|
||||||
|
||
|
Home > System boot software |
Related keywords: system, boot, System, system tray, encryption system, SYSTEM, content management system, boot manager, billing system, system cleaner |
|
|
1. | Registry Clean Expert 3.69 (registry-clean.net) | ||
By fixing these obsolete information in Windows registry, your system will run faster and error free. The backup/restore function of the tool let you backup your whole Windows Registry so you can use it to restore the registry to the current status in case you encounter some system failure. Besides above, the startup and BHO organizer feature let you manage your startup and | |||
Updated: 3, 2006 | Rating: 99 | Author: Rick Davis | Size: 815 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
2. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
- Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
3. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
- Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
4. | UltraISO Media Edition 7.6.6.1308 (ezbsystems.com) | ||
option to make the newly created image bootable and to specify the boot loader. In addition, UltraISO can convert nearly all known data CD/DVD image formats to ISO, BIN/CUE, Nero (.NRG) or CloneCD (.CCD/.IMG/.SUB) format. It can be used as CD image extractor/creator/editor/converter with CD burning | |||
Updated: 3, 2006 | Rating: 39211 | Author: EZB Systems | Size: 2727 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | 007 Spy Software 3.86 (e-spy-software.com) | ||
deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just like a surveillance camera directly point at the computer monitor. Features include start and stop scheduling, logs remote delivery | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
6. | 101 Clips Pro. - Multi Clipboard 6.02 (101clips.com) | ||
somewhere? You need 101 Clips. No other multi clipboard offers 101's unique clip cataloging system. You can catalog by group or by favourites, in alphabetic or arranged order and with or without color highlighting. There is even a search facility which will find text both in the names you give | |||
Updated: 3, 2006 | Rating: 42 | Author: John Turnbull | Size: 2050 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
7. | M8 Multi Clipboard 9.12 (m8software.com) | ||
within the program. It has an extensive, well organized library system. (See screen shot) Drag clips there to save them permanently. You can view up to three groups of 30 clips at any one time. There are 100 groups in the library and you can have 100 libraries (300,000 clip capacity). It has four customizable buttons to start your most used programs. It has a form filling mode. Any | |||
Updated: 3, 2006 | Rating: 42 | Author: John Turnbull | Size: 1892 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
8. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
Server is an enterprise class mail server software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based administration, and a wide array of standard email options | |||
Updated: 3, 2006 | Rating: 322 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
9. | Random Word Generator 8.1 (gammadyne.com) | ||
that creates lists of random, artificial words. Its sophisticated system of word construction generates a high percentage of useful words. You can generate words with certain restrictions, such as ending in a vowel or making the third letter 'a'. A spell checking dictionary can automatically ensure | |||
Updated: 3, 2006 | Rating: 48 | Author: Greg Wittmeyer | Size: 2499 kb | Shareware Go to category: Education > Languages Similar programs | |||
10. | Winmail Mail Server 4.3 (magicwinmail.net) | ||
Server is an enterprise class mail server software system offering a robust feature set, including extensive security measures. Winmail Server supports SMTP, POP3, IMAP, Webmail, LDAP, multiple domains, SMTP authentication, spam protection, anti-virus protection, SSL/TLS security, Network Storage, remote access, Web-based administration, and a wide array of standard email options | |||
Updated: 3, 2006 | Rating: 82 | Author: amax it | Size: 14752 kb | Shareware Go to category: Servers > Mail Servers Similar programs | |||
11. | Duplicate Email Remover 2.11.0 (mailutilities.com) | ||
test the add-in and preview the messages to delete. A priority system in the add-in is used when you search for duplicates across several folders. Using the priority system, you can specify, for example, that of the two identical messages stored in the folders "Important Letters" and "Temporary Folder", it is the message from the temporary folder that should be considered the | |||
Updated: 3, 2006 | Rating: 0 | Author: Andrey Manchuk | Size: 2218 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
12. | Duplicate Email Remover 2.11.0 (mapilab.com) | ||
test the add-in and preview the messages to delete. A priority system in the add-in is used when you search for duplicates across several folders. Using the priority system, you can specify, for example, that of the two identical messages stored in the folders "Important Letters" and "Temporary Folder", it is the message from the temporary folder that should be considered the | |||
Updated: 3, 2006 | Rating: 0 | Author: Andrey Manchuk | Size: 2218 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
13. | Atomic Email Logger 2.54 (atompark.com) | ||
