|
||||||
|
||
|
Home > Resource allocation software |
|
|
51. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC Acme Pro keylogger is an ability to save log files in special database for further analysis and retrieving information by specifying a | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
52. | PERIMON - Zykluskalender 3.6.9 (natuerliche-verhuetung.de) | ||
values or designate too many days as infertile by default, PERIMON's fertility analysis is based upon the data of your individual cycle and includes a wide safety reserve for cycle irregularities Is birth control with PERIMON safe? You'd better ask "Is PERIMON safe enough for my needs", because | |||
Updated: 2, 2006 | Rating: 165 | Author: ZANA digital | Size: 55 kb | Freeware Go to category: Home & Hobby > Health & Nutrition Similar programs | |||
53. | Victoria Woman Calendar 2.0 (executivpro.com) | ||
It contains the calendar,secret diary, reminder encrypt photo album, protect notebook and keeps track of women menstrual cycle. The Calendar predicts the future menstrual cycles and ovulation period, and it make possible for you to plan menstruation-free important events, such as vacation, travel | |||
Updated: 9, 2005 | Rating: 69 | Author: Victoria Korsunen | Size: 635 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
54. | Advanced HTMLCoder 3.0 (raysion.com) | ||
implementing password protection to restrict access to the Web resources and disabling certain operations in the browser interface. If your page is intended for private use only, you can encrypt its code (using powerful Blowfish and GOST encryption algorithms) and set the access password. You can also protect the source code of your pages from unethical competitors by encrypting it | |||
Updated: 8, 2004 | Rating: 59 | Author: Raysion Software Team | Size: 635 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
55. | Advanced Project Management 2.03 (advcomm.net) | ||
by managing your projects online with Advanced Project Manager It's time to relax and let Advanced Project Manager help you in a way that best suits your business.You may add member and projects as well. Let Advanced Project Manager help you to: Manage your projects remotely Define project deadlines, costs, team members and workweeks etc. Break down your projects into tasks and | |||
Updated: 3, 2005 | Rating: 48 | Author: Syed Nauman Hashmi | Size: 1000 kb | Shareware Go to category: Web Development > ASP & PHP Similar programs | |||
56. | ASP Calendar 2.0.0 (educesoft.com) | ||
folders with the following tree: Root/fpdb/resourcedata.mdb Root/resource/all other files The fpdb folder must have the correct permissions for write access to a database. Contact your ISP/network administrator for further details. Those who have MS Frontpage can use this application to set | |||
Updated: 9, 2005 | Rating: 234 | Author: Dave Wilson | Size: 56 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
57. | Check Proxy Professional (HTTP) 4.20 (checkproxy.com) | ||
Professional is blazing fast. 11. It requires less CPU/network resources than regular proxy checking software. Check Proxy Professional (HTTP) Features: 1. Managing / checking HTTP proxy lists 2. Proxy list printing 3. Proxy anonymity level detection 4. Determines type of the proxy server (Anonymous/Transparent) | |||
Updated: 9, 2005 | Rating: 259 | Author: Sergey Nemarov | Size: 5228 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
58. | Check Proxy Professional (Socks) 4.20 (checkproxy.com) | ||
Professional is blazing fast. 9. It requires less CPU/network resources than regular proxy checking software. ... Check Proxy Professional (Socks) Features: 1. Managing / checking SOCKS proxy lists 2. Proxy list printing 3. Determines speed of the proxy server 4. Determines Location (country) of the proxy server | |||
Updated: 9, 2005 | Rating: 920 | Author: Sergey Nemarov | Size: 5040 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
59. | DeskNET Command Center 1.0 (desknet.co.uk) | ||
Developed as an alternative to newsletter emails, DeskNET provides an exclusive method for webmasters and companies to stay in contact with their customers and subscribers and keep them coming back, time and time again. With DeskNET, webmasters can broadcast a variety of text, image and multimedia files | |||
Updated: 3, 2005 | Rating: 0 | Author: Robert Palmer | Size: 2615 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
60. | Essen Target Harvester 2.4 (essencomp.com) | ||
web page loading from web sites. It requires very few machine resources while running and is very easy to use. In order to operate, it needs a computer with a functioning connection to the Internet. The program searches the website, given as a URL or list of URLs, at each level and each link in order to extract email addresses. It can search from a list of manually entered URLs | |||
Updated: 9, 2005 | Rating: 0 | Author: Apurva Parekh | Size: 1693 kb | Commercial Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Resource allocation software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|