Design, explore and maintain databases, build compound SQL query statements, manage database user rights, and manipulate data fast and convenient.
Description
Advanced Log Monitor is a log management solution that monitors log files from any program, database or device and notifies you by email when a specific event occurs (Warning, Firewall attack, Hardware failure or anything else), can quickly and cost-effectively monitor your mission-critical servers, …Informations
- Status: Fully functional
- Source: None
- price: $29.99
- Size: 1 308 kB
Platforms: ME,
Description
AutoDialogs is a program that was developed to provide quick access to the folders you use most often in standard Open / Save as / Browse for folder dialogs (including Office 95/ 97/ 2000/ XP and Windows 2000 Professional dialog boxes), Windows Explorer and other programs. Using AutoDialogs, …Informations
- Status: Evaluation (time-limit)
- Source: N/A
- price: $19.95
- Size: 566 kB
Platforms: ME, NT4, W2K, W95, W98, XP,
By Mauro Venturini.
Freeware 20 Oct 1999Description
The old Windows 3.x File Manager was polite enough to ask if you really wanted to do that 1 GByte directory tree move you just happened to start with a mouse drag. Some genius (!?) at Microsoft decided that this was a useless function and removed it from the Windows Explorer of Windows 95 and NT 4.Informations
- Status: Fully functional
- Source: None
- Size: 287 kB
Platforms: NT4, W95, W98,
By Uri Fridman.
Freeware 10 Jun 2002Description
Fraenc console is a file security application, it performs the following: file encryption (using twofish, 128 bits) file hashing (using sha1) file wiping (secure erasing files) string encryption and hashing secure decryption to screen only hash verification. The program runs from the command line.Informations
- Status: Fully functional
- Source: On request
- Size: 47 kB
Platforms: NT4, W2K, W98,
By Abalov-soft.
Freeware 02 Oct 2005Description
Fresh Up was developed to combine cleaning and tweaking features to clean and optimize your Windows XP system. There’s no reason to be anxious about tweaking your system using Fresh Up since it automatically creates a ’System-Restore-Point’ on the first start of the software and whenever you want.Informations
- Status: Fully functional
- Source: None
- Size: 627 kB
Platforms: XP,
By Raytown Corp..
13 Mar 2002Description
Invisible Files 2000 Pro (IF2000 Pro) is a program for Windows 95/ 98/ ME that allows hiding of any file or folder on the local hard drives of personal computers. The files are not physically deleted but they are invisible (even in Windows safe mode and DOS session). File systems FAT16 and FAT32 are supported.Informations
- Status: With Nag-Screen
- Source: N/A
- price: $59.95
- Size: 734 kB
Platforms: ME, W95, W98,
Description
Protect private and sensitive data from potential unauthorized access. You can encrypt virtual disk image with one of modern and reliable encryption algorithms--Encrypted Disk supports AES (256-bit key), Blowfish (448-bit key), Triple DES (192-bit key). Encrypted disk can be mounted with any spare …Informations
- Status: Demo only
- Source: None
- price: $29.95
- Size: 3 476 kB
Platforms: NT4, W2K, W2K3, XP,
By Uri Fridman.
Freeware 13 Nov 2000Description
Creates files with random garbage in them. this program is good for hidding encrypted files. The person checking your HDD won’t know which of the files are garbage and which are actual encrypted files.Informations
- Status: Fully functional
- Source: On request
- Size: 186 kB
Platforms: NT4, W2K, W95, W98,
Description
TrayIcon Explorer allows you to quickly access any folder or disk drive on your system or network using the system tray and adds an icon to the system tray which when clicked brings up a menu containing shortcuts to the directories you use most often. Selecting a shortcut opens an Explorer window on that directory.Informations
- Status: Evaluation (time-limit)
- Source: N/A
- price: $15
- Size: 477 kB
Platforms: ME, NT4, W2K, W95, W98, XP,
By Uri Fridman.
Freeware 21 Aug 2001Description
XFraenc is a simple application that performs file encryption, hash and wiping. A hash of the password is created before encrypting or decrypting and is used to start the key generation in Twofish. A "Hash" is a like a fingerprint, it takes a snapshot of the file, compresses it and generate a one-way output.Informations
- Status: Fully functional
- Source: None
- Size: 242 kB
Platforms: ME, NT4, W2K, W95, W98,