1 2 3 4 5 6 7 8 9 10 11 12 13 14
|
|
Restrict access to your computer with Security Administrator. This password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others...
|
|
|
DLL Explorer Professional comes complete with DLL Explorer 3.0 Plus all the documentation and sample programs to unleash the power of DLL Explorer in your own apllications.
|
|
|
Save Keys 6.0 is a completely invisible key recorder that secretly records every key typed into the keyboard along with the window title of the window or program that the keys were typed into. This...
|
|
|
When Windows starts up, it automatically launches a number of programs for you. Advanced StartUp Manager is program that allows you to control what programs run at system startup when you turn on o...
|
|
|
User Finder takes the information from your WINS database to provide details of which user is logged onto which computer throughout your network. Finding users on your network just became easier. -...
|
|
|
This utility takes a server and servicename as input and checks the current status of the service. Status is returned as errorlevels that can be used in batchfiles. To get help, just execute svcsta...
|
|
|
CD-ROM Watcher allows you to control usage CD-ROM Drive and CDs that somebody can use . The most appropriate reason to use that program - to prevent your children to use CD without a supervision . ...
|
|
|
Evita que quienes usan su computadora alteren sin su autorizacion la configuracion de Windows, ademas puede configurarla para que se ejecuten solo los programas que usted autorice, funciona bajo Wi...
|
|
|
Desktop Spy 4.0 secretly takes pictures of your computer screen, records all applications loaded, web sites visited, chat conversations, E-mail activity, and anything else that is visible on the sc...
|
|
|
Wipro UWIN Base Toolkit consists of set of utilities and tools which brings you complete UNIX user environment on to Windows platform. Salient features of this product include scripting, Shell util...
|
|
|
Sometimes some programs stop working for no apparent reason. To try to understand why programs that had worked perfectly earlier have failed you need Application Integrity Checker. This utility wil...
|
|
|
It has never been so easy to monitor what users are doing on your computer system. With Key Thief 2.0 Key Serv, you may capture and log all keystrokes that are typed in any Windows application. All...
|
|
|
Task scheduler and automation software for Windows, MacOSX, and Unix. Automate multiple file ftp transfers, ftp monitor, web downloads through proxy or secure sites, monitor website for changes, do...
|
|
|
VSMC is a program which helps you in administering your virtual servers hosted on a VMware GSX 2.0 / 2.5 host. This software is only supported for Windows 32-bit OS (NT,2000,2003) and VMware GSX Se...
|
|
|
Version 2.4 brings with it many new powerful features allowing you toprotect even more of the Win95/98 operating environment than ever before.This new version provides you with group security profi...
|
|
|
Let your mouse wrap around the edges of your monitor screen.
|
|
|
What happens to your computer when you install a program or perform just about any action within Windows? What files are being installed? Where are they going? What files have been changed by the p...
|
|
|
ShadowSecurityScanner
|
|
|
At last, an affordable solution to removing temporary Internet and System filesfrom your computer. But it doesn't stop there, because with it's new Plug-Insupport there are no limitations to what c...
|
|
|
Clipboard Genie 3.5 is a very useful utility. Everything that is copied into Windows Clipboard is saved into Clipboard Genie. Text and Graphics. To retrieve it, simply click on the text or graphic ...
|
|
|
Reg Organizer offers a variety of tools required for effective System Registry and configuration files management. This software letsyou view, edit and clean the Registry and preview the registry f...
|
|
|
1to5 FileProcessor automates the processing of files. The processor can open up to 5 different applications. A free defineable macro-block for each application simulates the program control. For ex...
|
|
|
Create ODBC Data Source Names (DSNs) on the fly with the simple click of a buttonsaving your company both time and money! Imagine having to spend 3 minutes per PC tosetup a DSN. Now imagine having ...
|
|
|
This is the order form for Wipro UWIN - Runtime Licenses. Wipro UWIN Runtime Package is a customized product. Please contact Wipro UWIN at uwin@wipro.combefore ordering the Wipro UWIN Runtime Lice...
|
|
|
Capture Station 3.3 is a very handy stand-alone professionalscreen and image capturing tool that helps you take rectangular or circular snapshots anywhere and of any size from your desktop, orjust ...
|
|