|
||||||
|
||
|
Home > Through software |
|
|
821. | WB Wandering Horse 2.1 (webaby-corp.com) | ||
sure it isn’t accidentally. So may be The Horse that wanders alone through this mysterious forest, will help you to find the road further. Winter forest in a frosty haze .May be it is a magic forest? And if you have indeed found yourself in such a strange place, for sure it isn’t accidentally. So may be The Horse that wanders alone through this mysterious forest, will help | |||
Updated: 9, 2005 | Rating: 0 | Author: WEBaby Corp. | Size: 4188 kb | Shareware Go to category: Desktop > Similar programs | |||
822. | WindowBlinds 4.51 (scripting.stardock.com) | ||
4.5 includes the new ability to change the color of visual styles through hue shifting along with modifying the brightness and saturation of the visual style. It also includes the ability to have alpha blended Start menus and standard menus which enable users to have semi-transparent pieces to those | |||
Updated: 9, 2005 | Rating: 260 | Author: Stardock Systems | Size: 8754 kb | Shareware Go to category: Desktop > Themes & Wallpaper Similar programs | |||
823. | WindowGhost 1.0 (barefootinc.com) | ||
effects when moving or resizing windows. It allows you to "see through" windows and be able to better place windows on your desktop. WindowGhost also allows transparent menu effects. Arrange your windows more efficiently with WindowGhost! With this desktop enhancement, windows become transparent (ghost-looking) when they are moved or resized, allowing you to partially "see | |||
Updated: 9, 2005 | Rating: 358 | Author: Don Metzler | Size: 588 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
824. | tipicim 0.7.12 (tipic.com) | ||
• Offline storage • Message logs • Contact blocking • Expandable through services • Expandable through plugins TipicIM for developers TipicIM is fully featured and expandable through Plugins. The core technology for message routing is ATE - ATE Client, the same technology of | |||
Updated: 9, 2005 | Rating: 0 | Author: Dave Linch | Size: 1187 kb | Freeware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
825. | ToolButton Deskbar 3.5 (toolbutton.com) | ||
about RSS. The Reader automatically detects RSS feeds as you browse through web sites and once found, can launch the Reader without you having to go through the confusing process of subscribing. RSS feeds can be organized by adding buttons to your Deskbar. Create and add your own personal | |||
Updated: 9, 2005 | Rating: 82 | Author: ToolButton Inc. | Size: 6865 kb | Freeware Go to category: Desktop > Other Similar programs | |||
826. | Traffic Log 1.0 (spelts.com) | ||
page for each visitor. The log file can be purged of old visits through use of the script. Traffic Log is not intended to duplicate the use of server logs, log analysis tools, or other tracking scripts that use SSI. Rather, it is intended where use of these methods are simply not possible, but meaningful statistics are desired. Each hit is captured through a standard HTML | |||
Updated: 9, 2005 | Rating: 0 | Author: David Spelts | Size: 706 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
827. | Trap Console 1.5 (cscare.com) | ||
lines. Trap Console can also communicate with other applications through its generic telnet connector module. The user-defined script controls the socket communication. Access to all properties and values of the respective SNMP trap are available with Trap Console macros. Trap Console was designed with great care to guarantee its safe operation over long periods of time. A user can | |||
Updated: 9, 2005 | Rating: 980 | Author: Tomas Vocetka | Size: 20536 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
828. | TZ Personal Firewall 3.3.0.0 (TrackZapper.com) | ||
business & home information. Avoid the entrance to your equipment through backdoors that could allow the stealing of information from it. TZ personal firewall stops Hackers, Trojans, Spyware, Viruses, DoS attacks & data thieves & protects your PC from Internet-borne threats. Put a secure barrier between your hard drive & hackers, whether you use a dial -up, ISDN, DSL & cable | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 3458 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
829. | TZ Spyware-Adware Remover 8.2.0.0 (trackzapper.com) | ||
business and home information. Avoid the entrance to your equipment through backdoors that could allow the stealing of information from it, monitors the programs tries to connect to internet and waits for incoming connection then alerts the user to decide to allow or block this connection. New Anti Phishing , Phishing is the all inclusive term used to describe efforts to deceive | |||
Updated: 9, 2005 | Rating: 0 | Author: Track Zapper | Size: 6659 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
830. | TZO Dynamic DNS Client with Photo Sharing 2.1.3 (tzo.com) | ||
located throughout North America and connected to the Internet through different Internet backbones. TZO also provides free customer support and also has a wide range of services to fit all home and business needs such URL redirection, port redirection, domain registration and hosting, and more. TZO has also been incorporated or bundled in many networking products and services from | |||
Updated: 9, 2005 | Rating: 0 | Author: Tzolkin Corporation | Size: 2882 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
|
Home > Through software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|