|
||||||
|
||
|
Home > Connection software |
|
|
261. | Website Extractor 9.30 (internet-soft.com) | ||
any files that were not copied due to transfer errors or bad connections. The program is equipped to run through a proxy server and download only revised or new files, bypassing documents that have already been copied. The Extractor is essentially a search robot and is designed for fast-track navigation through the hyperlinks of cyber space, downloading web pages at the | |||
Updated: 2, 2006 | Rating: 42 | Author: Website Extractor | Size: 740 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
262. | WebIdeaTree 4.20 (webideatree.com) | ||
easy to create, organize and maintain your Web or Intranet site. It's a powerful yet simple automatic Web site generator. Working from a single site content/source file and CSS templates, you can produce a Website with the exact look & feel that you want. You can use as little or as much custom | |||
Updated: 2, 2006 | Rating: 0 | Author: Christophe Guibert | Size: 8867 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
263. | WebCloner Offline Browser 2.5 (productsfoundry.com) | ||
file for offline view and manipulation. Once saved, no internet connection is required to access them. Also take advantage of full featured export process that gives you the ability to move or change the way saved websites will stay on your computer. Also WebCloner is an offline browser, image viewer with advanced browsing and image editing features, site mapping tool, browser | |||
Updated: 2, 2006 | Rating: 0 | Author: Candin Jurca | Size: 3142 kb | Shareware Similar programs | |||
264. | Web Log Mixer 1.3 (bitstrike.com) | ||
Web Log Mixer is a GUI/command line utility which helps you to combine log files generated by the web server into a single log file. Source log files can be generated either by a single web server or by different web servers in the load balancing environment. The program understands log files compressed with | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexey Stcherbic | Size: 460 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
265. | TurboFTP 4.60.438 (turboftp.com) | ||
you synchronize local and remote folders with ease. The GUI program's Task Scheduler offers scheduled FTP transfer, uni- and bi-directional synchronization capabilities and can send multiple notification e-mails upon task complete. TurboFTP's Sync Service Module goes an extra mile in FTP/SFTP automation to allow you to simultaneously run multiple scheduled FTP/SFTP tasks as | |||
Updated: 2, 2006 | Rating: 578 | Author: TurboSoft, Inc. | Size: 3588 kb | Demo Go to category: Network & Internet > FTP Clients Similar programs | |||
266. | TelStar 1.9.2 (innersystem.com) | ||
disconnect, etc. Features also include menu-selected tiling of open connections, double-clicking to open a new connection, true pass-through aux print (without eating the escape sequences), and prompted verification if you attempt to close the session other than by logging off. A lean and quick telnet client for windows, suitable for corporate | |||
Updated: 2, 2006 | Rating: 0 | Author: Dennis Taylor | Size: 680 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
267. | Stealth Web Page Recorder 1.1 (blazingtools.com) | ||
of password protected pages and web pages which use secure HTTPS connection. The new version also captures logins and passwords for the sites. It is absolutely undetectable after the installation. Stealth Web Page Recorder stores the text of web pages visited and lets you easily review the saved information later. It has convenient user interface similar to the History bar in the | |||
Updated: 2, 2006 | Rating: 0 | Author: BlazingTools Software | Size: 114 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
268. | Internet Secure Tunneling 2.0.0.228 (han-soft.biz) | ||
tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure. The tunneling capability of SSH Secure Shell is a feature that allows, for example, company employees to access their email, company intraweb pages and shared files securely by even when | |||
Updated: 2, 2006 | Rating: 0 | Author: JING YU HAN | Size: 927 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
269. | SSH client for windows SSHPro 2.9 (labtam-inc.com) | ||
between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. SSH is the industry standard for remote logins. It addresses most of the critical issues which concerns most users while on the internet: cyber hackers stealing passwords and other important information. SSHPro brings you typical | |||
Updated: 2, 2006 | Rating: 0 | Author: Submit Submit | Size: 3136 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
270. | SoftPerfect Network Protocol Analyzer 2.3 (softperfect.com) | ||
debugging, maintaining and monitoring local networks and Internet connections. It captures the data passing through your dial-up connection or network Ethernet card, analyzes this data and then represents it in an easily readable form. SoftPerfect Network Protocol Analyzer is a useful tool for network administrators, security specialists, network application developers and | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Kotov | Size: 1670 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
|
Home > Connection software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|