|
||||||
|
||
|
Home > Detect software |
Related keywords: detect hackers, detect spyware |
|
|
61. | Server Nanny Network Monitor 4.0.0 (ServerNanny.com) | ||
can perform these, and many more actions for you when a failure is detected. Automatically. Never again will you have to interrupt other important tasks--or come in on your day off just to do a simple fix. Server Nanny is very powerful and also easy to set up and use. Within minutes you can be | |||
Updated: 2, 2006 | Rating: 0 | Author: Xenos Software LLC | Size: 5575 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
62. | MailBell 2.18 (emtec.com) | ||
MAPI and Hotmail-Email accounts. It can notify you of new mail, can detect undesired messages and lets you delete mail with large attachments without downloading | |||
Updated: 2, 2006 | Rating: 0 | Author: Markus Schmidt | Size: 1415 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
63. | Golden Keywords 4.10 (scosoft.com) | ||
the whole cycle of keyword-based web site optimization: from detecting potentially relevant keywords on web page to ranking key phrases relevance and importance. The application is capable of conducting its own keyword researches basing on initial key phrase found on web pages and monitoring top search engines and PPC services for number of search items returned by given key | |||
Updated: 2, 2006 | Rating: 0 | Author: Dan Smith | Size: 4237 kb | Shareware Go to category: Web Development > Site Administration Similar programs | |||
64. | Easy Free Web Cam 3.5.4 (uk-software.com) | ||
cam software. You can have 'email alerts' sent to you when motion is detected, upload to any ftp server or just use our FREE web space. It's very easy to use and set-up but if you need more, then just explore the advanced settings for image manipulation etc. You can alter the uploaded HTML page or the | |||
Updated: 2, 2006 | Rating: 42 | Author: Adrian Bellwood | Size: 4270 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
65. | Cactus Spam Filter 2.11 (codeode.com) | ||
free easy-to-use spam blocker. It protects your inbox by learning to detect spam as it's being used. After a short while it has adapted to your personal mailbox and blocks out most of the junk e-mail. Since the filter becomes personal, spammers will not be able to fool it. Installation is very simple | |||
Updated: 2, 2006 | Rating: 42 | Author: Jon Kagstrom | Size: 585 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
66. | AM-DeadLink 2.7 (aignes.com) | ||
detects dead links and duplicates in your Browser-Bookmarks. If a Bookmark has become unavailable you can delete it from your Browser. AM-Deadlink checks Bookmarks from Internet Explorer, Opera, Mozilla and Netscape. Additionally you can download/update the FavIcons of all your Favorites from the Browsers Internet Explorer and Opera. AM-DeadLink detects dead links and | |||
Updated: 2, 2006 | Rating: 307 | Author: Martin Aignesberger | Size: 806 kb | Freeware Go to category: Network & Internet > Browser Tools Similar programs | |||
67. | Advanced Administrative Tools 5.92 (glocksoft.com) | ||
there is no program, either anti virus nor anti trojan, that can detect unknown trojan horses. To secure your network, you may need to lock down applications that aren't required by any function you currently use. To do this effectively, you have to know what ports are available and what application is utilizing them. AATools Network Monitor displays the services that are active on | |||
Updated: 2, 2006 | Rating: 173 | Author: Alex Markov | Size: 3087 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
68. | Add Contacts 1.5 (mapilab.com) | ||
senders. When a contact is being created, the add-in attempts to detect the name corresponding to the e-mail address automatically. So, if you have received a message from the address "John Smith" , the new contact created by the program will be named John Smith. However, if name detection fails, the add-in attempts to retrieve it from the message body itself. For example, if your | |||
Updated: 2, 2006 | Rating: 456 | Author: Andrey Manchuk | Size: 2004 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
69. | Metal Detector - Treasure Hunter Pro 5.0 (aidsoft.com) | ||
This program was made for Metal Detector users by Metal Detector users! The author (programmer)contacted over 100 metal detector users and asked them what features they wanted in a computerprogram for their hobby, and 'Metal Detector - Treasure Hunter Professional' is a result of thosetop requests | |||
Updated: 2, 2006 | Rating: 0 | Author: Robert W. Benjamin | Size: 968 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
70. | River Past PlayDV 4.10.2 (riverpast.com) | ||
hog plug. You can connect and disconnect the camcorder and it will detect the change automatically. It enables you to record the video to a AVI-DV file (both type-1 or type-2), or a QuickTime compatible DV file. DirectX 8.0 and above is required. No adware or spyware. 30 DAY MONEY BACK | |||
Updated: 2, 2006 | Rating: 120 | Author: John Huang | Size: 1529 kb | Shareware Go to category: Audio & Multimedia > Video Tools Similar programs | |||
|
Home > Detect software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|