|
||||||
|
||
|
Home > Recent files list software |
Related keywords: files, list, mailing list, recent, hide files, to do list, Files, PDF files, recent documents, compare files |
|
|
1. | CSSS Video 2.1 (HTTP:) | ||
time survey and if it is necessary do many operation (play sound file (siren) ,record sound, video or snapshot, call by telephone). In case of voice modem usage, there is a possibility of listening of a guarded room by telephone If you want: - to guard your home, office or any location; - to eavesdrop; - to save money and don't buy signalling device; This software for | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 3005 kb | Demo Go to category: Home & Hobby > Personal Interest Similar programs | |||
2. | DJ2000 1.6 (dj2000.215software.com) | ||
is the ultimate MP3 Library Manager and Player. It's an integrated environment for not only playing and most importantly storing and manging your entire MP3 collection whether on your local drives or on CDR. Key Features: - Your personal Jukebox - DJ2000 manages your MP3 collection much like a jukebox. You can search your collection for specific songs, artists, and types of | |||
Updated: 9, 2005 | Rating: 16 | Author: 215 Technology, Inc. | Size: 2168 kb | Demo Go to category: Audio & Multimedia > Other Similar programs | |||
3. | GroupMAN 1.01.177 (groupman.com) | ||
(Group Manager) functions as a list-server program and makes it easy to create and manage both announcement mailing lists and interactive discussions on your Windows PC. GroupMAN is unique because it's designed to work from your personal electronic- mail address, as opposed to dedicated accounts on a list server. To use GroupMAN, you don't even need a | |||
Updated: 3, 2005 | Rating: 0 | Author: TNL Total Solutions TNL Total Solutions | Size: 5377 kb | Demo Go to category: Communications > E-Mail Clients Similar programs | |||
4. | Mixpad 2.45 (3rddaysoftware.com) | ||
the physical properties of formulations. Designed to mimic Microsoft's Excel, it's familiar interface will help simplify the bench chemist's work. Anyone who has to mix two or more ingredients together will want MixPad. This program simplifies the task of managing large numbers of | |||
Updated: 3, 2005 | Rating: 42 | Author: Lou Vasquez | Size: 148480 kb | Demo Go to category: Business > Other Similar programs | |||
5. | AssetManage Home Edition 2006 (libertystreet.com) | ||
items by Category, Room, Month of Purchase and more. Attach images, files and URLs to your records. Easily track changes in Status or Location. Each item has an associated 'Item Notebook' where you can track repairs and other expenses related to a possession. AssetManage Home makes it simple to | |||
Updated: 2, 2006 | Rating: 0 | Author: Paul Dembowski | Size: 23138 kb | Demo Go to category: Home & Hobby > Personal Finance Similar programs | |||
6. | Collection Explorer 2.5.3 (collectionexplorer.com) | ||
and viewed. Collection Explorer looks and operates like Microsoft's Windows Explorer, making it easy to learn. The left pane of the main window lists all of the categories in your collection, arranged in a tree. Categories can contain subcategories, and so on. The categories that come | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve West | Size: 4283 kb | Demo Go to category: Home & Hobby > Other Similar programs | |||
7. | AlertPingPro 2.7.6 (psgsoft.com) | ||
computers in your local area network or in the internet. Build a list of TCP/IP devices (computers, printers, and other network components) to verify their network connections. AlertPing periodically pings each device to determine its network connectivity. After issuing a ping request, the program waits for a reply, if AlertPing receives a failed ping request, different alarm and | |||
Updated: 9, 2005 | Rating: 0 | Author: Vadim Petrov | Size: 656 kb | Demo Go to category: Network & Internet > Network Monitoring Similar programs | |||
8. | Email Remote Control 1.167 (otiumation-inc.com) | ||
Remote Control allows you to monitor and contact your PC, receive files, appointments, personal contacts from your Home PC or work PC from anywhere in the world. By using Email Remote Control, you will be able to send Email instructions from anywhere in the world and receive an immediate response | |||
Updated: 3, 2005 | Rating: 0 | Size: 16000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
9. | MDaemon 8.1.4 (files.altn.com) | ||
