|
||||||
|
||
|
Home > G lock software |
Related keywords: lock, lock folder, lock files, lock folders, lock desktop, cd lock, Software Lock and Key, lock file, file lock, floppy lock |
|
|
1. | DeskLook 3.2 (xemico.com) | ||
list and folders in messages list. Everything is interactive, e.g. you can double click on an appointment directely on the desktop to get it opened in Outlook; or double click on contacts link to bring up Outlook Contacts. DeskLook offers two data views, fixed central and customizable side bar, in three different styles with changeable transparency, and works even if Outlook is not | |||
Updated: 9, 2005 | Rating: 16 | Author: XemiComputers Ltd. | Size: 1345 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
2. | gReg 4.55 (gitanosoftware.com) | ||
out-strips the competition with state-of-the-art encryption that locks out thieves permanently. Smoke your competitors with gReg's advanced customer tracking and technical support history. You and your customer support staff can satisfy every customer quickly and efficiently with our system .Cut your advertising time and costs in half! Use gReg to distribute an evaluation version of | |||
Updated: 9, 2005 | Rating: 0 | Author: Jesus Moreno | Size: 5840 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
3. | ShareGuard Copy Protection 3.6 (zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 11474 kb | Shareware Go to category: Development > Other Similar programs | |||
4. | ShareGuard V1 1 (zappersoftware.com) | ||
to protect their software. Consists of 4 components: (1) ShareGuard Lock (2) ShareGuard Key (3) ShareGuard Locksmith (4) CRC Check. (1) ShareGuard Lock is the program that protects your software from reverse engineering and from being used longer than the specified demonstration period. This is | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | Advanced Email Verifier 5.15 (glocksoft.com) | ||
Advanced Email Verifier (AEV) is your powerful solution for the "message delivery error". AEV is designed for system administrators, webmasters, programmers as well as for those advanced users who have their own mailing lists and need to keep them up-to-date. When Internet users move from one service | |||
Updated: 2, 2006 | Rating: 42 | Author: Alex Markov | Size: 4148 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
6. | G-Lock EasyMail 4.62 (glocksoft.com) | ||
G-Lock EasyMail was developed to help people run and manage mailing lists, newsletters, announcement lists and customer updates. G-Lock EasyMail is a powerful group mailer which sends your message directly from your outbox to the recipient's mail server (without using any ISP's SMTP server). Program supports multi-threaded delivery, and so works several times | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3281 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
7. | G-Lock EasyMail Professional 4.62 (glocksoft.com) | ||
HTML, Lotus 1-2-3, XML, MS Access Files as well as ODBC databases. G-Lock EasyMail is a fast, powerful yet simple to use email software designed primarily for applications in which the sender and recipient have an existing relationship, a retailer's customer base, a physician's list of patients, a | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3324 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
8. | G-Lock Email Processor 1.98 (glocksoft.com) | ||
that nobody on the exclusion list will receive your message. G-Lock Email Processor is designed to process/parse bounced/undeliverable and subscribe/unsubscribe emails as well as extract information from your email messages and create user defined text documents, that can be imported by other | |||
Updated: 2, 2006 | Rating: 119 | Author: Alex Markov | Size: 2601 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
9. | TZ Privacy Guard 3.1.0.0 (trackzapper.com) | ||
or some one passing by. TZ Privacy Gaurd lets you encrypt and lock your IE favorite and history folders. This does not affect within explorer other folders that are unlocked. More Features: - Encrypts and locks your favorite's folder(s) and subfolders and files within. - Encrypts and locks your history folders(s). - Encrypts and locks your personal | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 4266 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
10. | Advanced Hide Folders 4.6 (hide-folders.biz) | ||
simple drag and drop folders from Windows or add files by mask (e.g hide all .jpg files). In addition, as an added security measure, you can also lock the hidden files. Advanced Hide Folders also prevent access to your confidential files via MRU features (e.g. list of Most Recently Used documents in MS Office). Additional features include hotkey operation and optional | |||
Updated: 9, 2005 | Rating: 81 | Author: Otto Schulz | Size: 258 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > G lock software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|