|
||||||
|
||
|
Home > G lock software |
Related keywords: lock, lock folder, lock files, lock folders, lock desktop, cd lock, Software Lock and Key, lock file, file lock, floppy lock |
|
|
1. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
impossible to use email without receiving spam in large amounts. G-Lock SpamCombat is your powerful solution for clearing your Inbox from spam, virus, and junk emails. G-Lock SpamCombat is email filtering software that lets you eliminate all unwanted messages at the server level without receiving them with your email client. G-Lock SpamCombat… | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
2. | RageWork 2.4 (softrage.com) | ||
a *Powerful, dual-windowed File Manager. Basic operations on files e.g. copying, moving, deleting, changing the name, create new files and directories, execute programmes, compression and extracting. Multi-rename, Attribute change, Calculate space (even in FTP), "Open with" support, Tabs with hide effect, Keys shortcut, Bookmarks (jump to your folders, favorite), Markers, Column… | |||
Updated: 2, 2006 | Rating: 1068 | Author: The Rage | Size: 16739 kb | Shareware Similar programs | |||
3. | eBooksWriter PRO 2005.15.195 (visualvision.com) | ||
- you can assign different passwords for different users; - "lock to PC" personal key protection with the CBProtect Virtual Vault service; - music and video: AVI MPEG WMV......; - frames, text styles, popup windows, rollover / mouse over sensitive images, visual linking: feature rich, easy to use, fast; - forms and shopping cart (Gold edition) - plugin capabilities… | |||
Updated: 2, 2006 | Rating: 0 | Author: Aldo Ghigliano | Size: 2460 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
4. | G-Lock Email Processor 1.98 (glocksoft.com) | ||
that nobody on the exclusion list will receive your message. G-Lock Email Processor is designed to process/parse bounced/undeliverable and subscribe/unsubscribe emails as well as extract information from your email messages and create user defined text documents, that can be imported by other… | |||
Updated: 2, 2006 | Rating: 119 | Author: Alex Markov | Size: 2601 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
5. | G-Lock EasyMail Professional 4.62 (glocksoft.com) | ||
HTML, Lotus 1-2-3, XML, MS Access Files as well as ODBC databases. G-Lock EasyMail is a fast, powerful yet simple to use email software designed primarily for applications in which the sender and recipient have an existing relationship, a retailer's customer base, a physician's list of patients, a… | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3324 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
6. | Advanced Email Verifier 5.15 (glocksoft.com) | ||
Advanced Email Verifier (AEV) is your powerful solution for the "message delivery error". AEV is designed for system administrators, webmasters, programmers as well as for those advanced users who have their own mailing lists and need to keep them up-to-date. When Internet users move from one service… | |||
Updated: 2, 2006 | Rating: 42 | Author: Alex Markov | Size: 4148 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
7. | eBooksWriter PRO 2005.15.195 (visualvision.com) | ||
- you can assign different passwords for different users; - "lock to PC" personal key protection with the CBProtect Virtual Vault service; - music and video: AVI MPEG WMV......; - frames, text styles, popup windows, rollover / mouse over sensitive images, visual linking: feature rich, easy to use, fast; - forms and shopping cart (Gold edition) - plugin capabilities… | |||
Updated: 2, 2006 | Rating: 89 | Author: Aldo Ghigliano | Size: 2460 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
8. | Netjini 1.0 (168.144.45.89) | ||
monitor) d. most used protocol e. which device lock network f. which device generate erronious trafic g. The most used 5/10/15/N application and used ones h. 5/10/15/N MAC addresses and IPs which generate the most packet on network. i. 5/10/15/N MAC addresses and IPs which used bandwith and erroreous ones The Application enables you to see… | |||
Updated: 9, 2005 | Rating: 0 | Author: Ertugrul Akbas | Size: 35156 kb | Commercial Similar programs | |||
9. | ShareGuard V1 1 (padfile.zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is… | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
10. | CopyLock 1.08 (noeld.com) | ||
renaming or deleting one or many files which are currently in use (e.g. system files like comctl32.dll, or virus/trojan files.) Add the files to update, click Apply, restart and that's it! You can also list and edit the pending operations from the system after you ran an installer or view the… | |||
Updated: 9, 2005 | Rating: 0 | Author: Noel DANJOU | Size: 121 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > G lock software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|