|
|
Safety
|
MSDS Executive License: Freeware
|
|
|
MSDS Executive Overview - Protect Your Company and Employees. MSDS Executive is a tool to assist organization's in fulfilling their OSHA regulatory requirements. Use this application to import and electronically store material safety data sheets, perform MSDS searches, and automate MSDS renewal requests for manufacturers and suppliers. Reduce administration costs and the risk of errors.
Author: ENVIRON.COM| Date: 17-01-2001 | Size: 4789 KB
|
|
- |
|
Security Forms License: Freeware
|
|
|
Collection of security and human resources related forms including; Absentee report, Acknowledgment of receipt of company property, Applicant information release, Attendance record, Cash over short log, Checklists for handling workers, Daily time sheet, Discipline documentation form, Driving record check, Drug testing consent form, Drug testing policy, Educational record check, Employee attendance record, Employment application, Employment reference check, Employment reference release, Equipment inventory list, Expense report, Fair credit act disclosure notic, General loss report, General release for employment t, Group payroll, Immediate action required, Job description, Key log, Locker agreement, Loss prevention committee, Loss prevention employee of the month, Loss prevention safety committee, Loss prevention safety committee minutes, Loss prevention safety training notice, Loss prevention training notice, Medication log, Meeting notice, Memo, Osha form 101, Osha form 174, Osha form 200, Performance appraisal, Personal reference check, Personnel change notice, Phone call log form, Plant loss prevention inspection, Privacy policy, Progressive discipline policy, Record of disciplinary action, Reference check control form, Safety committee, Safety employee of the month, Safety training notice, Sample company policy on aids, Sample emergency instructions, Sample of general work rules, Sample sexual harassment policy, Sample workplace safety rules, Self evaluation, Smoking policy, Termination meeting checklist, Time off request, To do list, Training checklist, Training notice, Violence in the workplace preven, Visitor log, Voluntary resignation form, Weekly time card, Workplace safety policy.
Author: Paul Pleasant| Date: 05-06-2002 | Size: 173 KB
|
|
- |
|
Daewoo Lanos Screen Saver License: Freeware
|
|
|
The style is Italian. The structural design and engines are German. The safety engineering is British. Daewoo Lanos is a masterpiece of automotive engineering. Period. Download this screen saver to see for yourself.
Author: | Date: 20-03-2002 | Size: 1397 KB
|
|
- |
|
Minefield License: Freeware
|
|
|
Minefield is a game in which you have to bring as many men as you can across the minefield to safety (marked by a blue flag). You start at the bottom right square of a grid of up to 20 x 15 squares and use the arrow keys on the keyboard to move your man towards the flag. You die if he steps on a mine (duh!). The minefield is randomly generated when you start a game, but the mines stay where they are throughout the game so you have to try to remember where they are. In addition to the mines, you also have to avoid up to 2 snakes and 2 ghosts. Snakes can only move on squares which do not contain mines, whereas ghosts can move anywhere in the grid. You may, on occasion, pick up a map or invincibility potion. The map shows you the location of every mine in the grid, whereas the potion makes you invincible (ie. cannot be killed by mine, snake nor ghost), for a period of time. You may sometimes also be blown to another square by a strong gust of wind (this can only happen if you step on a square that does not contain a mine). Minefield has plenty of customizable settings. It is also skinable - you can replace all the graphics with your own.
