|
||||||
|
||
|
Home > Warnings log software |
|
|
71. | EXP Elite 1.0.65 (extractorpro.com) | ||
software for email marketing & designed for specifically today's opt-in e-mail marketing. Features include autoresponders, unlimited mailing lists, newsletter management software, list filtering and more. It sends opt-in e-mail to your subscribers - 24 hours a day, 7 days a week. Works as your own newsletter server - so you can stop paying high monthly fees for this service. Sends | |||
Updated: 3, 2005 | Rating: 0 | Author: Don Schnure | Size: 204 kb | Demo Go to category: Communications > E-Mail Clients Similar programs | |||
72. | ezProxy 2.7.1 (lavasoftware.net) | ||
balance Win9x/NT/Win2000/WindowsMe Run as NT service Log ezProxy is a proxy server, make all your computers share one connection to internet. provide everything you need to simultaneously connect all your computers to the Internet through just one simple connection with your existing service | |||
Updated: 2, 2006 | Rating: 42 | Author: Hu Wei | Size: 2029 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
73. | File Send Automatically 1.1 (mailutilities.com) | ||
the folder monitored by the add-in or just drag it there - and that's all! The procedure not only becomes simpler, but the probability of a user's mistake, such as sending the document to a wrong address or misspelling the address, is reduced. Moreover, a user doesn't need to know anything about the Internet, nor need he/she have any knowledge of Microsoft Outlook! It is | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrey Manchuk | Size: 346 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
74. | Flystrike Spam Interrogator 2.4.0.63 (flystrike.net) | ||
perform auto deletion of e-mail messages if required by the user. A log of deleted messages allows the user to discover any false positives. A threat list is available that allows the user to enter e-mails associated with particular worms or incorrigible nuisances; messages from those on the threat list are auto-deleted from the remote server before the conventional interrogation is | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4920 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
75. | FormTGP 1.0 (adultauto.com) | ||
pages for you. It will check your gallery design against each site's rule page in the database. This will stop you from submitting to places that will blacklist you, before it's already to late. Detailed Logs: FormTGP stores info on every submission it makes and. You can easily view | |||
Updated: 9, 2005 | Rating: 0 | Author: Maxim Nyukin | Size: 3341 kb | Shareware Go to category: Web Development > Site Administration Similar programs | |||
76. | FTP Voyager Browser 4.6.2 (CrystalPort.com) | ||
operations. It can connect to almost any FTP site, whether it's a Unix site or a Windows NT site, and it looks and feels like Windows Explorer. In fact, you can even drag and drop files from the FTP site to your hard drive, and vice versa. Also included are local drive and folder panes, a log pane, the ability to resume broken file transfers, and 270 pre-configured public | |||
Updated: 3, 2005 | Rating: 54 | Author: Chris Addington | Size: 4739 kb | Demo Go to category: Network & Internet > Browsers Similar programs | |||
77. | GetAnonymous 1.2 (getanonymous.com) | ||
Internet Explorer Toolbar, Compatibility, Real-time Activity Log). GetAnonymous List of Features is considered the most wide-ranging of online privacy software. First time to introduce the proxy chain technology, GetAnonymous allows you to stand behind multiple proxies. This provides you with more protection and privacy than ever. GetAnonymous not only allows you to use a proxy | |||
Updated: 9, 2005 | Rating: 42 | Author: David Adreson | Size: 5996 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
78. | GetAnonymous V2.0 - Personal Edition 2 (coftware.com) | ||
Internet Explorer Toolbar, Compatibility, and Real-time Activity Log). GetAnonymous List of Features is considered the most wide-ranging of online privacy software. First time to introduce the proxy chain technology, GetAnonymous allows you to stand behind multiple proxies. This provides you with more protection and privacy than ever. GetAnonymous not only allows you to use a proxy | |||
Updated: 9, 2005 | Rating: 90 | Author: Tom Brett | Size: 10240 kb | Shareware Go to category: Servers > Firewall & Proxy Servers Similar programs | |||
79. | Gotta Know Now - Web Page Watcher 2.6m (members.bellatlantic.net) | ||
as well as the web page containing the information just found in it's browser window. It will run in the background while you are away or at your computer doing other work. Thus you can use Gotta Know Now to monitor a business news wire web site for a press release on your stock. Or you can use it to | |||
Updated: 9, 2005 | Rating: 0 | Author: Patrick DiRienzo | Size: 787 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
80. | Imaginary Telnet Server 1.0 (whizkidtech.redprince.net) | ||
One of the possible attacks is by using the Telnet protocol to log into your system. If successful, the attacker can gain complete control of your system. With the Imaginary Telnet Server running, he will be served a fake response which will prevent him from accessing any resources available on your system. The server will give him the impression that he has found a top secret | |||
Updated: 3, 2005 | Rating: 97 | Author: G. Adam Stanislav | Size: 38 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Warnings log software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|