|
||||||
|
||
|
Home > Content delivery software |
|
|
1. | Mystica 5.46 (dawntec.com) | ||
Mystica is a versatile image generator capable of creating custom images and movies for a variety of projects. Rather than designing standard still images, the program allows you to produce actual artwork. All images are exportable in all major graphics formats. Versatile artwork generator capable of creating custom images for a variety of projects. | |||
Updated: 3, 2006 | Rating: 0 | Author: Thomas Renn | Size: 3936 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
2. | Smart MP3 Renamer 1.4.0.5 (jiisoft.com) | ||
the files according to the found tags and/or their filename. It's also possible to write and remove album cover pictures from the id3 tags. Includes an advanced ID3 tag editor that supports soundtracks/releases with multiple artists. The Program is also capable of downloading track lengths to ensure the validity of your mp3 albums. There are several options available for | |||
Updated: 3, 2006 | Rating: 107 | Author: Jonatan Dahl | Size: 623 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
3. | WireChanger 3.5.0 (wiredplane.com) | ||
each with its own weight. The weight determines how often theme`s images will appear in the wallpaper rotation. Themes can be synchronized with specific folder content, so all new images will be added automatically at WireChanger startup. About templates. Template can overlay your wallpaper image with useful information (Example: weather forecast or famous people`s | |||
Updated: 3, 2006 | Rating: 0 | Author: WiredPlane.com | Size: 3590 kb | Shareware Go to category: Desktop > Other Similar programs | |||
4. | Steganography 1.7.1.1 (securekit.com) | ||
an excellent method of embedding information on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while | |||
Updated: 2, 2006 | Rating: 1019 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | Steganography 1.7.1.1 (pipisoft.com) | ||
an excellent method of embedding information on the contents of the file within another file! Make your secrets invisible in just 3 quick steps! Steganography enables you to use digital data hiding techniques (steganography) to hide files and messages within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while | |||
Updated: 2, 2006 | Rating: 0 | Author: Rachel White | Size: 1106 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | FileMonkey 10.22 (monkeyjob.com) | ||
Main features include: Perform search and replace on multiple file contents, names or folder names using wildcards such as asterisk. Rename files or folders to match a sequence or crop names. Copy or move files. Split, join, or merge target files. Change attributes of files or directories. Convert file | |||
Updated: 2, 2006 | Rating: 61 | Author: monkey job | Size: 2098 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
7. | Advanced Scrolling Text Software 4.5 (jpowered.com) | ||
process. This applet is designed to read a text file and display the contents within your web page in scrolling format. There are many advanced features which places this product above other news and text scrollers. Main Features Summary Multi-Language Support Adjustable Scroll Speed Images can be | |||
Updated: 2, 2006 | Rating: 318 | Author: Patrick OBrien | Size: 91 kb | Shareware Go to category: Web Development > Java & JavaScript Similar programs | |||
8. | Data Destroyer 7.31 (hermetic.ch) | ||
Windows 'deletes' a file it does not actually destroy the contents of the file but rather simply unlinks the file from the file directory system, leaving the contents of the file in the disk sectors. This data will remain there until the operating system uses those sectors when writing new data. Until the old data is overwritten (and this may take months or longer) it can be | |||
Updated: 2, 2006 | Rating: 16 | Author: Peter Meyer | Size: 1826 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
9. | 1st Mass Mailer 3.0 (softstack.com) | ||
Mass Mailer lets you organize a subscription on your web site, it's easy-to-use, and configuration is very simple. The program allows to quickly import the list of respondents into its internal database, do filter based manipulations on the list, sort and search for duplicate emails and enable or disable individual emails. 1st Mass Mailer allows you to create and manage large mailing | |||
Updated: 2, 2006 | Rating: 159 | Author: IM Soft | Size: 1689 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
10. | Advanced Password Generator 2.87 (segobit.com) | ||
designed to generate passwords of any length or character content. This application is used by network administrators, internet service providers and others to create and administer passwords. It is fast, small and easy to use. Advanced Password Generator gives users a choice of random number generators that produce extremely random seed values. Random number generators are | |||
Updated: 2, 2006 | Rating: 16 | Author: Segobit Software Segobit Software | Size: 177 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Content delivery software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|