|
||||||
|
||
|
Home > Aim software |
|
|
1. | Registry Clean Expert 3.69 (registry-clean.net) | ||
Registry Clean Expert scans the Windows registry and finds incorrect or obsolete information in the registry. By fixing these obsolete information in Windows registry, your system will run faster and error free. The backup/restore function of the tool let you backup your whole Windows Registry so you can use | |||
Updated: 3, 2006 | Rating: 99 | Author: Rick Davis | Size: 815 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
2. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
3. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
4. | Winged Warrior 2.3a (datawaregames.com) | ||
Here's an adventure you don't want to miss! This is the first of the three RPG games in the Winged Warrior series. In this role-playing game, it is your duty as a warrior to restore peace to the kingdom. You do this by gathering information from the people you meet, training to become a powerful warrior, and | |||
Updated: 3, 2006 | Rating: 0 | Author: T. Morris | Size: 522 kb | Shareware Go to category: Games & Entertainment > Kids Similar programs | |||
5. | Winged Warrior II 2.3a (datawaregames.com) | ||
Continue your journeys as the Winged Warrior in the second of the three RPG games in the Winged Warrior series. In this adventure, you travel to a new land to aid your alien neighbors who have fallen into the hands of an evil emperor. Explore this new world by seeking help from those willing to assist you | |||
Updated: 3, 2006 | Rating: 0 | Author: T. Morris | Size: 293 kb | Shareware Go to category: Games & Entertainment > Kids Similar programs | |||
6. | Winged Warrior III 2.3a (datawaregames.com) | ||
Winged Warrior III is the third role playing game in the series. In this adventure, the Winged Warrior must stop a mysterious, metallic armored foe who is attacking the Alien World with magic. But, this is very strange, since magic cannot be used on the Alien World. Once again, the Winged Warrior must save | |||
Updated: 3, 2006 | Rating: 0 | Author: T. Morris | Size: 592 kb | Shareware Go to category: Games & Entertainment > Kids Similar programs | |||
7. | Quest Creator 2.4a (datawaregames.com) | ||
A game maker in which you can easily create your own adventures in mythical, medieval settings. Using preset or custom characters, set up worlds in which you control the plot, action, and difficulty of the game. A variety of graphic images are included for you to use with Quest Creator such as these enemies | |||
Updated: 3, 2006 | Rating: 320 | Author: T. Morris | Size: 1259 kb | Shareware Go to category: Games & Entertainment > Strategy & War Games Similar programs | |||
8. | QuadQuest 2.3a (datawaregames.com) | ||
QuadQuest is a turn-based strategy adventure game in which you play four quests. Each quest has its own hero, but you choose the five party members that will accompany the hero. Battle more than 100 different enemies in medieval, mythical lands. Select from more than 100 different items when equipping your | |||
Updated: 3, 2006 | Rating: 0 | Author: T. Morris | Size: 1432 kb | Shareware Go to category: Games & Entertainment > Strategy & War Games Similar programs | |||
9. | 007 Spy Software 3.86 (e-spy-software.com) | ||
keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just like a surveillance camera directly point at the computer monitor. Features include start and stop scheduling, logs remote delivery, stealth mode, user filter, password protection, suspend on idle, HTML report, logs sorting and searching, etc. With this powerful tool | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
10. | Duplicate Email Remover 2.11.0 (mailutilities.com) | ||
Duplicate E-mail Remover is powerful and flexible tool intended for the search and processing of duplicated mail messages in Microsoft Outlook folders. DER processes both email messages and posts in mail-type Microsoft Outlook folders. You can use Duplicate E-mail Remover to find mail message copies both in | |||
Updated: 3, 2006 | Rating: 0 | Author: Andrey Manchuk | Size: 2218 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
11. | Duplicates Remover for Outlook 2.4.0 (mapilab.com) | ||
Duplicates Remover for Outlook is a powerful and flexible tool intended for the search and processing of duplicates in Microsoft Outlook folders. DRO process contacts, notes, tasks, journal and calendar items and appropriate type Microsoft Outlook folders. You can use DRO to find duplicates both in one folder | |||
Updated: 3, 2006 | Rating: 91 | Author: Andrey Manchuk | Size: 2411 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
12. | Duplicate Email Remover 2.11.0 (mapilab.com) | ||
Duplicate E-mail Remover is powerful and flexible tool intended for the search and processing of duplicated mail messages in Microsoft Outlook folders. DER processes both email messages and posts in mail-type Microsoft Outlook folders. You can use Duplicate E-mail Remover to find mail message copies both in | |||
Updated: 3, 2006 | Rating: 0 | Author: Andrey Manchuk | Size: 2218 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
13. | Super Utilities 6.25 (superlogix.net) | ||
Super Utilities offers 26 tools for fixing, speeding up, maintaining, and protecting your PC. It encompasses four suites of utilities: System Cleaner, Privacy Protector, System Maintenance, and Special Utilities. 1.System Cleaner features a spyware-removal component as well as tools for cleaning your disk and | |||
Updated: 3, 2006 | Rating: 16 | Author: li jiangnan | Size: 3328 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
14. | System Cleaner 5.01c (pointstone.com) | ||
