|
||||||
|
||
|
Home > Targets software |
|
|
241. | NetScanTools 5.10 (netscantools.com) | ||
*Find the Authoritative DNS for a domain. *Scan Ports on a target computer(s) for TCP services. *Sweep an IP address range looking for active computers. *Diagnose network connectivity problems with Ping, Traceroute, TCP Term, Echo and Chargen. *Plot Ping and Traceroute time response graphs (print them too!). *Check to see if a domain name has been used with the Whois | |||
Updated: 3, 2005 | Rating: 0 | Author: NWPS Inc NWPS Inc | Size: 1908 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
242. | Newsgroup Explorer 5.10 (internet-soft.com) | ||
address removal. You can use your selected keywords to scan the target audience and only return the information you are interested in. Newsgroup Explorer includes the following features and options: search for messages using keywords; built-in newsgroup reader for online / offline reading of messages; view individual messages within a newgroup for reading; multiple include/exclude | |||
Updated: 3, 2005 | Rating: 16 | Author: InternetSoft Corporation | Size: 450 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
243. | PacScope 1.02 (pacscope.com) | ||
PacScope, a shareware, is designed for professional use but also targets even novice users to enjoy the maximum experience of using PacScope with no confusion at all. Using PacScope, a network administrator, like you, enjoys to maintain the network in optimum conditions since PacScope helps to detect a | |||
Updated: 3, 2005 | Rating: 39 | Author: Kazuyuki Kitajima | Size: 5720 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
244. | Link Spy 1.4 (spyutilites.com) | ||
and e-mail addresses copied into clipboard or dragged onto special targets (ReGet's icon, for example). The program gathers these links and addresses and places them into a virtual folder, so that you may later access them. You can make a short description of each of the addresses, sort and setup automatic activation of your browser or e-mail client. As you work on your computer | |||
Updated: 3, 2005 | Rating: 0 | Author: Dmitriy Gorin | Size: 600 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
245. | Barnes Ballistics 2.0.10 (solepoint.com) | ||
or metric. Put your calculations to the bench test by accessing "Target Shoot". Set your aim for a given trajectory table you are working with, fire and see where the bullet will impact the target at any given distance to target and wind. A fun, virtually realistic way to gain knowledge | |||
Updated: 3, 2005 | Rating: 4186 | Author: Jerry Edwards | Size: 54 kb | Shareware Go to category: Home & Hobby > Other Similar programs | |||
246. | DevSolutions FTP 1.0 (devsolutions.net) | ||
October 1985, which is the official specification in use today.Being targeted for the Internet, it was designed as a platform-independent protocol from the ground up. DevSolutions FTP support and major operations Supports multiple uploading/downloading of files to and from the FTP server. SSL | |||
Updated: 3, 2005 | Rating: 0 | Author: supportTeam | Size: 1115 kb | Shareware Go to category: Development > Other Similar programs | |||
247. | Terminator Collection 1.0 (pxcompany.com) | ||
John Conner, who now runs a computer programming company, was the target of the machines. When Conner hacks into Cyberdyne Systems' computers, he discovers the top-secre operation "Skynet." Soon, two terminators descend from the future. Originally programmed as an assassin, a disadvantaged T-101 | |||
Updated: 3, 2005 | Rating: 0 | Author: Parallaxis software | Size: 2753 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
248. | Active Grabber 1.1 (caesar-soft.biz) | ||
methods of e-mail extraction: spider method, substitute and extra-targeting method. Spider method is the classical solution. It consistently goes deep into a sites using the established system of restrictions. Substitute method is the best way to extract only nessessary e-mails. Extra-Targeting | |||
Updated: 3, 2005 | Rating: 368 | Author: Alexander Balobin | Size: 610 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
249. | FastMail 1.21 (internet-soft.com) | ||
date. So the messages being sent to your recipients can contain targeted information. For example: "Dear John Smith, congratulations on your birthday." FastMail has a black list database of words (the anti-spam list) and addresses of users whose letters should not be sent under any circumstances, even if they subscribe to your news. The program supports various national message | |||
Updated: 3, 2005 | Rating: 0 | Author: InternetSoft Corporation | Size: 2032 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
250. | Imshooter 1.00 (Imshooter.com) | ||
advertisements directly to computer screens. Allows targeted advertisement by geographic regions mapped to IP addresses. Reach customers effectively, a popup message will appear on the PC screen. Reach millions by shooting one advertisement. With this latest trend in online marketing you can reach the customer directly by displaying the message on their computer screen. It ensures | |||
Updated: 3, 2005 | Rating: 16 | Author: Arfaeen Iqbal | Size: 550 kb | Shareware Go to category: Business > Other Similar programs | |||
251. | eCount 1.0.1 (athnetix.com) | ||
that uses computers and hardwired or wireless RF technology to count target hits. It runs on a Windows 95/98/Me/2000/NT4.0/XP PC. The RF transmitter has a working range of well over 350+ feet. There can be either single or dual display's allowing one or two competitor's to compete. The transmitter comes with a normally open sensor and magnet. As a target is hit the sensor will | |||
Updated: 8, 2004 | Rating: 0 | Author: Keith Thompson | Size: 9 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
252. | Data Flow Manager for Access 97 3.5 (peterssoftware.com) | ||
it to an output file based on your field mapping, source, and target | |||
Updated: 8, 2004 | Rating: 82 | Author: Peter De Baets | Size: 4553 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
253. | IntelliPointer 4.0 (intellipointer.com) | ||
You don't need to put your hand in awkward positions to reach your target. With all these provisions IntelliPointer significantly reduces the strain and the risk of injury to your hand, wrist, arm and shoulder. IntelliPointer is ergonomic mouse software that reduces hand movement and strain | |||
Updated: 8, 2004 | Rating: 0 | Author: Mahmoud Razzaghi | Size: 1024 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Targets software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|