|
||||||
|
||
|
Home > Illegal operation software |
Related keywords: operation, illegal, graphics set operation, modem operation |
|
|
1. | Advanced SPAM Generator 1.20 (atompark.com) | ||
of e-mail addresses extraction. Improved algorithm allows to exclude illegal addresses and generate fresh mail list with unlimited number of recipients. Know how technology of e-mail addresses extraction. Improved algorithm allows to exclude illegal addresses and generate fresh mail list with unlimited number of | |||
Updated: 9, 2005 | Rating: 2499 | Author: Evgeny Medvednicov | Size: 561 kb | Commercial Go to category: Communications > E-Mail Clients Similar programs | |||
2. | EXECryptor 2.3.7 (softcomplete.com) | ||
information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents illegal creation of keygen. EXECryptor supplies you with one-touch trial technology that allows to turn your full-feature application in 'try-before-you-buy' version in a few moments | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
3. | MacNames 1.1m (peccatte.karefil.com) | ||
filenames stored on a Windows NT or 2000 Server volume, removing illegal characters and adding filenames extensions; With this Mac to PC conversion Windows can identify the appropriate applications associated with renamed files. MacNames works as well a Windows NT 4.0 or Windows 2000 Service | |||
Updated: 2, 2006 | Rating: 285 | Author: Patrick Peccatte | Size: 2191 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
4. | PC Guard for Win32 5.00 (sofpro.com) | ||
Windows 95/98/ME/2000/NT/XP 32bit EXE/DLL applications from illegal distribution and reverse engineering. Even more, you don't need any source code editing or programming experience for this. Everything is fully automatic! With PC Guard for Win32 you can protect unlimited number of your programs with no additional investments. You also don't need any additional | |||
Updated: 9, 2005 | Rating: 48 | Author: Blagoje Ceklic | Size: 841 kb | Commercial Go to category: Development > Management & Distribution Similar programs | |||
5. | PELock 1.06 (pelock.pac.pl) | ||
dependent keys • keeping of the database and checkup of "stolen" (illegal) registration keys • ready to use samples of license key system in C/C++/Delphi • user-friendly interface • many option, which allow you the customize protection to your needs • entire thing written in assembler (win32asm) • compatibility with all operating systems Windows 95/98/ME/NT/2K/XP | |||
Updated: 9, 2005 | Rating: 0 | Author: Bartosz Wójcik | Size: 422 kb | Demo Go to category: Development > Other Similar programs | |||
6. | Proton Half Life Key Chance 1.1 (proton.com.tr) | ||
old Half-life key number chanced with new key serial. included 50 over key. old Half-life key number chanced with new key serial. included 50 over key. | |||
Updated: 9, 2005 | Rating: 0 | Author: Salih GUCLU | Size: 50 kb | Freeware Go to category: Games & Entertainment > Other Similar programs | |||
7. | Solitaire Package One 2.97a (galleus.com) | ||
cards are displayed in the card pick part of this dialog. Optional illegal move messages remind you to play fair. The gameplay has a limited undo feature, and smart autoplay helps you end a game already won. Solitaire Package One ha a billion numbered + more random deals. Mouse and keyboard control | |||
Updated: 9, 2005 | Rating: 0 | Author: Gábor Kertes | Size: 903 kb | Shareware Go to category: Games & Entertainment > Card Similar programs | |||
8. | Flystrike Spam Interrogator 2.4.0.63 (flystrike.net) | ||
messages for remote deletion. Messages containing abusive or illegal content can be relayed to the appropriate authorities with a set of automatically extracted headers. A number of pre-written (English, French, and Spanish) abuse reports are provided to help the user. If desired, each e-mail message can be viewed in original form or as a web document (for HTML). For the latter | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4920 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
9. | MultiDom 1.1 (hibyte.co.uk) | ||
input intepreters and character filters ensures typing errors and illegal characters are dealt with accordingly. MultiDom can be easily tailored by anyone with basic HTML skills in order to stay in keeping with an existing website design. Professional installation is an optional extra. To learn | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Nicholas | Size: 33 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
10. | Agent Password 1.8 (agentpassword.com) | ||
and find out passwords of other people. But this is probably illegal and, as a law-abiding citizen, you surely would not want to do this, would you? AgentPassword provides you with the following benefits: It automatically logs passwords, making it unnecessary to remember them; it runs invisibly in the background; it is fully compatible with all Windows OS; it has very | |||
Updated: 8, 2004 | Rating: 251 | Author: Pavel Mikhailov | Size: 902 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Illegal operation software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|