and validates inbound messages signed with DKIM. Read Alt-N's published white paper on DKIM and its implementation in MDaemon at http://www.altn.com/support/white_papers.asp. In addition to DKIM, MDaemon 8.1 includes support for Greylisting, a relatively new spam fighting technique which involves deferring the initial acceptance of a new mail message from unknown senders and | |||
Updated: 2, 2006 | Rating: 196 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
10. | MyPrivacy 5.5.3 (omniquad.com) | ||
information in online forms, Urls in your browser address bar, files you searched for, etc. Data that otherwise would be exposed to other users of your computer. It also helps you clear the files from both the Temp & the Temporary Internet Explorer folders. Preserve your privacy. Your Windows PC and Internet Explorer Browser have several helpful features that help make | |||
Updated: 2, 2006 | Rating: 82 | Author: Daniel Sobstel | Size: 7824 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
11. | PlexDomain: Domain-Name Search, Generation, Popularity and Analysis Toolkit 3.1 (plexobject.com) | ||
for Registration Registered Domains REAL-TIME NEWLY DELETED LISTS MONITORING DOMAINS FOR AVAILABILITY - Schedule background jobs and receive emails DIRECTORY CRAWLING FILTERING DOMAINS It supports filtering domains by searching number of links in: AltaVista AllTheWeb Teoma Alexa AOL HotBot Lycos Google DMOZ LookSmart MSN Yahoo POWER SEARCH FOR AVAILABLE DOMAINS - It | |||
Updated: 9, 2005 | Rating: 0 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
12. | SpeedOptimizer 2.0 (speedbit.com) | ||
At the end of the process you will be issued an Optimization Report listing the settings that have been optimized. Speeds Up all Internet-related data transmission Faster loading of web page elements (text and graphics) Accelerated downloading, uploading and streaming of content (music, movies, games, clips etc.) Faster delivery (transmission and receipt) of email massages and | |||
Updated: 9, 2005 | Rating: 16 | Author: Speedbit Speedbit | Size: 784 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
13. | CSSS 2.2 (sarbash.com) | ||
There is a function of scaring away, with the help of sound files playback (siren), and also recording of a sound on the disk. In case of voice modem usage, there is a possibility of listening of a guarded room by telephone. Features: - availability to determine the movement in a room by change of a sound background - pickup. - Dialing 1-5 telephone numbers in case of | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 2640 kb | Demo Go to category: System Utilities > Other Similar programs | |||
14. | Ghost Keylogger 3.80 (keylogger.net) | ||
surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs completly | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
15. | Surf Spy 2.10 (bysoft.se) | ||
visited web site and stores it to a password protected encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are away. In the stealth mode, Surf Spy does not show up in the system tray, task bar, or task list. Surf Spy is compatible | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
16. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
Automatic inventory. Vidamic Netlog is a smart inventory program that automatically generates a completed inventory card for each computer/client. Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
17. | MDaemon 8.1.4 (altn.com) | ||
and validates inbound messages signed with DKIM. Read Alt-N's published white paper on DKIM and its implementation in MDaemon at http://www.altn.com/support/white_papers.asp. In addition to DKIM, MDaemon 8.1 includes support for Greylisting, a relatively new spam fighting technique which involves deferring the initial acceptance of a new mail message from unknown senders and | |||
Updated: 2, 2006 | Rating: 865 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
18. | PlexDomain: Domain-Name Search, Generation, Popularity and Analysis Toolkit 3.1 (plexobject.com) | ||
for Registration Registered Domains REAL-TIME NEWLY DELETED LISTS MONITORING DOMAINS FOR AVAILABILITY - Schedule background jobs and receive emails DIRECTORY CRAWLING FILTERING DOMAINS It supports filtering domains by searching number of links in: AltaVista AllTheWeb Teoma Alexa AOL HotBot Lycos Google DMOZ LookSmart MSN Yahoo POWER SEARCH FOR AVAILABLE DOMAINS - It | |||
Updated: 9, 2005 | Rating: 0 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
19. | Ghost Keylogger 3.80 (keylogger.net) | ||
surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs completly | |||
Updated: 3, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 600 kb | Demo Similar programs | |||
|
Home > Recent files list software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|