|
||||||
|
||
|
Home > Email filter software |
Related keywords: email, filter, Email, bulk email, spam filter, email marketing, email extractor, email address, Filter, email software |
|
|
311. | 007 Spy Software 3.01 (e-spy-software.com) | ||
of computer users and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just like a surveillance camera directly point at the computer monitor. Features include | |||
Updated: 3, 2005 | Rating: 1455 | Author: Demi He | Size: 2176 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
312. | dfg BackUp XP 3.13.9 (dfg1.netfirms.com) | ||
simply the best! - The fastest, award winning and easy to use back up and restore program for nearly all backup medias - HD, ZIP, FTP, CD R/RW, etc. It is the most effective and fastest you can get today. Unlimited backup profiles are supported. dfg BackUp XP can be configured to start the backup automatically (powerful scheduler using command line options (switches) and to exit | |||
Updated: 9, 2005 | Rating: 16 | Author: victoria gross | Size: 3415 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
313. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
can hide the logs on the monitored PC or send them via network or email. The monitoring can be opted to be invisible to the user and ActMon is protected against manipulation: The program runs completely maintenance free. Activity data is sensitive data, and ActMon prevents unauthorized access to the log files and screenshots using the strong U.S. government approved | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
314. | Art Directory Print 3.1 (zzee.com) | ||
or saves them as an HTML, XML, or CSV file, which you can send by email or publish to the web. It adds itself to the Windows Explorer context [right mouse button] menu and can make and print listings with a couple of mouse clicks. User has total control over the output: you can specify not only which columns will be printed, but also their order and width. In addition to the standard | |||
Updated: 2, 2006 | Rating: 138 | Author: Paul Slavic | Size: 1984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
315. | Backup4all 3.0 (backup4all.com) | ||
and mirror backups. When defining a backup you can also set file filters and schedule the backup for automatic execution. Once a backup is performed, you can see what files have been changed since the last backup or you can read the statistics about the next backup execution. You can use the context menu from the tree to run standard actions associated with the file type. There is | |||
Updated: 2, 2006 | Rating: 24 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
316. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
key stroke activity that may provide clues as to the intruder’s intentions or their identity. Notification Services – Theft Recovery ComputerSafe sends various types of remote notifications when violations occur - pages, phone calls and emails. If the system is set up to record video of the violation, the resulting video clip can be attached to the email* | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
317. | DirSync Directory Synchronizer 3.0.4 (archersoft.com) | ||
remote administration, scheduling, simulation, e-mail reporting, filtering, unicode filename, validation, transfer security attributes, transfer folder creation/modification time, keep deletion files, file revisioning, pre/post-sync process, error handling, path variables and detailed log, etc. The synchronization is based on the policy specified by user to copy those files which | |||
Updated: 2, 2006 | Rating: 0 | Author: Frank Archer | Size: 2851 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
318. | Email Audit 3.2 (km-vision.com) | ||
Email Audit is a powerful add-in utility for Microsoft Outlook 2000/XP/2003.As the new mail arrives,it filters and clusters Spam mails, Junk mails, Bounce mails into their respective folders. The email audit utility comes with a host of built in spam control filters and flexible | |||
Updated: 9, 2005 | Rating: 0 | Author: Shama Hegde | Size: 8172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
319. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
increasing problem, and nowadays it is practically impossible to use email without receiving spam in large amounts. G-Lock SpamCombat is your powerful solution for clearing your Inbox from spam, virus, and junk emails. G-Lock SpamCombat is email filtering software that lets you eliminate | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
320. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode option, hot key access, Email logs, Monitoring and logging across your home network, LAN or the | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Email filter software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|