|
Utilize the latest in encryption technology to protect your sensitive data. Privacy tools include file/folder encryption, e-mail encryption, file/folder shredder, file/folder Backup with auto encry...
|
|
|
BonnickCondensedUT BoldOblique for the Macintosh
|
|
|
Say hello to our adorable babies - Dylan and Jenny! These finely crafted 3D models have been designed with animation in mind. Their high resolution textures and finely tuned shaders allow for very ...
|
|
|
IBM Hardware Maintenance Manual 570 Series including UltraBase 101 Pages
|
|
|
This revolutionary program brings life to your desktop. Plants grow directly on the Windows Desktop and need your care just like real plants!
|
|
|
A automated tool let you search for users on icq newtwork that match you specified query. And then you can send them any message you like thru Icq pager or Icq Express mail. ICQ Spider is very ea...
|
|
|
Watch what your spouse, children or emplyees do on the computer while you are not around!!!VISAGE captures all user activities on a PC. Similar to surveillance camera, VISAGE takes screen snapshots...
|
|
|
The Toon Amp Visualizer for Winamp renders realtime cartoon scenes with your 3D card. Several variations of the effects are possible so you can pick the one you like best. You can also customize ...
|
|
|
The SONY PCG-R600 series Security Chip w/Password Recovery Service allows for resetting of SONY PCG-R600 series BIOS passwords. The package includes instructions. This package includes the replacem...
|
|
|
Most of these effects are binaural recordings. They were recorded with two tiny omni microphones placed directly behind my ears. Essentially the microphones hear what I hear. So if you listen to th...
|
|
|
NetworkSmart QA is designed to provide developers and engineers with some insight into how their application is functioning across the network. Monitor the round trips that your application genera...
|
|
|
CrГѓВ©ditos, utilidad del negocio, flujos de caja descontados, planeamiento financiero, inversiГѓВіn, bonos, costo de capital, opciones, valuaciГ...
|
|
|
Internet Explorerfront-end for quick and easy browsing of local web-documents. This programrequires Microsoft Internet Explorer 3.0 or better.
|
|
|
This is the order form for purchasing advertising on minioak.com. Please contact advertising@minioak.com before purchasing any advertising. That way, we can discuss the best option for your adverti...
|
|
|
Collection of Menu Java Applets.
|
|
|
You can easily replace the garbled, random sound in your home movies with music or narration or add sound to silent movies using this movie audio replacement tool. Supported Audio Types: MP3, WAV, ...
|
|
|
Is an algebric program about how to do factorization from composite number to more complicated algebric expression. It uses very simple understandable mathematical language with lots of examples on...
|
|
|
DataFieldsCE all dates database viewer. For a emulator and mobile device.
|
|
|
Ave Maria Poker is a video poker card game with cool graphics and animation.Features: - 9 cool levels- "Red-Black Playing"- Normal and Joker Challenged game- Full statistics and logs of games and c...
|
|
|
MiniRemote is what is known as advertware which means that when you download the program today - you have a full and non time limited program. MiniRemote pays for itself through the banners that ar...
|
|
|
Sales Strategist is a tool that measures the possibility to win (PTW) of a specific project. Beside, it assesses the strengths and weaknesses of an organization in comparison to the competition in ...
|
|
|
Storing your passwords in the Windows by checking save password every time a password dialog appears in your browser you are suffering the risk of been hacked because they know where Windows stores...
|
|
|
EliteStyle Notepad is a notepad with beautiful interface and extra functions.
|
|
|
THis is a 5 seats site license dedicated to small business.
|
|
|
User Manager Standard provides effective, reliable access, user and security management for computers, programs and websites and safeguards computers against tampering and malicious users. Building...
|
|