by priority downloads
KPI Column
2.0 download... set of site columns (KPI Issue Status, KPI Priority, KPI Task Status, KPI % Complete) · AJAX support enabled Why ArtfulBits KPI Column? ArtfulBits KPI (Key Performance Indicator) column is ...
Moneydance
2024.3 Build 5219 download... tool for investors. Security is a top priority for The Infinite Kind, and Moneydance reflects this with its strong encryption protocols, ensuring that users' financial data remains secure. Additionally, ...
Dictaphone
1.0.70.255 download... their recordings widely. Security is also a priority with Dictaphone. The software includes encryption options to protect sensitive recordings, ensuring that your data remains secure. This is an essential ...
Portable iReasoning MIB Browser Enterprise
15 Build 5012 download... a network device. Security is a top priority for iReasoning Inc., and the Portable iReasoning MIB Browser reflects this with its robust support for SNMPv3, which includes authentication and ...
Portable WinSCP
6.3.5 download... handles file transfers. Security is a top priority for Portable WinSCP. The software employs strong encryption methods to protect data during transfer, ensuring that sensitive information remains secure. Additionally, ...
Portable HashTools
4.8.2 download... wherever they go. Security is a top priority for Binary Fortress Software, and Portable HashTools reflects this commitment by providing accurate and reliable hash calculations. This precision is crucial ...
HelpDesk
11.6.9161.20269 download... resolved more efficiently. Security is a top priority for JitBit Software, and HelpDesk reflects this with its comprehensive security features. The software includes SSL encryption, regular data backups, and ...
Portable LogFusion
7.0 download... diverse IT environments. Security is a top priority for Binary Fortress Software, and Portable LogFusion reflects this with its secure handling of log data. The software ensures that sensitive ...
LogFusion
7.0 download... patterns over time. Security is a top priority for Binary Fortress Software, and LogFusion reflects this commitment. The software includes robust encryption options to protect sensitive log data, and ...
QueueExplorer Standard
5.0.47 download... into critical issues. Security is also a priority for QueueExplorer Standard. The software provides detailed access control, ensuring that only authorized personnel can perform sensitive operations. This is particularly ...
NetDrive
3.17.960 download... with media-rich content. Security is a top priority for Bdrive Inc., and NetDrive reflects this commitment. The software employs advanced encryption protocols to protect data during transfer and storage. ...
DreamMail
6.7.1.6 download... create professional-looking emails. Security is a top priority for the DreamMail Team, and the software includes several features to protect user data. DreamMail supports SSL/TLS encryption for secure email ...
SuperDiary
3.4.0 download... informed financial decisions. Security is a top priority in Journal Plus, with options for password protection and encryption of sensitive data. This ensures that users' personal information remains secure ...
FBackup
9.9 Build 969 download... down the computer. Security is a top priority for FBackup. The software offers password protection and encryption options to safeguard sensitive data. This ensures that your backups are not ...
Socialite
2.8.4 download... and content management. Security is a top priority for Teckee, and Socialite incorporates robust security measures to protect user data. The software uses encryption and secure authentication protocols to ...
Budget Calendar
1.11.2793 download... for personal use. Security is a top priority for MiShell Software Systems, and Budget Calendar reflects this with robust data protection features. Users can rest assured that their financial ...
RaidenMAILD
5.1.0 download... on the go. Security is a top priority for RaidenMAILD, and the software includes several features to protect users' data and communications. It supports SSL/TLS encryption, ensuring that emails ...
AVG Anti-Virus 10 (x32 bit)
2011.1434 downloadExceptional protection that won’t get in your way AVG Anti-Virus offers real-time protection against today’s most sophisticated threats. Chat, download and exchange files with confidence; play games and watch videos ...
AVG Anti-Virus 10 (x64 bit)
2011.1434 downloadExceptional protection that won’t get in your way AVG Anti-Virus for Windows x64 offers real-time protection against today’s most sophisticated threats. Chat, download and exchange files with confidence; play games ...
MailMill COM
1.2.5 download... standard and custom header fields. Set the message priority. SMTP and ESMTP protocols. SMTP authentication (clear text and NTLM authentication methods). Allow you to specify non standard SMTP port number. ...
MailMill COM x64
1.2.5 download... standard and custom header fields. Set the message priority. SMTP and ESMTP protocols. SMTP authentication (clear text and NTLM authentication methods). Allow you to specify non standard SMTP port number. ...
Google Chrome Portable
129.0.6668.59 download... their specific needs. Security is a top priority with Google Chrome Portable. It includes robust features such as sandboxing, automatic updates, and built-in malware protection to safeguard users against ...
WhatsApp for PC
2.2506.4.0 download... **Security and Privacy** Security is a top priority for WhatsApp Inc., and WhatsApp for PC is no exception. The app uses end-to-end encryption to ensure that your messages and ...
Process Lasso
12.5.0 download... and persistent settings such as CPU affinities and priority classes, Process Lasso enables full control over running ... of unique and helpful functions. These include persistent priority classes, persistent CPU affinities, disallowed processes, per-process power ...
Process Lasso x64
12.5.0 download... and persistent settings such as CPU affinities and priority classes, Process Lasso enables full control over running ... of unique and helpful functions. These include persistent priority classes, persistent CPU affinities, disallowed processes, per-process power ...