Software Downloads | Home | Submit | Latest News | Category | Contact us |
Search for removing Keylogger Hunter 2.12 in Alexander G. Styopkin Utility for blocking the activity of keyboard monitoring programs presumably running on your PC. Neutralizes up to 90% of keyloggers, depriving them of information about the pressed keys. Keylogger Hunter was created, which paralyzes accumulation of information by Hook-based keyloggers. This program is neither a detector, nor a disabler of keyloggers; it paralyzes the principle of keylogger functioning, based on Hooks.Removing Whiteheads 1.0 in Flawless Complexion A whitehead is a collection of sebum and keratin that plugs the opening of the pilosebaceous unit (skin pore) and imbeds itself in the follicular canal under the skin so that it looks like a raised, white bump. It is also often called as a closed comedone. The whiteheads appear in the form of tiny, pearly, white raised spots. They are common on the area just above the cheekbone, nose, or where the skin is fine.Prosto Disk Cleaner 2.2 in Prosto Software There are numerous well-hidden duplicates, temporary files, and many other types of files that are crucial to the system and that you often don't even see. That "garbage" piles up on your hard disk, eats up the free space and slows your computer downmultiblocks 1.00 in zerodoso You enter the world of blocks with new unique gameplay, advanced 3d graphics and high quality sound. It consists of 6 completely different games with one common aim: to remove blocks. Gameplay is changed radically by adding "splited round" and combos. Now there are many ways to gain points. Dynamism of the game is increased by graphics and moves of camera. It developes imagination, reflex and guarantees hours of a good time. Really absorbing!Duplicate Remover for Microsoft Excel 1.0 in Add-in Express Ltd. With this handy add-in you can easily find and remove duplicates or unique records from Microsoft Excel lists or tables. Search for duplicates in one range or compare two lists with different number of columns, choose columns for comparison. You can delete duplicates from any range, select, color, copy or move them to another location (new workbook, new/existing worksheet). It works with Microsoft Excel 2007, 2003, 2002, 2000.Red Eye Pilot for Mac 1.60 in Two Pilots Using Red Eye Pilot, you can remove red eyes from your photos with just a couple of clicks. You can adjust the pupil area and brightness, and preview the results real-time. The program keeps structure of the pupil.Advanced Tracks Cleaner 1.9 in Winsoul Software Advanced Tracks Cleaner is a powerful tool for your protection. Every day when you work on a computer, Windows keeps track of your activities on the computer, when you are connected to the Internet, the web browser you are using leaves many traces of your activity on the Internet, even software you use also leaves traces. All these traces after your work on the computer might be used by other people against you. Therefore Advanced Tracks CleanerCloneMaster 3.13 in SoftByte Labs CloneMaster will clean your hard drive of duplicate files. It searches for TRUE duplicate files (byte for byte). It does not find duplicates by filename, date, size or CRC. It does so by comparing the file data itself ensuring 100% accuracy. CloneMaster uses a special algorithm that makes the scan extremely fast. CloneMaster find duplicates in multiple paths, backups drive, drives, Hard drive, Floppy, USB Stick, Jaz, ZIP, CDROM, DVD, Network etctextonly 1.1 in CrookedBush.com Inc. This script automatically converts pages on your site to 'text only' on the fly for those who want faster access and don't have a quick modem. It maintains most links within the site, removing images and table tags and doesn't harm links outside of the site. Simply put a link to the script on each page, and the script does the rest. It reads the data on the page, removing non-text information.BPS Spyware and Adware Remover 9.3.0.1 in Bullet Proof Soft BPS Spyware/Adware Remover is the fastest scanning techniques in the market. It will protect your PC from the thousands of SpyWare and AdWare internet surfers come across. In addition BPS Spyware/Adware Remover have the ability to manage the infected lists so the user can take an action later without performing a new scan. A set of scan options is proviided so the user can highly customize the program.Duplicate File Finder & Remover 7.0 in Sobolsoft Find and delete duplicate and similar files on your computer. You decide which dupe files are safely sent to the Recycling Bin. Search and remove doubles / multiples of your image, media and any other type of files.System Optimizer And Tweaker 1.2.0.0 in Malware Remover With System Optimizer And Tweaker you can control your Windows system ,it includes many powerful tweaks and hidden Registry settings. The simple user interface enables fast access to settings that affect the speed, security, efficiency, and convenience of your computer, System Tweaker And Optimizer also includes tweaks for many known software applications,Win Tweak Manager is the best utility for modifying system settings.DupeWatcher 2.3 in Resonantsoft DupeWatcher is a profile based powerful duplicate file finder for Windows. It can detect duplicate files irrespective of file names using CRC32 or MD5 content match algorithms. It can also detect duplicate files based on file name, size, create or modified date. It has option to exclude System, Read-only, Hidden files and zero byte files from duplicate search. A powerful filter helps to include or exclude specific file groups or file types.Lavrov's Virtual Disk Library 1.0 in Lavrov's Company A virtual disk library can be used in any application written using Visual C++, Visual Basic, Visual C#, Borland Delphi and C++ Builder. Using this library you can keep all application files in a single file on the hard disk. The library looks like MS IStorage mechanism but is more powerful, flexible and it's performance is better. Also, all library functions are in a single DLL - VirtualDiskDll.dll.Secure Clean PC 2.11 in SoftFolder Inc When you work on your computer it records the information traces of all your actions which may be used against you. When you log in next time, you don't need to type again the user names, passwords, credit card information, and so on. The information that you may consider as confidential is kept on your computer unprotected and may be recovered by people with some minimal computer knowledge. Remove unwanted evidence from PC for security!
|