|
||||||
|
||
|
Home > Fix registry software |
Related keywords: registry, Registry, registry cleaner, registry fix, system registry, registry monitor, windows registry, registry editor, windows registry cleaner, registry tool |
|
|
151. | DeployMaster 2.7.0 (jgsoft.com) | ||
The no-nonsense installation builder that will deliver your software with a good first impression: a smooth installation. Computer novices enjoy its ability to install your software without asking any questions, while computer experts enjoy the control and feedback it offers when they click the Advanced | |||
Updated: 9, 2005 | Rating: 0 | Author: Jan Goyvaerts | Size: 1916 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
152. | SWFKit 2.1 (swfkit.com) | ||
and receiving email,reading and writing file, accessing system registry, playing and recording multimedia, embedding an ActiveX control, printing,invoking dll,manipulating images and more features you can get the full list from our site. In a word, with the easy scripting language FFish Script, you can get the power provided only by the advance programming languages such as VC, VB | |||
Updated: 9, 2005 | Rating: 42 | Author: Qunzhi Zhang | Size: 7400 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
153. | System Key Wizard 2.1 (home.wol.co.za) | ||
with your own messages. 7. You can specify the name of the registry key you want to use. 8. Encryptkey prevents other users of the component from decrypting your keys. 9. The component is data aware. This is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a verity of fields. One line of code | |||
Updated: 9, 2005 | Rating: 16 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
154. | System Key Wizard 2.1 (continuumq.com) | ||
with your own messages. 7. You can specify the name of the registry key you want to use. 8. Encryptkey prevents other users of the component from decrypting your keys. 9. The component is data aware. This is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a variety of fields. One line of code | |||
Updated: 9, 2005 | Rating: 0 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
155. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
- Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified address (or | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
156. | BPS Spyware and Adware Remover 9.3.0.0 (bulletproofsoft.com) | ||
hard drive and last only as long as the computer is powered up), registry, & drives for known adware modules & for known SpyWare parasites & scum-ware components and lets you remove them safely from your system. Using BPS Spyware/Adware Remover Startup Manager, you can clean up and remove any unwanted programs from auto-starting, often freeing up CPU for your computer. BPS | |||
Updated: 2, 2006 | Rating: 122 | Author: BulletProof Soft | Size: 8238 kb | Demo Go to category: System Utilities > Other Similar programs | |||
157. | Internet Cyclone 1.78 (geocities.com) | ||
ME, NT, 2000 and XP designed to automatically optimize your Windows registry settings wich will boost your Internet connection up to | |||
Updated: 9, 2005 | Rating: 0 | Author: Iordache Daniel | Size: 1340 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
158. | Spyware Inoculator 2.0 (camtech2000.net) | ||
Inoculator installs what Microsoft refers to as 'kill bits' in the Registry that block the installation of known Web Based Spyware installations t cases will prevent those already installed from functioning. These include add on Toolbars, Dialers, so-called browser helpers, browser hijackers, key | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Campbell | Size: 2299 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
159. | AutoHotkey 1.0.20 (autohotkey.com) | ||
files more easily than in most other languages. - Work with the registry and INI files using the included interface commands. - Display simple tooltips and balloon tips. - Display dialog boxes to interact with the user. - Convert any script into an EXE that can be run on any computer. Script your own macros and hotkeys. Any key, mouse/joystick button, or combination can become a | |||
Updated: 9, 2005 | Rating: 254 | Author: Chris Mallett | Size: 1083 kb | Freeware Go to category: System Utilities > Automation Tools Similar programs | |||
160. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
- Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified address (or | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Fix registry software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|