|
||||||
|
||
|
Home > Opt in email software |
Related keywords: email, Email, bulk email, email marketing, email extractor, email address, email software, email client, bulk email software, EMAIL |
|
|
921. | Find In Context 2.00 (inetprivacy.com) | ||
In Context shows all relevant fragments of your files together in a single report, where you can read them straight away, and the built-in context viewer allows you to browse through bigger fragments of the original files instantly, without having to open them in other programs. The fast and flexible proximity search algorithm and the file access engine of the | |||
Updated: 9, 2005 | Rating: 0 | Author: iNetPrivacy Software | Size: 343 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
922. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
increasing problem, and nowadays it is practically impossible to use email without receiving spam in large amounts. G-Lock SpamCombat is your powerful solution for clearing your Inbox from spam, virus, and junk emails. G-Lock SpamCombat is email filtering software that lets you eliminate | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
923. | Golden Eye 4.11 (monitoring-spy-software.com) | ||
Are you suspecting your husband or wife is cheating on you? who they email ? what movies they see? who they chat with ? Do you want to know what your employees are doing during work hours? Golden Eye is designed to monitor and record all the activity on your computer. with its bulit-in spy | |||
Updated: 2, 2006 | Rating: 42 | Author: Kevin | Size: 1490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
924. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
viewed. Other features include stealth mode option, hot key access, Email logs, Monitoring and logging across your home network, LAN or the Internet in real-time with an optional add-on product HWIN, and much more. Logs may be sent to a decrypted comma delimited text file for importation into thousands of other applications for storage or further analysis from our exclusive | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
925. | IdentaFone Pro 2.50 (identafone.com) | ||
name, send the information to a pager or cell phone, submit an email message with the caller information, or broadcast a popup over the local network. If you are tired of sales calls just block any unwanted caller you choose and even play them a wave file to explain why you do not accept their calls. Get off telemarketer lists with the telezapper type tones included with the | |||
Updated: 9, 2005 | Rating: 35 | Author: IdentaFone Software | Size: 2945 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
926. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
927. | Instant Backup 1.3.2 (rundegren.com) | ||
a Network, CD-RW, ZIP, JAZ or any other drive. It is designed in a way that gives you full control through customization and reports. The backed up files are stored separately, with the same hierarchy as in the source. You can specify filters for folders and file extensions to include/exclude. The built-in customizable scheduler can automate the backup and notify you | |||
Updated: 2, 2006 | Rating: 42 | Author: -- -- | Size: 846 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
928. | IntraMail 2003.01.20 (dplanet.ch) | ||
exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are extremely well protected against local hackers and Internet attacks like | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
929. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
930. | ActMon Password Recovery XP 4.03 (iopus.com) | ||
of frequently used passwords, such as the password of your dial-in ISP, Outlook Express email or FTP connection. However, since you no longer enter the saved passwords manually, you tend to forget them. What are you to do when you need to know one of the saved passwords? The password is staring right at you, but is hiding behind a row of asterisks. For Windows 9x and NT | |||
Updated: 9, 2005 | Rating: 685 | Author: Team ActMon | Size: 315 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Opt in email software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|