|
||||||
|
||
|
Home > Protocols software |
Related keywords: Socket protocols |
|
|
21. | EzDNS 1.71 (frantzensoft.com) | ||
publishes and/or e-mails your PC's local LAN IP and global WAN IP address, currently running processes and connection information to a remote web page or text file that is customizable. EzDNS is ideal for people with cable or DSL Internet providers who usually change your IP address on a daily or weekly basis. EzDNS can make publishing the address of your web, FTP, or game server a | |||
Updated: 2, 2006 | Rating: 0 | Author: Ryan Frantzen | Size: 1659 kb | Demo Go to category: Network & Internet > Network Monitoring Similar programs | |||
22. | HTML Guardian 7.2.9 (protware.com) | ||
Encrypt HTML, SHTML, JavaScript, VBScript, PHP and ASP files. Hide HTML source code from web site thieves. HTML Guardian is a solution for total Web site protection -it will make impossible stealing and re-using your source code in other websites.. Image protection add-on [Image Guardian] is especially Hide html source from thieves. Disable right-click,page printing,text selection/copying, clipboard,offline usage of encrypted files. Html password protection | |||
Updated: 2, 2006 | Rating: 0 | Author: Ivan Ned | Size: 7563 kb | Demo Go to category: Web Development > HTML Tools Similar programs | |||
23. | Internet Access Scheduler 2.0 (winutility.com) | ||
Scheduler lets you control which users can access what TCP/IP based protocols (HTTP, FTP, SMTP, POP3, Telnet, etc.) on a local computer, depending on the time of day and day of the week. You can also set allowed/denied TCP/UDP ports and IP addresses for incoming and outgoing connections. Internet | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 784 kb | Demo Go to category: System Utilities > Other Similar programs | |||
24. | Internet Access Scheduler 2.0 (winutility.com) | ||
Scheduler lets you control which users can access what TCP/IP based protocols (HTTP, FTP, SMTP, POP3, Telnet, etc.) on a local computer, depending on the time of day and day of the week. You can also set allowed/denied TCP/UDP ports and IP addresses for incoming and outgoing connections. Internet | |||
Updated: 9, 2005 | Rating: 0 | Author: Alex Egiazarov | Size: 784 kb | Demo Go to category: System Utilities > Other Similar programs | |||
25. | MCSE Masterpack 4 2.12.01 (wheelertech.com) | ||
to the Internet. Also explains DNS, DHCP, Remote Access, Network Protocols, WINS, and IP Routing. In addition, measures the skills required to manage, monitor, and troubleshoot Network Address Translation (NAT) and Certificate Services. Explains and then tests you on Active Directory, DNS for Active Directory, the components of Active Directory, Active Directory security solutions | |||
Updated: 9, 2005 | Rating: 215 | Author: Phillip Wheeler | Size: 166400 kb | Demo Go to category: Education > Reference Tools Similar programs | |||
26. | mnoGoSearch Lite for Windows 3.2.36.1 (mnogosearch.org) | ||
MnoGoSearch for Windows is a search engine designed to organize search within a website, number of websites, intranet or local system. This Lite release is build using singnificantly improved new generation mnoGoSearch engine 3.2 which includes the following major changes: - Better storage engine | |||
Updated: 2, 2006 | Rating: 0 | Author: Lavtech.com corp. | Size: 2204 kb | Demo Go to category: Web Development > Site Administration Similar programs | |||
27. | MultiDom 1.1 (hibyte.co.uk) | ||
Multidom was originally commisioned by a client whose brief was simple - for us to design the fastest, most configurable domain name search engine in the World. MultiDom supports multiple name queries, and up to 200+ TLDs. Plus, new TLDs can be added by administrators. Enter domain names with or without | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Nicholas | Size: 33 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
28. | Panda Security Demo 3.0.2.0 (pandasecurity.com) | ||
Helps you keep hackers or unauthorized or inexperienced users away from your files, and helps you keep them from configuring your systems. It helps you prevent data from being removed from your company or personal computer. You can limit, depending on who accesses a computer, the use of certain files or | |||
Updated: 9, 2005 | Rating: 0 | Author: Armando Bernal | Size: 6010 kb | Demo Go to category: System Utilities > Other Similar programs | |||
29. | Phone Lister 3.00 (cyber-matrix.com) | ||
Phone lister is an application used to manage corporate phone lists. Phone Lister can dramatically improve the speed of telephone extension retrieval for companies still using traditional time intensive paper-based solutions or limited in-house applications for phone list management. Phone Lister can be used | |||
Updated: 9, 2005 | Rating: 0 | Author: Cyber Matrix | Size: 1975 kb | Demo Go to category: Communications > Telephony Similar programs | |||
30. | PortsLock 1.8 (protect-me.com) | ||
disk. It lets you control which users can access what TCP/IP based protocols (HTTP, FTP, SMTP, POP3, Telnet, etc.) on a local computer, depending on the time of day and day of the week. You can also set allowed/denied TCP/UDP ports and IP addresses for incoming and outgoing connections. Keep in mind that almost 80% of all security breaches come from the inside! PortsLock enhances | |||
Updated: 2, 2006 | Rating: 16 | Author: Ashot Oganesyan | Size: 1765 kb | Demo Go to category: System Utilities > Other Similar programs | |||
|
Home > Protocols software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|