|
C: \ Search results |
Showing: 281-290 of 309 |
|
ShareCrypt 2.1 by: SecurStar GmbH
|
|
Strong encryption algorithms such as AES 256 bit and Blowfish 448 Bit.
License: Shareware, Price: $59.13 US
[read more] [download]
|
Downloads: 191
Size: 3683 K
Date: 2006-09-08
|
Keywords: ShareCrypt, DriveCrypt, Server Encryption, Multy user access, share, shared, SecurStar, network encryption, full disk encryption, hard disk encryption, disk encryption
|
|
Electric Field 2.01 by: Nasanbat Namsrai
|
|
An excellent tool for visualizing electric field and equipotential lines.
License: Freeware, Price: $0.00 US
[read more] [download]
|
Downloads: 206
Size: 827 K
Date: 2006-08-29
|
Keywords: electric field, electric field line, equipotential surface, charge, drawing electric field line, physics educational software, physics academic software, Nasanbat Namsrai, nasanbat@gmail.com
|
|
Babala 0.4.0 by: Pavel Richter
|
|
Fend off evil muggers, requires keen strategy! 200 levels, a blistering ascent
License: Freeware, Price: $0.00 US
[read more] [download]
|
Downloads: 231
Size: 467 K
Date: 2006-08-23
|
Keywords: free puzzle game, logic game, mind game, strategy game, moves, shots, solve, freeware, compete online, score contest, user forum, high score post, arsenal, bomb, enemy, shoot, fantasy, difficulty, challenge
|
|
Sort Text Lists Alphabetically Software 7.0 by: Sobolsoft
|
|
Sort content of files in alphabetical order.
License: Shareware, Price: $29.99 US
[read more] [download]
|
Downloads: 231
Size: 338 K
Date: 2006-06-11
|
Keywords: alphabetical, alphabetizing, alphabetize, file, sorting, order, labels, last names, alpha, address, columns, rows, one, two, three, four, 1, 2, 3, 4, field, entry, entries, auto, automatically, listing, numerically, numeric, rank, string, array
|
|
Impersonator 1.77 by: DimaWare
|
|
An automated "Run As" program that provides options not included in Windows
License: Shareware, Price: $35.00 US
[read more] [download] [buy now]
|
Downloads: 298
Size: 245 K
Date: 2006-06-10
|
Keywords: runas, run as, run process as different user
|
|
Remote Shutdown 3.4 by: Coruscant Ltd.
|
|
Shutdown mutiple remote workstations over a network with a number of options.
License: Shareware, Price: $44.99 US
[read more] [download]
|
Downloads: 233
Size: 336 K
Date: 2006-05-31
|
Keywords: Coruscant, Remote, Shutdown, NT, delayed, reboot, restart, network, users, log off, log out, server, power-off, APM, Windows, admin, administrator, domain, PDC, cluster, trust relationship
|
|
Defocus Dei 4.0 by: Mootools
|
|
Post production depth of field & depth effects generator on 3d images
License: Shareware, Price: $79.00 US
[read more] [download] [buy now]
|
Downloads: 218
Size: 5459 K
Date: 2006-05-22
|
Keywords: defocus, focus, circle of confusion, depth of field, post production, z, buffer, zbuffer, depth, 3ds max, lightwave, cinema 4d, vue, esprit, maya, softimage, realistic
|
|
Excel Find and Replace Comments Software 7.0 by: Sobolsoft
|
|
Replace comments in MS Excel.
License: Shareware, Price: $19.99 US
[read more] [download]
|
Downloads: 249
Size: 340 K
Date: 2006-05-14
|
Keywords: search, replacing, searching, finding, fields, value, cell, text, removing, change, name, mass, worksheet, sheet, workbook, duplicates, edit, look in, match
|
|
HyperText Studio, Team Edition 5.0 by: Olson Software Limited
|
|
Team authoring WYSIWYG tool creates and manages online Help and Web sites
License: Shareware, Price: $499.00 US
[read more] [download]
|
Downloads: 303
Size: 31855 K
Date: 2006-03-31
|
Keywords: HTML, Web, Site Management, WYSIWYG, CSS, Cascading Style Sheets, Web Site, Web Authoring, Authoring, WinHelp, HTML Help, Help Authoring, Multiuser, Team, Enterprise
|
|
XPcop 1.0 by: Nliven Technologies
|
|
Parental control utility with advanced system security & user administration
License: Shareware, Price: $29.99 US
[read more] [download] [buy now]
|
Downloads: 208
Size: 4029 K
Date: 2006-01-06
|
Keywords: Parental control software, Internet Security, System Security, Bandwidth Monitoring, parental control software, internet security, badwidth monitoring, system security, User Profile based security, Application (exe) Control, Complete System Security
|
|
|
|
|