|
||||||
|
||
|
Home > Computer pet software |
Related keywords: computer, computer security, computer game, Computer, computer software, computer backup, computer games, computer monitoring, computer animation software, computer graphics |
|
|
91. | Ping Alarm 1.4 (Pingalarm.narod.ru) | ||
small and convenient program is intended for watching for presence computers at the Net. The program sends the request with a specific interval, determined by the user to selected computer. If it is exist - works alarm and programm issues the message "Name_of_the_computer is exist ". Also alarm | |||
Updated: 9, 2005 | Rating: 1664 | Author: Roman Balabolko | Size: 290 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
92. | RPN Engineering Calculator 6.3.2 (j-a-associates.com) | ||
Right Triangle, and any Defined Plane Triangle problems, also computes the trig functions, as well as some hyperbolic functions. Converts Radians to Degrees, and Hours, Minutes, Seconds to Decimal Hours and vice versa. Convert; thousands of conversion plus more than 40 physical constants and many specific gravities. This RPN Calculator offers a choice of more than 250 solutions | |||
Updated: 2, 2006 | Rating: 0 | Author: Jim Allen | Size: 1466 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
93. | SafeCryptor 1.5 (gemiscorp.com) | ||
or family. SafeCryptor is the encryption system where your own computer is your unique key, especially suitable for the secure transfer of passwords between two computers. Some of its features and benefits are: - Recipients just need their own computers for decrypting the information; their computers are their unique keys. - Robust and complex encryption scheme | |||
Updated: 9, 2005 | Rating: 0 | Author: GemiScorp | Size: 1472 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
94. | SafeHouse Hard Drive Encryption 2.10 (pcdynamics.com) | ||
on-the-fly encryption for your notebook or desktop personal computer. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse encrypted volumes appear on your PC as another Windows drive letter. All encryption is performed automatically and transparently on the fly. You can do anything with a SafeHouse virtual drive | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Avritch | Size: 1972 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
95. | ShutDown NOW! 4.6 (dworld.de) | ||
systems, like MS-Windows 2000 and XP. - SHDN! can shut down your computer comfortable, professional and securely, supporting all capabilities provided by the installed operating system, and additionally offers a big variety of tricky features, you never will find elsewhere. - SHDN! has built-in more than 5 different timer/countdown features for up to 1,000 planed events, provides | |||
Updated: 9, 2005 | Rating: 93 | Author: Carsten Stratz | Size: 1467 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
96. | SmartMOUSE 2.2 (uiexpert.com) | ||
*Increased working productivity. *Early prevention of computer-related illness. Specifically, SmartMOUSE provides you the following features: 1. Just Wheel It : Directly use wheel button to scroll the window under cursor. No need to click. 2. Smart Move : Automatically move cursor onto dialog box center or the button on it. 3. Easy Switching : Switch to the | |||
Updated: 9, 2005 | Rating: 132 | Author: Liang Zhang | Size: 1942 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
97. | Terminator Collection 1.0 (pxcompany.com) | ||
from the famous movie. Destined leader John Conner, who now runs a computer programming company, was the target of the machines. When Conner hacks into Cyberdyne Systems' computers, he discovers the top-secre operation "Skynet." Soon, two terminators descend from the future. Originally | |||
Updated: 3, 2005 | Rating: 0 | Author: Parallaxis software | Size: 2753 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
98. | TrojanShield 2.20 (trojanshield.com) | ||
hackers and Trojan viruses. If a hacker tries to break into your computer, Trojan Shield automatically warns you so you can take action against them. You don't need to be a computer expert to use Trojan Shield, Just install it and let it go to work. The trial edition of Trojan Shield is fully functional for 15 days, during which time you can disinfect any trojans which you | |||
Updated: 9, 2005 | Rating: 0 | Author: Lewis Guest | Size: 2072 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
99. | Wipe Expert 1.60 (bodrag.com) | ||
internet browsing is the recording of many confidential data on your computer: visited pages, credit card info, passwords? Did you know that by simply deleted a document stored on your computer, it continues existing on your hard drive and can be easily recovered? Anyone with access to your | |||
Updated: 2, 2006 | Rating: 16 | Author: Dragos Diaconescu | Size: 2984 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
100. | Client for Remote Administrator 2.1 (volmsoft.com) | ||
control program that enables you to work on one or more remote computers from your own. It is a complete remote control solution with all key features such as File Transfer, NT security, Telnet and Multilanguage support included. === What is the "Client for Remote Administrator" ? Those who is already familiar with program Remote Administrator, know that its address book is | |||
Updated: 9, 2005 | Rating: 16 | Author: Vladimir Shevchenko | Size: 938 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Computer pet software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|