|
||||||
|
||
|
Home > That software |
|
|
971. | Rarissimo 1.0c (peccatte.karefil.com) | ||
compression tool companion of WinRar that will periodically scan source folders, compress files with normalized filenames like RA0000001.rar to a target folder waiting for transfer. Then in reception location it uncompress restoring Macintosh structures and filenames and Windows 2000 files with properties (Title, Subject, Comments, Keywords, etc.). Compressed files keep their | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2647 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
972. | PurgeIE 7.03 (purgeie.com) | ||
PurgeIE enables you to easily remove a variety of leftover files that Internet Explorer leaves in its wake when you browse the Internet. Despite all of the bad press that Cookies have received, there are some good Cookies that contain stored passwords and preferences for Web sites you trust. These Cookies actually make your life easier. You just tell PurgeIE which | |||
Updated: 2, 2006 | Rating: 48 | Author: Jim Lawler | Size: 822 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
973. | PurgeIE Pro 3.03 (purgeie.com) | ||
PurgeIE Pro enables you to easily remove a variety of leftover files that Internet Explorer leaves in its wake when you browse the Internet. Despite all of the bad press that Cookies have received, there are some good Cookies that contain stored passwords and preferences for Web sites | |||
Updated: 2, 2006 | Rating: 16 | Author: Jim Lawler | Size: 845 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
974. | Proxifier 2.00 (proxifier.com) | ||
is a program that allows network applications that do not support working through proxy servers to operate through a HTTP or SOCKS proxy server or a chain of proxy servers. There are many network applications that do not support working through proxy servers and thus cannot be used from LAN or with firewalls. These can compromise corporate privacy and lead you to | |||
Updated: 2, 2006 | Rating: 3044 | Size: 685 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
975. | Program Lock Pro 2.1 (softdd.com) | ||
and running, and it only locks and prevents access to the programs that you specify. Easy to use interface shows you current status of all locked programs, and allows you to easily click and unlock as you wish. (Runs on all Windows systems) Lock and unlock any program on your pc, including the control panel, IE, Outlook, AOL, AIM, and | |||
Updated: 2, 2006 | Rating: 172 | Author: SoftDD Software | Size: 708 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
976. | Private Shell SSH Client 2.1 (privateshell.com) | ||
you are not familiar with SSH, you can easily establish connections that use public key authentication and provide ssh tunneling for third-party applications (such as Oracle, MySQL, CVS, VNC, e-mal clients and other software). Private Shell's default configuration allows you to connect to any SSH1 or SSH2 server in the most secure way by choosing the strongest encryption | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
977. | Power Email Verifier 3.0 (tecsoftware.biz) | ||
list formats. Verified email records are saved in the same format that they are imported in. Program comes completely pre-configured, just load list and go! Power Email Verifier can check your email lists for valid emails. It can import large lists with no problem. Uses multithreading to verify emails at a very fast rate. Simulates the sending of email without sending any | |||
Updated: 2, 2006 | Rating: 16 | Author: Terry Cowley | Size: 3314 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
978. | Power Email Extractor Lite 3.9 (tecsoftware.biz) | ||
Works many times faster than search engine email extraction programs that use multi threading. Includes a keyword search tool that enables you to create targeted email lists based on a certain newsgroup topic or category. No news server required. You can extract up to 100,000 unique email | |||
Updated: 2, 2006 | Rating: 0 | Author: Terry Cowley | Size: 4056 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
979. | Potolook plugin for Microsoft Outlook 3.6 (positic.ru) | ||
Outlook is a powerful e-mail messaging and management system that we use everyday. Even a minute saved on a repetitive operation may save you a few hours every week. This is why Outlook plug-ins (programs intended to enhance certain operations or add new features) are so popular today. As a heavy Outlook user myself, I tried and used many different plug-ins. Some of them have | |||
Updated: 2, 2006 | Rating: 0 | Author: Positic Software | Size: 2001 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
980. | PortsLock 1.8 (protect-me.com) | ||
IP addresses for incoming and outgoing connections. Keep in mind that almost 80% of all security breaches come from the inside! PortsLock enhances access control possibilities for system administrators, helps them to build a more secure network environment, and protects corporate networks against | |||
Updated: 2, 2006 | Rating: 16 | Author: Ashot Oganesyan | Size: 1765 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > That software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|