|
||||||
|
||
|
Home > Direct email software |
Related keywords: email, Email, bulk email, email marketing, email extractor, email address, direct, email software, email client, bulk email software |
|
|
381. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
Peer2Peer applications (Kazaa, Kazaa Lite, iMesh, Napster, Morpheus, Direct Connect, Limewire, Shareaza, etc.), and for other popular programs such as Windows Media Player, RealPlayer, Yahoo Messenger, ICQ, etc. Eraser has an intuitive interface and wizards that guide you through all the necessary steps needed to protect your privacy and sensitive information. Other features include | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
382. | Filehand Search 3.0 (filehand.com) | ||
be indexed for instant searching. Supported files include Outlook email and contacts, PDF, Word, PowerPoint, Excel, WordPerfect, HTML/MHT, MP3 and Zip archives. Whether you are an expert or novice computer user, Filehand Search locates your files faster than you can click on My Documents and find | |||
Updated: 9, 2005 | Rating: 0 | Author: Elliot Mednick | Size: 683 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
383. | Find In Context 2.00 (inetprivacy.com) | ||
which normally cannot or are not supposed to be opened and searched directly, e.g. email databases, swap files, cache and cookies collection of your browser etc. Instead of just pointing you to the documents that might be relevant to your search, Find In Context finds the most relevant | |||
Updated: 9, 2005 | Rating: 0 | Author: iNetPrivacy Software | Size: 343 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
384. | Golden Eye 4.11 (monitoring-spy-software.com) | ||
Are you suspecting your husband or wife is cheating on you? who they email ? what movies they see? who they chat with ? Do you want to know what your employees are doing during work hours? Golden Eye is designed to monitor and record all the activity on your computer. with its bulit-in spy | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin | Size: 1490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
385. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
viewed. Other features include stealth mode option, hot key access, Email logs, Monitoring and logging across your home network, LAN or the Internet in real-time with an optional add-on product HWIN, and much more. Logs may be sent to a decrypted comma delimited text file for importation into thousands | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
386. | IIPwr Package 2.00 (iipwr.com) | ||
wanted to spy on a computer you own but currently don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities (such as keystrokes, active applications, passwords, visited | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
387. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
faster access to your passwords by accessing the password manager directly from the tray menu; a virtual keyboard created in order to prevent any key logger software from stealing your passwords; a shredder that helps you destroy beyond recovery files, folders and internet traces; a locker that allows you to password protect certain applications; the ability to create self-decrypting | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
388. | IP Mailer 2004d (wappu.tv) | ||
ISP gives you a temorary IP address each time you log on, you can email your IP address automatically to your friends and office/home so that you can find your computer for remote access regardless of the constantly changing IP address. If you use your computer remotely or need to have other people access some server functionality on your PC you can let them know what your IP address | |||
Updated: 9, 2005 | Rating: 151 | Size: 1600 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
389. | JvCrypt 1.0 (vandaveer.com) | ||
the command line. With JvCrypt, you can encrypt and decrypt files directly from the command line (DOS window). You can even execute JvCrypt commands from batch files! (5) Password database. With JvCrypt, you have the option of storing frequently used passwords into a password database. These passwords can be used when running JvCrypt from the command line or during normal interactive | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
390. | LaptopLocate.net 2.9.2 (tometasoftware.com) | ||
of the computer is transmitted to a pre-determined location via email and logged for reference. This information is also transmitted to our servers and logged in the event your computer is ever stolen. LaptopLocate.net is helpful in finding where computers, especially mobile computers are currently located. If the computer is stolen, Tometa Software will coordinate with law | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 4839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Direct email software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|