|
||||||
|
||
|
Home > Search protected software |
Related keywords: search, Search, search engine, search and replace, search engines, search engine optimization, word search, search tool, image search, search engine submission |
|
|
1. | Mil Shield 4.7 (milincorporated.com) | ||
Shield 4.7 protects your privacy by removing all tracks from your online or offline computer activities (it also shreds the content of the infamous INDEX.DAT files). NEW! Now cleans all Firefox tracks. NEW! SELECTIVE CLEANING. Many of the Internet Explorer tracks come from features that are good and convenient: Internet cache speeds up the browsing, cookies protect you | |||
Updated: 3, 2006 | Rating: 508 | Author: Ilko Tcenov | Size: 1724 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
2. | URLBase 6 Professional Edition 6.0.0.1046 (terriadev.com) | ||
keeping your database efficient at all times. Powerful database search capabilities enable you to quickly find links based on search phrases, keywords, verification status, modification date or library assignments. Based on years of experience, URLBase 6 Professional Edition matured to a stable and high performance level. Built-in database backup and recovery tools help you | |||
Updated: 3, 2006 | Rating: 16 | Author: Martin Visser | Size: 2337 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
3. | Word Password 9.0.5351 (lastbit.com) | ||
also occur if someone who does not work with you anymore password protects your vital information that is absolutely necessary to retrieve. The program features various approaches to the password recovery problem, from straightforward brute-force attack and dictionary search, to unique | |||
Updated: 3, 2006 | Rating: 431 | Author: Vitas Ramanchauskas | Size: 773 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
4. | Excel Password 9.0.5351 (lastbit.com) | ||
also occur if someone who does not work with you anymore password protects your vital information that is absolutely necessary to retrieve. The program features various approaches to the password recovery problem, from straightforward brute-force attack and dictionary search, to unique | |||
Updated: 3, 2006 | Rating: 685 | Author: Vitas Ramanchauskas | Size: 774 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
5. | Duplicate Email Remover 2.11.0 (mailutilities.com) | ||
E-mail Remover is powerful and flexible tool intended for the search and processing of duplicated mail messages in Microsoft Outlook folders. DER processes both email messages and posts in mail-type Microsoft Outlook folders. You can use Duplicate E-mail Remover to find mail message copies both in one folder and in different folders. A duplicate message found can be: marked with a | |||
Updated: 3, 2006 | Rating: 0 | Author: Andrey Manchuk | Size: 2218 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
6. | Duplicates Remover for Outlook 2.4.0 (mapilab.com) | ||
Remover for Outlook is a powerful and flexible tool intended for the search and processing of duplicates in Microsoft Outlook folders. DRO process contacts, notes, tasks, journal and calendar items and appropriate type Microsoft Outlook folders. You can use DRO to find duplicates both in one folder and | |||
Updated: 3, 2006 | Rating: 91 | Author: Andrey Manchuk | Size: 2411 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
7. | Duplicate Email Remover 2.11.0 (mapilab.com) | ||
E-mail Remover is powerful and flexible tool intended for the search and processing of duplicated mail messages in Microsoft Outlook folders. DER processes both email messages and posts in mail-type Microsoft Outlook folders. You can use Duplicate E-mail Remover to find mail message copies both in one folder and in different folders. A duplicate message found can be: marked with a | |||
Updated: 3, 2006 | Rating: 0 | Author: Andrey Manchuk | Size: 2218 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
8. | Attachments Zip Compressor 1.4.5 (mapilab.com) | ||
to unpack all incoming archives. - You frequently send attachments protected by the same password? AZC can pack password-protected files and even create self-extracting archives. - Your software system can't index attachments within archives? AZC is here to help again! AZC is a powerful multi-purpose add-in capable of doing with attachments whatever you need it to do. It can | |||
Updated: 3, 2006 | Rating: 74 | Author: Andrey Manchuk | Size: 4 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
9. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
folders and internet traces; a locker that allows you to password protect certain applications; the ability to create self-decrypting packages and mail them to your friends or business partners, you will be able to safely send the self-decrypting packages as zip files; a tool that allows you to transfer a password securely over the internet; a cryptboard to help you use the program | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | FileMonkey 10.22 (monkeyjob.com) | ||
common file management tasks. Main features include: Perform search and replace on multiple file contents, names or folder names using wildcards such as asterisk. Rename files or folders to match a sequence or crop names. Copy or move files. Split, join, or merge target files. Change attributes of files or directories. Convert file or directory names to uppercase, lowercase or | |||
Updated: 2, 2006 | Rating: 61 | Author: monkey job | Size: 2098 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Search protected software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|