|
||||||
|
||
|
Home > Office software |
|
|
1. | BPS Spyware and Adware Remover 9.3.0.0 (bulletproofsoft.com) | ||
BPS Spyware/Adware Remover is a program that eliminates all adwares, spywares, viruses, Dialers, and hijackers that might exist on your PC. BPS Spyware/Adware Remover is a program that uses a database with tens of thousands fingerprints of spyware adware, trojans and worms that can be updated automatically to | |||
Updated: 2, 2006 | Rating: 122 | Author: BulletProof Soft | Size: 8238 kb | Demo Go to category: System Utilities > Other Similar programs | |||
2. | TextMaker for Windows 2006 (softmaker.de) | ||
on multiple platforms, look no further: TextMaker 2006 is here! It's extremely fast, highly Microsoft Word compatible and easy-to-use. TextMaker includes 17-language on-the-fly spell-checking, extensive text formatting capabilities, drawing and pictures, outlining, tables, and, most importantly, lossless roundtrip conversion of MS Word documents. New features: OpenOffice.org and | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftMaker SoftMaker Software GmbH | Size: 18460 kb | Demo Go to category: System Utilities > Text/Document Editors Similar programs | |||
3. | MDaemon 8.1.4 (files.altn.com) | ||
and validates inbound messages signed with DKIM. Read Alt-N's published white paper on DKIM and its implementation in MDaemon at http://www.altn.com/support/white_papers.asp. In addition to DKIM, MDaemon 8.1 includes support for Greylisting, a relatively new spam fighting technique which involves deferring the initial acceptance of a new mail message from unknown senders and | |||
Updated: 2, 2006 | Rating: 196 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
4. | MDaemon 8.1.4 (altn.com) | ||
and validates inbound messages signed with DKIM. Read Alt-N's published white paper on DKIM and its implementation in MDaemon at http://www.altn.com/support/white_papers.asp. In addition to DKIM, MDaemon 8.1 includes support for Greylisting, a relatively new spam fighting technique which involves deferring the initial acceptance of a new mail message from unknown senders and | |||
Updated: 2, 2006 | Rating: 865 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
5. | Cryptocx v6 6.1.3 (easybyte.com) | ||
Cryptocx is an encryption component designed for use in any modern development environment. Cryptocx encrypts and decrypts data using standards compliant algorithms to make sure that your information is totally secured. It is very easy to add Cryptocx to an existing application or web site backend. Use | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
6. | RemoteExec 3.07 (isdecisions.com) | ||
RemoteExec® is a very powerful tool for remotely updating your Windows NT/2000/XP networks. It allows you to remotely execute the same program simultaneously on multiple computers, without requiring preinstalled agents on target machines. RemoteExec® will dramatically minimize, simplify and secure all | |||
Updated: 9, 2005 | Rating: 0 | Author: Alastair Volrath | Size: 527 kb | Demo Go to category: Network & Internet > Remote Computing Similar programs | |||
7. | PEERNET File Conversion Center 2.6 (peernet.com) | ||
Windows application that enables you to quickly and easily convert office documents, spreadsheets, web pages, PostScript files, and more into image or PDF files. You can also use File Conversion Center to convert files from one image type to another. These files can be optimized for use in archiving, publishing, faxing, displaying on screen, or displaying in a web browser. (Trial key | |||
Updated: 9, 2005 | Rating: 0 | Author: PEERNET Support | Size: 9364 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
8. | WinSyslog 6.0 (winsyslog.com) | ||
receives messages via UDP, TCP as well as RFC 3195. Adiscon's reliable and encrypted SETP protcol is also supported. WinSyslog's rule engine allows extremely flexible customizing. Runs as a background service or Windows GUI application. Basic features are free to use, enhanced features require a registration. The enhanced features can be tried for free for 30 days. Works | |||
Updated: 9, 2005 | Rating: 31 | Size: 9460 kb | Demo Go to category: Network & Internet > Network Monitoring Similar programs | |||
|
Home > Office software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|