|
||||||
|
||
|
Home > Based software |
|
|
201. | RelayFax Server 6.7.0 (files.altn.com) | ||
- Using Inbound Fax Rules, RelayFax supports routing of faxes based upon Calling Number Display data (commonly called Caller ID); Outlook Address Book Integration - Client can use the shared contacts that are set up in your Outlook Address book so you don't have to maintain multiple address books; OCR Inbound Routing - Using Optical Character Recognition (OCR), RelayFax checks | |||
Updated: 2, 2006 | Rating: 16 | Author: Arvel Hathcock | Size: 12132 kb | Demo Go to category: Communications > Fax Tools Similar programs | |||
202. | RelayFax Server 6.7.0 (altn.com) | ||
- Using Inbound Fax Rules, RelayFax supports routing of faxes based upon Calling Number Display data (commonly called Caller ID); Outlook Address Book Integration - Client can use the shared contacts that are set up in your Outlook Address book so you don't have to maintain multiple address books; OCR Inbound Routing - Using Optical Character Recognition (OCR), RelayFax checks | |||
Updated: 2, 2006 | Rating: 0 | Author: Arvel Hathcock | Size: 12132 kb | Demo Go to category: Communications > Fax Tools Similar programs | |||
203. | RelayFax Server 6.7.0 (altn.com) | ||
- Using Inbound Fax Rules, RelayFax supports routing of faxes based upon Calling Number Display data (commonly called Caller ID); Outlook Address Book Integration - Client can use the shared contacts that are set up in your Outlook Address book so you don't have to maintain multiple address books; OCR Inbound Routing - Using Optical Character Recognition (OCR), RelayFax checks | |||
Updated: 2, 2006 | Rating: 0 | Author: Arvel Hathcock | Size: 12132 kb | Demo Similar programs | |||
204. | Remote Administrator 2.2 (radmin.com) | ||
protection from password guessing and DoS attacks. The software is based on the TCP/IP protocol. All you need to control a computer located anywhere in the world is a TCP/IP connection between the two computers and a login. Radmin is very secure and reliable remote control software. It typically works | |||
Updated: 9, 2005 | Rating: 257 | Author: Dmitri Znosko | Size: 1855 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
205. | Retroskop 2.0.0.7 (lightdev.com) | ||
or source codes. Extensive online help and PDF manual included. Web based installer for any platform allows installation and start directly from browser with a single click. Retroskop simplyfies set up of recurring backups for directory snapshots, directory synchronizations or entire release packages. Ideal backup solution for MP3 or video collections as well as for project data or | |||
Updated: 3, 2005 | Rating: 39 | Author: Ulrich Hilger | Size: 756 kb | Commercial Go to category: System Utilities > Backup & Restore Similar programs | |||
206. | RSSOwl | RSS & RDF Newsreader 0.72b (rssowl.sourceforge.net) | ||
specification that gives users the power to collect and organize Web-based news and information in a more efficient manner. Applications that collect data from RSS-compliant sites are called RSS readers or "aggregators". RSSOwl is such an application. It lets you gather, organize, update, and store | |||
Updated: 9, 2005 | Rating: 0 | Author: Benjamin Pasero | Size: 3000 kb | Freeware Go to category: Network & Internet > Other Similar programs | |||
207. | Secure Notes Organizer 3.0.8 (secureaction.com) | ||
menu(s) This Organizer lets you store and arrange all your text-based information in a outline tree form. Also it can be used as your personal diary or personal information | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1500 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
208. | Security Task Manager 1.6f (neuber.com) | ||
well as a unique security risk rating. The security risk rating is based on an analysis that takes different aspects of the process into consideration, and indicates the likelihood of the process being potential spyware, malware or a Trojan or keylogger. This indicator is purely based on generic analysis, and does not use any signature files, so it is open to interpretation by | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
209. | Senomix Timesheets 2.52b (senomix.com) | ||
the easiest networked timesheet software for engineering and project-based offices. Senomix's user interface lets employees register their time in as detailed or general a manner as required and collects your company’s timesheet, billing and project status information on one computer for easy | |||
Updated: 2, 2006 | Rating: 42 | Author: Charles O'Dale | Size: 40000 kb | Freeware Go to category: Business > Accounting & Finance Similar programs | |||
210. | ShyFile - File and Email Security 6.24 (shyfile.net) | ||
ever restore it again. ShyFile works independently from all your web based email accounts and desktop email applications. Create secure files that carry your encoded contents. Use your browser to decode. Symmetric keys are employed for your email and HTML encryption, as well as for the binary file encryption. Includes a File Shredder. Max. 6144-bit depth of | |||
Updated: 9, 2005 | Rating: 16 | Author: John Bettels | Size: 4419 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Based software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|