|
Obtain utility rapidly and simply. SoftEmpire is pleased to present a huge assortment of the splendid free programs, utilities, and solutions. Here you can try demo versions of well known marketable utilities, and recieve the top free programs for your laptop or cell device. Explore an excellent group of exclusive new solutions on SoftEmpire! Acquire trial editions and obtain recent apps on the notebook or cell device. Meet the fresh versions and new releases of common applications, fresh software solutions, and computer tools! Obtain for free!
Download free utility software from the popular Internet directory!
System software designed to help analyse, configure, improve, and maintain the computer.
Top Disk utility software downloads for Windows 7.
Windows utility software tool accumulation to appraise, coordinate, and optimize the working of the computer.
|
EF Commander OS/2-PM
|
|
Download
|
Buy now!
|
View screenshots
|
Vendor Price: $ 35
License: Shareware
File Size: 0.49 Mb
Version: 2.36
Release Date:
18 Sep 2008
OS: OS/2, OS/2 Warp, OS/2 Warp 4
System Requirements:
Typical Installation
Company: EFSoftware
|
EF Commander for OS/2 is a complete file manager for the OS/2 desktop.
If you've ever used and liked Norton Commander, you'll like this dual-windowed program, which comes complete with bubble and online help. You can search directory trees and directories and perform actions, including Run, on files. You can also check file attributes and edit files with search-and-replace and drag-and-drop, and much more...
Multilingual.
Shareware
|
More to download:
Batch Image Commander
Batch Image Commander is a batch image processor made for command line operation and as a System Tray Icon application for timer based operation.
FTP Commander Pro
FTP upload and download your web pages to the Internet - super fast and easily! The program offers a no-nonsense interface consisting of two side-by-side local computer and FTP server panels.
Trike Commander
A "top view" arcade action / strategy game where you battle against
enemy land units. While you fight you earn
money and upgrade your vehicle with new
armor, guns, shells, speed and more...
Multiplayer option available...
PDF Stamp Command Line
PDF Stamp is an advanced product that enables you to stamp content into a PDF document. Besides images, texts and graphics, PDF Stamp is able to add links and notes. PDF Stamp (PDF Watermark) is easy to use. it does NOT need Adobe Acrobat software.
PDF Chart Creator Command Line Tool
PDF Chart Creator is a utility that converts data into a chart PDF document. The conversion process is initiated by calling PDFChart.exe directly from the command line, or from within a batch file, with parameters that control it's operation.
PDF to TIFF command line
AP PDF to tiff Batch Converter is a useful pdf tool, the converter produces fully functional tiff documents with text, pictures, graphics etc. It does not need any software support, such as Adobe Acrobat, Acrobat Reader, etc.
Kernel for PST to NSF
Export outlook to notes with Kernel for PST to NSF software for email migration from MS Outlook to Lotus Notes email client. It converts emails, contacts, attachments, images, email properties of PST file to NSF file.
Export PST to NSF
Outlook to Notes is user friendly software that satiates the needs of customers globally. Convert Outlook Emails to Lotus Notes NSF file with all its Meta data intact. PST to NSF Convert Software is complete solution for Outlook to Notes Migration.
How to Access Protected NSF Files
Solve query like - How to Access Protected NSF Files with feasible NSF local security remover tool. Using this NSF opener tool you can easily remove NSF local security to safely open protected NSF files.
|
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|