|
||||||
|
||
|
Home > Interesting software |
|
|
341. | wodMailbox 2.0.7.0 (weonlydo.com) | ||
multipart messages, different encodings and stuff like that. It's almost the same for wodMailbox - it's light, quick and fully supports all mail related RFC's. You can look on using wodMailbox for three main purposes: When you want to access mail messages in the mailbox When you want to access and parse one mail message When you want to prepare and create new | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 821 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
342. | wodImapServer 2.0.0.0 (weonlydo.com) | ||
implementation. All you need to do is to put it on VB form, call it's Start method and it's immediately accepting connections by your clients! It fully supports commands defined in RFC2060. Since wodImapServer is COM object and not the full application, there's few things developer | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1033 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
343. | wodPop3Server 1.3.2.0 (weonlydo.com) | ||
implementation. All you need to do is to put it on VB form, call it's Start method and it's immediately accepting connections by your clients! It fully supports commands defined in RFC1939. Use your favorite mail client (such as Outlook Express or Eudora) to read mail provided by your own | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 857 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
344. | wodSSHTunnel 1.5.0.0 (weonlydo.com) | ||
you can allow or deny user to use secure channel - once again, it's your decision. If you allow user to connect and use channel, everything is done by wodSSHTunnel, and you don't need to do anything else wodSSHTunnel component is server-type component that will add secure tunneling (based on SSH protocol) capabilities to your application. Based on your rules and definitions, it will | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1317 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
345. | CPUSpy 1.044 (SinnerComputing.com) | ||
cache sizes, release dates, codename, and transistor count. Interesting facts are also included for most major models. A OS database is also included for comparing past current and future versions of Windows as well as information on you computers drives. Processor data can be saved in a HTML report file providing an easy way to extract data from a PC and analyse it later | |||
Updated: 2, 2006 | Rating: 42 | Author: Andrew Glina | Size: 51 kb | Shareware Go to category: System Utilities > Benchmarking Similar programs | |||
346. | Mp3 Tag Assistant Professional 2.7 (assistanttools.com) | ||
Music filenames are often inconsistent and erroneous. Mp3 Tag Assistant Professional allows you to change filenames based on their tagged information saving you time and effort. Automate the tedious task of changing tagged information in MP3 and WMA files. Easily copy or move music files, create playlists and | |||
Updated: 2, 2006 | Rating: 0 | Author: Roman U. Kondratiev | Size: 3152 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
347. | ieSupportManager 1.50 (iecomputersystems.ie) | ||
ieSupportManager is a fully featured desktop and web based helpdesk system. Features include a web interface, email notifications, email logging, knowledgebase, contract management facilities and a comprehensive suite of reports. ieSupportManager allows users to add to and search its knowledgebase and | |||
Updated: 2, 2006 | Rating: 0 | Author: Stephen McNamee | Size: 14336 kb | Demo Go to category: System Utilities > Other Similar programs | |||
348. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
349. | NCrypt TX 1.8 (littlelite.net) | ||
This text based encryption tool allows easy message hiding, to be used in e-mail, messenger and other communications. NCrypt TX also has hashing capabilities to verify message integrity. It supports DES, Rijndael-AES, SHA, and MD5 algorithms, as well as historical algorithms such as ROT13 and Vigenere. With | |||
Updated: 2, 2006 | Rating: 0 | Author: Alessio Saltarin | Size: 511 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
350. | Monitor one FP1.78.317 (fineconnection.com) | ||
them yourself with just a few clicks. Seven licence types available (S-type,M-type,L-type, 3 upgrade types and Enterprise). Small networks (less than 8 objects) can be managed for free. A comprehensive, all-in-one and graphical all-in-one network monitoring software for network uptime and health | |||
Updated: 2, 2006 | Rating: 42 | Size: 16047 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
|
Home > Interesting software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|