|
||||||
|
||
|
Home > Illegal software |
Related keywords: Illegal Operation |
|
|
1. | EXECryptor 2.3.7 (softcomplete.com) | ||
information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents illegal creation of keygen. EXECryptor supplies you with one-touch trial technology that allows to turn your full-feature application in 'try-before-you-buy' version in a few moments | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
2. | MacNames Site License 1.1m (peccatte.karefil.com) | ||
translates Macintosh filenames for Windows use removing illegal characters and adding extensions. Optionally as a Windows service it regularly scans and replaces characters allowed by Macintosh but forbidden in windows file names. For the files stored on Mac volumes of NT/2000/XP servers shared by Macintosh and Windows clients, the truncate to 31 characters function | |||
Updated: 2, 2006 | Rating: 0 | Author: Patrick Peccatte | Size: 2589 kb | Commercial Go to category: System Utilities > File & Disk Management Similar programs | |||
3. | MacNames 1.1m (peccatte.karefil.com) | ||
filenames stored on a Windows NT or 2000 Server volume, removing illegal characters and adding filenames extensions; With this Mac to PC conversion Windows can identify the appropriate applications associated with renamed files. MacNames works as well a Windows NT 4.0 or Windows 2000 Service | |||
Updated: 2, 2006 | Rating: 285 | Author: Patrick Peccatte | Size: 2191 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
4. | PhotoMarker Pro 1.5 (senwa.nl) | ||
Protect your property against misuse, abuse and illegal use by third parties. Digital imagefiles are widely spread by internet and email. Also valuable imagefiles owned by private persons or companies are often sent out by family, employees or collegues without protection of any kind. Many are sent by email as an unprotected attachment. As soon as the imagefile attachment breaks | |||
Updated: 9, 2005 | Rating: 82 | Author: senwa senwa | Size: 1357 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
5. | StrongSearch 1.3.1 (kraslabs.com) | ||
and password-protected resources, StrongSearch does not use any illegal methods and requires authorization data to be entered. The program supports multiple file search attributes (like file type or date of creation) and is very simple in use, making it perfect for home networks and even individual PCs, not connected to any network. The other nice features are Drag’n’Drop | |||
Updated: 9, 2005 | Rating: 0 | Author: Sergey Startsev | Size: 1434 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
6. | Flystrike Spam Interrogator 1.6 (softwarepromoting.com) | ||
messages for remote deletion. Messages containing abusive or illegal content can be relayed to the appropriate authorities with a set of automatically extracted headers. A number of pre-written (English and German) abuse reports are provided to help the user. If desired, each e-mail message can be viewed in original form or as a web document (for HTML). For the latter, pictures | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4950 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
7. | Flystrike Spam Interrogator 2.4.0.63 (downloads.flystrike.com) | ||
messages for remote deletion. Messages containing abusive or illegal content can be relayed to the appropriate authorities with a set of automatically extracted headers. A number of pre-written (English, French, and Spanish) abuse reports are provided to help the user. If desired, each e-mail message can be viewed in original form or as a web document (for HTML). For the latter | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Komorowski | Size: 4920 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
8. | Software Administration Kit 1.8 (lobstersoft.com) | ||
codes. In the battle against piracy, SAK helps you defeat illegal registration code generators by making it easy to change your key generation scheme, and e-mail your customers new codes or key files. The Software Administration Kit includes a highly customizable set of sales reports, including a graph that shows how sales have evolved over time, pie charts that display | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Grigore | Size: 2372 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
9. | WinDriver Expert 1.90 (zhangduo.com) | ||
WinDriver Expert is a utility that enables you to detect hardware, backup driver or drivers currently installed on your system. If you want to restore driver, find the latest drivers for your hardware and install them into your computer, you might try the Shareware version product My Drivers. With it, you may | |||
Updated: 9, 2005 | Rating: 42 | Author: Duo Zhang | Size: 476 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
10. | WinDriver Ghost 2.02 (zhangduo.com) | ||
WinDriver Ghost provides you the easy and fast detection, backup and restore of the entire hardware device drivers currently on your system. With it, you can even find the latest drivers for your hardware and install them onto your computer. Just one or two mouse button clicks, you will have all your hardware | |||
Updated: 9, 2005 | Rating: 0 | Author: Duo Zhang | Size: 1126 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Illegal software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|