Search results for 'choose people'.
578 products found. Showing 240-250 in 10 groups sorted by relevance.
240. OverTower
OverTower is a fantasy based card game with a strategic gameplay. Choose your own strategy to beat down the enemy. DetailsDownload trialBuy now ($14.95) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: ForthTech Software
Let you exchange CD information (CD catalog) with other people through CD Exchange (CDE) files. Active Database Monitor, program work at background and auto notify when it finds new discs (play sound and change system tray icon). CD Cover Generator, generate and print CD cover/label from database automatically.
Let you exchange CD information (CD catalog) with other people through CD Exchange (CDE) files. Active Database Monitor, program work at background and auto notify when it finds new discs (play sound and change system tray icon). CD Cover Generator, generate and print CD cover/label from database automatically.
THE SPECIAL OFFER for academic institutions, schools and non-profit organizations (multilicense discount about 80-90%). Logging other people's keystrokes or breaking into other people's computer without their permission can be considered as an illegal activity by the courts of many countries.
PC Activity Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. Logging other people's keystrokes or breaking into other people's computer without their permission can be considered as an illegal activity by the courts of many countries.
MCBase is the most flexible tool to handle your multi media music collection. Apart from various standard reports, a powerful User Report Designer is also included, to enable you to create any report layout you may choose.
Stealth Keyboard Interceptoryi (SKIn2000) for Microsoft® Windows® NT/2000/XP is a monitoring program which allows to intercept all keystrokes, mouse clicks, captions of active windows, static text and other. Logging other people's keystrokes or breaking into other people's computer without their permission can be considered as an illegal activity by the courts of many countries.