|
||||||
|
||
|
Home > Blacklists software |
|
|
381. | DesktopCalendar 1.0 (fcodersoft.com) | ||
In the real world you always place the calendar in some easily accessible place, to be able to see it at any moment, so, why should you run some extra program to do the same thing on your computer? This is the basic idea that lies behind the creation of Desktop Calendar. We think that desktop is the most | |||
Updated: 9, 2005 | Rating: 0 | Author: Evgeny Shamin | Size: 1060 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
382. | DotCom Clock 1.0.1528 (turtlemeat.com) | ||
The idea behind the DotCom Clock: The .com business is built around that machines can do business faster than humans. For the people who work in the .com environment it is essential that they can focus on the consept of time. This program will help you to keep focused on time. The idea behind the DotCom The .com business is built around that machines can do business faster than humans. For the people who work in the .com environment it is essential that they can focus on the consept of time. This program will help you t | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Berg | Size: 49 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
383. | Dupli Find 4.0 (rlvision.com) | ||
unique. o Merge several newsletter files into one. o Apply blacklists to files. o ... and much more! Dupli Find is a utility that searches text, excel & word files for duplicate lines. Found duplicates are reported and can be removed by the | |||
Updated: 2, 2006 | Rating: 48 | Author: RL Vision | Size: 807 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
384. | EldoS KeyLord 4.0 (eldos.org) | ||
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
385. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (industry-standard AES encryption is used). You can store any data including binary files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
386. | Email Audit 3.2 (km-vision.com) | ||
User Interface Build your own Whitelist of contacts Build your Blacklist contact Bar Blacklist Domains Reliable built-in Spam filters & Flexible user defined Spam filters. Build Subject Database. Option to apply audit on selected folders only. Clusters Junk mails, Bounce mails and Newsletters Compliments Outlook Rules implementations. Moves suspect mails (Virus | |||
Updated: 9, 2005 | Rating: 0 | Author: Shama Hegde | Size: 8172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
387. | Email Spy Pro 4.5 (email-spy.biz) | ||
get emails sent by monitored user or not?). Email Spy Pro blacklist option allows you to set flexible rules for outgoing emails of monitored computers (e.g. allows/forbids emails sending to specified addresses only). That feature is very appropriate for small and middle companies, which don't have own dedicated email server. Email Spy Pro is appropriate for: - Businesses | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
388. | Encryption Workshop 3.0 (encryption-workshop.com) | ||
Encryption Workshop includes file and folder encryption and decryption tool. Currently nine strong symmetrical block ciphers are implemented: BLOWFISH, GOST, RC 4, DES, Skipjack, TWOFISH, TEA and XOR. Any type of file can be encrypted/decrypted, not only ZIP files. If working with ZIP archives you might want | |||
Updated: 3, 2005 | Rating: 116 | Author: chaojun wang | Size: 1340 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
389. | Folder Security 2.5 (folder-security.com) | ||
Folder Security is a software program designed to password-protect folders. It lets you prevent people from viewing, printing, or altering your confidential documents. Folders remain protected should your PC be rebooted into Windows Safe Mode or DOS. A nice feature is the ability to include a password hint | |||
Updated: 9, 2005 | Rating: 0 | Author: Nicole Collet | Size: 755 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
390. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
G-Lock SpamCombat filters spam using a combination of whitelist, blacklist, Bayesian filter, and other anti-spam technologies. G-Lock SpamCombat works on Windows 98/ME/NT/2000 and XP. Do you dread all the junk in your email Inbox? Do you remember how useful email was without spam, whishing the | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
|
Home > Blacklists software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|