|
||||||
|
||
|
Home > Internet marketing software |
Related keywords: internet, Internet, marketing, internet explorer, Internet Explorer, email marketing, internet privacy, internet security, INTERNET, internet spy |
|
|
911. | IntelliPointer 4.0 (intellipointer.com) | ||
and repositioning your mouse. Make your computer pointing and internet browsing natural and effortless. Point and click between letters with ease and comfort. Reach all tool bars and long drop down menus without straining your hand. Improve your performance and productivity. Save desktop space by using a smaller mouse pad. Eliminate frequent cleaning of your mouse. How | |||
Updated: 8, 2004 | Rating: 0 | Author: Mahmoud Razzaghi | Size: 1024 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
912. | Internet Explorer Password Revealer 1.3 (rixler.com) | ||
you use Internet, chances are you have over a dozen logins and passwords. Couple for e-mails, few more for online shops, one or two for a newspaper or a magazine subscription, bank accounts and so forth. Plus, there are web forms, shipping and billing addresses, credit card numbers and much, much more. Internet Explorer Password Revealer is a simple software application that | |||
Updated: 3, 2005 | Rating: 48 | Author: Felix Kosolapov | Size: 664 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
913. | IntraChat 2.0 (intrachat.com) | ||
obscure options. The program does not require a dedicated server or Internet connection and can be installed on any computer with Windows OS that supports TCP/IP protocol. Each client is independent of each other. All messages are encrypted with the US Government approved algorithm to make sure that | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Haidukov | Size: 676 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
914. | IntraMail 2003.01.20 (dplanet.ch) | ||
short mails are extremely well protected against local hackers and Internet attacks like Trojans or Tunneling-helpers or other applications. Passwords stay encrypted in memory and swap files. Wireless networks and mixed networks can be used very securely. A CHAT-room with use of pseudonyms is also | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
915. | Iside 1.3 (littlelite.altervista.org) | ||
Useful also to compare photos, music and movies downloaded from Internet. It can also be used for file integrity checking. Iside is a message digest computing tool. It can be used for file integrity checking. It also compares files and folders by computing their hash code | |||
Updated: 9, 2005 | Rating: 0 | Author: Alessio Saltarin | Size: 628 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
916. | Jetico Personal Firewall 1.0.1.61 (jetico.com) | ||
Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall | |||
Updated: 9, 2005 | Rating: 42 | Author: Jetico Inc. | Size: 2744 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
917. | Launch-n-Go 2.0 (tethyssolutions.com) | ||
launch toolbar for fast access to anything on your computer or the Internet. It even allows you to perform custom searches. For e.g., assign a keyword ebay & a search URL & perform searches on eBay. By typing ‘ebay;books’ in the toolbar conveniently located at the bottom right of your screen, instantly get the results displayed to you. Try it! You can also create your own | |||
Updated: 9, 2005 | Rating: 39 | Author: Tethys Solutions | Size: 2334 kb | Shareware Go to category: Development > Other Similar programs | |||
918. | Link Spy 1.4 (spyutilites.com) | ||
copied into clipboard or dragged onto special targets (ReGet's icon, for example). The program gathers these links and addresses and places them into a virtual folder, so that you may later access them. You can make a short description of each of the addresses, sort and setup automatic activation of your browser or e-mail client. As you work on your computer, simply right-click | |||
Updated: 3, 2005 | Rating: 0 | Author: Dmitriy Gorin | Size: 600 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
919. | Lock Files and Folders 1.4 (winguardpro.com) | ||
Lock Files & Folders can lock your files and folders without encrypting them. It simply disables users from reading or writing to files, which includes operations such as moving, renaming, deleting and opening. Lock Files & Folders can lock your files and folders without encrypting them. It stops users from moving, renaming, deleting and opening files. | |||
Updated: 3, 2005 | Rating: 0 | Author: WG Soft | Size: 446 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
920. | LockEXE 2.0 (mazepath.com) | ||
and your privacy with LockEXE. Keep your children from browsing the internet without your permission! You can either browse for the program you want to lock, or simply drag it to the select box! Nothing could be easier! Set the password and click Lock. The program will no longer run without the LockEXE can password protect | |||
Updated: 9, 2005 | Rating: 16 | Author: John Hooper | Size: 145 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Internet marketing software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|