|
||||||
|
||
|
Home > Cleanup registry software |
Related keywords: registry, cleanup, Registry, registry cleaner, registry fix, system registry, registry monitor, windows registry, registry editor, windows registry cleaner |
|
|
161. | IE Privacy Keeper 2.7 (unhsolutions.net) | ||
you to keep selective history items to conceal the fact of the cleanup. IE Privacy Keeper has a secure deletion feature to prevent data recovery. You can specify custom files and registry keys to delete. IE Privacy Keeper is absolutely free! Get it now and forget about online privacy issues! Simple, fast and efficient browsing history cleaner for Internet Explorer and Mozilla | |||
Updated: 9, 2005 | Rating: 71 | Author: Eugene Plokhov | Size: 1025 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
162. | JBMail 3.2 (jbmail.pc-utils.com) | ||
download them! This portable software does not require installation, registry keys or even temporary files. JBMail can be run from a CD or floppy disk, yet it has all the essential mail client features including attachment support, advanced junk filtering, address books, and defenses against | |||
Updated: 9, 2005 | Rating: 0 | Author: Jem Berkes | Size: 554 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
163. | Spyware Inoculator 2.0 (camtech2000.net) | ||
from ever being installed in the first place? Spyware Inoculator's "Set it and Forget it" feature accomplishes just that. Most Spyware is installed over the Internet by using ActiveX Controls which are basically the same thing as a web site running a program (.exe) from their site on your PC. Spyware Inoculator installs what Microsoft refers to as 'kill bits' in the Registry | |||
Updated: 9, 2005 | Rating: 0 | Author: Jerry Campbell | Size: 2299 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
164. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
- Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified address (or | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
165. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
- Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified address (or | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
166. | Always Right 3.0 (superhunter.net) | ||
a number of software installations and un-installtions, the registry becomes full of nagging file reference pointing to where the files used to reside but no longer exist. Always Right will find any files and folders that may have been moved on your hard drive and help you correct registry entries that point to them. And while the time past, your hard drive will have a lot of | |||
Updated: 9, 2005 | Rating: 38 | Author: super hunter | Size: 2310 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
167. | Backup-2006 Studio 5.0.1.200 (backup2001.com) | ||
backup sets (My emails, My documents, My Emails, Windows Shell and Registry). From the catalog you can search for files without opening each individual archive file. Backup-2006 Studio interface uses the Office 11 look and feel. Backup-2006 Disk Image allows to create entire partition image. Image file can be compressed and or encrypted. It can also replicate one partition to | |||
Updated: 2, 2006 | Rating: 42 | Author: RD Technologies Inc | Size: 15065 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
168. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
- Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified address (or | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
169. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
- Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified address (or | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
170. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
- Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified address (or | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Cleanup registry software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|