|
||||||
|
||
|
Home > Unknown software |
Related keywords: unknown driver |
|
|
1. | Read-e 1.0.39 (aowi67.dsl.pipex.com) | ||
choice. It also has a quick word look-up function, for referencing unknown words. Perfect if you have a lot of web reading to do. Or maybe you or someone you know has difficulty reading (e.g. poor eye-site, dyslexia, ADD/ADHD). Whoever you are, you could probably use Read-e to benifit your use of | |||
Updated: 9, 2005 | Rating: 0 | Author: Phil Teare | Size: 4098 kb | Shareware Go to category: Education > Other Similar programs | |||
2. | MDaemon 8.1.4 (files.altn.com) | ||
involves deferring the initial acceptance of a new mail message from unknown senders and tells the sending email server to try again later. When the sending server tries a second time - which most spam sources will not do - MDaemon will accept it. Exception options and white lists can exempt trusted | |||
Updated: 2, 2006 | Rating: 196 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
3. | TZ Personal Firewall 3.3.0.0 (TrackZapper.com) | ||
Trojan horses & spyware programs from hurting your computer. If an unknown outside source attempts a connection to your computer, a pop-up window alerts you to the intrusion & again prompts you to choose whether to grant access. The Application Control allows you to decide which applications can & | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 3458 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
4. | Anti-keylogger 6.1 (anti-keyloggers.com) | ||
against most types of the keylogging software, both known and unknown. Anti-keylogger blocks keylogging programs activity without using of signature bases. Anti-keylogger is capable to buck various types of keylogging programs possibly included in any commercial, shareware, freeware products, as well as in Trojan horses, viruses of very different operation principles. Due to the | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 2659 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently being developed worldwide. The PrivacyKeyboard automatically deactivates all running keylogging programs on your PC and allows you to ensure a more secure method to record your customer-selected information (passwords, logins, PIN etc.). Due to the PrivacyKeyboard, keystroke | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
6. | MDaemon 8.1.4 (altn.com) | ||
involves deferring the initial acceptance of a new mail message from unknown senders and tells the sending email server to try again later. When the sending server tries a second time - which most spam sources will not do - MDaemon will accept it. Exception options and white lists can exempt trusted | |||
Updated: 2, 2006 | Rating: 865 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
7. | PrivacyKeyboard 6.1 (anti-keylogger.com) | ||
keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently being developed worldwide. The PrivacyKeyboard automatically deactivates all running keylogging programs on your PC and allows you to ensure a more secure method to record your customer-selected information (passwords, logins, PIN etc.). Due to the PrivacyKeyboard, keystroke | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Unknown software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|