Shut down with one click or with one key stroke. Run scan disk and backup programs programs, daily or at certain days of the week. Just one click, then leave your computer and it will power-off automatically after all programs finished.
12Ghosts TrayProtect 9.70 To keep track of many tray icons you may hide those that you don't need all the time. You can still access such hidden tray icons in the context menu of 12-Tray. It will also restore tray icons after a 'crash' or restart of the taskbar.
12Ghosts Timer 9.70 12Ghosts Timer is an easy to use and powerful scheduler for starting applications or documents, or setting up reminders. Start once, countdown, recurring, or after logon. You can set the process priority and window size. Holiday support.Programmable.
Description: Shut down with one click or with one key stroke. Run maintenance programs, daily or at certain days of the week, for example scan disk and backup programs. Just one click, then leave your computer and it will power-off automatically after all programs finished.
Initiate an "auto-logon as a different user" - without waiting for the insert-password-now dialog box. Dual-boot directly into a parallel installation of Windows NT/2000/XP, restarts without user intervention.
It allows you to log off your computer after a specified time of inactivity, or makes sure to restart your computer weekly. It saves you time by automating the shut down process, and even terminates not responding programs.
Easy Net Control Server 18.104.22.168 This software allows easily shutdown, restart, and logoff active user, send messages,chat and execute commands in remote computers. This software allows easily shutdown, restart
TK ChildLock! 1.0 With ChildLock! you can limit an user's log on or log off times. Define when users can log on to your PC. If a specified user is already logged on your system on a non-logon-time
Home Computer Users Highly Vulnerable Home computer users who think that they are well protected from malevolent acts should think again. The vast majority of home computers operate at risk of intrusion by invasive code, according to the results of a study conducted by America Online and the