|
||||||
|
||
|
Home > List grabber software |
Related keywords: list, grabber, mailing list, to do list, audio grabber, image grabber, List, email grabber, mailing list manager, distribution list |
|
|
461. | Chilkat POP3 ActiveX Control 4.3.1 (emailcomponent.com) | ||
and receiving email. Packed with advanced features including: full S/MIME capability for sending and receiving signed and encrypted email, MHTML for sending HTML email with embedded images and style sheets, multipart/alternative, multipart/related, attachments, advanced AES encryption, automated international character encoding conversion, Outlook integration, progress monitoring | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
462. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
key stroke activity that may provide clues as to the intruder’s intentions or their identity. Notification Services – Theft Recovery ComputerSafe sends various types of remote notifications when violations occur - pages, phone calls and emails. If the system is set up to record video of the violation, the resulting video clip can be attached to the email*. Additionally, if | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
463. | Compendium-TA 1.3 (compendiumdev.co.uk) | ||
Compendium-TA is an outliner, a Graph Diagrammer, a cross-referencer, an entity modeller, a system prototyper, in short it is a flexible general purpose modelling tool. For modelling what? Novels, Articles, WebSites, Systems. You can use it to track defects and requirements, generate html, generate test For modelling what? Novels, Articles, WebSites, Systems. What do you model | |||
Updated: 9, 2005 | Rating: 0 | Author: Alan Richardson | Size: 6600 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
464. | Cresotech Easystart 2.0 (cresotech.com) | ||
context search engine allows you to locate any program, form the list of programs and service files on your computer, sort them by name, time of work, last access time or launch number - just type in some letters from program name to the wildcard list and give some seconds to EasyStart to collect the data on all file groups (like Desktop, Start Menu, etc.) and detect any | |||
Updated: 9, 2005 | Rating: 0 | Author: Cresotech, Inc. | Size: 1508 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
465. | Cresotech PocketLANce 1.15.50 (cresotech.com) | ||
Cresotech PocketLANce is a unique application allowing Pocket PC users to browse and manage LAN resources on their PDA devices. Designed for both personal and corporate use, PocketLANce opens new horizons for business people, software developers, mobile professionals or home users: now they can work with | |||
Updated: 9, 2005 | Rating: 0 | Author: Cresotech, Inc. | Size: 328 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
466. | Crime Catcher 2.1 (crime-catcher.com) | ||
for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Every single pixel being monitored for change. Hide Crime Catcher completely from view! Can appear in the system tray, taskbar, both, or neither - completely hidden from view! Email notifications with attachments Have emails of what the webcam has | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
467. | DB Maker 2.0 (internet-soft.com) | ||
random data downloaded from the Internet, to systematize catalogs; lists and price list; to process stock quotations, prices and offers; processing orders; to set up subscriber databases; to transfer information from email clients; to analyze statistical data on websites; to process email and | |||
Updated: 9, 2005 | Rating: 42 | Author: DB Maker | Size: 537 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
468. | Dekart Private Disk 2.07 (dekart.com) | ||
program fails to protect the system. Now you can create a white-list of applications, only these programs will be allowed to access the contents of the encrypted drive. This feature protects your data from external threats, as well as internal ones: group leaders can be sure that employees are able to access sensitive information while doing their job, but they cannot copy it, or use | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
469. | DeviceLock 5.73 (ntutility.com) | ||
administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available. Keep in mind that almost 80% of all security breaches come from the inside! DeviceLock is a best solution to secure NT and protect your network computers against attack from the inside. DeviceLock gives network administrators control over which users can access what devices | |||
Updated: 2, 2006 | Rating: 190 | Author: Ashot Oganesyan | Size: 6769 kb | Demo Go to category: Security & Privacy > Access Control Similar programs | |||
470. | DIRlist 2.6 (WindowsUtilities.com) | ||
shared by other users - Print, display, and browse directory listings with file descriptions - Used for project documentation, instruction manuals, and directory contents - Document the files and directories to promote identification - Propagates related descriptions by navigating between directories Provides user descriptions of files and subdirectories. DIRlist provides free | |||
Updated: 9, 2005 | Rating: 42 | Author: Frank Snyder | Size: 1597 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > List grabber software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|