|
||||||
|
||
|
Home > Applications software |
|
|
391. | wodPop3Server 1.3.2.0 (weonlydo.com) | ||
control is a component that can be easily integrated into your applications to provide full Pop3 protocol server implementation. All you need to do is to put it on VB form, call it's Start method and it's immediately accepting connections by your clients! It fully supports commands defined in RFC1939. Use your favorite mail client (such as Outlook Express or | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 857 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
392. | wodTelnetDLX 2.1.8.0 (weonlydo.com) | ||
(only ActiveX version) - Supports 'slave printing' directly from applications you run on the server - Has blocking mode for scripting clients (only COM version), as well as non-blocking mode (both versions) - Supports negotiation for auto determining SSH1/SSH2 protocols - Automatically | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1850 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
393. | wodSSHServer 1.3.0.0 (weonlydo.com) | ||
ability to easily add SSH2 (and SFTP) server capabilities to your application, as well as old TELNET server protocol. SSH protocol provides strong encryption of data, and authentication of users over insecure networks, such as Internet. Using it is really easy. Add it to your form (or create instance on the fly), use internal methods to generate pair of keys for the server (or import | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 1368 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
394. | wodSSHTunnel 1.5.0.0 (weonlydo.com) | ||
add secure tunneling (based on SSH protocol) capabilities to your application. Based on your rules and definitions, it will accept local connections, encrypt it and forward to SSH server (where they will be decrypted and sent to destination host). SSH server is required for this component to work | |||
Updated: 2, 2006 | Rating: 42 | Author: Kresimir Petric | Size: 1317 kb | Shareware Go to category: Servers > Telnet Servers Similar programs | |||
395. | CPUSpy 1.044 (SinnerComputing.com) | ||
Most x86 processors support the CPUID instruction which returns data describing the make and model of the CPU. Later processors also support extended features such as cache details, processor features, design speed and processor name. CPUSpy interrogates your processor and displays this data (if supported) in | |||
Updated: 2, 2006 | Rating: 42 | Author: Andrew Glina | Size: 51 kb | Shareware Go to category: System Utilities > Benchmarking Similar programs | |||
396. | Note Studio for Windows 3.1.1 (dogmelon.com.au) | ||
say you make a note of something - a fact, a figure, anything. Regardless of where it is stored, if that information is not available to you when you absolutely need it, it may as well not exist. Note Studio aims squarely at addressing this issue. It is a powerful note-taking system which brings all your information together in one location. With Note Studio, the priority is on | |||
Updated: 2, 2006 | Rating: 0 | Author: Ant Wiese | Size: 10105 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
397. | WinTools.net Classic 6.5 (wintools.net) | ||
is used for periodic cleaning of the MS Windows registry from unused applications remained after uninstallation and from invalid references which decrease system speed and system loading time. Start Up - This is a startup manager. This tool allows you to monitor, add, remove, enable and/or disable | |||
Updated: 2, 2006 | Rating: 0 | Author: Ruslan Smekalov | Size: 722 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
398. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
399. | LanToucher Instant Messenger 1.33 (vitalsoundlab.com) | ||
'net send' command alternative, our full-featured instant messaging application offers you a much richer network communication environment, expanding the concept of conventional serverless messaging. Its user-friendly interface and original features make LanToucher Instant Messenger the tool of choice for both home and enterprise instant messaging. Based on peer-to-peer technology | |||
Updated: 2, 2006 | Rating: 42 | Author: Vital Sound Laboratory | Size: 2039 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
400. | Tray Safe 4.3 (traysafe.com) | ||
Tray Safe password manager is a proud holder of the world's most secure password keeper title because of its unique hardware ID feature. Basically, it means that the program works only on a single PC (yours). Should someone access your PC or make a copy of your hard-drive, they won't be able to launch or hack the program. In addition, Tray Safe offers a wide choice of | |||
Updated: 2, 2006 | Rating: 0 | Author: F-Group Software | Size: 3069 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
|
Home > Applications software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|