|
||||||
|
||
|
Home > Http software |
Related keywords: http server, working http proxies, http monitor, HTTP Module, HTTP Accelerator, FAST HTTP, http sniffer, http proxy, embedded HTTP Proxy Server, java http client |
|
|
91. | Proxifier 2.00 (proxifier.com) | ||
do not support working through proxy servers to operate through a HTTP or SOCKS proxy server or a chain of proxy servers. There are many network applications that do not support working through proxy servers and thus cannot be used from LAN or with firewalls. These can compromise corporate privacy and lead you to many other restrictions. Proxifier solves all of these problems and | |||
Updated: 2, 2006 | Rating: 3044 | Size: 685 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
92. | Potolook plugin for Microsoft Outlook 3.6 (positic.ru) | ||
Microsoft Outlook is a powerful e-mail messaging and management system that we use everyday. Even a minute saved on a repetitive operation may save you a few hours every week. This is why Outlook plug-ins (programs intended to enhance certain operations or add new features) are so popular today. As a heavy | |||
Updated: 2, 2006 | Rating: 0 | Author: Positic Software | Size: 2001 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
93. | Overseer Network Monitor 2.6 (sensiblesoftware.com) | ||
or network device to make sure it is connected to the network. The HTTP module allows you to monitor your websites to make sure they're responding to user's requests. The Windows Service module allows you to monitor services running on Windows NT/2000/XP/2003 servers. The Windows Event Log module | |||
Updated: 2, 2006 | Rating: 0 | Author: Derek Kalweit | Size: 1852 kb | Demo Go to category: Network & Internet > Network Monitoring Similar programs | |||
94. | MyProxy 7.11 (myproxy.com.ua) | ||
advertiser's requests and prevents tracking of your online habits http://myproxy.desofto.com/ High quality web accelerator with powerful pop-up & ad blocker and cache will save your time, money and nerves | |||
Updated: 2, 2006 | Rating: 215 | Author: Dmitry Silchenko | Size: 848 kb | Shareware Similar programs | |||
95. | MDaemon 8.1.4 (files.altn.com) | ||
published white paper on DKIM and its implementation in MDaemon at http://www.altn.com/support/white_papers.asp. In addition to DKIM, MDaemon 8.1 includes support for Greylisting, a relatively new spam fighting technique which involves deferring the initial acceptance of a new mail message from | |||
Updated: 2, 2006 | Rating: 196 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
96. | MDaemon 8.1.4 (altn.com) | ||
published white paper on DKIM and its implementation in MDaemon at http://www.altn.com/support/white_papers.asp. In addition to DKIM, MDaemon 8.1 includes support for Greylisting, a relatively new spam fighting technique which involves deferring the initial acceptance of a new mail message from | |||
Updated: 2, 2006 | Rating: 865 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
97. | MAPInotify: Shadow of Power! 4.34 (silmarilsoftware.com) | ||
MAPInotify: Shadow of Power! is an advanced skinable mail-checker utility that can monitor unlimited number of mailboxes, IMAP4 folders or any Microsoft Exchange folders and notify you in any number and combination of ways. It is compatible with Outlook 9x/2000/XP/2003, OutlookExpress, Microsoft Mail and | |||
Updated: 2, 2006 | Rating: 0 | Author: Maxim Malencoff | Size: 3616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
98. | Internet Secure Tunneling 2.0.0.228 (han-soft.com) | ||
Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure. The tunneling capability of SSH Secure Shell is a feature that allows, for example, company employees to access their email, company intraweb pages and shared files securely by even when working from home or on the road. Tunneling makes it possible to access email | |||
Updated: 2, 2006 | Rating: 0 | Author: JING YU HAN | Size: 927 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
99. | Internet Download Accelerator 4.4 (westbyte.com) | ||
for all connection types, resumes broken downloads, supports FTP, HTTP and HTTPS protocols, firewalls, proxy servers, cookies, redirects, authorization and a lot of different platforms and servers. IDA lets you conveniently manage downloads by orginizing them in categories with automatic category detection option. The category list has uniqe drag and drop possibilities of download | |||
Updated: 2, 2006 | Rating: 0 | Author: Ruslan Voloshyn | Size: 2335 kb | Shareware Go to category: Network & Internet > Download Managers Similar programs | |||
100. | Internet Download Accelerator 4.3.2 (one.com.ua) | ||
for all connection types, resumes broken downloads, supports FTP, HTTP and HTTPS protocols, firewalls, proxy servers, cookies, redirects, authorization and a lot of different platforms and servers. IDA lets you conveniently manage downloads by orginizing them in categories with automatic category detection option. The category list has uniqe drag and drop possibilities of download | |||
Updated: 2, 2006 | Rating: 0 | Author: Ruslan Voloshyn | Size: 2334 kb | Shareware Go to category: Network & Internet > Download Managers Similar programs | |||
|
Home > Http software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|