|
||||||
|
||
|
Home > Unknown software |
Related keywords: unknown driver |
|
|
1. | BB DOALL 6.51 (bbsys.com) | ||
fields in the main data file. -Reverse-Engineer text files with an unknown structure. A "best effort" will be made to determine the "likely" structure of text file. -Produce MapQuest maps automatically from address data in your tables. Single or multiple. -Produce emails in simple, MAPI or | |||
Updated: 2, 2006 | Rating: 28 | Author: Bob Bolda | Size: 8789 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
2. | MacNames 1.1m (peccatte.karefil.com) | ||
Archive renaming operations in Log files. When a folder becomes unknown (folder removed or renamed, lack a connexion with a file server, etc.), MacNames can send different kind of warnings: beep, display message, send a message to an administrator, messages in the Log, messages in the Applications EventLog (when MacNames is running as a Windows service). Languages: English and | |||
Updated: 2, 2006 | Rating: 285 | Author: Patrick Peccatte | Size: 2191 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
3. | Pop-Up Dictionary 4.5 (popdict.com) | ||
help you translate texts from virtually any language. Just select an unknown word in your text, press Ctrl+Ins+Ins and you will see the translation, press Ins and this word is marked for studying. Set the test-yourself time and the program will from time to time keep asking you to translate new words | |||
Updated: 9, 2005 | Rating: 0 | Author: Artyom Lukanin | Size: 4376 kb | Shareware Go to category: Education > Languages Similar programs | |||
4. | Read-e 1.0.39 (aowi67.dsl.pipex.com) | ||
choice. It also has a quick word look-up function, for referencing unknown words. Perfect if you have a lot of web reading to do. Or maybe you or someone you know has difficulty reading (e.g. poor eye-site, dyslexia, ADD/ADHD). Whoever you are, you could probably use Read-e to benifit your use of | |||
Updated: 9, 2005 | Rating: 0 | Author: Phil Teare | Size: 4098 kb | Shareware Go to category: Education > Other Similar programs | |||
5. | MDaemon 8.1.4 (files.altn.com) | ||
involves deferring the initial acceptance of a new mail message from unknown senders and tells the sending email server to try again later. When the sending server tries a second time - which most spam sources will not do - MDaemon will accept it. Exception options and white lists can exempt trusted | |||
Updated: 2, 2006 | Rating: 196 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
6. | Spam Freak 1.0 (interlocator.com) | ||
is never infected with any viruses or worms whether known or unknown. For support, contact [email protected] To install: run install.exe Documentation: In program Set your pop mail accounts. Set some simple rules Turn off auto download for your normal mail client. Run Spam Freak before checking your mail and watch Spam Freak zip through your mail removing all | |||
Updated: 3, 2005 | Rating: 0 | Author: Mike Hunt | Size: 1037 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
7. | TZ Personal Firewall 3.3.0.0 (TrackZapper.com) | ||
Trojan horses & spyware programs from hurting your computer. If an unknown outside source attempts a connection to your computer, a pop-up window alerts you to the intrusion & again prompts you to choose whether to grant access. The Application Control allows you to decide which applications can & | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 3458 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
8. | Anti-keylogger 6.1 (anti-keyloggers.com) | ||
against most types of the keylogging software, both known and unknown. Anti-keylogger blocks keylogging programs activity without using of signature bases. Anti-keylogger is capable to buck various types of keylogging programs possibly included in any commercial, shareware, freeware products, as well as in Trojan horses, viruses of very different operation principles. Due to the | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 2659 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
9. | PrivacyKeyboard 7.1.1 (anti-hack.biz) | ||
keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently being developed worldwide. The PrivacyKeyboard automatically deactivates all running keylogging programs on your PC and allows you to ensure a more secure method to record your customer-selected information (passwords, logins, PIN etc.). Due to the PrivacyKeyboard, keystroke | |||
Updated: 2, 2006 | Rating: 16 | Author: Raytown Corporation LLC | Size: 3238 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
10. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently being developed worldwide. The PrivacyKeyboard automatically deactivates all running keylogging programs on your PC and allows you to ensure a more secure method to record your customer-selected information (passwords, logins, PIN etc.). Due to the PrivacyKeyboard, keystroke | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Unknown software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|