|
||||||
|
||
|
Home > Aim software |
|
|
1. | Registry Clean Expert 3.69 (registry-clean.net) | ||
Registry Clean Expert scans the Windows registry and finds incorrect or obsolete information in the registry. By fixing these obsolete information in Windows registry, your system will run faster and error free. The backup/restore function of the tool let you backup your whole Windows Registry so you can use | |||
Updated: 3, 2006 | Rating: 99 | Author: Rick Davis | Size: 815 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
2. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
3. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
4. | 007 Spy Software 3.86 (e-spy-software.com) | ||
keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just like a surveillance camera directly point at the computer monitor. Features include start and stop scheduling, logs remote delivery, stealth mode, user filter, password protection, suspend on idle, HTML report, logs sorting and searching, etc. With this powerful tool | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | Duplicate Email Remover 2.11.0 (mailutilities.com) | ||
Duplicate E-mail Remover is powerful and flexible tool intended for the search and processing of duplicated mail messages in Microsoft Outlook folders. DER processes both email messages and posts in mail-type Microsoft Outlook folders. You can use Duplicate E-mail Remover to find mail message copies both in | |||
Updated: 3, 2006 | Rating: 0 | Author: Andrey Manchuk | Size: 2218 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
6. | Duplicates Remover for Outlook 2.4.0 (mapilab.com) | ||
Duplicates Remover for Outlook is a powerful and flexible tool intended for the search and processing of duplicates in Microsoft Outlook folders. DRO process contacts, notes, tasks, journal and calendar items and appropriate type Microsoft Outlook folders. You can use DRO to find duplicates both in one folder | |||
Updated: 3, 2006 | Rating: 91 | Author: Andrey Manchuk | Size: 2411 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
7. | Duplicate Email Remover 2.11.0 (mapilab.com) | ||
Duplicate E-mail Remover is powerful and flexible tool intended for the search and processing of duplicated mail messages in Microsoft Outlook folders. DER processes both email messages and posts in mail-type Microsoft Outlook folders. You can use Duplicate E-mail Remover to find mail message copies both in | |||
Updated: 3, 2006 | Rating: 0 | Author: Andrey Manchuk | Size: 2218 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
8. | Super Utilities 6.25 (superlogix.net) | ||
Super Utilities offers 26 tools for fixing, speeding up, maintaining, and protecting your PC. It encompasses four suites of utilities: System Cleaner, Privacy Protector, System Maintenance, and Special Utilities. 1.System Cleaner features a spyware-removal component as well as tools for cleaning your disk and | |||
Updated: 3, 2006 | Rating: 16 | Author: li jiangnan | Size: 3328 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
9. | System Cleaner 5.01c (pointstone.com) | ||
Your PC is slowing down. Programs don't run as fast as they used to; it takes longer to boot up in the morning and sometimes it takes forever to shut down at the end of the day. Don't worry, you're not alone. These kinds of things happen to all PCs eventually. It's not your fault. Your PC needs an | |||
Updated: 3, 2006 | Rating: 0 | Author: Steven Martins | Size: 2455 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
10. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
11. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
12. | Clean Disk Security 7.54 (diskcleaners.com) | ||
This program gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk | |||
Updated: 3, 2006 | Rating: 16 | Author: Kevin Solway | Size: 660 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
13. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
14. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
15. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
16. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
edit controls: - Window content of most chat clients (ICQ, AIM, Yahoo etc.) - Content of Internet browser window (Internet explorer) - Mail content, viewed by Microsoft Outlook and Microsoft Outlook Express - etc. - Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
17. | Logan's fight 3.00 (yildun.com) | ||
In the year 2010 aliens start invasion on Earth. Europe fell down under superior aliens tehnical power and now the target is USA. Before total destruction of town only two man succeeded to escap and one of them was: LOGAN, PROFESSION: MUJAHADEEN He must go deep in Amazon jungle and find an aliens tehnical power and now the target is USA. Before total destruction of town only two man succeeded to escap and one of them was: LOGAN, PROFESSION: MUJAHADEEN | |||
Updated: 3, 2006 | Rating: 39 | Author: Samir Alicehajic | Size: 3239 kb | Shareware Go to category: Games & Entertainment > Action Similar programs | |||
18. | Logan's fight 3.00 (yildun.com) | ||
In the year 2010 aliens start invasion on Earth. Europe fell down under superior aliens tehnical power and now the target is USA. Before total destruction of town only two man succeeded to escap and one of them was: LOGAN, PROFESSION: MUJAHADEEN He must go deep in Amazon jungle and find an aliens tehnical power and now the target is USA. Before total destruction of town only two man succeeded to escap and one of them was: LOGAN, PROFESSION: MUJAHADEEN | |||
Updated: 3, 2006 | Rating: 0 | Author: Samir Alicehajic | Size: 3239 kb | Shareware Similar programs | |||
19. | Total Privacy 5.01 (pointstone.com) | ||
You know what you've been doing with your computer, but that doesn't mean that anyone else has to! Total Privacy is a safe and easy-to-use to use privacy protection tool that stops all those pesky snoopers such as Cookies, history, cache, index.dat, competitors (and even your boss!) from finding the trail of | |||
