Iconix eMail ID 4.50.2.2 |
Company:
ICONIX, Inc.
|
Date Added: January 15, 2013 | Visits: 714 |
|
||||||||||
Iconix eMail ID is a useful mail utility that uses industry standard technologies to verify the authenticity of the message when an email arrive. Iconix eMail ID uses technologies like Domain Keys and Sender ID which are backed by companies such as Cisco, Microsoft and Yahoo!
|
License: Freeware | Size: 5.1 MB |
USER REVIEWS
ICONIX EMAIL ID RELATED
Misc. Web Browser Tools
-
Who Calls 2.1.2
Who Calls uses your modem to detect the CallerID of a calling party. Caller ID (caller identification or CID, and more properly calling number identification CNID, also known as CLID=calling line identity or CLIP=calling line identification... |
||
Web Browser Tools
-
GlodaQuilla search indexing enhancements 0.3.2
GlodaQuilla search indexing enhancements is a Thunderbird extension that allows suppression or enabling of indexing, using inherited properties. It can be done at the account level, or for a tree of related folders. Indexing is changed in the... |
20.48 KB | |
Multimedia & Graphics
-
LipidXplorer 1.2.2 Beta
LipidXplorer is an unique application specially built in order to identify lipids from high to low resolution mass spectra. Now you can use this accessible Open Source software to help you with your research. |
||
Web Browsers
-
GlodaQuilla 0.3.2
GlodaQuilla was prepared at the request of Andrew Sutherland of Mozilla Messaging to assist in the debugging of the gloda global database. It adds three columns to the Thunderbird message pane: * OnDisk indicates whether a particular... |
20.48 KB | |
Libraries
-
Bio::Tools::Run::PiseApplication::align2model 1.4
Bio::Tools::Run::PiseApplication::align2model is a Bioperl class for align2model - create a multiple alignment of sequences to an existing model. Parameters: align2model (String) run (String) Run name db (Sequence) Sequences to align... |
829.44 KB | |
Libraries
-
XML::TMX::Writer 0.16
XML::TMX::Writer is a Perl extension for writing TMX files. SYNOPSIS use XML::TMX::Writer; my $tmx = new XML::TMX::Writer(); $tmx->start_tmx(ID => paulojjs); $tmx->add_tu(SRCLANG => en, en => some text, pt => algum texto);... |
15.36 KB | |
Audio Tools
-
rebot3.pl 1.0.2
rebot3.pl renames MP3 files that you have grabbed from audio CDs with the track name, number, album, and/or artist. It does so by using either a remote CDDB server or a local CDDB created by cd (and other) players like xmcd, kscd or xmms. With... |
13.31 KB | |
Programming
-
Flex 2.5.33
Flex is a Fast Lexical Analyzer. Flex is a fast lexical analyzer generator. It is a tool for generating programs that perform pattern-matching on text. Flex is a non-GNU free implementation of the well known Lex program. Flex is a tool for... |
880.64 KB | |
Multimedia & Graphics
-
VarScan 2.2.8 Beta
The advent of massively parallel sequencing technologies has fundamentally changed the study of genetics. New platforms like the Illumina GAIIx and the Roche GS yield unprecedented levels of sequencing throughput. The analysis and interpretation... |
||
Security Tools
-
WhatHash 1.1
WhatHash is a simple application that can determine the type of hash you type. It can recognize all known types of hashes. Get WhatHash and take it for a spin to see what it can actually do for you! for WindowsAll |
NEW DOWNLOADS IN WINDOWS SOFTWARE, SECURITY TOOLS
Windows Software
-
iTop Screen Recorder 4.5.0.1385
iTop Screen Recorder is an all-in-one screen recorder, video editor, and screenshot tool. It helps capture anything on your PC screen to be a high-quality video file or screenshot, as well as edit the recorded videos and local videos to make them... |
144.59 MB | |
Windows Software
-
Lock Cursor Tools 7.0
Lock Cursor Tools simply locks the mouse cursor. You may choose a predetermined area, the primary or secondary monitor screen or part of the window of a particular application. Lock Cursor Tools makes your computer work more productively by... |
1.34 MB | |
Windows Software
-
Sync2 Cloud 2.10
Synchronizing Outlook between multiple sources now made easy with Sync2 Cloud, powerful Microsoft Outlook synchronization software. Sync Outlook Calendar, Contacts and Tasks between multiple sources. Share Outlook Calendar with others without... |
28.29 MB | |
Windows Software
-
WDZ Hash Generator 1.0
A simple program that can generate hashes such as md5, sha1, sha2 and many others. Hash function - a function assigning any short number to any large number, always having a fixed size, non-specific, quasi-random value, so-called irreversible... |
2.27 MB | |
Windows Software
-
WriterHelper 1
WriterHelper consist of WordNet Dictionary, WordNet Thesaurus, Plagairism Checker, Encryption using TripleDES, DES, and AES. WriterHelper helps you to search for dictionary, thesurus using WordNet Dictionary, Encrypt Text using AES, DES,... |
223 KB | |
Security Tools
-
Privacy Eraser Free 6.3
Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Microsoft Edge, Mozilla Firefox,... |
9.41 MB | |
Security Tools
-
WinGPG 1.0.1.1
WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations:... |
9.39 MB | |
Security Tools
-
USB Lockit 1.0
USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from prying eyes on Android & Windows. Once the drive is locked, nobody can access your files. All in 3 Easy Steps: 1. To lock... |
11 KB | |
Security Tools
-
Overwrite Program 1.4
Overwrite Program is a program that overwrites empty space on disk, data and metadata. The operating systems and programs automatically write and delete data on disk, for example text editors may save copies of the document for recovery and... |
407 KB | |
Security Tools
-
Security Camera Viewer 5.2
If you have one or more IP cameras, then you also need software that is able to receive and display a video stream from these devices. Most likely you will also want to monitor access to the rooms in automatic mode. A modern security system should... |
29.53 MB |