|
||||||
|
||
|
Home > Command line email software |
Related keywords: email, Email, line, command, bulk email, command line, email marketing, on line, email extractor, email address |
|
|
51. | Control Freak 1.3 (windsweptsoftware.com) | ||
application. You get an Explorer like file manager, a full-featured email client, an FTP client, a zip file manager, a cab file manager, a powerful file finder, and an expanded control panel. It also has an Address Bar, The Command Line, which starts were Explorer's Address | |||
Updated: 9, 2005 | Rating: 0 | Author: Greg DeBacker | Size: 2808 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
52. | CryptoForge 3.2.5 (cryptoforge.com) | ||
encrypt, and decrypt documents in a way that they can be sent by any email, messenger, or chat program. You can also use the built-in SMTP client. CryptoForge provides four encryption algorithms: 448-bit Blowfish, 256-bit Rijndael (AES), 168-bit Triple DES, and 256-bit Gost. It also includes powerful compression to strengthen cryptographic security even more. The command | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
53. | Dr.Web Anti-Virus for Workstations 4.31.a (advancedforce.com) | ||
for Workstations and it will do all the work for you. The scanner’s unique ability of testing the system memory, detecting the most sophisticated Trojans and backdoor programs running in the background, which are untraceable by ordinary means, makes it a powerful weapon against any non-traditional | |||
Updated: 3, 2005 | Rating: 0 | Author: Igor Daniloff | Size: 4253 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
54. | East-Tec Eraser 2006 7.0 (east-tec.com) | ||
and online activity with East-Tec Eraser 2006. Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer. Completely destroy information stored without your knowledge or approval: Internet | |||
Updated: 2, 2006 | Rating: 76 | Author: Horatiu Tanescu | Size: 4933 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
55. | Email Extractor 1.21 (bysoft.se) | ||
Email Extractor is a command line tool that allows you to extract e-mail addresses from any file (Microsoft Word, Microsoft Excel, Outlook Express, executables and so on). The Email Extractor is a command line tool that allows you to extract e-mail addresses from any file (Microsoft Word, Microsoft Excel, Outlook Express, executables and so | |||
Updated: 9, 2005 | Rating: 0 | Author: Roger Karlsson | Size: 110 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
56. | Groone's Macroer 2.6 (groonesworld.com) | ||
worry about repitive tasks again! Groone's Macroer simplifies those redundant day to day tasks. By creating simple text routines you will free up hours on the keyboard. There are no complicated scripting languages to know and no list of forced to remember keyboard strokes. YOU define everything. Now you don't have to remember hundreds of passwords that may fill your day at work | |||
Updated: 3, 2005 | Rating: 82 | Author: R Bennett | Size: 3810 kb | Freeware Go to category: Security & Privacy > Password Managers Similar programs | |||
57. | JvCrypt 1.0 (vandaveer.com) | ||
using the advanced Blowfish encryption algorithm. Some of JvCrypt's key features include: (1) Ability to protect your files with powerful encryption. With JvCrypt you can select a single file or multiple files to be compressed and encrypted all in one step. You have the option of creating a single encrypted zip file for each file selected or combining all of your selected files to a | |||
Updated: 9, 2005 | Rating: 42 | Author: John Vandaveer | Size: 3124 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
58. | Message Pattern Extractor 2.10 (xyz3.com) | ||
execute SQL * Count words/keywords in the various sources * Count lines * Swap bytes MPX can be configured to perform a practically limitless variety of tasks. Configurable Pattern Recognizer / Manipulator for EMails and Files. User defines patterns in terms of sets; defines a state machine in terms of patterns and actions. Accepts input from stored emails and/or files. Generates | |||
Updated: 8, 2004 | Rating: 0 | Author: Jim Miller | Size: 1751 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
59. | NetMailBot 5.0.1 (exclamationsoft.com) | ||
is the most powerful command line email client for sending and receiving email on the market today. It runs from a DOS command prompt, which allows it to be easily called from other applications. In fact, many of our customers run NetMailBot from existing applications to send email notices, invoices, statements, and research reports to their | |||
Updated: 9, 2005 | Rating: 0 | Author: ExclamationSoft Corporation | Size: 3028 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
60. | QueIt 2.0 (vandaveer.com) | ||
(i.e. only execute a program if a file exists). You can also send command line arguments from QueIt to the program that you are launching. You can even send an email after a task has started or is complete. With the QueServer add-on, QueIt is able to run your scheduled tasks on remote computers (i.e. a computer other than the one QueIt was installed on). QueIt is a | |||
Updated: 9, 2005 | Rating: 0 | Author: John Vandaveer | Size: 2728 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
|
Home > Command line email software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|