|
||||||
|
||
|
Home > Aim software |
|
|
1. | Registry Clean Expert 3.69 (registry-clean.net) | ||
Registry Clean Expert scans the Windows registry and finds incorrect or obsolete information in the registry. By fixing these obsolete information in Windows registry, your system will run faster and error free. The backup/restore function of the tool let you backup your whole Windows Registry so you can use | |||
Updated: 3, 2006 | Rating: 99 | Author: Rick Davis | Size: 815 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
2. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
3. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
4. | 007 Spy Software 3.86 (e-spy-software.com) | ||
keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just like a surveillance camera directly point at the computer monitor. Features include start and stop scheduling, logs remote delivery, stealth mode, user filter, password protection, suspend on idle, HTML report, logs sorting and searching, etc. With this powerful tool | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | Duplicate Email Remover 2.11.0 (mailutilities.com) | ||
Duplicate E-mail Remover is powerful and flexible tool intended for the search and processing of duplicated mail messages in Microsoft Outlook folders. DER processes both email messages and posts in mail-type Microsoft Outlook folders. You can use Duplicate E-mail Remover to find mail message copies both in | |||
Updated: 3, 2006 | Rating: 0 | Author: Andrey Manchuk | Size: 2218 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
6. | Duplicates Remover for Outlook 2.4.0 (mapilab.com) | ||
Duplicates Remover for Outlook is a powerful and flexible tool intended for the search and processing of duplicates in Microsoft Outlook folders. DRO process contacts, notes, tasks, journal and calendar items and appropriate type Microsoft Outlook folders. You can use DRO to find duplicates both in one folder | |||
Updated: 3, 2006 | Rating: 91 | Author: Andrey Manchuk | Size: 2411 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
7. | Duplicate Email Remover 2.11.0 (mapilab.com) | ||
Duplicate E-mail Remover is powerful and flexible tool intended for the search and processing of duplicated mail messages in Microsoft Outlook folders. DER processes both email messages and posts in mail-type Microsoft Outlook folders. You can use Duplicate E-mail Remover to find mail message copies both in | |||
Updated: 3, 2006 | Rating: 0 | Author: Andrey Manchuk | Size: 2218 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
8. | Super Utilities 6.25 (superlogix.net) | ||
Super Utilities offers 26 tools for fixing, speeding up, maintaining, and protecting your PC. It encompasses four suites of utilities: System Cleaner, Privacy Protector, System Maintenance, and Special Utilities. 1.System Cleaner features a spyware-removal component as well as tools for cleaning your disk and | |||
Updated: 3, 2006 | Rating: 16 | Author: li jiangnan | Size: 3328 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
9. | System Cleaner 5.01c (pointstone.com) | ||
Your PC is slowing down. Programs don't run as fast as they used to; it takes longer to boot up in the morning and sometimes it takes forever to shut down at the end of the day. Don't worry, you're not alone. These kinds of things happen to all PCs eventually. It's not your fault. Your PC needs an | |||
Updated: 3, 2006 | Rating: 0 | Author: Steven Martins | Size: 2455 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
10. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
11. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
12. | Clean Disk Security 7.54 (diskcleaners.com) | ||
This program gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk | |||
Updated: 3, 2006 | Rating: 16 | Author: Kevin Solway | Size: 660 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
13. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
14. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
15. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
16. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
17. | Logan's fight 3.00 (yildun.com) | ||
In the year 2010 aliens start invasion on Earth. Europe fell down under superior aliens tehnical power and now the target is USA. Before total destruction of town only two man succeeded to escap and one of them was: LOGAN, PROFESSION: MUJAHADEEN He must go deep in Amazon jungle and find an aliens tehnical power and now the target is USA. Before total destruction of town only two man succeeded to escap and one of them was: LOGAN, PROFESSION: MUJAHADEEN | |||
Updated: 3, 2006 | Rating: 39 | Author: Samir Alicehajic | Size: 3239 kb | Shareware Go to category: Games & Entertainment > Action Similar programs | |||
18. | Logan's fight 3.00 (yildun.com) | ||
In the year 2010 aliens start invasion on Earth. Europe fell down under superior aliens tehnical power and now the target is USA. Before total destruction of town only two man succeeded to escap and one of them was: LOGAN, PROFESSION: MUJAHADEEN He must go deep in Amazon jungle and find an aliens tehnical power and now the target is USA. Before total destruction of town only two man succeeded to escap and one of them was: LOGAN, PROFESSION: MUJAHADEEN | |||
Updated: 3, 2006 | Rating: 0 | Author: Samir Alicehajic | Size: 3239 kb | Shareware Similar programs | |||
19. | Total Privacy 5.01 (pointstone.com) | ||
You know what you've been doing with your computer, but that doesn't mean that anyone else has to! Total Privacy is a safe and easy-to-use to use privacy protection tool that stops all those pesky snoopers such as Cookies, history, cache, index.dat, competitors (and even your boss!) from finding the trail of | |||
Updated: 3, 2006 | Rating: 42 | Author: Steven Martins | Size: 2551 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
20. | ESBPCS for VCL 4.2.2 (esbconsult.com) | ||
for Borland Delphi 5, 6, 7, 2005/Win32 and BDS2006/Win32, which are aimed at making "data entry and manipulation easier" for Developers and their Customers. Components included cover Integer Edits, Float Edits, Hex Edits, IP Address Edits, Percentage Edits, Date Edits, Time Edits, Date/Time Edits, Month Edits, Time Edits, Complex Edits, Fraction Edits, Currency Edits, Calculator | |||
Updated: 2, 2006 | Rating: 0 | Author: Glenn Crouch | Size: 17011 kb | Shareware Go to category: Development > Delphi Similar programs | |||
|
Home > Aim software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|