|
||||||
|
||
|
Home > Email utilities software |
Related keywords: email, utilities, Email, Utilities, bulk email, email marketing, email extractor, email address, email software, email client |
|
|
191. | Email Audit 3.2 (km-vision.com) | ||
Email Audit is a powerful add-in utility for Microsoft Outlook 2000/XP/2003.As the new mail arrives,it filters and clusters Spam mails, Junk mails, Bounce mails into their respective folders. The email audit utility comes with a host of built in spam control filters and flexible | |||
Updated: 9, 2005 | Rating: 0 | Author: Shama Hegde | Size: 8172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
192. | Email Extractor FREE Edition 2.1.7 (placementprogram.com) | ||
duplicate emails, split files or merge them in a bunch of seconds. Email Extractor is a strategic tool for marketing professionals. It's FAST, simple to use and it has a cool interface. Email Extractor can be used to extract emails from Outlook Express or other mail clients able to export mail messages. Email Extractor helps extracting emails from multiple files | |||
Updated: 9, 2005 | Rating: 49 | Author: Francesco Casi | Size: 92 kb | Freeware Go to category: Communications > E-Mail List Management Similar programs | |||
193. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
194. | Event Log Janitor 1.0 (streiff-is.com) | ||
Simple to use, requires no SMTP Server setup - specify DNS Server, email address(es), hour interval to email, and whether or not to clear the log in the easy portable dialog configuration. Requires the MS.NET Framework from Microsoft's site. A great utility, simple to use for | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Streiff | Size: 972 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
195. | Event Log Watchdog 3.0 (keroonsoftware.com) | ||
Log Watchdog monitor's your Windows Event Logs and notifies you via Email or Syslog when a new event is logged. You can define which Event Logs you wish to monitor and what types of events you wish to receive Email notification of. One license per machine. Event Log Watchdog monitor's your Windows Event Logs and notifies you via Email when a new event is | |||
Updated: 2, 2006 | Rating: 0 | Author: Rob Rhodes | Size: 7224 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
196. | Groone's Macroer 2.6 (groonesworld.com) | ||
worry about repitive tasks again! Groone's Macroer simplifies those redundant day to day tasks. By creating simple text routines you will free up hours on the keyboard. There are no complicated scripting languages to know and no list of forced to remember keyboard strokes. YOU define everything. Now you don't have to remember hundreds of passwords that may fill your day at work | |||
Updated: 3, 2005 | Rating: 82 | Author: R Bennett | Size: 3810 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
197. | IIPwr Package 2.00 (iipwr.com) | ||
own but currently don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities (such as keystrokes, active applications, passwords, visited websites, emails, chats etc.) and | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
198. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
auditing In addition, Infiltrator also comes with 18 network utilities for footprinting, scanning, enumerating and gaining access to machines (ping sweep, whois lookups, email tracing, share scanning and more). The program can be run from the commandline, allowing for external scheduling and automated scanning. Infiltrator is an intuitive network security scanner that can | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
199. | ActMon Password Recovery XP 4.03 (iopus.com) | ||
newest version of this popular password recovery utility decrypts and displays the passwords behind the asterisks on ALL Windows systems. It works automatically on Web pages, Windows 9x/NT and Windows 2000/XP systems. Windows systems allow a convenient storage of frequently used passwords, such as the password of your dial-in ISP, Outlook Express email or FTP connection | |||
Updated: 9, 2005 | Rating: 685 | Author: Team ActMon | Size: 315 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
200. | IP Mailer 2004d (wappu.tv) | ||
ISP gives you a temorary IP address each time you log on, you can email your IP address automatically to your friends and office/home so that you can find your computer for remote access regardless of the constantly changing IP address. If you use your computer remotely or need to have other people access some server functionality on your PC you can let them know what your IP address | |||
Updated: 9, 2005 | Rating: 151 | Size: 1600 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
|
Home > Email utilities software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|