|
||||||
|
||
|
Home > Identification software |
Related keywords: name tags identification, language identification, character set identification, file identification |
|
|
441. | Atomic Email Hunter 3.30 (atompark.com) | ||
restrictions. Atomic Email Hunter is capable of using proxies and identifying itself to web servers as a specified user agent. The application can use large number of independent threads to search for e-mails at blazing speeds. Besides highly configurable behavior, Atomic Email Hunter features eye-pleasing user interface and is capable of saving data to disk as well as exporting | |||
Updated: 2, 2006 | Rating: 338 | Author: Evgeny Medvednicov | Size: 938 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
442. | Flystrike Spam Interrogator 1.6 (softwarepromoting.com) | ||
POP server. A Score based on an Inventory of tests helps the user identify unsolicited messages for remote deletion. Messages containing abusive or illegal content can be relayed to the appropriate authorities with a set of automatically extracted headers. A number of pre-written (English and | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4950 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
443. | Flystrike Spam Interrogator 2.4.0.63 (downloads.flystrike.com) | ||
POP server. A Score based on an Inventory of tests helps the user identify unsolicited messages for remote deletion. Messages containing abusive or illegal content can be relayed to the appropriate authorities with a set of automatically extracted headers. A number of pre-written (English, French, and | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4920 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
444. | iNet Shaper 2.191 (winfiles32.com) | ||
has remote administration, activity monitor, activity logs. Router identifies user by IP address and by MAC address of incoming packet. Also, user can gain access to internet using logon utility included in distribution. Traffic shaper gives the posiibility of bandwidth redistribution among LAN users | |||
Updated: 3, 2005 | Rating: 24 | Author: UIP RU | Size: 4100 kb | Freeware Similar programs | |||
445. | SignGen 1 (gjsmith.com) | ||
to the PKI standards of a Public and Private key being used to identify the user and a unique transaction key generated on behalf of that user for stamping within their document. SignGen also provides a simple Electronic File management system for recording all physical files within your registry and allows documents to be electronically assigned to those files. SignGen | |||
Updated: 9, 2005 | Rating: 0 | Author: Garry Smith | Size: 2490 kb | Demo Go to category: Business > Office Suites & Tools Similar programs | |||
446. | ipAddress 2.51.2 (castlesoft.co.nz) | ||
you use the internet, your computer has a unique number which identifies your computer to other computers on the internet. This unique number is known as the computer's IP (Internet Protocol) Address. For most people, when they connect to the Internet, their ISP (Internet Service Provider) automatically allocates an IP address for the duration of that connection. There are times | |||
Updated: 9, 2005 | Rating: 0 | Author: Castle Software | Size: 859 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
447. | Magic NetTrace 2.00.2 (tialsoft.com) | ||
functions into one friendly GUI utility. Using this tool you can identify the source of Internet connectivity problems, track down the source of junk mail, find out a geographic location of a web server or your ICQ buddy, troubleshoot e-mail problems and more. Multithreaded architecture makes the program extremely fast and tight integration with Internet Explorer enables users to | |||
Updated: 3, 2005 | Rating: 76 | Author: Alexei Tikhonov | Size: 1247 kb | Shareware Similar programs | |||
448. | MDaemon 8.1.4 (altn.com) | ||
8.1 new feature includes the first implementation of DomainKeys Identified Mail (DKIM) for the Microsoft Windows platform. DKIM validates the sender address and message integrity of each email received. MDaemon creates outbound signatures and validates inbound messages signed with DKIM. Read Alt-N's published white paper on DKIM and its implementation in MDaemon at | |||
Updated: 2, 2006 | Rating: 865 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
449. | Robot-Manager 3.1 (websitemanagementtools.com) | ||
and track visits by robots, spiders and crawlers to your website. Identify which spiders visited, when they visited, and what pages they indexed. Direct spiders to your most important pages, and exclude them from non-public pages. Maximizes effectiveness with search engines by avoiding over/under submitting. Excellent to improve search engine placements for users of automatic | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Lange | Size: 3475 kb | Shareware Go to category: Web Development > Site Administration Similar programs | |||
450. | Spam Crusher 1.1A (americansys.com) | ||
Can. Those on your friends list and those who aren't are easily identified with icons. That makes it easy to maintain. As you can see, Spam Crusher is designed to help eliminate SPAM from your email. And the ability to add filters, and friends, helps Spam Crusher to constantly get better and more effective. So, if you're tired of junk email give it a try. Spam Crusher is designed | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Porter | Size: 790 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
|
Home > Identification software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|