|
||||||
|
||
|
Home > Modification software |
Related keywords: voice modification, visible light modification, modification date, last modification date |
|
|
61. | TweakRAM 5.3.11.3 (elcor.net) | ||
defragment system memory for faster access time. TweakRAM doesn't modify your system in any way and your system will be even more stable with TweakRAM installed. No matter how much physical memory you have, TweakRAM will help keep your computer running faster and efficiently. TweakRAM is a handy memory optimizer tool that will keep your computer running faster and efficiently. It | |||
Updated: 2, 2006 | Rating: 110 | Author: Nick Nifontov | Size: 1635 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
62. | Stealth Folder Hide XP 9.3 (folder-hider-stealth.com) | ||
With Stealth Folder, folders and files can't be deleted, viewed, modified, or run. Stealth Folder Operates in Stealth mode, special hotkey is required to pull it up. Stealth Folder is not visible in Start, Toolbar, Taskbar, Add/Remove Programs or CTL ALT DEL.. Stealth Folder is Password Protected and | |||
Updated: 2, 2006 | Rating: 0 | Author: Ben Nelson | Size: 540 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
63. | SpyBuddy 3.7 (exploreanywhere.net) | ||
every document printed, every file or folder renamed and/or modified, all text and images sent to the clipboard, every keystroke pressed, every password typed, and more! SpyBuddy is a powerful monitoring and surveillance suite for PC's. SpyBuddy will record all PC and Internet browsing habits for you to review at a later date and time. Perfect for monitoring spouses and | |||
Updated: 2, 2006 | Rating: 82 | Author: Bryan Hammond | Size: 2347 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
64. | Folder Security Personal 3.5 (y0ys.com) | ||
completely or restrict access by making them read-only ,preventing modification or deletion by other users or programs. The program can also lock Floppy, CDrom, USB sticks, and other removable drives or make them read-only. It works with drive of all of FAT/FAT32/NTFS formats. This program can also repair and prevent malicious changes on most options of the Internet Explorer, such as | |||
Updated: 2, 2006 | Rating: 666 | Author: Y0YS Software | Size: 803 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
65. | RegSnap 5.8.1920 (lastbit.com) | ||
view, explore and compare saved snapshots and learn which keys were modified, deleted, or added|You can view, explore and compare saved registry snapshots and find which keys were modified, deleted, or added}{You can also analyze other sensitive system parts, such as a list of files in system directories|Also, you can analyze other system settings such as a contents of system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 768 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
66. | Reg Organizer 3.1 (chemtable.com) | ||
Extensive and extremely powerful set of Registry tools to safely modify the Windows Registry. It keeps track of changes made so they can easily be reverted. It includes many system optimizing, speed enhancing and resource freeing | |||
Updated: 2, 2006 | Rating: 0 | Author: Konstantin Polyakov | Size: 1440 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
67. | RandomScreen Deluxe 5.11 (anggogo.com) | ||
Randomscreen dexlue is composed of a screensaver runner and a wallpaper changer. You can use it customize the running of your screensaver and changing of your desktop wallpaper. Depending of your settings, it can run different screensaver(s) at different time, it can load flash and photos in screensaver. It | |||
Updated: 2, 2006 | Rating: 0 | Author: Sowen Zhang | Size: 1874 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
68. | Program Protector 2.1 (blumentals.net) | ||
This functionality is achieved using a special algorithm which modifies executable file of the application, so that it requires to enter valid password before program can start. Program Protector is very easy to use and does not require any special computer knowledge. Program Protector is unique, because unlike other protection software, it is safe against circumvention | |||
Updated: 2, 2006 | Rating: 0 | Author: Karlis Blumentals | Size: 1300 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
69. | Professional Renamer 2.35 (miklsoft.com) | ||
or two-digit value and allows a choice between the time of creation, modification, last access or any other user-set value. The same flexibility is in every attribute dialogue. The unique pattern thus created will be saved as a reusable template or exported into a file. The system of visual templates | |||
Updated: 2, 2006 | Rating: 0 | Author: Mihail Cherkashin | Size: 1144 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
70. | Printfil 4.3 (guolo.com) | ||
This software allows character based applications to print to any Windows printer, including USB, network printers, faxmodems and PDF writers, even if it is a Dos/Windows application or a Unix/Linux app. running on a Windows PC via telnet, without changes to the original applications. You can set your | |||
Updated: 2, 2006 | Rating: 1170 | Author: Davide Guolo | Size: 1007 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
|
Home > Modification software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|