Updated: 3, 2006 | Rating: 42 | Author: Steven Martins | Size: 2551 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
20. | ESBPCS for VCL 4.2.2 (esbconsult.com) | ||
for Borland Delphi 5, 6, 7, 2005/Win32 and BDS2006/Win32, which are aimed at making "data entry and manipulation easier" for Developers and their Customers. Components included cover Integer Edits, Float Edits, Hex Edits, IP Address Edits, Percentage Edits, Date Edits, Time Edits, Date/Time Edits, Month Edits, Time Edits, Complex Edits, Fraction Edits, Currency Edits, Calculator | |||
Updated: 2, 2006 | Rating: 0 | Author: Glenn Crouch | Size: 17011 kb | Shareware Go to category: Development > Delphi Similar programs | |||
21. | ESBPCS for VCL 4.2.2 (esbconsult.com.au) | ||
for Borland Delphi 5, 6, 7, 2005/Win32 and BDS2006/Win32, which are aimed at making "data entry and manipulation easier" for Developers and their Customers. Components included cover Integer Edits, Float Edits, Hex Edits, IP Address Edits, Percentage Edits, Date Edits, Time Edits, Date/Time Edits, Month Edits, Time Edits, Complex Edits, Fraction Edits, Currency Edits, Calculator | |||
Updated: 2, 2006 | Rating: 0 | Author: Glenn Crouch | Size: 17011 kb | Shareware Go to category: Development > Delphi Similar programs | |||
22. | Agent 2002 1.32 (axygames.com) | ||
Agent 2002 is a real masterpiece of arcade games with splendid animation and music! In this fascinating adventure you are the android with codename: Agent 2002. You must bring up presents to mazes of deep space. You face malicious cyber-guards with their skilful traps and only a tiny remote device, teleporter | |||
Updated: 2, 2006 | Rating: 0 | Author: Boris Bortnik | Size: 4556 kb | Shareware Similar programs | |||
23. | Photolightning photo software 4.2 (photolightning.com) | ||
Photolightning is the ultimate photo software for both home and business digital camera users. It's the easiest and fastest way to print, email, and enhance your digital photos. Photolightning is so simple that even beginners can make great photo prints, send emails without attachments, create slide shows | |||
Updated: 2, 2006 | Rating: 0 | Author: Dan Slavin | Size: 5316 kb | Shareware Go to category: Graphic Apps > Other Similar programs | |||
24. | KLS Backup 2006 Professional 1.9.0.0 (kls-soft.com) | ||
KLS Backup 2006 Professional is a powerfull backup, synchronization and disk cleaner program that allows you to back up or synchronize your data to local and network drives or FTP server. The cleanup feature is a complete solution to backup and clean private data and free up disk space. The backup files can | |||
Updated: 2, 2006 | Rating: 0 | Author: Levente Kiri | Size: 4083 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
25. | EF Commander 5.00 (efsoftware.com) | ||
File manager, features include: * Two file windows side by side. * Task list to switch to any active program. * Configurable button bar to start external programs or internal menu commands. Supports full parameter lists. * Supports extended Drag & Drop with the mouse over the entire desktop. * Extended | |||
Updated: 2, 2006 | Rating: 75 | Author: Emil Fickel | Size: 3607 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
26. | Privacy Defender 7.0.2t (synergeticsoft.com) | ||
Internet Vulnerability Profiling and Removing tool-Privacy Defender is a security tool that helps you protect your privacy by removing all evidence of previously downloaded music, video files, images stored in your PC. It gets rid of the data that will remain on your hard drive even after reformatting | |||
Updated: 2, 2006 | Rating: 42 | Author: Sergey Anikin | Size: 433 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
27. | IconCool Manager 4.38.60220 (iconcool.com) | ||
IconCool is a powerful tool to manage, extract, convert, modify, search, create, enlarge or reduce icons. An icon library with dozens of sample entries is included and accessible through a tree-style organizational system, allowing you to categorize icons and create new libraries within them. You can search | |||
Updated: 2, 2006 | Rating: 42 | Author: Wang Peibing | Size: 7916 kb | Shareware Go to category: Graphic Apps > Icon Tools Similar programs | |||
28. | My Buddy Icons 4.36.60220 (iconcool.com) | ||
is an easy-to-use icon tool to customize, modify or create your own AIM (AOL Instant Messenger) buddy icons, then send them directly to your AIM messenger. The program includes more than 100 original icons which were created by Newera IconCool Team and it allows you to customize your the icons | |||
Updated: 2, 2006 | Rating: 87 | Author: Wang Peibing | Size: 5553 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
29. | Internet Cleaner 3.0.8 (softneoweb.com) | ||
Internet Cleaner is an award-winning privacy protection and hard drive clean-up utility that helps you remove all traces of your online and offline activity and free up some space on your hard drive by removing the unnecessary files. As its name implies, Internet Cleaner can easily eliminate all records of | |||
Updated: 2, 2006 | Rating: 107 | Author: Serge Vinogradov | Size: 1217 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
30. | Complete Cleanup 4.83 (softdd.com) | ||
As you browse the internet many websites store information about your browsing habits on your computer. Every webpage you browse is also stored on your machine, and this can allow anyone who shares your computer with you to snoop and view what type of websites you have been visiting. Complete Cleanup displays | |||
Updated: 2, 2006 | Rating: 42 | Author: SoftDD Software | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Aim software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|