Search results for 'change hidden network setting'.
2443 products found. Showing 1-11 in 10 groups sorted by relevance.
1. nnCron
Display/hide/close/kill/minimize/maximize and hide specified windows to system tray,. However, for those who prefer to work in a GUI environment, the program has a graphical shell which can be used to remove, add, edit and run tasks, set up reminders, change program settings. DetailsDownload trialBuy now ($25.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Language: English, German, Portuguese, Spanish, Italian, French, Russian
Vendor: Nicholas Nemtsev
Simplified rights listings, hidden rights only viewable from the webmaster area. Active layout for the profiles page (show/hide items). Big pictures are resized to a width set as maximum, stamp with site name is applied on upload, maximum upload size can be set, all picture are compressed as jpeg with customizable quality.
TuneText is innovative enhancement of HTML files featuring built-in micro-Editor: Edit, Highlight, Bookmark, start from last-visited-page, hide your source code, set colors, insert emoticons,. Reader's changes to the content are processed separately, and original version always remains protected and intact!
Talisman Desktop is a replacement for Windows Desktop and shell replacement. Talisman hides the standard desktop of Windows, replaces the standard taskbar and startmenu. You can create a set of independent themes, and store them on any disk in the local computer or on a local area network.
7. NetLimiter
You must set the password and daily limit and that's all. Using is very simply, only unpack file NetLimit.exe in any folder (except directly on root of HD) and start it, then set options. Registered users also can disable MS-DOS prompt (to prevent date changing with DOS command DATE), Date/Time changing in control panel, Regedit (registry editor), Exit To DOS, and disable the various function keys that modify the boot process, such as F5 and F8. DetailsDownload trial (Demo: 185 KB) Buy now ($12.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows 98, Windows ME
Vendor: Dejan Dimanic
8. Network Configuration Management Network Configuration Management is a set of utilities that manage network config, diagnose and monitor network, it includes: Bandwidth Monitor: shows your connection speed in real time. Asterisk Password Recovery: recovers forgotten password hidden under asterisk. DetailsDownload trialBuy now ($29.95) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003, Windows 98/ME/NT/2000/XP/Server 2003
Vendor: Missilesoft
Using this program you get opportunities to: · Create and support locations (subdivisions) structure · Import data into database from files created with mvPCinfo utility · Renew data automatically · Remove computers from one location to another · Remove components and peripherals between the computers · Navigate the trees of all installed components, peripherals and software · View components, peripherals and software statistics charts · Print a set of documentation: - List of computers of any subdivision - Components, peripherals and software of any computer - List of computers that contain any indicated component, peripherals or software - Event log that contains data on all changes for any time period Together with mvPCinfo utility it allows to perform automatic enterprise network inventory in easy-to-use manner.
Second Copy 2000 (formerly 97) copies files and folders from one location to another on the same drive another drive or across the network. Second Copy monitors the source files for changes and additions and then automatically copies the new or changed files to their designated destination.
Backup by hand always has hidden troubles for protecting data due to the complicated operation or being out of memory. Network Backup. AnyBackup offers fast backup and 100%-accurate restoring as well as the advanced capabilities, such as Incremental Backup, Automated Backup, Network Backup, File Encryption, and File Filter.