|
||||||
|
||
|
Home > Logs software |
Related keywords: server logs, referrer logs, NT event logs, raw logs, raw server logs, web logs, http logs, Windows logs |
|
|
841. | CustomChat Server 1.5 (customchat.com) | ||
The CustomChat Server is for novices and advanced programmers. It requires only a browser for an Administrator to manage chat rooms. There is no hardware or software for the end user to download or install, and the system is intuitively set up for Administrators to maintain community features through a FAST | |||
Updated: 9, 2005 | Rating: 42 | Author: CustomChat Inc. | Size: 9243 kb | Freeware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
842. | CustomChat Server 1.5 (customchat.com) | ||
The CustomChat Server is for novices and advanced programmers. It requires only a browser for an Administrator to manage chat rooms. There is no hardware or software for the end user to download or install, and the system is intuitively set up for Administrators to maintain community features through a FAST | |||
Updated: 9, 2005 | Rating: 0 | Author: CustomChat Inc. | Size: 9243 kb | Freeware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
843. | CustomChat Server 1.5 (customchat.com) | ||
The CustomChat Server is for novices and advanced programmers. It requires only a browser for an Administrator to manage chat rooms. There is no hardware or software for the end user to download or install, and the system is intuitively set up for Administrators to maintain community features through a FAST | |||
Updated: 9, 2005 | Rating: 0 | Author: CustomChat Inc. | Size: 9243 kb | Freeware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
844. | Darn! Passwords! 3.1.03.41 (odarn.com) | ||
web sites. Just pick the password, and drag it and it's log-in (if there is one) into the program or web site that uses it. No retyping is necessary (even in programs that do not accept the drag, you can just paste the password in). Go to the URL of a password protected site with the click of a button. Its simple interface makes using your passwords convenient and | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Thornton | Size: 2454 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
845. | Email Protector 2.0 (mazepath.com) | ||
email, but Email Protector can password protect and automatically log off your email account! Email Protector shows you how to add password protection to your Outlook Express email. You have done this already? Well then you know that simply closing Outlook Express STILL leaves you vulnerable. The | |||
Updated: 9, 2005 | Rating: 0 | Author: William Smith | Size: 348 kb | Freeware Go to category: Communications > Other E-Mail Tools Similar programs | |||
846. | File Send Automatically 1.1 (mapilab.com) | ||
the folder monitored by the add-in or just drag it there - and that's all! The procedure not only becomes simpler, but the probability of a user's mistake, such as sending the document to a wrong address or misspelling the address, is reduced. Moreover, a user doesn't need to know anything about the Internet, nor need he/she have any knowledge of Microsoft Outlook! It is | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrey Manchuk | Size: 346 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
847. | Flystrike Spam Interrogator 1.6 (softwarepromoting.com) | ||
perform auto deletion of e-mail messages if required by the user. A log of deleted messages allows the user to discover any false positives. A threat list is available that allows the user to enter e-mails associated with particular worms or incorrigible nuisances; messages from those on the threat | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4950 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
848. | Flystrike Spam Interrogator 2.4.0.63 (downloads.flystrike.com) | ||
perform auto deletion of e-mail messages if required by the user. A log of deleted messages allows the user to discover any false positives. A threat list is available that allows the user to enter e-mails associated with particular worms or incorrigible nuisances; messages from those on the threat list are auto-deleted from the remote server before the conventional interrogation is | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4920 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
849. | HiClock Pro 3.19 (kgsoft.com) | ||
HiClock Pro gives you an easy and thorough way to synchronize your system clock to the exact time using the Internet. It queries one of the National Institute of Standards and Technology timeservers, which then returns the correct standard time. Standard time is converted to local time and compared with the | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Kardailsky | Size: 1052 kb | Shareware Go to category: Network & Internet > Timers & Time Synch Similar programs | |||
850. | HiDialer 2000 PRO 3.2.19 build 1110 (hidialer2000.com) | ||
connect, disconnect and re-connect to ISP on failures and log all sessions’ times. Throw in automatic applications launching on connecting to Internet, convenient scheduling and highly informative stats and you get the right application for all your dialing needs! HiDialer 2000 is available in standard and professional variations providing cost-effective licensing for | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Kardailsky | Size: 812 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
|
Home > Logs software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|