4764 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
413. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
414. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
415. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
416. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
417. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
418. | PC LockUp 2.185 (softheap.com) | ||
LockUp is a computer security software, which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and shows a picture, which you can change in the options. An allowed time schedule and | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
419. | PowerKey 2.11.01.22 (elcor.net) | ||
PowerKey is an advanced encryption toolkit designed to protect your most sensitive data. Thanks to its easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It | |||
Updated: 2, 2006 | Rating: 0 | Author: Nick Nifontov | Size: 1029 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
420. | #Remove Access Security 3.0 (e-tech.ca) | ||
Access Security 3.0' is the ultimate tool concerning security for Access databases. 'Remove Access Security' can reveal passwords, reset passwords and remove user-level security for secured and non-secured database (.MDB) files. This software is simple to use, and can be a real life-saver in a variety of situations, including corrupted passwords | |||
Updated: 9, 2005 | Rating: 102 | Author: Neil Britto | Size: 350 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
421. | S.O.S.Automation 1.01 (sosautomation.com) | ||
- Medical monitor and alarm system. Implemented in software for a home PC. constantly monitor the surroundings and call you upon emergency. This is extremely useful for infants and dependent. Calls you automatically upon an alarm event. Upon an alarm event it enables you to monitor the PC surrounding | |||
Updated: 2, 2006 | Rating: 39 | Author: Izack Lesher | Size: 3000 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
422. | SecureWord 1.5 (cezeo.com) | ||
We also use RipeMD- European standard of digital signature, SHA- Security Hash Standard of the National Institute of Standards and Technologies of USA, TwoFish- of Counterpane Inc.- a well-known encryption algorithm of an established company. An improved security system. Convenient and easy interface. We designed it with special attention because the ease of your work depends | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
423. | SpyAnytime PC Spy 2.4 (waresight.com) | ||
is a powerful spy software to secretly track all activities of computer users with just a single click, and it does NOT require you to have advanced computer skills at all. It allows you to monitor and record all areas of computer usage, e.g. keystroke, e-mail, online chat, passwords, Web sites, and take screen snapshots every few seconds like a surveillance camera. Features include | |||
Updated: 9, 2005 | Rating: 0 | Author: Jason H | Size: 1400 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
424. | Tweak Manager 2.12 (winguides.com) | ||
every aspect of your computer, including tweaks for popular software like Microsoft Office and Internet Explorer. - Customize your computer with over 1000+ powerful tweaks - Secure Windows with hundreds of restrictions and policies - Tweak popular software like Internet Explorer and Office - Easily download new and updated tweaks using Live Update Take complete control | |||
Updated: 9, 2005 | Rating: 42 | Author: WinGuides Software | Size: 1721 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
425. | Tweaki...for Power Users 4.3.5 (jermar.com) | ||
even apply changes to multiple computers at once. No need to install software on every computer -just connect to the computers remotely. Designed for *all* Windows operating systems, Tweaki is your Swiss Army knife of utilities. Configure, secure and optimize Windows, tweak Microsoft Office, validate your Internet Explorer links -and much more. Tweaki, more than just a system | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Rawdon | Size: 3658 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
426. | WatchetBurn! 2.72 (watchetsoft.co.uk) | ||
technology writes direct to all types of CD/DVD with no additional software required. Create multi-session archives or automated backup projects. Writes only updated files - save space/ time but can locate files from any session on the backup. WatchetBurn! creates revolutionary see-thru disks - all | |||
Updated: 3, 2005 | Rating: 0 | Author: Colin Balkham | Size: 5711 kb | Shareware Similar programs | |||
427. | WinTasks 5 Professional 5.03 (lidownloads.com) | ||
ultimate power utility software that arms users with a comprehensive set of tools to put them in full control of their computer. WinTasks 5.0 Professional provides you with a wealth of information and a powerful set of tools that will help you enhance the protection against system security threats while dramatically increasing computer performance. The award-winning | |||
Updated: 9, 2005 | Rating: 0 | Author: Johan Malmberg | Size: 3697 kb | Demo Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
428. | iTrack Workgroup 2.1 (softopia.com) | ||
