|
||||||
|
||
|
Home > End spam software |
Related keywords: spam, anti spam, spam filter, Spam, spam blocker, spam killer, stop spam, block spam, SPAM, anti spam software |
|
|
111. | BCWipe 3.07.2 (jetico.com) | ||
BCWipe ensures that another person will not restore files you have deleted from a disk. When you delete sensitive files from a disk on your computer, Windows does not erase the contents of these files from the disk - it only deletes 'references' to these files from filesystem tables. Contents of the deleted | |||
Updated: 9, 2005 | Rating: 24 | Author: Jetico Inc. | Size: 2651 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
112. | CopyQuick 1.0 (bobcatutilities.com) | ||
CopyQuick is a utility to repeatedly copy selected files between directories quickly and easily. Once the list of files and directories that you wish to copy has been created it can be saved in a file and loaded again later for repeated use. Once you have created and save you file list you can access it and | |||
Updated: 3, 2005 | Rating: 0 | Author: Alec Ford | Size: 210 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
113. | DefPrin 1.72 (insync-software.co.uk) | ||
competitors. An absolute godsend for mobile laptop users. Here's a little story to amuse you and to illustrate DefPrin. John travels to a number of sites at different locations where he is able to plug his laptop into the corporate network in the local business centre and use the printers | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Newman | Size: 523 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
114. | Email Audit 3.2 (km-vision.com) | ||
Outlook 2000/XP/2003.As the new mail arrives,it filters and clusters Spam mails, Junk mails, Bounce mails into their respective folders. The email audit utility comes with a host of built in spam control filters and flexible user defined filters. You can now create Whitelist of email IDs | |||
Updated: 9, 2005 | Rating: 0 | Author: Shama Hegde | Size: 8172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
115. | FingerPoint 1.4 (neurotechnologija.com) | ||
is an end user software package for person identification using his/her fingerprints as a unique ID. The system has integrated support for DigitalPersona U.are.U fingerprint scanners, and is intended for application in enterprises where frequent and reliable check-ups of personal identity are needed. It allows to avoid using of paper documents or magnetic cards, which can be | |||
Updated: 9, 2005 | Rating: 16 | Size: 8012 kb | Demo Go to category: System Utilities > Other Similar programs | |||
116. | Hide Folders XP 2.2 (fspro.net) | ||
Every day we trust our personal files to a computer. Most of us store various bits of personal or business-critical information on our hard drives. If you share your computer with co-workers, children, or a spouse, or your computer is always connected to the Internet, your private files are under threat of | |||
Updated: 9, 2005 | Rating: 173 | Author: FSPro Labs | Size: 1025 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
117. | Lock My PC 3.4 (fspro.net) | ||
These days, computers are everywhere: from banks and government offices to shops and homes. We tend to rely on our machines more and more each day. We store our valuable data, personal and business-critical information, photos, credit card information, important phone numbers and vast amount of other private | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
118. | PC DoorGuard 4 (astonsoft.com) | ||
A very extensive and thorough intrusion scanner that scans any media on your PC for backdoors and trojan horses. PDG easily removes any found trojan with a click of a button, together with any elements it may have left in registry/system files/memory. PDG also constantly monitors your system to prevent | |||
Updated: 9, 2005 | Rating: 42 | Author: Maxim Afanasjev | Size: 6879 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
119. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
120. | SecuritySkillz PC SystemGaurd 1.1 (securityskillz.com) | ||
most advanced & powerful system security software of its type. In just a few mouse-clicks, even your kid can provide total freedom for your PC, from hackers, trojans, keyloggers, spying programs, all hidden & malicious stealth programs!! Features No matter whatever Stealth Algorithm a program is using, it cannot escape from Advanced AntiSpy Mode!! Searches all the active | |||
Updated: 3, 2005 | Rating: 0 | Author: Amit Gupta | Size: 3072 kb | Shareware Go to category: Business > Other Similar programs | |||
|
Home > End spam software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|