|
||||||
|
||
|
Home > Unknown software |
Related keywords: unknown driver |
|
|
1. | BB DOALL 6.51 (bbsys.com) | ||
fields in the main data file. -Reverse-Engineer text files with an unknown structure. A "best effort" will be made to determine the "likely" structure of text file. -Produce MapQuest maps automatically from address data in your tables. Single or multiple. -Produce emails in simple, MAPI or | |||
Updated: 2, 2006 | Rating: 28 | Author: Bob Bolda | Size: 8789 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
2. | Pop-Up Dictionary 4.5 (popdict.com) | ||
help you translate texts from virtually any language. Just select an unknown word in your text, press Ctrl+Ins+Ins and you will see the translation, press Ins and this word is marked for studying. Set the test-yourself time and the program will from time to time keep asking you to translate new words | |||
Updated: 9, 2005 | Rating: 0 | Author: Artyom Lukanin | Size: 4376 kb | Shareware Go to category: Education > Languages Similar programs | |||
3. | Read-e 1.0.39 (aowi67.dsl.pipex.com) | ||
choice. It also has a quick word look-up function, for referencing unknown words. Perfect if you have a lot of web reading to do. Or maybe you or someone you know has difficulty reading (e.g. poor eye-site, dyslexia, ADD/ADHD). Whoever you are, you could probably use Read-e to benifit your use of | |||
Updated: 9, 2005 | Rating: 0 | Author: Phil Teare | Size: 4098 kb | Shareware Go to category: Education > Other Similar programs | |||
4. | MDaemon 8.1.4 (files.altn.com) | ||
involves deferring the initial acceptance of a new mail message from unknown senders and tells the sending email server to try again later. When the sending server tries a second time - which most spam sources will not do - MDaemon will accept it. Exception options and white lists can exempt trusted | |||
Updated: 2, 2006 | Rating: 196 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
5. | Spam Freak 1.0 (interlocator.com) | ||
is never infected with any viruses or worms whether known or unknown. For support, contact [email protected] To install: run install.exe Documentation: In program Set your pop mail accounts. Set some simple rules Turn off auto download for your normal mail client. Run Spam Freak before checking your mail and watch Spam Freak zip through your mail removing all | |||
Updated: 3, 2005 | Rating: 0 | Author: Mike Hunt | Size: 1037 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
6. | TZ Personal Firewall 3.3.0.0 (TrackZapper.com) | ||
Trojan horses & spyware programs from hurting your computer. If an unknown outside source attempts a connection to your computer, a pop-up window alerts you to the intrusion & again prompts you to choose whether to grant access. The Application Control allows you to decide which applications can & | |||
Updated: 9, 2005 | Rating: 0 | Author: Ahmad Ayman | Size: 3458 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
7. | Anti-keylogger 6.1 (anti-keyloggers.com) | ||
against most types of the keylogging software, both known and unknown. Anti-keylogger blocks keylogging programs activity without using of signature bases. Anti-keylogger is capable to buck various types of keylogging programs possibly included in any commercial, shareware, freeware products, as well as in Trojan horses, viruses of very different operation principles. Due to the | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 2659 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
8. | Panda Titanium 2006 Antivirus + Spyware 5.00.00 (pandasoftware.com) | ||
your security, it offers a double layer of protection against unknown viruses and intruders thanks to its TruPrevent Technologies. It also protects you from hackers, phishing and other online fraud. Ongoing antivirus protection for your computer, thanks to its greater detection and elimination efficiency for all types of viruses and its automatic, daily | |||
Updated: 2, 2006 | Rating: 220 | Author: Panda Software | Size: 33972 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
9. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
keylogging hardware devices (hardware keyloggers), both known and unknown, currently in use or presently being developed worldwide. The PrivacyKeyboard automatically deactivates all running keylogging programs on your PC and allows you to ensure a more secure method to record your customer-selected information (passwords, logins, PIN etc.). Due to the PrivacyKeyboard, keystroke | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
10. | unWC 2.50 (zipghost.com) | ||
button, all ebooks will be decompiled quickly (unWC will ignore any unknown ebook automatically). What can I do with it? Extract all source files from an .EXE type ebook which was compiled by Webcompiler, then you can edit and recompile those source files, that's all. What is the system requirement? You will need a Pentium 100 PC or higher, 16MB RAM or more. The | |||
Updated: 9, 2005 | Rating: 68 | Author: guohua feng | Size: 962 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Unknown software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|