Search results for 'contain company name'.
1508 products found. Showing 77-91 in 10 groups sorted by relevance.
77. Email Spy Pro
Email Spy Pro is appropriate for: - Businesses trying to put a stop to inappropriate using of companyname, leakage of trade/industrial secrets or intellectual property. That feature is very appropriate for small and middle companies, which don't have own dedicated email server. DetailsDownload trialBuy now ($89.95) Find similar
Vendor: Spydex Inc. (owned by Edison Commerce Corp.)
EmailObserver(TM) is a unique email monitoring software and surveillance tool created for a wide range of users either for ordinary home users or businessmen, corporations etc. Businesses trying to control internal information turnover, to stop incorrect using of the companyname, drain of trade/industrial know-how or intellectual property etc.
79. BG CallerId
You must subscribe to the caller id service from your local phone company and have a caller id capable modem. The months are grouped to form an year so the directory 2004 residing in the executable file folder contains the logs for the year 2004. DetailsDownload trialBuy now ($20.86) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Language: English, Bulgarian
Vendor: George Yaneff
80. D_back
Included and excluded files are specified separately, wildcards (*?) are allowed in all paths and file names. The software distribution kit contains command-line utility and backup scheduler which allow you to automate data processing on both personal computers and server systems. DetailsDownload trialBuy now ($29.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME, Windows Server 2003
Vendor: SVA-soft
As more and more companies connect their computers into networks and prompt their employees to use shared resources, searching for files over LAN becomes an increasingly difficult task. Frequently, people do not remember the exact file names, which results in a horrendous amount of time spent waiting for the search results.
Site name, www-address, e-mail address, snail mail address, telephone number, fax number, password and user information, a full site description, user comments, link pages, screen dumps, binaries, and a geographic reference to where the site is located!
Then the company uses the Serial Monitor to reverse-engineer the protocol based on the working software. 2. The company has a device and the working software (e.g. device driver) but doesn't know the protocol. In the morning, you will get a small compressed log file that contains everything you need to find your bugs!
Setup asks you to enter you name and the target directory, the rest of the installation runs automatically. 2. Displays of table occupancy together with names, and visual symbols of male and female guests and children. 3. Displays of table occupancy toggling between names of the guests and visual symbols representing customer and staff employee.
To join your local messaging network, enter your email address and optional the name of your relevant workgroup. After successful connection the names and connection-states of all affiliated users will indicate directly on the group-orientated contact list.