|
||||||
|
||
|
Home > Unsolicited software |
Related keywords: unsolicited email, unsolicited e mail, unsolicited commercial email, unsolicited junk, unsolicited spam, cluster unsolicited |
|
|
401. | IBPTime 1.50 (pages.infinit.net) | ||
Implements the Internet Time Service (ITS) which allows users to synchronize their computer clocks via the Internet. The time information provided by the service is directly traceable to UTC. The service responds to time requests from an Internet client in several formats including the DAYTIME, TIME, and NTP | |||
Updated: 9, 2005 | Rating: 39 | Author: IBP Support | Size: 1191 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
402. | IEToolKit 1.5.5 (ietoolkit.com) | ||
annoting ads. Features: Intelligent popup killer,Block 100% Unsolicited Popups Save web pages to one single Web Archive files (*.mht) easily and quickly; Conveniently saves Flash files embedded in web pages to local drive with only a drag of the icon to the flash object. Filter flash,audio,video,aniimations,image, which enhances your browsing experience significantly | |||
Updated: 2, 2006 | Rating: 16 | Size: 1231 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
403. | Free Picture Finder 3.5 (fatesoft.com) | ||
Free Picture Finder is an image search and management program that can search and download images on Internet. It has internal image search engine ,picture finder and picture downloader. Searching is executed by using keywords, Found images are stored in image gallery. This version targets scores It uses internal image searcher and picture downloader to search and download pic on web. Searching is executed by using keywords, The search possibilities are endless | |||
Updated: 3, 2006 | Rating: 229 | Author: fatesoft fatesoft | Size: 1208 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
404. | Imaginary Telnet Server 1.0 (whizkidtech.redprince.net) | ||
Whenever your computer is connected to the Internet, it is opened up to attacks by anyone experienced with the Internet technology. One of the possible attacks is by using the Telnet protocol to log into your system. If successful, the attacker can gain complete control of your system. With the Imaginary | |||
Updated: 3, 2005 | Rating: 97 | Author: G. Adam Stanislav | Size: 38 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
405. | InboxSpecialist 2001 (gutmannsoft.com) | ||
If you're annoyed by people sending you large attachments via email, InboxSpecialist is for you. Like a standard new mail checker, it will access your email server at specific intervals and check for new mail. Unlike most checkers, though, it displays the size of waiting mail, giving you the option of | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Gutmann | Size: 1358 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
406. | indexsoft Site-Up 2.63 (indexsoft.com) | ||
indexsoft Site-UP is a multilingual web based file manager with build-in WYSIWYG editor. With help of Site-UP you can easy support your website using only a computer connected to the Internet and browser. Moreover indexsoft Site-UP with success can replace any FTP client and telnet or ssh access. Site-UP | |||
Updated: 9, 2005 | Rating: 0 | Author: Serzh Black | Size: 400 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
407. | Internet Explorer Tools 0.9 (ie-tools.game-craze.com) | ||
What is it? Internet Explorer Tools is a plugin for Microsoft Internet Explorer which filters all content loaded by Microsoft Internet Explorer from the Internet. Filters can be configured, for example, to reduce traffic or to improve readability of pages if have poor eyesight or just block all | |||
Updated: 8, 2004 | Rating: 52 | Author: Mikhail Mikhalev | Size: 150 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
408. | Internet Secure Tunneling 2.0.0.228 (han-soft.biz) | ||
Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure. The tunneling capability of SSH Secure Shell is a feature that allows, for example, company | |||
Updated: 2, 2006 | Rating: 0 | Author: JING YU HAN | Size: 927 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
409. | Internet Utility - Popup Blocker 2.10 (internet-utility.com) | ||
of annoying unsolicited pop-up windows when surfing the web? Get this popular Popup Blocker and you won't need worry about the popup window any more. Not only are pop-up ads annoying, but they steal bandwidth from your other legitimate downloads. By using our popup blocker, you will browse faster than before since the ads don't get downloaded and never appear. Here is our | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Smith | Size: 562 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
410. | ActMon STARR Computer and Internet Monitoring *PRO Edition* 3.27a (iOpus.com) | ||
ActMon STARR is the all-round, award-winning Computer and Internet Monitoring tool. It allows companies and individuals to track the use / abuse of PCs easily and invisibly. It logs screenshots, keystrokes, user names, passwords, path names, access times, windows titles, BOTH sides of a CHAT conversation, AOL | |||
Updated: 2, 2006 | Rating: 222 | Author: ActMon GmbH | Size: 998 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
|
Home > Unsolicited software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|