|
||||||
|
||
|
Home > Companies software |
Related keywords: market research companies |
|
|
511. | DomainRipper 1.0 (domainripper.com) | ||
has not already been bought or one that has expired, unfortunately companies responsible for maintaining the Whois databases, such as Network Solutions, can take months to delete expired domains from their systems. You will not be able to register an expired domain until it has been completely deleted | |||
Updated: 3, 2005 | Rating: 16 | Size: 10240 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
512. | DriveWatch (Drive_Watch) 1.2 (mysite.verizon.net) | ||
Disk/Path(s) free resource monitoring program. Ideal for use in situation of unattended high volume downloads, file transfers and file sharing. Monitor for file modifications, change in free space, file/folder counts and more. A utility made of use to assist in preventing loss of valuable data and loss of time due to lack of Free Storage Resources. Perfect for professionals and | |||
Updated: 3, 2005 | Rating: 0 | Author: Webadviso Media Inc. | Size: 4000 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
513. | DSN Now! 2.2 (ic.net) | ||
(DSNs) on the fly with the simple click of a button saving your company both time and money! Imagine having to spend 3 minutes per PC to setup a DSN. Now imagine having to setup 100 PCs - that's 5 hours spent creating DSN files!!! At $25 per hour that's $125!!! So you can see how DSN Now can easily pay for itself the first day it's used! With DSN Now you can | |||
Updated: 9, 2005 | Rating: 16 | Author: Frank Kusluski | Size: 1794 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
514. | EldoS KeyLord 4.0 (eldos.org) | ||
information records to "expire" so that you are notified when it's time to go and change password or acount info. KeyLord integrates with your web browser and helps you store login information not in insecure Windows Password Storage (for which browsers and crackers exist), but in encrypted KeyLord file. EldoS KeyLord lets you arrange confidential information (passwords, account | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 1864 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
515. | EldoS KeyLord for PocketPC 4.1 (eldos.org) | ||
information records to "expire" so that you are notified when it's time to go and change password or acount info. EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, print it and store it in secure encrypted file. You can store any data including files inside of the tree | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 176 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
516. | Email Spy Pro 4.5 (email-spy.biz) | ||
only). That feature is very appropriate for small and middle companies, which don't have own dedicated email server. Email Spy Pro is appropriate for: - Businesses trying to put a stop to inappropriate using of company name, leakage of trade/industrial secrets or intellectual property. - Parents concerned about what their children send by email who they communicate | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Nilsson | Size: 323 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
517. | EmailObserver 5.2.2 (softsecurity.com) | ||
is a suitable tool for: - Parents concerned about their children's computer activity, i.e. what kind of messages they send by email, who they communicate with etc. - Spouses concerned about their partner's secret cyber relationship etc. - Businesses trying to control internal information | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
518. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
519. | Find Protected 2.0 (aks-labs.com) | ||
problems associated with unauthorized or illegal use of confidential company information. This utility aims to protect your company from electronic data leakage and reveal inappropriate use of sensitive files. With Find Protected, IT administrators can do a deep inspection of employees' files to enforce an intelligent data security policy across their organizations. Find | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 1225 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
520. | Exp USB Virtual Driver (EUSBVD) 2.0 (alarit.com) | ||
TCP/IP. These solutions contain, both software and the hardware. Our company as well has the like solution: it is a product for the remote control of consecutive devices ENSD. Nowadays there are more and more devices with interface USB as alternative to the parallel or consecutive connection, but there | |||
Updated: 9, 2005 | Rating: 39 | Author: Rachel Guillermo | Size: 547 kb | Commercial Go to category: Network & Internet > Remote Computing Similar programs | |||
|
Home > Companies software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|