|
||||||
|
||
|
Home > Marketing software |
|
|
471. | LaptopLocate.net 2.9.2 (tometasoftware.com) | ||
Tometa LaptopLocate.net is a software utility that will monitor a computer's IP address to allow server administrators and general users to locate their computer. Using cutting edge technology, each time a computer that has LaptopLocate.net is turned on, the IP address of the computer is transmitted to a | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 4839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
472. | Keylogger Hunter 2.1 (styopkin.com) | ||
Utility for blocking the activity of keyboard monitoring programs presumably running on your PC. Neutralizes up to 90% of keyloggers, depriving them of information about the pressed keys. Keylogger Hunter was created, which paralyzes accumulation of information by Hook-based keyloggers. This program is | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexander Styopkin | Size: 611 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
473. | KGB Free Key Logger 1.93 (refog.com) | ||
Free KGB Key Logger is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex | |||
Updated: 2, 2006 | Rating: 2482 | Author: ReFog Software | Size: 1477 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
474. | KGB Spy 3.93 (refog.com) | ||
KGB Spy Software is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
475. | Junk-Out for Outlook 2003/2002/2000 1.0 (theofficemaven.com) | ||
Junk-Out keeps junk mail out of your Microsoft Outlook Inbox, using a combination of statistical methods (Bayesian filtering) and information you provide, to show only e-mail messages you want to see. The more you use Junk-Out, the better it gets at distinguishing useful e-mail, and getting junk out of your | |||
Updated: 2, 2006 | Rating: 0 | Author: Mike Craven | Size: 10536 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
476. | JIT Scheduler 8.30 (gibinsoft.net) | ||
JIT Scheduler is the task scheduler for Windows 95/98/Me/NT 4/2000/2003/XP, it provides the easy way to create and launch tasks in specified day and time. JIT Scheduler supports 4 types of tasks: Application, Document, System Shutdown or just Message (Remind). This means, that you can open document (e.g | |||
Updated: 2, 2006 | Rating: 42 | Author: Igor V. Polyakoff | Size: 678 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
477. | Instant File Name Search 1.4 (sowsoft.com) | ||
Instant File Name Search (IFNS) is a fast, free and easy to use software especially designed for file name searches. Instantly search files by name, part of name or mask (*.pdf, pentium?.jpg, *nirvana*.mp3 etc.) on your computer or local network. IFNS offers support of Boolean operators (AND, OR, NOT) | |||
Updated: 2, 2006 | Rating: 0 | Author: Vladimir Sinitsyn | Size: 460 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
478. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
Infiltrator is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom for vulnerabilities, security holes and exploits, and information enumerations. Infiltrator can reveal security holes and alert the user | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
479. | IdentaFone Multi-Line Caller ID Software 3.99 (identafone.com) | ||
A virtual telephone assistant that works with your multi-line Caller ID hardware from Rochelle, TCI, Zeus Phonstuff Inc, or YES Telecom for monitoring up to 100+ lines. By using your local network, only one Caller ID box is required, allowing several workstations to have the same detailed status of callers | |||
Updated: 2, 2006 | Rating: 0 | Author: IdentaFone Software | Size: 2752 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
480. | IconChanger 3.5 (shelllabs.com) | ||
Does your desktop look plain and boring? Get Icon Changer! Icon Changer is a software application that makes changing icons fun and easy. It's a hassle-free way to personalize your desktop without having to open up any computer manuals. Simply click the icon you want to change, point at the one you like and | |||
Updated: 2, 2006 | Rating: 434 | Author: Marat Maksyutov | Size: 1128 kb | Shareware Go to category: Graphic Apps > Icon Tools Similar programs | |||
|
Home > Marketing software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|