Covert Operations


Advertisement

USB Missile Launcher NZ  v.1.4.11

Perform covert operations from your desk. Fire missiles at passing colleagues. Strap a camera on top of the Launcher and record the video of your covert operations.What's new in this version:- Distribution created by automated build- Changed application ...

Radio Operations Center for Kantronics  v.3.96.07

The Radio Operations Center (ROC) is a comprehensive suite of full-featured software solutions for commercial radio, amateur (Ham) radio, MARS and marine radio control. ROC is the only 32-bit Windows software available for operating TNCs in host mode ...





Advertisement

Fujitsu ServerView Operations Manager  v.5.0

ServerView Operations Manager monitors and analyzes PRIMERGY servers and connected storage extension units in the network. Integrated components or those that can be integrated as an option enhance the Operations Manager with functions such as Update ...

Screensaver Operations  v.1. 3. 2003

Screensaver Operations allows you to perform configurable actions after a computer has been left idle for a specified amount of time.

Features:
- Log off user, shut down or restart computer, or run any process when left idle
- Optional ...

The art of covert hypnosis 2.0  v.2.0

The Art of Covert Hypnosis is comprised of 15 audio chapters with over 8+ hours of audio instruction. There is also a comprehensive 322 page course guidebook and exercises manual too.

Be confident in knowing that even a complete novice can start ...

Microsoft System Center Operations Manager  v.2012 RC

System Center Operations Manager is a utility solution to meet the need for end-to-end service monitoring in the enterprise IT environment. Operations Manager provides an easy to use monitoring environment that monitors thousands of servers, applications, ...

Math Rush Basic Operations Lite  v.1.0

Math Rush Basic Operations app is designed to improve mental calculation skills for current hi-tech generation. Math Rush series not only improve critical and logical thinking but also get rid of fear over math and create interest over math problems and ...

Algebra1 : Basic Operations on whole and rational numbers  v.4.00.005

Among the subjects covered: Introduction of negative integers on an axis, addition and multiplication of whole numbers, proof of the sign rules, operations on fractions, prime numbers LCM' and GCD', setting and solving linear equations in one variable.

ALGEBRA 1 : Basic Operations on whole and rational numbers  v.4.00.005

Among the subjects covered: Introduction of negative integers on an axis, addition and multiplication of whole numbers, proof of the sign rules, operations on fractions, prime numbers LCM' and GCD', setting and solving linear equations in one variable.

Bulk Meter Flow and Operations  v.1.2.5

The Bulk Meter Flow and Operations project provides aweb-based application to manage water meter readings.

Covert Linux  v.1.0

Covert Linux is technology of instalation for Linux without repartition the disk and running from native system, e.g. you can install Linux from ,say, Windows by grabbing some SETUP.EXE, launching it and then clicking on desktop icon.

COVERT Pro  v.3.0.0.18

COVERT Pro - an innovative solution to ensure total privacy while working at the computer.

Protecting against spyware programs by masking action of computer user. Its essence is to create a secure platform in which any user can run their applications, ...

Covert Affiliate  v.2.0.0208



By using Covert Affiliate, you make sure that nearly every single visitor to your site gets your affiliate cookie the moment they arrive. They wont even know that they have arrived on a page that has your affiliate link.So it doesn't matter ...

Household Calculator

Household Calculator handles main arithmetic operations with two operands, addition, subtraction, multiplication, division, and complex formulas with unlimited number of operations and operands. For example, you can type in Edit Window such formula ((12.

EmInspector  v.2.5

It can track all activities of your workers on their computers, in fully invisible, covert way. Also, it can restrict applications or websites from running. And finally, it can help you to prevent corporate information theft.

So, here are ...

Pages : 1 | 2 >
Newest Reviews