Your PC is slowing down. Programs don't run as fast as they used to; it takes longer to boot up in the morning and sometimes it takes forever to shut down at the end of the day. Don't worry, you're not alone. These kinds of things happen to all PCs eventually. It's not your fault. Your PC needs an | |||
Updated: 3, 2006 | Rating: 0 | Author: Steven Martins | Size: 2455 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
15. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
16. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
17. | Clean Disk Security 7.54 (diskcleaners.com) | ||
This program gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk | |||
Updated: 3, 2006 | Rating: 16 | Author: Kevin Solway | Size: 660 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
18. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
19. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
20. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
21. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
22. | Logan's fight 3.00 (yildun.com) | ||
In the year 2010 aliens start invasion on Earth. Europe fell down under superior aliens tehnical power and now the target is USA. Before total destruction of town only two man succeeded to escap and one of them was: LOGAN, PROFESSION: MUJAHADEEN He must go deep in Amazon jungle and find an aliens tehnical power and now the target is USA. Before total destruction of town only two man succeeded to escap and one of them was: LOGAN, PROFESSION: MUJAHADEEN | |||
Updated: 3, 2006 | Rating: 39 | Author: Samir Alicehajic | Size: 3239 kb | Shareware Go to category: Games & Entertainment > Action Similar programs | |||
23. | Logan's fight 3.00 (yildun.com) | ||
In the year 2010 aliens start invasion on Earth. Europe fell down under superior aliens tehnical power and now the target is USA. Before total destruction of town only two man succeeded to escap and one of them was: LOGAN, PROFESSION: MUJAHADEEN He must go deep in Amazon jungle and find an aliens tehnical power and now the target is USA. Before total destruction of town only two man succeeded to escap and one of them was: LOGAN, PROFESSION: MUJAHADEEN | |||
Updated: 3, 2006 | Rating: 0 | Author: Samir Alicehajic | Size: 3239 kb | Shareware Similar programs | |||
24. | Total Privacy 5.01 (pointstone.com) | ||
You know what you've been doing with your computer, but that doesn't mean that anyone else has to! Total Privacy is a safe and easy-to-use to use privacy protection tool that stops all those pesky snoopers such as Cookies, history, cache, index.dat, competitors (and even your boss!) from finding the trail of | |||
Updated: 3, 2006 | Rating: 42 | Author: Steven Martins | Size: 2551 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
25. | ESBPCS for VCL 4.2.2 (esbconsult.com) | ||
for Borland Delphi 5, 6, 7, 2005/Win32 and BDS2006/Win32, which are aimed at making "data entry and manipulation easier" for Developers and their Customers. Components included cover Integer Edits, Float Edits, Hex Edits, IP Address Edits, Percentage Edits, Date Edits, Time Edits, Date/Time Edits, Month Edits, Time Edits, Complex Edits, Fraction Edits, Currency Edits, Calculator | |||
Updated: 2, 2006 | Rating: 0 | Author: Glenn Crouch | Size: 17011 kb | Shareware Go to category: Development > Delphi Similar programs | |||
26. | ESBPCS for VCL 4.2.2 (esbconsult.com.au) | ||
for Borland Delphi 5, 6, 7, 2005/Win32 and BDS2006/Win32, which are aimed at making "data entry and manipulation easier" for Developers and their Customers. Components included cover Integer Edits, Float Edits, Hex Edits, IP Address Edits, Percentage Edits, Date Edits, Time Edits, Date/Time Edits, Month Edits, Time Edits, Complex Edits, Fraction Edits, Currency Edits, Calculator | |||
Updated: 2, 2006 | Rating: 0 | Author: Glenn Crouch | Size: 17011 kb | Shareware Go to category: Development > Delphi Similar programs | |||
27. | Photolightning photo software 4.2 (photolightning.com) | ||
Photolightning is the ultimate photo software for both home and business digital camera users. It's the easiest and fastest way to print, email, and enhance your digital photos. Photolightning is so simple that even beginners can make great photo prints, send emails without attachments, create slide shows | |||
Updated: 2, 2006 | Rating: 0 | Author: Dan Slavin | Size: 5316 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
28. | KLS Backup 2006 Professional 1.9.0.0 (kls-soft.com) | ||
KLS Backup 2006 Professional is a powerfull backup, synchronization and disk cleaner program that allows you to back up or synchronize your data to local and network drives or FTP server. The cleanup feature is a complete solution to backup and clean private data and free up disk space. The backup files can | |||
Updated: 2, 2006 | Rating: 0 | Author: Levente Kiri | Size: 4083 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
29. | EF Commander 5.00 (efsoftware.com) | ||
File manager, features include: * Two file windows side by side. * Task list to switch to any active program. * Configurable button bar to start external programs or internal menu commands. Supports full parameter lists. * Supports extended Drag & Drop with the mouse over the entire desktop. * Extended | |||
Updated: 2, 2006 | Rating: 75 | Author: Emil Fickel | Size: 3607 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
30. | Privacy Defender 7.0.2t (synergeticsoft.com) | ||
Internet Vulnerability Profiling and Removing tool-Privacy Defender is a security tool that helps you protect your privacy by removing all evidence of previously downloaded music, video files, images stored in your PC. It gets rid of the data that will remain on your hard drive even after reformatting | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Anikin | Size: 433 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
|
Home > Aim software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|