|
Free computer tool gettings from the specialized in download webs sites! Explore the popular software system groups, check the most recent releases of the excellent tools, and get instantly! Do not miss a luck to acquire the hottest software solutions: use SoftEmpire website to recieve apps for free. Meet the website of free utilities and software application demo versions. select among system applications, recieve manipulators, softwares for relax, and all other sorts of apps for your notebook or mobile accessory!
|
Network Password Changer
|
|
Download
|
View screenshots
|
License: Freeware
File Size: 0.07 Mb
Version: 1.0
Release Date:
5 Oct 2003
OS: WinNT 3.x, WinNT 4.x, WinXP, Windows2000
System Requirements:
none
Company: Twaddle Software
|
Changes password on multiple computers centrally. Ideal for centrally changing the Local Administrator password on a group of computers.
Uses the currently logged in user and searches for computers on the network that the user can log in to as a local user, and changes the password of the user remotely.
This will work with domains and workgroups. Given 10 computers which all have a local user account 'fred' with the same password, when 'fred' runs this program, it will attempt to change the passwords on all 10 computers and will report errors if it could not change the password.
|
More to download:
Password Spectator Pro
When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. See the password behid the asterisks with this software.
Accent Access Password Recovery
Accent Access Password Recovery is a small but very powerful tool. It can recover a lost password for any document created and protected by Microsoft® Access 95/97/2000/XP. Its easy-to-use graphic interface and context help are provided to lead y...
Password Creator
Helps you create passwords that difficult to guess or crack. Whether you're a home user or a network administrator, you'll find that this tool will help you create passwords that are more secure. Create any where from 1 to 10000 passwords at a time.
Network Protocols Map Screensaver
We design special screensavers and wall-papers for IT/Networking professionals and students, who will display our art on their computer screens for months or years. This item can be widely downloaded on Internet to build your product awareness.
Network Traffic Monitor Analysis Report
Packet Analyzer CAPSA enterprise edition is an advanced network monitoring, analysis and reporting tool. It captures and analyzes traffic realtime, present comprehensive and graphic reports for many technical and business purposes.
Network Icon Collection
High quality Network icon Collections
Network Collection is designed for internet enabled applications, or any software that features file transfers, messaging, email or contact management and more...
Remove Local NSF Security Tool
Best Lotus notes NSF security removal tool can remove local NSF security. PDS NSF security breaker tool made with unique conceptor quick scanning feature for breaking NSF security and open NSF database in readable form with real local NSF database.
Keyloggers utility
Specialized Key logger software enables users with sophisticated feature to economically trace and record entire other users performed activities including pressed keystrokes, clipboard content, voice chat conversation and many others in easiest way.
Parental Control
Parental control application records entire pressed keyboard action such as typed characters chat conversation, visited website URLs address many others activities. Key logger Software captures online and offline system action in hidden mode.
|
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|