|
||||||
|
||
|
Home > Personal computer software |
Related keywords: computer, personal, Personal, Personal Finance, computer security, personal information manager, computer game, personal finance, Personal Information Manager, Computer |
|
|
421. | Email Spy Pro 4.5 (email-spy.biz) | ||
monitoring software available today. Once installed on monitored computer it sends exact copies of all outgoing emails to your secret email address. While monitored user sends emails by using usual email client software (like Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar), all his outgoing emails will be INVISIBLY copied to your secret email address pre-configured | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
422. | eMailMerge 4Outlook 1.21 (addins4outlook.com) | ||
the sending of dull and dry messages and can help establish a personal and lasting relationship with your clients. The whole setup of the prepared messages minimizes the risk of classifying the messages as spam, thus making the use of eMailMerge essential for the marketer that wishes to sent Press Releases or communications to various institutions and organisations. Send | |||
Updated: 9, 2005 | Rating: 0 | Author: Addins4Outlook Addins4Outlook | Size: 694 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
423. | Find Protected 2.0 (aks-labs.com) | ||
such as PGP disk. Use Find Protected to inspect local or remote computers for password protected files. After selecting the types of protected files that you want to find and the location to search in, you run the scan. The result of the inspection is a list of discovered password protected files. Date and Size filters in Find Protected allow you to speed-up the search process | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
424. | Evolution Interface 1.1 (evolution-interface.com) | ||
(GUI) for the Windows OS that will change the way you work with your computer. Evolution Interface is simple to learn, easy to use, and greatly enhances creativity. It empowers both computer novices and power users. Evolution clears desktop clutter, saves thousands of clicks and scrolls, and | |||
Updated: 9, 2005 | Rating: 0 | Author: CodeName: MANA LLC | Size: 8470 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
425. | EZ Password Secure 1.2 (esmarttools.com) | ||
groups. Further more, EZ Password Secure can store all other personal information, e.g. bank accounts. Built-in Password Generator provides custom passwords. With the 1-Click function, you can paste the username&password to the clipboard, and also launch the associated web site. Key features: Encrypted database. The encrypted database can be accessed only with the entry | |||
Updated: 9, 2005 | Rating: 0 | Author: Yunqing Feng | Size: 628 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
426. | EZ Wizard 3.0 (microtech.doe.gov) | ||
98, ME, 2000 and XP systems saving up to $50 / yr in energy costs. Personal computers use more energy than all other desktop and office equipment combined. Unfortunately, much of this energy is needlessly expended while the computer sits idle, perhaps while you are in a meeting, on the telephone, or at lunch. Fortunately, we can reduce this waste through the use of | |||
Updated: 9, 2005 | Rating: 0 | Author: David Ensign | Size: 86 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
427. | EzCrypt+ 2.01 (kmgi.com) | ||
Internet" (Forbes). EzCypt+ adds Encrypt option to your mouse’s right button menu. Just enter your password, and your file will be converted into self-expendable password-protected file. For you, opening the file will be as easy as clicking the file and typing in your password, but for a hacker it would become an impenetrable fortress. “Encrypt and e-mail” option allows | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Konanykhin | Size: 616 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
428. | F-Secure Internet Security 2003 2003 (f-secure.com) | ||
2003 includes an award winning antivirus software and an easy-to-use personal firewall product that protects your system against break-in attempts when you are connected to the Internet. Especially for home users and small offices without dedicated IT-staff, F-Secure Internet Security 2003 provides | |||
Updated: 9, 2005 | Rating: 45 | Author: F-Secure Corporation | Size: 6416 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
429. | Fast Shutdown 1.02 (fastdown.multiservers.com) | ||
simple utility, which allows you log off, restart or shutdown your computer by easy mouse click. After starting the little icon appears in system tray and you can perform the desired action by single or(and) double mouse click on it. All actions are tunable. Fast Shutdown has also many settings, so you can tune restart process for your comfort and pleasure. Fast Shutdown - it is the | |||
Updated: 9, 2005 | Rating: 0 | Author: George March | Size: 376 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
430. | File Monster 2.6.7 (nstarsolutions.com) | ||
really been erased. As a result, anyone with a little knowledge of computers can very easily recover the information you thought was erased. To take your privacy a step further, File Monster also overwrites the original file name with a randomly generated name and it changes the file's creation date. It can even erase pesky hidden files, system files, and read-only files | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Personal computer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|