|
||||||
|
||
|
Home > Master volume software |
Related keywords: volume, master, Volume Normalization, Master, web master, Volume, Volume Normalizer, volume edit, Flash ScreenSaver Master, volume control |
|
|
1. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
Spam emails have become an ever increasing problem, and nowadays it is practically impossible to use email without receiving spam in large amounts. G-Lock SpamCombat is your powerful solution for clearing your Inbox from spam, virus, and junk emails. G-Lock SpamCombat is email filtering software that lets you | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
2. | BookCAT 7.12.02 (fnprg.com) | ||
BookCAT is a powerful database program designed specifically to maintain an inventory of your book collection. BookCAT is used by book-lovers, schools, churches, clubs, and business libraries. Using BookCAT you can quickly catalog your books by downloading information from the Internet. BookCAT will help | |||
Updated: 3, 2006 | Rating: 227 | Author: Fredrik Nordbakke | Size: 6008 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
3. | PRTG - Paessler Router Traffic Grapher 5.2.0.574 (paessler.com) | ||
PRTG Traffic Grapher is an easy to use Windows application for monitoring and classifying bandwidth usage. It provides system administrators with live readings and long-term usage trends for their network devices. PRTG is mainly used for bandwidth usage monitoring, but may also be used to monitor many other | |||
Updated: 2, 2006 | Rating: 16 | Author: Dirk Paessler | Size: 9813 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
4. | EXECryptor 2.3.7 (softcomplete.com) | ||
PellesC, Visual Basic, PowerBASIC, IBASIC, PureBasic. All SDK's and samples are available. Powerful software tool used for an application code protection from reverse engineering, analysis and modifications, based on a brand new metamorphing code transformation technology, that provides with strong software | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
5. | SecureBlackbox.NET 4.3 (secureblackbox.com) | ||
with PKIBlackbox or PGPBlackbox, MIMEBlackbox offers support for S/MIME or PGP/MIME respectively. * SSHBlackbox - client and server components that provide support for SSH1 and SSH2 (including compression) and don't depend on third-party libraries. * SFTPBlackbox - client and server components that provide support for SSH File Transfer Protocol (SFTP, Secure File Transfer | |||
Updated: 2, 2006 | Rating: 48 | Author: EldoS Corporation | Size: 8799 kb | Commercial Go to category: Development > C / C++ / C-sharp Similar programs | |||
6. | Floppy Image 2.3.3 (rundegren.com) | ||
Create image files of floppy disks and back (for backup, shipping or transfer). Save the image file compressed, uncompressed or as a self-extracting exe. Add descriptions to or convert your old image files. Supports DMF and other non-standard formats. Logically recreate bad sectors when writing floppy disks | |||
Updated: 2, 2006 | Rating: 0 | Author: -- -- | Size: 814 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
7. | SecureBlackbox (VCL) 4.3 (secureblackbox.com) | ||
with PKIBlackbox or PGPBlackbox, MIMEBlackbox offers support for S/MIME or PGP/MIME respectively. * SSHBlackbox - client and server components that provide support for SSH1 and SSH2 (including compression) and don't depend on third-party libraries. * SFTPBlackbox - client and server components that provide support for SSH File Transfer Protocol (SFTP, Secure File Transfer | |||
Updated: 2, 2006 | Rating: 16 | Author: EldoS Corporation | Size: 42127 kb | Commercial Go to category: Development > Delphi Similar programs | |||
8. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
Cryptosystem ME6 is a Windows program which uses a symmetric key encryption system to encrypt information in either a single file or in multiple files (at once) so that it cannot be read by those not knowing the key. Data is encrypted using a key which is from 16 to 64 characters long, and which can be either | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | Advanced Phone Recorder 1.7.9 (concelsys.com) | ||
Apply voice equalization between calling and called party. When the volume level of one of the parties is much lower you can increase it with a click of a button. There are plenty of reasons to record a telephone conversation. One of the most fun may be recording a call to customer service for | |||
Updated: 2, 2006 | Rating: 983 | Author: John Feloukas | Size: 1273 kb | Shareware Go to category: Business > Other Similar programs | |||
10. | Pinochle and Bezique by MeggieSoft Gam 2006 (bufton.org) | ||
MeggieSoft Games Pinochle and Bezique is a comprehensive implementation of the original Pinochle and Bezique card games (the two-player versions). Play against an online opponent or against your computer. Pinochle and Bezique has a rich user interface with many customizable visual, audio, and game options | |||
Updated: 2, 2006 | Rating: 0 | Author: MeggieSoft Games | Size: 2872 kb | Shareware Go to category: Games & Entertainment > Card Similar programs | |||
|
Home > Master volume software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|