|
||||||
|
||
|
Home > Between software |
|
|
251. | Access Administrator Pro 4.14 (getfreefile.com) | ||
you a lot of abilities to allocate access to your files and folders between your users according to predefined schedules. It means that each user has his own list of allowed and disallowed files and folders within certain time periods. The program does not modify your media: in protecting your files, it just uses a high-reliability VXD driver working at Windows kernel level. This | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
252. | Access Administrator Pro 4.14 (softheap.com) | ||
you a lot of abilities to allocate access to your files and folders between your users according to predefined schedules. It means that each user has his own list of allowed and disallowed files and folders within certain time periods. The program does not modify your media: in protecting your files, it just uses a high-reliability VXD driver working at Windows kernel level. This | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
253. | Phota Flowers Screensaver 3.5 (Whizical.com) | ||
Photos, in random or sequential sequence, with a specified interval between image changes. The background that surrounds photos can be set to either a solid color or a pattern. An Animate Colors feature performs a sequence of color shifts on each image. 30 pretty flower pictures are included. The screensaver display can be accompanied by music. The flowers can optionally be | |||
Updated: 2, 2006 | Rating: 0 | Author: Jeff Holcomb | Size: 4133 kb | Freeware Go to category: Desktop > Similar programs | |||
254. | CyberMatrix Pro Schedule 5.03 (cyber-matrix.com) | ||
the software now has a feature to drag and drop appointments between different people, dates and times. Dragging the appointment edges allows appointment time adjustments right on the schedule. In addition, the unavailable features have been greatly improved. People can now be indicated as unavailable multiple times per day and even within date ranges. Finally, synchronization | |||
Updated: 2, 2006 | Rating: 0 | Author: Cyber Matrix | Size: 2953 kb | Commercial Go to category: Business > PIMS & Calendars Similar programs | |||
255. | VisNetic MailServer 8.3.5 (deerfield.com) | ||
compatible with the Jabber open XML protocol. Instant messages between the IM server and any Jabber-compatible IM client are secured using SSL/TLS encryption. IM transmissions between VisNetic Mail Server's IM server and any Jabber-compatible IM server located outside your organization are also secured via SSL/TLS. VisNetic Mail Server is a high performance mail server with | |||
Updated: 2, 2006 | Rating: 124 | Author: Deerfield Com | Size: 25757 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
256. | TurboFTP 4.60.438 (turboftp.com) | ||
newly created or updated files added in it. It supports dependency between tasks, different dialup connection for individual task, and running programs before or after a schedule job. The Sync Service Module can also run as a console program to perform FTP/SFTP download/upload and synchronization of | |||
Updated: 2, 2006 | Rating: 578 | Author: TurboSoft, Inc. | Size: 3588 kb | Demo Go to category: Network & Internet > FTP Clients Similar programs | |||
257. | Web Search and Replace 7.6.3 (crystalsoftware.com.au) | ||
and replace changes to a line or column range or both. Convert files between Unix, Mac and PC/Windows end of line formats. Filters can remove blanks from the start or end of each line, remove blank lines, remove HTML tags and add line numbers. Restrict changes to line or column ranges. More than 200 | |||
Updated: 2, 2006 | Rating: 16 | Author: Simon Carter | Size: 2376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
258. | SSH client for windows SSHPro 2.9 (labtam-inc.com) | ||
rlogin and rsh, while providing a securely encrypted communication between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. SSH is the industry standard for remote logins. It addresses most of the critical issues | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
259. | Private Shell SSH Client 2.1 (privateshell.com) | ||
Use built-in Secure FTP client (SFTP client) to transfer files between computers securely. Private Shell takes care to establish public key authentication, providing DSA or RSA key generation and key upload features. You can use the included key agent utility to cache decrypted private keys. Tokens are supported. Use the power and flexibility of graphical user interface and | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
260. | PEN - Pennock's Email Notifier 2.4-1 (enterprise.pennock.nl) | ||
a sound whenever new email arrives in your mailbox. You can choose between different pop-up styles or create your own. PEN supports an unlimited amount of POP3 (even over SSL) as well as IMAP, AOL, Excite, Gmail, Hotmail, Netscape, Lycos, Mail.com, MSN & Yahoo webbased mailboxes. You can preview subjects or preview the mail itself. Unwanted email can be deleted immediately, without | |||
Updated: 2, 2006 | Rating: 0 | Author: Cliff Pennock | Size: 3805 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Between software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|