|
||||||
|
||
|
Home > Registry software software |
Related keywords: software, Software, registry, RAD Software, free software, spy software, Registry, backup software, dating software, shopping cart software |
|
|
151. | Windows API Hooking SDK 2.15 (validtec.com) | ||
enables a large class of innovative extensions to existing binary software or existing system functions. Windows API Hooking SDK offers a dynamic link library for intercept and re-writing Win32 functions of system or applications. No need of drivers, No need of restarting windows, It makes you do | |||
Updated: 9, 2005 | Rating: 2181 | Author: James Chen | Size: 158 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
152. | DeployMaster 2.7.0 (jgsoft.com) | ||
no-nonsense installation builder that will deliver your software with a good first impression: a smooth installation. Computer novices enjoy its ability to install your software without asking any questions, while computer experts enjoy the control and feedback it offers when they click the | |||
Updated: 9, 2005 | Rating: 0 | Author: Jan Goyvaerts | Size: 1916 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
153. | System Key Wizard 2.1 (home.wol.co.za) | ||
is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a verity of fields. One line of code to protect your investment that is all. The component will auto create and show the demo pop up screen if an demo key is in use, the demo pop up screen is totally customizable from the components published | |||
Updated: 9, 2005 | Rating: 16 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
154. | System Key Wizard 2.1 (continuumq.com) | ||
is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a variety of fields. One line of code to protect your investment that is all. The component will auto create and show the demo pop up screen if an demo key is in use, the demo pop up screen is totally customizable from the components published | |||
Updated: 9, 2005 | Rating: 0 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
155. | Copysafe Pro 2.0 (artistscope.com) | ||
messages, picture frames, batch file import and processing, multi-registry for use on several domains, import images by the folder and batch process more than 3,000 images at a time. The most important area that image encryption will protect is the downloading of graphics using spiders and site grabbers. Encrypted images are safe because the image files on the server cannot be | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 3722 kb | Demo Go to category: Web Development > HTML Tools Similar programs | |||
156. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to a specified shared resource in LAN environment) for further inspection and analysis. The important advantage of PC | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
157. | BPS Windows Trace Remover 6.0.0.0 (bulletproofsoft.com) | ||
feature allows you to easily assign any files, folders, registry entries to be cleaned. Surf With Security ? Do you cavort around your neighborhood, passing out your credit card numbers and telling strangers your intimate secrets? No, right? (Right?) But that's essentially what you're doing. After all, your browser history, cookies, and cache could be dangerous weapons | |||
Updated: 9, 2005 | Rating: 16 | Author: bulletproof soft | Size: 4982 kb | Shareware Go to category: Communications > E-Mail List Management Similar programs | |||
158. | Internet Cleaner 3.0.8 (softneoweb.com) | ||
at the specified time intervals. Internet Cleaner is a trial software, you can download and evaluate it free of charge for the period of 30 days. Remove all traces of your computer activity (including recently visited sites, browser cache and cookies, Start menu history, documents history etc.) and free the hard drive space by erasing the Scandisk file fragments and emptying the | |||
Updated: 2, 2006 | Rating: 0 | Author: Serge Vinogradov | Size: 1217 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
159. | Internet Cyclone 1.78 (geocities.com) | ||
e-mailing, online gaming, chat and all other Internet related software utilities by preventing the data fragmentation during transmission. Internet Cyclone is a powerfull, easy-to-use, Internet Optimizer for Windows 95, 98, ME, NT, 2000 and XP designed to automatically optimize your Windows registry settings wich will boost your Internet connection up to | |||
Updated: 9, 2005 | Rating: 0 | Author: Iordache Daniel | Size: 1340 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
160. | JBMail 3.2 (jbmail.pc-utils.com) | ||
e-mail client that supports SSL/TLS encrypted POP3 and SMTP. The software has been designed for simplicity, security and on-line mailbox access meaning that mail is manipulated remotely and NOT stored locally. Delete spam or large attachments without having to first download them! This portable software does not require installation, registry keys or even temporary | |||
Updated: 9, 2005 | Rating: 0 | Author: Jem Berkes | Size: 554 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
|
Home > Registry software software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|