|
||||||
|
||
|
Home > Length software |
Related keywords: length nesting software, zero length files, zero length |
|
|
121. | Expired Domain Sniffer 2.0 (rebrandsoftware.com) | ||
are added to the domain name manager, which sorts domain names by length. -Browse for domain names: A browser just like Internet Explorer, which looks through any page you view for domain names and checks to see if they are expired. -Domain Name Creator: Enter a base word, and the software will create and check the availability of thousands of domain names. -Yahoo and | |||
Updated: 9, 2005 | Rating: 0 | Author: Mike Gibson | Size: 8796 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
122. | ezProxy 2.7.1 (lavasoftware.net) | ||
Remote administration User access limition by protocol, length, time Mac address limition Policy filter Proxy cascading DNS support Show real-time activities Dialup networking support Ban List Bandwidth balance Win9x/NT/Win2000/WindowsMe Run as NT service Log ezProxy is a proxy server, make all your computers share one connection to internet. provide | |||
Updated: 2, 2006 | Rating: 42 | Author: Hu Wei | Size: 2029 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
123. | GetAnonymous 1.2 (getanonymous.com) | ||
not only allows you to use a proxy chain, but also to control the length of this chain. You can set timing to end the connection with the proxy servers if they stop responding. It provides you with a fresh list of proxies each time you update your proxy. Our unique Internet Explorer toolbar puts all the privacy controls at your fingertips with a toolbar integrated with Internet | |||
Updated: 9, 2005 | Rating: 42 | Author: David Adreson | Size: 5996 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
124. | GetAnonymous V2.0 - Personal Edition 2 (coftware.com) | ||
not only allows you to use a proxy chain, but also to control the length of this chain. You can set timing to end the connection with the proxy servers if they stop responding. It provides you with a fresh list of proxies each time you update your proxy. Our unique Internet Explorer toolbar puts all the privacy controls at your fingertips with a toolbar integrated with Internet | |||
Updated: 9, 2005 | Rating: 90 | Author: Tom Brett | Size: 10240 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
125. | GetAnonymous V2.0 Professional Edition 2 (coftware.com) | ||
not only allows you to use a proxy chain, but also to control the length of this chain. You can set timing to search for the proxy servers as well as the depth of the pages. It provides you with a fresh list of proxies each time you update your proxy. Our unique toolbar puts all the privacy controls at your fingertips allowing for with a toolbar integrated with Internet Explorer. Now | |||
Updated: 9, 2005 | Rating: 39 | Author: Tom Brett | Size: 5120 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
126. | GetAnonymous V2.1 Professional 2.1 (coftware.com) | ||
not only allows you to use a proxy chain, but also to control the length of this chain. You can set timing to search for the proxy servers as well as the depth of the pages. It provides you with a fresh list of proxies each time you update your proxy. Our unique toolbar puts all the privacy controls at your fingertips allowing for with a toolbar integrated with Internet Explorer. Now | |||
Updated: 9, 2005 | Rating: 200 | Author: Tom Brett | Size: 1005568 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
127. | hCrypt 3.0 (raysion.com) | ||
you can use powerful Blowfish (448 bit encryption, password length up to 56 symbols) and GOST (256 bit encryption, password length 32 symbols) encryption algorithms. To protect less sensitive information, you may use simple but extremely fast XOR encryption. You can customize the appearance of the password prompt (fonts, colors, text), compress the encrypted page and | |||
Updated: 8, 2004 | Rating: 0 | Author: Raysion Software Team | Size: 623 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
128. | Hit Discovery 1.0 (hitdiscovery.com) | ||
you want to download the entire mp3 file because of the small length of its preview, Hit Discovery allows you to download more of the preview (retrieve and add a new portion of the mp3 file to the already downloaded portion). In the program options you can set the preview starting point from the beginning of the mp3 files. In this instance previews will be cut from the middle | |||
Updated: 3, 2005 | Rating: 0 | Author: Oleg Popov | Size: 769 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
129. | Malt Away 1.35 (vermalt.com) | ||
Text Reduction gives you 20-30% more of your messages on text-length constrained devices by inserting contractions, replacing common terms, and removing unnecessary characters. Customizable filters (based on email address and message content) give you only the messages you want. By retaining the correct "From" address, forwarded messages from Malt Away can be replied to | |||
Updated: 3, 2005 | Rating: 76 | Author: Vermalt Support | Size: 6721 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
130. | Network Assistant 4.1 (gracebyte.com) | ||
shared board. For each message you can specify its priority, life length. - User details. You can view details of remote users and specify your own details: full name, gender, age, work/contact information and picture (photo). - Instant messaging. Network Assistant supports its own instant | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexey Yudin | Size: 1482 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
|
Home > Length software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|