Landlord Enterprise Edition will run on the computer you have in your office, with no confusing installation and an easy-to-use, rich interface. Manage information like credit card numbers, address and phone number, social insurance #, etc. Separate tenants by status - in-active or active.
40. Guaranteed Excel Decryptor (5 clients, Windows+Linux version)
This is an utility to decrypt Excel 97/2000 files with password for opening. To speed up, simple distributed computing mechanism using several computers is included. It will take about one month in average (70 days maximum) using one Pentium II/333. DetailsDownload trial (Full version: 58.5 KB) Buy now ($59.00) Find similar
Platform: Windows 3.1x, Windows 95, MS DOS, Unix / Linux, Windows NT, Windows 2000, Windows 98, Windows ME
Vendor: Pavel Semjanov
With a simple click Anti Tracks securely erase your internet tracks, computer activities and programs history information stored in many hidden files on your computer. To ensure maximum privacy protection Anti Tracks implements the US Department of Defense DOD 5220.22-M, Gutmann and NSA secure erasing methods, making any erased files unrecoverable even when using advanced recovery tools.
You want to convert your digital audio easily from one format to another, but you feels yourself not very experienced with computer? You are professional and you want perform conversion from one format to another with maximum speed and minimum of hard drive space required?
Our software is intended for authorized system administrators and/or owners of the computer ONLY. Logging other people's keystrokes or breaking into other people's computer without their permission can be considered as an illegal activity by the courts of many countries.
46. dSPAM Hotmail
These exploits include the Iframes and rogue ActiveX controls that can be used to attack your computer, and the in-line images that can be used to identify your email address as live to the spammers. DSPAM is a dedicated email filtering system, employing a combination of key-phrase matching, heuristic analysis, blacklists and trusted lists to provide a range of levels of protection against unsolicited email messages, combined with real-time program updates for maximum security. DetailsDownload trialBuy now ($34.99) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Dragon Enterprises
Install the.NET-Framework in the version 1.1 on our computer, afterwardsSRNCpro. Detects device name, type, size, SCSI serial number, temperature, buffer size, HDD rotation speed and others. Detection of CD-drives' maximum and current read/write speeds, identifies SCSI devices (HDD, CD drives, scanners, tape drives).
These applications can help you to detect and eliminate (deactivate) threats to the integrity and security of your computer network. Flagship software application Anti- keylogger(TM) for Microsoft® Windows® NT/2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against most types of unauthorized activity monitoring software, both KNOWN and UNKNOWN.
50. ScreenDiscoverer
ScreenDiscoverer is an effective tool you can use to accomplish various tasks such as retrieving the magnification scale of the objects and choosing a color swatch from wherever you want and displaying the color info in HTML, HEX, RGB, HSV and CMYK formats. This user-friendly tool can be used by design professionals but it does not require any special technical or computer knowledge. This user-friendly and cost-effective product offers users maximum convenience at minimum resources. DetailsDownload trialBuy now ($19.00) Find similar
Platform: Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: DMSoft Technologies
Flagship software application Anti- keylogger(TM) for Microsoft® Windows® 95/98/ME/NT/2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against most types of unauthorized activity monitoring software, both KNOWN and UNKNOWN. These applications can help you to detect and eliminate (deactivate) threats to the integrity and security of your computer network.