Designed to search files for e-mail addresses, the program utilizes advanced search algorithms to extract e-mails from anywhere on your hard drive. It scans files of all types and finds thousands of new contacts. There are no any restrictions for Email Logger, it parses text, graphic, music and even | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Medvednicov | Size: 1550 kb | Shareware Go to category: Communications > E-Mail List Management Similar programs | |||
14. | BookCAT 7.12.02 (fnprg.com) | ||
get you started and a comprehensive context sensitive on-line help system. BookCAT is a database program designed to catalog and manage a personal, club, school, church, or business library. BookCAT will help you know what you have and where it is. Quickly catalog your books by downloading information from the | |||
Updated: 3, 2006 | Rating: 227 | Author: Fredrik Nordbakke | Size: 6008 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
15. | PicMaster 3.96 (graphics-tools.com) | ||
website. Morph people into other people or animals. Enlarge people’s noses and ears. Create real 3D-Images that can be seen with mirrors and red-blue glasses. Watch 3D-objects emerge out of your monitor. Print out your own glasses with PicMaster. An image browser in Explorer-style shows you all | |||
Updated: 3, 2006 | Rating: 42 | Author: Alexander Sabov | Size: 1485 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
16. | Autosend 2.8 (filesharingbyemail.com) | ||
of an html file of all shared files, private messages to the system owner. All texts sent within the mails can be modified and Autosend user interface can be customized in your own language thanks to language packs. Now offers the support for plenty of nice skins. Share files with your friends or with the world by email. Easy and safe ! Like a filesharing server (plenty of | |||
Updated: 3, 2006 | Rating: 0 | Author: PA BRISON | Size: 18554 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
17. | Autosend 2.8 (pacon.free.fr) | ||
of an html file of all shared files, private messages to the system owner. All texts sent within the mails can be modified and Autosend user interface can be customized in your own language thanks to language packs. Now offers the support for plenty of nice skins. Share files with your friends or with the world by email. Easy and safe ! Like a filesharing server (plenty of | |||
Updated: 3, 2006 | Rating: 0 | Author: PA BRISON | Size: 18554 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
18. | Super Utilities 6.25 (superlogix.net) | ||
and protecting your PC. It encompasses four suites of utilities: System Cleaner, Privacy Protector, System Maintenance, and Special Utilities. 1.System Cleaner features a spyware-removal component as well as tools for cleaning your disk and Registry, and for performing routine maintenance tasks. 2.Privacy Protector assists in protecting and securing sensitive | |||
Updated: 3, 2006 | Rating: 16 | Author: li jiangnan | Size: 3328 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
19. | Chronograph 5.0 (altrixsoft.com) | ||
Clock is a simple award-winning program which keeps your computer's clock accurate using atomic time servers of the National Institute of Standards and Technology (NIST). It has an easy-to-use nice-looking user interface and offers many useful features that make the process of time synchronization fast and comfortable. You can work in Manual, Periodical, or Wait-for-Connection | |||
Updated: 3, 2006 | Rating: 16 | Author: Dmitry Bespalov | Size: 1484 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
20. | PicturePlayer 3.10.00 (picture-player.com) | ||
PictuePlayer features - It supports all common graphic formats (s. Features) - Each image can be linked to a sound file as an option - Each image can be linked to a text passage as an option - Images can be advanced automatically or manually - Selection of fade-in effects - Optimized for use on CD / DVDs - The Player can be used royalty-free on CD / DVDs | |||
Updated: 3, 2006 | Rating: 0 | Author: Klaus Schwenk | Size: 5010 kb | Shareware Go to category: Audio & Multimedia > Presentation Tools Similar programs | |||
21. | Estimate 1.04 (m8software.com) | ||
Estimate is a generic costing and estimating system suitable for any trade or profession. It is based on these simple principles: You create a price list. You create simple estimations by choosing items from your price list and inserting the quantity. Once estimates have been saved, they in turn can be chosen as items in later estimates. When prices change, you just update your price | |||
Updated: 3, 2006 | Rating: 0 | Author: John Turnbull | Size: 1427 kb | Shareware Go to category: Business > Accounting & Finance Similar programs | |||
22. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
- Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
23. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
- Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
24. | Clean Disk Security 7.54 (diskcleaners.com) | ||
be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk cleaning method is now available as an option. This program can also clean | |||
Updated: 3, 2006 | Rating: 16 | Author: Kevin Solway | Size: 660 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
25. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
- Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
26. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
- Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
27. | ABC Amber Outlook Express Converter 4.14 (thebeatlesforever.com) | ||
newsletters, newsgroups mails organized in one file (as hypertext system). It is a very useful tool which converts your emails from MS Outlook Express to any document format (CHM, PDF, HTML, RTF, HLP, TXT, DOC, etc.) easily and quickly. All you have to do is select required messages, choose document format to convert and click "Save As" button. Currently our software supports more | |||
Updated: 3, 2006 | Rating: 120 | Author: ProcessText Group | Size: 1364 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
28. | ABC Amber Outlook Converter 5.10 (thebeatlesforever.com) | ||
your important emails, messages organized in one file (as hypertext system). It is a very useful tool that converts your emails from MS Outlook to any document | |||
Updated: 3, 2006 | Rating: 144 | Author: ProcessText Group | Size: 1482 kb | Shareware Go to category: Communications > Other E-Mail Tools Similar programs | |||
29. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
- Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
30. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
- Keystrokes - Pasting text from clipboard - File operations - System registry operations - Application installation/uninstallation - Putting programs in Startup folder - Visiting web sites. Log files are converted to HTML format for more convenient viewing in browser (Internet Explorer 4.0 or higher is recommended). Log file can be optionally sent via e-mail to specified | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
31. | Paraben's Mah-jong 2.4.2 (paraben.com) | ||
Mah-jong is an easy playing version of the classic game. Play it in English, French, German, or Spanish while listening to music. With features like "shadows" and "3D" play, the only challenge comes from the game itself. 3D play using your choice of DirectX 8.1 or OpenGL. Improved rendering speed in 2D version. Includes a layout editor and background image support for 3D play as | |||
Updated: 3, 2006 | Rating: 16 | Size: 1524 kb | Shareware Go to category: Games & Entertainment > Board Similar programs | |||
32. | WinCatalog Standard 1.53 (wincatalog.com) | ||
WinCatalog Standard takes cataloging to the next level. This software is as easy-to-use and friendly as the Light version, but at the same time it is much more powerful and functional. Many features of this program were inspired by users' requests and feedback. WinCatalog Standard makes managing your | |||
Updated: 3, 2006 | Rating: 42 | Author: Michael Rusakov | Size: 1667 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
33. | LeoCrystal 2.5 (leokrut.com) | ||
its in the crystal will effect with changing energy of the whole system that will be equivalent to the condensation energy of the corresponding mass of crystal. In simple words the molecule is the minimum part of the crystal that behaves as a whole crystal. The principal difference of behavior of molecules in liquids is based on the principle of the long order in the crystals | |||
Updated: 3, 2006 | Rating: 0 | Author: Leonid Sakharov | Size: 444 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
34. | COM Port Toolkit 3.6 (compt.ru) | ||
an integrated serial communications testing toolkit. It sends user's data to and receives one from a device and records all transfers to a log. You can test equipments serial communications protocol by hand: feed it input, check the output. You can write or use a script written by other developers to automate some specific tasks: CRC calculations, special transfer rules, outgoing | |||
Updated: 3, 2006 | Rating: 16 | Author: Michael Golikov | Size: 1199 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
35. | Attachments Zip Compressor 1.4.5 (mapilab.com) | ||
files and even create self-extracting archives. - Your software system can't index attachments within archives? AZC is here to help again! AZC is a powerful multi-purpose add-in capable of doing with attachments whatever you need it to do. It can automatically pack outgoing message attachments, create self-extracting archives and password-protected archives. AZC can automatically | |||
Updated: 3, 2006 | Rating: 74 | Author: Andrey Manchuk | Size: 4 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
36. | DBF Manager 1.31 (dbfmanager.com) | ||
One of such things is DBF database format used widely in system database upkeep and administration today. Despite the fact that DBF standard exists for decades it is still one of the most convenient and feature-rich database formats available on the market. What we actually need is some piece of software that can handle all the format functionality allowing us access DBF | |||
Updated: 3, 2006 | Rating: 406 | Author: Alexander Kardailsky | Size: 1544 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
37. | Dekart Private Disk 2.07 (dekart.com) | ||
even if your antivirus or antispyware program fails to protect the system. Now you can create a white-list of applications, only these programs will be allowed to access the contents of the encrypted drive. This feature protects your data from external threats, as well as internal ones: group leaders | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
