|
||||||
|
||
|
Home > Run once software |
|
|
21. | Outlook HelpDesk 7 (kalmstrom.nu) | ||
familiar with Outlook can start working with Outlook Helpdesk at once. Make a personal Outlook Task from a ticket with the press of a button, and synchronize with your PDA - perfect for support personnel always on the run. List all tickets assigned to you, work with the cases, print tickets, re-assign or forward the information - all with the simplicity you are used to in | |||
Updated: 3, 2005 | Rating: 0 | Author: Peter Kalmstrom | Size: 1057 kb | Shareware Go to category: Business > Other Similar programs | |||
22. | PageFocus Pro 6.14 (promaxum.com) | ||
with open source Ghostscript for importing and exporting PDF files. Once imported, you can use the PDF file as the template and add fields to create data entry forms and setup databases. The package consists of two programs. The main program is a powerful, yet easy-to-use drawing and desktop publishing program. It provides all the tools you need to create/edit drawings, images | |||
Updated: 9, 2005 | Rating: 0 | Author: Creative Stars, Inc. | Size: 6496 kb | Shareware Go to category: Business > Other Similar programs | |||
23. | PassMonster 2.25 (kamatoz.com) | ||
very unsafe. Bad guy only needs to possess your passwords database once and he will know all of your passwords! You can try encrypting the text file (database) containing your passwords. But it takes fairly large amount of time to decrypt it for each use and then encrypt it back again manually! So is | |||
Updated: 9, 2005 | Rating: 0 | Author: Greg Arkadiev | Size: 678 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
24. | RecOnPhone 2.50.25 (reconphone.com) | ||
subscribe from your telecom provider. It gives you the phone caller's name and number. Note that RecOnPhone uses and requires your modem to decode the caller id. Surveillance : in "hidden mode", the software can be made running and invisible at each PC startup. It will record but nothing will be | |||
Updated: 9, 2005 | Rating: 1382 | Author: Eric Brat | Size: 1390 kb | Freeware Go to category: Business > Other Similar programs | |||
25. | WorkManager Pro 2.0 (kamatoz.com) | ||
documents, URLs and system commands) as you need into one Work. Once this is done, the Work can be run with just one click. Just imagine clicking once and getting your browser, mail program, messenger, all your favorite URLs run and open in a second! The new Windows XP is fully supported! WorkManager Pro lets you automate working with multiple tasks on a PC. With | |||
Updated: 9, 2005 | Rating: 0 | Author: Greg Arkadiev | Size: 487 kb | Shareware Go to category: Business > Office Suites & Tools Similar programs | |||
26. | ! Visual Server Monitor 1.0 (visualservermonitor.say-it-now.com) | ||
capability Simple installation Monitor several systems at once Audible alerts Run programs on alert Highly customizable "No-Touch" remote monitoring. No client software to load on monitored remote servers Visual Server Monitor is a powerful application built to help you visually diagnose and monitor critical systems on your servers (local or remote) in real-time | |||
Updated: 9, 2005 | Rating: 82 | Author: No Spam | Size: 5000 kb | Freeware Go to category: Development > Components & Libraries Similar programs | |||
27. | Access Forms and Reports Assistant 2.0 (cbacorp.com) | ||
property and font changing utility for Access developers. It will run with Access 2000, 2002, or 2003, and make changes to any of those three Access mdb files for which you have the appropriate Access version installed on your computer. If you work with several secured databases, AFRA can keep track of your security information so you just select the workgroup data with two mouse | |||
Updated: 2, 2006 | Rating: 149 | Author: Bob Flenniken | Size: 6165 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
28. | ACProtect standard 1.20 (ultraprotect.com) | ||
Engine - ACProtect can replace some of the protected program's code with its own codes without function loss and speed loss. This feature combine the protect code and the program code more closer and prevent cracker from dump the original program; Embedded Protector - You can specify the place in your application to embed the inner cryptor. With the embedded cryptor, your | |||
Updated: 9, 2005 | Rating: 152 | Author: risco software | Size: 1604 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | Code-Lock 2.35 (chosenbytes.com) | ||
files. But most shareware are, in effect, Registered versions and once the cracker patches the correct places, the shareware will behave as Registered version. The better form of protection involves only distributing Demos that has limited functions. Registered users are sent the Registered version or are told of the URL to download the Registered version. Such methods are more | |||
Updated: 9, 2005 | Rating: 16 | Author: Ryan Thian | Size: 2721 kb | Demo Go to category: Development > Management & Distribution Similar programs | |||
30. | EventStudio Sequence Diagram Designer 2.5 (EventHelix.com) | ||
operations, resource leaks and invalid timer operations. Once the design issues have been addressed, EventStudio automatically generates sequence diagrams and collaboration diagrams. EventStudio allows the developers to explore a large number of success and failure scenarios without the overhead of individually documenting each scenario. The developers define a base | |||
Updated: 9, 2005 | Rating: 16 | Author: EventHelix.com Inc. | Size: 3295 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Run once software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|