|
||||||
|
||
|
Home > Unwanted software |
Related keywords: delete unwanted mail, unwanted files |
|
|
201. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
SpamCombat is email filtering software that lets you eliminate all unwanted messages at the server level without receiving them with your email client. G-Lock SpamCombat benefits: - Catches and deletes spam BEFORE it reaches your inbox. - Self learns based on your spam and good email and adapts to new types of spam. - Detects spam with great precision and accuracy. - Stops | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
202. | G-Lock Temp Cleaner 2.0 (glocksoft.com) | ||
on your hard drive. The program searches your drives potentially unwanted files and allows you to deal with them all with just one click. It comes pre-configured with the most common junk file types and allows you to add your custom extensions. G-Lock Temp Cleaner is easy to use and allows you to optionally delete files to the recycle bin, allowing you to restore them if you make a | |||
Updated: 9, 2005 | Rating: 248 | Author: Alex Markov | Size: 874 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
203. | GoodBye Spy 4.01 (tekeffect.com) | ||
your registry, memory, and drives, then allows you to remove these unwanted files from your system. To offer greater protection a Real Time Monitor runs silently in the background protecting you against further attacks. Free upgrades for life to all registered users. New recent modifications have been implemented into the search and detect engine. As such, GoodBye Spy now searches | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 608 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
204. | Hara-Kiri 2.02 (cyteg.com) | ||
that your computer is stolen, Or if your computer is infiltrated by unwanted users. Imagine several situation, when "Hara-Kiri" may be useful for you: 1. Your PC is stolen Malefactor runs your computer with hope to profit by important secrets of your firm... But he don't know that it is necessary to press a combination of certain keys while Windows is starting up! And secrets | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
205. | IdentaFone Pro 2.50 (identafone.com) | ||
local network. If you are tired of sales calls just block any unwanted caller you choose and even play them a wave file to explain why you do not accept their calls. Get off telemarketer lists with the telezapper type tones included with the rejection messages. Returning calls is as simple as scrolling through the list of recent numbers and clicking to dial. Included is a | |||
Updated: 9, 2005 | Rating: 35 | Author: IdentaFone Software | Size: 2945 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
206. | IECleaner 1.1 (zipstore.com) | ||
Explorer. IECleaner has a built-in Pop-up windows killer to prevent unwanted pop-up windows appearing on your screen while you are surfing, it will eliminate the majority of advertising windows that are commonly used. IECleaner lets you to define "hotkeys" and attach any necessary action. "Hotkeys" are | |||
Updated: 9, 2005 | Rating: 39 | Author: Atypie Software | Size: 1190 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
207. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
data. Keep those prying eyes out of your communications and prevent unwanted people from reading your private files. Invisible Secrets encrypts and hides data in places where not even your wife, boss, or a hacker would look for sensitive | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
208. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
209. | JoinLine 1.9 (WindowsUtilities.com) | ||
fixes text files with long fixed length records and unwanted line wraps. Spreadsheets and database programs import individual text records with data on the same line. However, sometimes text lines are wrapped before the end of the record. If these records always wrap to the same number of lines, then JoinLine can restore the wrapped records to single line records. A space pad | |||
Updated: 9, 2005 | Rating: 71 | Author: Frank Snyder | Size: 1799 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
210. | MiniApps 5.06 (backtec.com) | ||
multi account Check Book, and US Zip Codes. Option to remove unwanted programs. Words can't explain these valuable mini utilities, check them out. Forty one freeware in one install. Words can't explain these valuable mini utilities, check them | |||
Updated: 2, 2006 | Rating: 16 | Author: Theodore Fattaleh | Size: 7339 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
|
Home > Unwanted software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|