|
||||||
|
||
|
Home > Registry software |
Related keywords: registry cleaner, registry fix, system registry, registry monitor, windows registry, registry editor, windows registry cleaner, registry tool, registry clean, registry security |
|
|
161. | Internet Cyclone 1.78 (geocities.com) | ||
ME, NT, 2000 and XP designed to automatically optimize your Windows registry settings wich will boost your Internet connection up to | |||
Updated: 9, 2005 | Rating: 0 | Author: Iordache Daniel | Size: 1340 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
162. | Internet Sweeper Pro 4.00 (LadybugSoft.com) | ||
Pro Includes a free plugin creator, where your can erase files and Registry entries for most third-party programs. With Internet Sweeper Pro's Securely Erasing feature enabled, Internet Sweeper Pro will overwrite files a set number of times with random data, and others cannot recover or undelete | |||
Updated: 9, 2005 | Rating: 0 | Author: Geoffrey Callaghan | Size: 1732 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
163. | JBMail 3.2 (jbmail.pc-utils.com) | ||
download them! This portable software does not require installation, registry keys or even temporary files. JBMail can be run from a CD or floppy disk, yet it has all the essential mail client features including attachment support, advanced junk filtering, address books, and defenses against | |||
Updated: 9, 2005 | Rating: 0 | Author: Jem Berkes | Size: 554 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
164. | BPS Windows Trace Remover 6.0.0.0 (bulletproofsoft.com) | ||
feature allows you to easily assign any files, folders, registry entries to be cleaned. Surf With Security ? Do you cavort around your neighborhood, passing out your credit card numbers and telling strangers your intimate secrets? No, right? (Right?) But that's essentially what you're doing. After all, your browser history, cookies, and cache could be dangerous weapons | |||
Updated: 9, 2005 | Rating: 16 | Author: bulletproof soft | Size: 4982 kb | Shareware Go to category: Communications > E-Mail List Management Similar programs | |||
165. | Copysafe Pro 2.0 (artistscope.com) | ||
messages, picture frames, batch file import and processing, multi-registry for use on several domains, import images by the folder and batch process more than 3,000 images at a time. The most important area that image encryption will protect is the downloading of graphics using spiders and site grabbers. Encrypted images are safe because the image files on the server cannot be | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 3722 kb | Demo Go to category: Web Development > HTML Tools Similar programs | |||
166. | LottoMaster (6 aus 49) 1.00 (OnlineTimer.de) | ||
zusätzlichen Dateien und schreibt keine Einträge in win.ini oder Registry. Über Anregungen würde ich mich sehr freuen. Kopieren Sie dieses Freeware-Tool ruhig Ihren Freunden und Bekannten. Kontakte --- Aktuelle Versionen erhalten Sie unter http://www.aborange.de mailto: info@winsplit.de Sie möchten nicht immer jede Woche die gleichen Lottozahlen tippen und Ihnen fallen nicht | |||
Updated: 9, 2005 | Rating: 0 | Author: Jochen Milchsack | Size: 315 kb | Freeware Go to category: Games & Entertainment > Board Similar programs | |||
167. | SWFKit 2.1 (swfkit.com) | ||
and receiving email,reading and writing file, accessing system registry, playing and recording multimedia, embedding an ActiveX control, printing,invoking dll,manipulating images and more features you can get the full list from our site. In a word, with the easy scripting language FFish Script, you can get the power provided only by the advance programming languages such as VC, VB | |||
Updated: 9, 2005 | Rating: 42 | Author: Qunzhi Zhang | Size: 7400 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
168. | System Key Wizard 2.1 (home.wol.co.za) | ||
with your own messages. 7. You can specify the name of the registry key you want to use. 8. Encryptkey prevents other users of the component from decrypting your keys. 9. The component is data aware. This is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a verity of fields. One line of code | |||
Updated: 9, 2005 | Rating: 16 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
169. | System Key Wizard 2.1 (continuumq.com) | ||
with your own messages. 7. You can specify the name of the registry key you want to use. 8. Encryptkey prevents other users of the component from decrypting your keys. 9. The component is data aware. This is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a variety of fields. One line of code | |||
Updated: 9, 2005 | Rating: 0 | Author: Morne Rossouw | Size: 3731 kb | Shareware Go to category: Development > Delphi Similar programs | |||
170. | DeployMaster 2.7.0 (jgsoft.com) | ||
The no-nonsense installation builder that will deliver your software with a good first impression: a smooth installation. Computer novices enjoy its ability to install your software without asking any questions, while computer experts enjoy the control and feedback it offers when they click the Advanced | |||
Updated: 9, 2005 | Rating: 0 | Author: Jan Goyvaerts | Size: 1916 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
|
Home > Registry software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|