mail. It is a fully multi-user system with definable levels of security and access privileges, supporting any network supported by Windows 95 or Windows NT. Because the database is stored in Microsoft Access format, you can use any of the features available in Access to manipulate your data. Any query can be exported to Excel XLS, HTML, or a formatted text file. iTrack supports | |||
Updated: 3, 2005 | Rating: 0 | Author: Mark Chenault | Size: 13680 kb | Shareware Similar programs | |||
429. | Task Manager 2005 (orbisoft.com) | ||
Orbisoft's top-rated Task Manager 2005в„ў task management software to get organized and manage all your team's jobs and tasks effortlessly. Task Manager 2005 can be used personally or in a team environment to track personal and shared tasks, jobs (including customer jobs) and projects. Get a quick-view of all your tasks, guard against missed deadlines, balance workloads automatically | |||
Updated: 9, 2005 | Rating: 0 | Author: Orbisoft Development | Size: 15088 kb | Demo Go to category: Business > Project Management Similar programs | |||
430. | PDF to Text (pdf2text) SDK-COM 3.0 (verypdf.com) | ||
SDK-COM can convert pdf to text file, it does not need Adobe Acrobat software, it has high speed in pdf to text conversion, you can use it to convert pdf to text file, you can convert a lot of pdf files on the fly to text files once time! Function and face: 1.pdf to text SDK-COM supports extract external text to txt file. 2.pdf to text SDK-COM can keep the text layout in pages | |||
Updated: 9, 2005 | Rating: 0 | Author: verypdf verypdf | Size: 583 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
431. | BREAKTRU PAYROLL 2006 10.1.0 (breaktru.com) | ||
the deductions and withholding too much or too little? Payroll 2006 software makes it easy to keep track of your weekly or bi-weekly pay checks. Enter the hours worked as well as overtime, holiday, sick leave, and other pay categories, then Payroll 2006 applies the withholding tax rates for federal | |||
Updated: 3, 2006 | Rating: 0 | Author: David Giordano | Size: 6501 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
432. | eResponse 6.1.3 (mail.bonafide.com) | ||
order fulfillment, customer service and inventory management software for small to medium size online stores and mail order operations. Easily export inventory information to multiple online stores such as; Store.net, Yahoo Store, Half.com, Nextag.com, Amazon.com and integrate to existing online stores. Import customer orders directly from these stores eliminating double entry | |||
Updated: 3, 2005 | Rating: 0 | Author: Art Canlas | Size: 22872 kb | Demo Similar programs | |||
433. | Fixed Asset Pro 2006 4.0 (softdomain.net) | ||
Asset Pro 2006 is a full-featured fixed asset management software that has been specifically designed to assist companies of all sizes to account for and manage their fixed assets. It provides end-users with intuitive interface, ease of use and minimum learning process. Designed to cater for a wide range of business, the program provides complete management control over fixed | |||
Updated: 2, 2006 | Rating: 0 | Author: Chong Fatt Chee | Size: 20150 kb | Shareware Go to category: Business > Inventory & Barcoding Similar programs | |||
434. | NewWayService 2.19 (orologic.com) | ||
is the Help Desk software solution designed to maximise your service centre or call centre department. Whatever your industry, NewWayService allows you to easily track and manage calls, issues, jobs, requests or work orders. With its very user-friendly environment, no intense training is needed to learn to use it. Flexible, NewWayService adapts itself to your needs | |||
Updated: 3, 2006 | Rating: 0 | Author: Sales Department | Size: 21313 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
435. | MICR Font Set 3.4 (micrfonts.com) | ||
fonts come in Windows TrueType and PostScript formats. Note: Optio software users need our LaserJet PCL version, not the TrueType version. Print your own checks from Windows, using any laser printer! You get our MICR fonts (which include the numbers 0 - 9, On-Us, Transit, Amount, and Dash), a calibration program, and our Secure Fonts used in printing check amounts and payee | |||
Updated: 2, 2006 | Rating: 0 | Author: Gary Elfring | Size: 1166 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
436. | StrongDisk Pro 3.0 (strongdisk.com) | ||
tokens and smart cards. File keys also can be used as additional security measures. - Additional means against sensitive data leakage and system failures. - Supports NTFS, FAT32 and FAT16 protected disks. - Compatible with MS Windows 95/98/Me/NT/2000/2003/XP. StrongDisk Pro is the most proven and | |||
Updated: 9, 2005 | Rating: 0 | Size: 1914 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
437. | Silver Key 3.3 (kryptel.com) | ||
will probably not like the idea of buying and learning some software just to decrypt your file. No problem here if you are using Silver Key! Right-click the file or folder you wish to send and select the “Create EXE Parcel” command. Silver Key compresses and encrypts your data and adds a small decryptor program. Your correspondent doesn’t need to install any decrypting | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 3935 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
438. | SpyMyPC PRO 1.9 (benutec.com) | ||
