|
||||||
|
||
|
Home > Email from command line software |
Related keywords: email, Email, line, command, bulk email, command line, email marketing, on line, email extractor, email address |
|
|
41. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet history, Web pages and pictures from sites visited on the Internet | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
42. | Email Extractor 1.21 (bysoft.se) | ||
Email Extractor is a command line tool that allows you to extract e-mail addresses from any file (Microsoft Word, Microsoft Excel, Outlook Express, executables and so on). The Email Extractor is a command line tool that allows you to extract e-mail addresses | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Karlsson | Size: 110 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
43. | JvCrypt 1.0 (vandaveer.com) | ||
using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one step. You have the option of creating a single encrypted zip file for each file selected or combining all of your selected files to a | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
44. | Message Pattern Extractor 2.10 (xyz3.com) | ||
actions to perform when patterns are recognized. It accepts input from stored emails (via MAPI) and/or files. It can generate database tables (via ODBC) and/or files. It can be configured to parse emails (header fields, text bodies) or perform transformations on files. MPX can perform a wide variety of tasks because its design recognizes that many transformation tasks | |||
Updated: 8, 2004 | Rating: 0 | Author: Jim Miller | Size: 1751 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
45. | NetMailBot 5.0.1 (exclamationsoft.com) | ||
is the most powerful command line email client for sending and receiving email on the market today. It runs from a DOS command prompt, which allows it to be easily called from other applications. In fact, many of our customers run NetMailBot from existing applications to send email notices, invoices, statements, and | |||
Updated: 9, 2005 | Rating: 0 | Author: ExclamationSoft Corporation | Size: 3028 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
46. | QueIt 2.0 (vandaveer.com) | ||
(i.e. only execute a program if a file exists). You can also send command line arguments from QueIt to the program that you are launching. You can even send an email after a task has started or is complete. With the QueServer add-on, QueIt is able to run your scheduled tasks on | |||
Updated: 9, 2005 | Rating: 0 | Author: John Vandaveer | Size: 2728 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
47. | QuickButtons 1.5 (mjtnet.com) | ||
QuickButtons was originally written for Mark Weidmann, who suffers from MD, to try and make the use of his computer easier and it is hoped that QuickButtons will benefit others who find using keyboard shortcuts difficult or prefer to use the mouse. Mark enjoys playing on-line games and communicating with his Internet friends. Some of his games have awkward keystrokes that make | |||
Updated: 9, 2005 | Rating: 0 | Author: Marcus Tettmar | Size: 853 kb | Shareware Go to category: Development > Other Similar programs | |||
48. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
49. | SMTPTo 3.00.0038 (ionly.com) | ||
just to name a few. You create your standardized answers and from now on, answering boring emails is a pleasure. Even better, your recipients will love how detailed and but incredible fast you are able to answer. Key benefits: - React faster and better by email - Use templates to send standardized emails - Personalize common emails - Stop writing similar messages | |||
Updated: 9, 2005 | Rating: 68 | Author: Markus Kreisel | Size: 1262 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
50. | TEXTools 2.2 (fireflysoftware.com) | ||
to text like you've never done before with a minimal number of lines of code. Easier to develop, maintain and debug than traditional code, pipes are the ultimate solution to those everyday text editing problems. TEXTools' streamlined user interface seamlessly integrates 69 text translation filters, giving you the power to easily accomplish the most challenging editing tasks | |||
Updated: 9, 2005 | Rating: 571 | Author: Barry Block | Size: 1026 kb | Shareware Go to category: Development > Other Similar programs | |||
|
Home > Email from command line software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|