38. | Lotto Pro 2006 Lottery Software 7.05 (windowslotto.com) | ||
do it for them. Maximizes your payoffs - Over 225 wheeling systems are included that maximize your payoffs through multiple ticket hits. Saves money - A filter option eliminates lottery tickets with unlikely number combinations. Filters can be applied based on the sum of the numbers or the number of odd and even numbers on each ticket. Saves time - Prints your tickets | |||
Updated: 2, 2006 | Rating: 1305 | Author: John Lake | Size: 7084 kb | Shareware Go to category: Games & Entertainment > Casino & Gambling Similar programs | |||
39. | EXECryptor 2.3.7 (softcomplete.com) | ||
is a software protection system for protect programs from reverse engineering, analysis, modifications and cracking. EXECryptor has powerful anticrack, antidebug, antitrace and import code protection features for stop the latest cracking software. and crackers issues. EXECryptor allows to turn program into trial, demo or evalutaion versions and vice versa. You can set | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
40. | LanFlow Net Diagrammer 5.04 (pacestar.com) | ||
documenting a network, LAN, internet,vector or other communications system. Drop in components like computers, workstations, routers, and servers and connect them with lines and cables. Choose components from built in symbols and clip art or add commonly available clip art formats. Use lines to connect | |||
Updated: 2, 2006 | Rating: 0 | Author: John Daleiden | Size: 5126 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
41. | EMS IB Manager 4.1 (ems-hitech.com) | ||
state-of-the-art graphical user interface with well-described wizard system, so clear in use that even a newbie will not be confused with it. Key Features: - Latest InterBase and Firebird versions support; - Powerful and easy-to-use graphical user interface; - Rapid database management and | |||
Updated: 2, 2006 | Rating: 0 | Author: EMS Software Development | Size: 13885 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
42. | 27 Tools-in-1 Wichio Browser 5.0 (wichio.com) | ||
is a multipage Web browser with 27 built-in utilities. It's easy to use, with a button for each utility. To set options for any utility, just right-click its button. If you install the MS speech engine, Wichio will notify you (for the features that give notifications) by speaking anything you want. Wichio features Wichio is a tabbed browser with 27 built-in utilities. It's | |||
Updated: 2, 2006 | Rating: 0 | Author: Revopoint Co., Ltd | Size: 4940 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
43. | SQLExecMS 2.6 (laplas-soft.com) | ||
created based on long experience of development and of support DB systems. Llist of features divided by categories: -for DBA - Monitor active connections, oldest transactions and vital SQL server performance counters;Check utilization of proc cache;Watch locks; Review space used by DB files, tables and indexes; Manage DB file and filegroups;Turn on and off trace flags;Manage | |||
Updated: 2, 2006 | Rating: 433 | Author: Oleg Dantchenko | Size: 4928 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
44. | CDCheck 3.1.11 (elpros.si) | ||
the program helps you determine whether your data is safe before it's too late. The program also provides extremly fast binary compare for effectively checking that file transfers (burning, copying...) were accomplished successfully and alerts you of differences. Besides that CDCheck supports creation and checking of MD5, CRC-32, SHA... hashes in SFV, MD5 and CRC file formats. This | |||
Updated: 2, 2006 | Rating: 1217 | Author: Mitja Perko | Size: 1400 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
45. | Hide Window Hotkey 2.5 (elongsoft.com) | ||
web browsers, Notepad, etc. Hide Window Hotkey stays running in the system tray, so it stays out of your way while it works. It can also protect the hidden windows with a password. You can set other options too, such as muting all sounds during hiding, specifying hotkeys etc.It also can set application windows transparency.Reorder and arrange the windows on taskbar based on your | |||
Updated: 2, 2006 | Rating: 0 | Author: Helen Lin | Size: 885 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
46. | Secret Explorer 6.6.1471 (unhsolutions.com) | ||
email account and identity passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Similar programs | |||
47. | Secret Explorer 6.6.1471 (unhsolutions.com) | ||
email account and identity passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Similar programs | |||
48. | Secret Explorer 6.6.1471 (unhsolutions.net) | ||
email account and identity passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
49. | Secret Explorer 6.6.1471 (unhsolutions.net) | ||
email account and identity passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
50. | Softros LAN Messenger 3.6.2 (softros.com) | ||
The program is very stable when running under any Windows operating system and in any network, regardless of its size. This application can be used for contacting individual users or for group notifications. All messages are logged, so there is no risk of losing a message. All correspondence can be | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrew Green | Size: 2128 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
|
Home > System boot software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|