PRO is award-winning, highly flexible, all-round desktop security monitoring solution, the best choice if you want to know what others are doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, Internet connections, passwords and chat conversations. SpyMyPC PRO also includes advanced stealth mode features to prevent | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 666 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
439. | AES Free 2.5 (abensoft.com) | ||
files are executable programs (EXEs) that contain a AES-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting AES-files simply by running it like any other program. No other software is needed. These self-extracting AES-files are ideal | |||
Updated: 9, 2005 | Rating: 0 | Size: 515 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
440. | AES Home 4.0 (abensoft.com) | ||
are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt answer-back messages with the proper password. No other software is required. These active AES-files are ideal for safe electronical distribution of the information | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
441. | AES Pro 5.5 (abensoft.com) | ||
key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active public keys are ideal to create communication with the users who do not have the PGP or CHAOS Public Key programs | |||
Updated: 9, 2005 | Rating: 36 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
442. | Active CHAOS 5.0 (safechaos.com) | ||
key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is required. These active public keys are ideal to create communication with the users who do not have the PGP or CHAOS programs installed | |||
Updated: 9, 2005 | Rating: 42 | Size: 996 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
443. | CHAOS Compressor 3.0 (safechaos.com) | ||
Data compression utility, which allows you to quickly open, create, and modify your archives. Data compression utility, which allows you to quickly open, create, and modify your archives. | |||
Updated: 9, 2005 | Rating: 0 | Size: 491 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
444. | CHAOS Generator 2.4 (safechaos.com) | ||
CHAOS Generator is an application designed to generate passwords of any length and character content. CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. The passwords are displayed and can be copied to your clipboard. CHAOS Generator is an application designed to generate passwords of any length and character content | |||
Updated: 3, 2006 | Rating: 0 | Size: 116 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
445. | CHAOS Messenger 4.0 (safechaos.com) | ||
are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable Chaos files that anyone can use to encrypt messages with the proper password. No other software is required. These active | |||
Updated: 9, 2005 | Rating: 0 | Size: 698 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
446. | CHAOS Shredder 3.0 (safechaos.com) | ||
your disk, without the possibility to recover it by any practical software or hardware | |||
Updated: 3, 2006 | Rating: 0 | Size: 195 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
447. | CHAOS Self Decryptor 3.9 (safechaos.com) | ||
are executable programs (EXEs) that contain a chaos file and the software necessary to decrypt the contents. Users can create self-decrypting executable files that anyone can decrypt with the proper password. No other software is needed. These self-decrypting chaos files are ideal to electronically distribute the information safely because they contain multiple compressed and | |||
Updated: 9, 2005 | Rating: 0 | Size: 535 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
448. | CHAOS Self Extractor 3.85 (safechaos.com) | ||
are executable programs (EXEs) that contain a chaos-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting chaos-files simply by running it like any other program. No other software is needed.These self-extracting chaos files are ideal to electronically distribute the information because they contain multiple | |||
Updated: 9, 2005 | Rating: 0 | Size: 520 kb | Freeware Go to category: System Utilities > File Compression Similar programs | |||
449. | NFS client and server for windows ProNFS 2.6 (labtam-inc.com) | ||
for windows 95/98/ME/NT/2000/XP/2003 ProNFS. Network File System software with high performance file sharing connectivity capabilities. ProNFS Server can be installed on any Windows 95/98/ME/NT/2000/XP/2003 PC to share your local drives and folders with other networked users, no matter which operating system they are running on their workstations. Only a NFS Client is required on | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 4971 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
450. | iMediaCONVERT 3.3.19 (imedialearn.com) | ||
presentation can be easily viewed with any web browser. No special software is required, since 98% of the browsers have the Flash plug-in already installed. When performing the conversion, the size of the output files is reduced with up to 90%, which is till to 3 times better than with other leading | |||
Updated: 2, 2006 | Rating: 381 | Author: iMediaLearn iMediaLearn | Size: 7770 kb | Commercial Go to category: Education > Teaching & Training Tools Similar programs | |||
|
Home > Security software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|