|
Free computer tool gettings from the specialized in download webs sites! Explore the popular software system groups, check the most recent releases of the excellent tools, and get instantly! Do not miss a luck to acquire the hottest software solutions: use SoftEmpire website to recieve apps for free. Meet the website of free utilities and software application demo versions. select among system applications, recieve manipulators, softwares for relax, and all other sorts of apps for your notebook or mobile accessory!
|
Network Password Changer
|
|
Download
|
View screenshots
|
License: Freeware
File Size: 0.07 Mb
Version: 1.0
Release Date:
5 Oct 2003
OS: WinNT 3.x, WinNT 4.x, WinXP, Windows2000
System Requirements:
none
Company: Twaddle Software
|
Changes password on multiple computers centrally. Ideal for centrally changing the Local Administrator password on a group of computers.
Uses the currently logged in user and searches for computers on the network that the user can log in to as a local user, and changes the password of the user remotely.
This will work with domains and workgroups. Given 10 computers which all have a local user account 'fred' with the same password, when 'fred' runs this program, it will attempt to change the passwords on all 10 computers and will report errors if it could not change the password.
|
More to download:
Password Spectator Pro
When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. See the password behid the asterisks with this software.
Accent Access Password Recovery
Accent Access Password Recovery is a small but very powerful tool. It can recover a lost password for any document created and protected by Microsoft® Access 95/97/2000/XP. Its easy-to-use graphic interface and context help are provided to lead y...
Password Creator
Helps you create passwords that difficult to guess or crack. Whether you're a home user or a network administrator, you'll find that this tool will help you create passwords that are more secure. Create any where from 1 to 10000 passwords at a time.
Network Protocols Map Screensaver
We design special screensavers and wall-papers for IT/Networking professionals and students, who will display our art on their computer screens for months or years. This item can be widely downloaded on Internet to build your product awareness.
Network Traffic Monitor Analysis Report
Packet Analyzer CAPSA enterprise edition is an advanced network monitoring, analysis and reporting tool. It captures and analyzes traffic realtime, present comprehensive and graphic reports for many technical and business purposes.
Network Icon Collection
High quality Network icon Collections
Network Collection is designed for internet enabled applications, or any software that features file transfers, messaging, email or contact management and more...
Animabilis RS File Encryption
Need a military grade file encryption solution? Would you like to delete (shred) files and be 100% sure they can't be "undeleted"? Now about protecting data stored with removable drives? RS File Encryption does all that and more!
System Sentinel
Safeguard against spyware, adware, malware, trojans, keyloggers, hijackers and more. Puts an entire network of protection hard at work defending each user. Also optimizes registry, scans for harmful cookies and even, protects removable drives.
Download Keylogger For Vista
Keylogger program records activities performed on your computer system including chat messages, typed URLs, visited website etc. Utility allow viewing the log files and providing facility to send encrypted log files to user specified email address.
|
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|