|
||||||
|
||
|
Home > Email software software |
Related keywords: software, email, Software, Email, RAD Software, free software, spy software, bulk email, email marketing, backup software |
|
|
671. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
Personal Edition 2 is a new update to our popular HWPE software. HWPE 2 monitors and logs URLS, keystrokes, Open Windows, and File and Shell Activity. An optional Filtering feature allows you to log to a fifth log for words and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
672. | HS SoBigRemover 1.2 (haysoft.com) | ||
software must be used to detect large number of SoBig viruses in an email account and delete them remotely without the need of downloading any of them to your machine. SoBig virus is large sized email so it uses network traffic when receiving to your machine. This software can be an indispensable tool to filter your emails from these large virused emails and | |||
Updated: 9, 2005 | Rating: 0 | Author: Cenker Sisman | Size: 576 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
673. | IdentaFone Multi-Line Caller ID Software 3.99 (identafone.com) | ||
pops, line status, memos, forwarding to pagers, cell phones or email, speed dial buttons, speech and phonebook imports are just some of its many features. Recalls history of any phone number, prints detailed call accounting reports, downloads calls from the hardware that were received when the computer is shut down for weekends and evenings. CID screen pops that use multi-line | |||
Updated: 2, 2006 | Rating: 0 | Author: IdentaFone Software | Size: 2752 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
674. | IdentaFone Pro 2.50 (identafone.com) | ||
name, send the information to a pager or cell phone, submit an email message with the caller information, or broadcast a popup over the local network. If you are tired of sales calls just block any unwanted caller you choose and even play them a wave file to explain why you do not accept their calls. Get off telemarketer lists with the telezapper type tones included with the | |||
Updated: 9, 2005 | Rating: 35 | Author: IdentaFone Software | Size: 2945 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
675. | IIPwr Package 2.00 (iipwr.com) | ||
what you are able to do! IIPwr is a professional surveillance software that gives you the ability to know everything that is going on with any computer. It monitors and records (logs) activities (such as keystrokes, active applications, passwords, visited websites, emails, chats etc.) and periodically sends the data to your email. KeySpy's seamless installation makes it | |||
Updated: 9, 2005 | Rating: 0 | Author: Allen Gor | Size: 759 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
676. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more. It can also audit password and security policies, perform HTTP/CGI server auditing, registry auditing In addition, Infiltrator also | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
677. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
678. | IP Mailer 2004d (wappu.tv) | ||
ISP gives you a temorary IP address each time you log on, you can email your IP address automatically to your friends and office/home so that you can find your computer for remote access regardless of the constantly changing IP address. If you use your computer remotely or need to have other people access some server functionality on your PC you can let them know what your IP address | |||
Updated: 9, 2005 | Rating: 151 | Size: 1600 kb | Shareware Go to category: Communications > Dial Up & Connection Tools Similar programs | |||
679. | Kaspersky Anti-Virus Personal Pro 5.0 (kaspersky.com) | ||
Pro constantly monitors all sources of possible virus infections: email, the Internet, CDs and more. Personal Pro also protects all parts of your PC: system memory, boot sector, files, mail databases and etc. It also contains unique technology for protecting your MS Office documents. Scanning archived | |||
Updated: 3, 2005 | Rating: 39 | Author: Andrey Shepelev | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
680. | Keylogger Pro 1.7 (exploreanywhere.net) | ||
remotely by having the program send keystrokes to a specified email address every X hours. KeyloggerPro can run in total stealth mode for invisible monitoring or with an optional warning screen, making the user aware of the monitoring taking place. You can limit logging to selected users, set monitoring schedules and more. Additional features include an intrusion detection option | |||
Updated: 2, 2006 | Rating: 257 | Author: Bryan Hammond | Size: 886 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Email software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|