|
||||||
|
||
|
Home > Id software |
|
|
111. | Picture Caller ID 2.0 (modemtools.com) | ||
Caller ID identifies callers before you answer the phone. Call Blocking enables effective telemarketer call block by cutting off black-listed numbers, such as the numbers that are blocked, out-of-area, or unidentified. Picture Caller ID lets you screen your calls using text-to-speech to announce the caller's name and number, so you only answer the call when you want | |||
Updated: 9, 2005 | Rating: 0 | Author: Oleg Afonin | Size: 535 kb | Shareware Go to category: Communications > Fax Tools Similar programs | |||
112. | Multi-ZIP-licity 2.0 (softuarium.com) | ||
Multi-ZIP-licity is a program for people working with multiple ZIP files. Its primary function is to extract files from multiple archives and create multiple archives. Program also includes extra tools designed to encrypt and decrypt files, list contents of a folder as text, change attributes of multiple | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 787 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
113. | My Drivers 3.11 (zhangduo.com) | ||
ease. Detailed Hardware and Driver Information Printing. PnP ID hardware fingerprint comparison. Driver Compatibility Test before download and installation. Download Drivers from the Internet with proxy support. Floppy Disc Creation with My Drivers included. Outlook, Outlook Express, IE Favorites backup and restore. English, French, Spanish Interface and Manual Available | |||
Updated: 9, 2005 | Rating: 284 | Author: Duo Zhang | Size: 987 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
114. | GRL RealHidden 1.0 (grltechnology.com) | ||
GRL RealHidden version 1.0 is a software utility that allows you to hide a file physically inside of another file, and then retrieve that hidden file. The resulting 'cloaked' file, that is the file containing hidden file, usually operates exactly like the original file. This product gives you the power to | |||
Updated: 9, 2005 | Rating: 0 | Author: Galen Lande | Size: 1967 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
115. | IdentaFone Pro 2.50 (identafone.com) | ||
calls and offers many ways to keep you informed about your caller's identity. Once the caller information is obtained, this virtual telephone assistant can speak the caller's name through your PC speakers, screen pop the callers name, send the information to a pager or cell phone, submit an email message with the caller information, or broadcast a popup over the local network | |||
Updated: 9, 2005 | Rating: 35 | Author: IdentaFone Software | Size: 2945 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
116. | IdentaPop 2.24 (identafone.com) | ||
unique Caller ID popup display that overlays the Caller ID on your screen and slowly fades away. Fully integrated with MS Outlook Contacts including Exchange Server public folders for lookups and screen pops for IP phones (Asterisk, Avaya, Cisco, ESI, NBX, NEC, Nortel, Panasonic etc) and TAPI | |||
Updated: 9, 2005 | Rating: 1308 | Author: IdentaFone Software | Size: 2665 kb | Shareware Go to category: Communications > Telephony Similar programs | |||
117. | IRCommand2 3.34 (wdpsoftware.com) | ||
COM+ interface or printing. By registering, you receive a key and ID that removes all limitations. The registered version will support a virtually unlimited number of device panels and buttons. IRCommand2 currently works with the Actisys IR200L IR control head, which uses a serial port on your PC. Written in C++, IRCommand2 is efficient and, unlike some other similar programs, it | |||
Updated: 9, 2005 | Rating: 0 | Author: Joe Mattioni | Size: 2324 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
118. | Lock Folder 5.0 (realclicks.com) | ||
Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
119. | DWG2PDF PDF Converter 3.0 (webtech360.com) | ||
dwg2PDF's easy-to-navigate explorer-friendly environment Navigate with ease in dwg2PDF's three-frame display. The dwg2PDF interface displays a file tree showing the contents of the users computer; identification of selected files by name, size, type, date, and time; and conversion radio button and checkbox selections. Select files for a variety of situations Create a | |||
Updated: 9, 2005 | Rating: 16 | Author: Jeff Lin | Size: 11737 kb | Demo Go to category: System Utilities > Other Similar programs | |||
120. | EldoS PKI Tools 1.2 (eldos.org) | ||
EldoS PKI Tools is set of programs designed for encryption and signing of files using X.509 certificates and for management of these certificates. 1. File Processor allows you to pack, unpack, sign, encrypt, verify signature and decrypt files using X.509 certificate right from Windows Explorer. It also | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Id software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|