|
||||||
|
||
|
Home > Internet protocol software |
Related keywords: internet, Internet, protocol, internet explorer, Internet Explorer, internet privacy, internet security, internet marketing, INTERNET, internet spy |
|
|
151. | RBackup Remote Backup 8.53 (remote-backup.com) | ||
then sends backup files off-site to the RBackup Server through the Internet, Intranet, or direct dial-up modems. RBackup has many failsafe features, and conforms to standard backup methodology. RBackup can be used to operate a subscription-based retail Remote Backup Service. It comes with an RBS Server | |||
Updated: 2, 2006 | Rating: 42 | Author: Remote Backup | Size: 56564 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
152. | Remote Administrator 2.2 (radmin.com) | ||
in front of it. The remote computer can be located anywhere on the Internet or LAN. It is a complete remote control and remote access solution with all key features such as View and Control Modes, File Transfer and Telnet support included. Radmin is optimized for both high- and low-bandwidth | |||
Updated: 9, 2005 | Rating: 257 | Author: Dmitri Znosko | Size: 1855 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
153. | Secura Backup Professional 2.13 (cmfperception.com) | ||
destination options that were never before possible due to insecure protocols and transfer methods. With Secura Backup it is now possible to securely send your most sensitive data to remote computers over the internet. Secura Backup is powerful professional backup software that specializes in 128 bit secure backups to local drives, network paths, FTP sites, CD/DVDs, and even | |||
Updated: 9, 2005 | Rating: 0 | Author: Christopher Fillion | Size: 3553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
154. | Stealth KeySpy 2.0.0 (professionalglobalmarketing.com) | ||
online and what they've been doing! * Protect your kids from Internet predators and offensive sites! * Ensure your school or library computers are only being used for their intended purpose! * Catch web-surfing employees red-handed! You'll also be getting: * A POWERFUL | |||
Updated: 9, 2005 | Rating: 48 | Author: Tom Eagar | Size: 700 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
155. | System Shield 2.1c (iolo.com) | ||
Most people believe that when a file is deleted, it is permanently and irrecoverably "gone". The error in this belief is that it relies on some basic assumptions that are very far from the truth. Realistically, the following must be true in order for a file to be irrecoverably deleted: 1. The data | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
156. | TimeWarp 3.0 (home.att.net) | ||
TimeWarp utility sets your computer's clock from a time server using the Simple Network Time Protocol (SNTP). Using your computer's internet connection, timing messages from an SNTP time server can be obtained automatically to set your computer clock. TimeWarp operates in unicast | |||
Updated: 9, 2005 | Rating: 0 | Author: Stephen Schmitt | Size: 570 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
157. | TrafMeter 6.4 (lastbit.com) | ||
You can use it to count useful traffic of your computer (it's free!) or use to build the traffic accounting system for all PCs in your office LAN. It makes easy to count custom IP packets and troubleshooting problems saving your efforts as a network administrator. In TrafMeter, you can set unlimited number of filters for captured traffic, defining network packets which are used | |||
Updated: 2, 2006 | Rating: 16 | Author: Alexey Kazakovsky | Size: 2805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
158. | Universal Plug-and-Play Tester 1.0 (Build 6.5) (noeld.com) | ||
Tester is an experimental tool which lists all the available Internet Gateway Devices (IGDs) compatible with the Universal Plug-and-Play protocol. As soon as the program starts, it searches for available devices. You can enumerate the devices again at any time by clicking the Discover button. If a device supports IP address monitoring then its external IP address will be | |||
Updated: 9, 2005 | Rating: 0 | Author: Noel DANJOU | Size: 87 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
159. | Universal Shield 4.0 (everstrike.com) | ||
Secure your data not only from local users, but network and Internet users as well. Use hotkeys to show and hide folders without actually running the program. Or, run the program in Stealth mode so that other users do not know about it. Set trusted processes, which will not be under protection; for example, some program will work with the hidden data, but users are unable to | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
160. | LanToucher Instant Messenger 1.33 (vitalsoundlab.com) | ||
to communicate directly with one another. No dedicated server or Internet connection is required. KEY FEATURES: True serverless (peer-to-peer) messaging; Proven cross-platform compatibility; All 32-bit Windows versions support; Works over any available network transport protocol (TCP/IP, IPX/SPX, or NetBEUI) No dedicated server or Internet connection is | |||
Updated: 2, 2006 | Rating: 42 | Author: Vital Sound Laboratory | Size: 2039 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
|
Home > Internet protocol software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|