|
||||||
|
||
|
Home > Destroy software |
Related keywords: search and destroy spybot, spybot search and destroy, destroy surfing traces, destroy sap, destroy data |
|
|
791. | Alloy 4.3.21.2005c (pgware.com) | ||
Alloy is a programming tool which allows the developer to embed all dependent files within the programmers main exe file. Users of Visual Basic and Visual DialogScript will find Alloy very useful as well as other programmers. When you need to integrate in runtime files or other files such as bitmaps, wav | |||
Updated: 3, 2006 | Rating: 191 | Author: PGWARE LLC | Size: 1403 kb | Shareware Go to category: Development > Install & Setup Similar programs | |||
792. | Kickstart 1.02 (westfaro.com) | ||
Kickstart is a powerful tool for DBAs and software developers. It lets you write scripts using a simple Basic like language to generate database objects for every table in a Database schema. For example, you might have developed a robust Oracle stored procedure that inserts rows into a particular database as | |||
Updated: 9, 2005 | Rating: 298 | Size: 7069 kb | Commercial Go to category: Development > Other Similar programs | |||
793. | Hard Angel 1.05 (kpot.8bit.co.uk) | ||
The virus has injured 500000 computers and many computers have been destroyed as a result of reprogramming Flash-memory. Now owners of motherboards lock it but this problem is actual for hard disks. Hard Angel is jumper for your hard drive. Protect your hard drive with a Hard Angel! The Hard Angel is | |||
Updated: 9, 2005 | Rating: 401 | Author: Ozerov Evgeny | Size: 300 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
794. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
free space wiper, you can even use Mutilate as a file remover to destroy previously deleted files on your hard drive. And, you can store up to thirteen folders in Power Mutilator for quick access to files or folders you target routinely. Mutilate File Wiper is an easy to use file eraser that shreds sensitive files so they cannot be recovered or undeleted. For additional security | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
795. | NetWorx 3.2 (softperfect.com) | ||
NetWorx is a simple, yet powerful tool that helps you objectively evaluate your bandwidth situation. You can use it to collect bandwidth usage data and measure the speed of your Internet or any other network connection. NetWorx can help you identify possible sources of network problems, ensure that you don't | |||
Updated: 9, 2005 | Rating: 16 | Author: Andrey Kotov | Size: 982 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
796. | Npust Homepage Guard 1.08 (npust.com) | ||
A really small anti spyware, It protects the IE Home page, Prevents the hijacking of your browser. Even if somebody already change it, this tool can change it back automatically, Download this Great Freeware now and you will be protected forever - no more ie Home page hijack ! presented by the Npust software | |||
Updated: 9, 2005 | Rating: 0 | Author: GARY KUO | Size: 396 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
797. | Pad 4.00 (hds-pad.com) | ||
Pad is the world's first powerful text and HTML editor to include both an image viewer and a word processing function. It will work with Windows(tm) 9x, NT, 2000, ME and XP. The new text editor provides syntax highlighting, unlimited undo and redo, a powerful search and replace engine with regular | |||
Updated: 9, 2005 | Rating: 39 | Author: Heiko Webers | Size: 1335 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
798. | PC Activity Monitor Lite 7.3 (spy-soft.biz) | ||
hidden, and even the experienced user cannot locate, stop or destroy the program. PC Acme Lite ensures registration of the following events: typing; clipboard operation; application start and termination (from the moment of OS loading); mouse manipulation; opening and close of windows. Additionally, when windows are opened and closed the following information | |||
Updated: 9, 2005 | Rating: 139 | Author: Dmitry Bulat | Size: 2888 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
799. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
hidden, and even the experienced user cannot locate, stop or destroy the program. PC Acme Lite ensures registration of the following events: typing; clipboard operation; application start and termination (from the moment of OS loading); mouse manipulation; opening and close of windows. Additionally, at opening and closing windows the following information is | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
800. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
hidden, and even the experienced user cannot locate, stop or destroy the program. PC Acme Standard ensures registration of the following events: typing; clipboard operation; application start and termination (from the moment of OS loading); mouse manipulation; opening and close of windows. Additionally, at opening and closing windows the following information is | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Destroy software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|