|
||||||
|
||
|
Home > John software |
Related keywords: john Zed King, John Dunn, John Connor |
|
|
81. | Aspose.AdHoc 1.4 (aspose.com) | ||
Aspose.AdHoc is a ASP.Net component. With the Ad Hoc Query Builder component you can quickly and easily add ad hoc capabilities to you ASP.Net application. The ad hoc component can be used for a variety of task, ranging from ad hoc reports to quick and easy search screens. Simply drag and drop the ad hoc | |||
Updated: 2, 2006 | Rating: 0 | Author: Ben Li | Size: 46 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
82. | RelayFax Server 6.7.0 (altn.com) | ||
RelayFax is a powerful email-to-fax and fax-to-email fax server. RelayFax Pro automates the process of sending, receiving and managing your network fax traffic. By integrating into existing email systems, RelayFax provides full faxing capabilities from your desktop. This fax software will prove cost effective | |||
Updated: 2, 2006 | Rating: 0 | Author: Arvel Hathcock | Size: 12132 kb | Demo Similar programs | |||
83. | Remote Performance Observer 3.0 (apexoft.com) | ||
Major system capabilities: Remotely collecting data on machines' resources usage (Memory, Processor, Hard Drive, Network Adapter, etc.), current services and protocols states on the machine (Web Service, Indexing Service, IP, TCP, UDP, ICMP, SMTP, etc.), OS critical parameters (Paging File | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexei Polkovnikov | Size: 2660 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
84. | Auto Mailer 2.2 (automsw.com) | ||
You can send email using the built in SMTP server, your own ISP's SMTP server, or your MAPI email client (such as Outlook Express). It includes mail merge capabilities so you can personalize your messages. It also includes a "Verify" mode so you can validate your email addresses without actually sending a message. Global and recipient specific attachments are supported. You can | |||
Updated: 2, 2006 | Rating: 0 | Author: Beiley Software | Size: 418 kb | Freeware Go to category: Communications > E-Mail Clients Similar programs | |||
85. | wodPop3Server 1.3.2.0 (weonlydo.com) | ||
implementation. All you need to do is to put it on VB form, call it's Start method and it's immediately accepting connections by your clients! It fully supports commands defined in RFC1939. Use your favorite mail client (such as Outlook Express or Eudora) to read mail provided by your own | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 857 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
86. | wodSSHServer 1.3.0.0 (weonlydo.com) | ||
will show you, step by step, how to manually respond to client's actions. You can make an interface that will talk to the clients (like an BBS system), they will enter commands and different type of values in your program where you can evaluate them. This is ideal for making restricted access area | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1368 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
87. | wodSSHTunnel 1.5.0.0 (weonlydo.com) | ||
you can allow or deny user to use secure channel - once again, it's your decision. If you allow user to connect and use channel, everything is done by wodSSHTunnel, and you don't need to do anything else wodSSHTunnel component is server-type component that will add secure tunneling (based on SSH protocol) capabilities to your application. Based on your rules and definitions, it will | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1317 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
88. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
89. | NCrypt TX 1.8 (littlelite.net) | ||
This text based encryption tool allows easy message hiding, to be used in e-mail, messenger and other communications. NCrypt TX also has hashing capabilities to verify message integrity. It supports DES, Rijndael-AES, SHA, and MD5 algorithms, as well as historical algorithms such as ROT13 and Vigenere. With | |||
Updated: 2, 2006 | Rating: 0 | Author: Alessio Saltarin | Size: 511 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
90. | Monitor one FP1.78.317 (fineconnection.com) | ||
them yourself with just a few clicks. Seven licence types available (S-type,M-type,L-type, 3 upgrade types and Enterprise). Small networks (less than 8 objects) can be managed for free. A comprehensive, all-in-one and graphical all-in-one network monitoring software for network uptime and health | |||
Updated: 2, 2006 | Rating: 42 | Size: 16047 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
|
Home > John software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|