Author: Gan Software| Date: 24-06-2004 | Size: 49 KB
|
|
- |
|
Perimon - Natural Family Planning License: Freeware
|
|
|
What is Perimon? Perimon is a contraception and family planning system that is easy to use and reliable. Perimon is a cycle monitor which gives you insight into your cycle. It was designed and made in Germany For whom is Perimon? Perimon is made for women from 18 to 45 years, who ... - are interested in simple and time-effective natural birth control, - appreciate an open system that can be modulated to their individual needs, - want to perceive the various cyclic changes in their body Is birth control with Perimon safe? It is. If you use Perimon only with the rhythm method, we estimate the Pearl index to 4.5 (a good safety). If you additionally examine your mucus or cervix - which is easy to do - safety will increase up to 1.0 (details on our web site) Why is Perimon freeware? The online version of Perimon isn't free of charge. Only Perimon DOS is free of charge because its user surface is out of date (operation without mouse and graphics) advantages of Perimon: - easy to use (no daily measurements necessary) - free of charge, no current expenses - Birth control with Perimon is natural and has no side effects - Perimon helps you to better get to know your body and its cycle - after finishing the initial phase Perimon gives a clear survey about your current and the passed cycles and your fertility - for many Perimon is an ancilla for contraception without hormones disadvantages of Perimon: - without additional determination of the ovulation, max. 12.5 days are designated for unprotected intercourse - for the remaining days other methods of contraception have to be used - people who think a contraception safety of 4.5 Pearl index is not sufficient "have to" additionally observe their mucus or cervical texture - first forecasts after 3-4 cycles A MODERN VERSION OF PERIMON CAN BE FOUND AT WWW.NATUERLICHE-VERHUETUNG.DE
Author: ZANA digital| Date: 16-04-2005 | Size: 55 KB
|
|
- |
|
dsCrypt License: Freeware
|
|
|
dsCrypt is AES/Rijndael file encryption software with simple, multi-file, drag-and-drop operations. It features optimal implementation, performance and safety measures. dsCrypt uses an advanced encryption algorithm and offers unique options for enhanced security. FEATURES - extensively tested and widely accepted algorithm - BruteHalt and exceptional resistance to brute-force password search - inherent resistance to brute-force key search - Secure PassPad and immunity to keylogger-infested environments - disclosed implementation and code details - secure use of system resources - verified data and file processing - efficient user interface and operation - speedy performance - really small executable file - self-contained and dependency-free - installation-and-pollution-free - freeware status and unrestricted distribution
Author: Dariusz Stanislawek| Date: 01-01-2003 | Size: 25 KB
|
|
- |
|
Flash Graphics License: Shareware
|
|
|
CD Flash Graphics contents 36 000 graphics in formats - fla and swf Flash 5 & MX below listof groups of Flash symbols and graphics: Birds, State Birds&Flowers, Plants, Dinozaurs, Insects, Dogs, Horses, Fish, Farm&Jungle, Zoo, Realistic, Sunset Animals, Architecture, Home, Landscape, Old Towns, Fire Safety&Egupment, Office, Food, Antropology, Skylines, Astrology, Zodiac, Astronomy, Web Page Components Anatomy.......
Author: Stanton Studios| Date: 05-07-2002 | Size: 650000 KB
|
|
- |
|
CHAOS Compressor License: Freeware
|
|
|
Data compression utility, which allows you to quickly open, create, and modify your archives.
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 491 KB
|
|
- |
|
Imaginary Telnet Server License: Freeware
|
|
|
When your computer is connected to the Internet, it is opened up to attacks by anyone experienced with the Internet technology. One of the possible attacks is by using the Telnet protocol to log into your system. If successful, the attacker can gain complete control of your system. With the Imaginary Telnet Server running, he will be served a fake response which will prevent him from accessing any resources available on your system.
Author: Whiz Kid Technomagic| Date: 11-03-2003 | Size: 38 KB
|
|
- |
|
ABC CHAOS License: Freeware
|
|
|
What can you do with ABC CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. The additional special protection completely excludes an opportunity of selection of the password to the encrypted information at use of the generator of the passwords and keys.
Author: Security Resources Group| Date: 10-01-2003 | Size: 368 KB
|
|
- |
|
CHAOS Generator License: Freeware
|
|
|
CHAOS Generator is an application designed to generate passwords of any length and character content. CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. The passwords are displayed and can be copied to your clipboard.
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 201 KB
|
|
- |
|
Break Reminder License: Freeware
|
|
|
A break reminder program to help prevent OOS/RSI and to assist healing these.Discretely runs in the background monitoring your computer use, using timers (to your settings) that remind you to take pauses and rest breaks.Logs most events, including ignored breaks.Multiple user support.Options for:-Black-out screen during breaks, -Password protection of settings, -Sounds, -Auto run, -ignoring or enforcing pauses and/or breaks.
Author: Chequers Software| Date: 08-08-2002 | Size: 850 KB
|
|
- |
|
AES Free License: Freeware
|
|
|
AES Free is the program that creates self-extracting encrypted AES-files for Windows. Self-extracting files are executable programs (EXEs) that contain a AES-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting AES-files simply by running it like any other program. No other software is needed. These self-extracting AES-files are ideal to storage and electronically distribute the information because they contain multiple compressed files and folders.
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 515 KB
|
|
- |
|
CHAOS Self Extractor License: Freeware
|
|
|
CHAOS Self-Extractor is the program that creates self-extracting chaos-files for Windows. Self-extracting files are executable programs (EXEs) that contain a chaos-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting chaos-files simply by running it like any other program. No other software is needed.These self-extracting chaos files are ideal to electronically distribute the information because they contain multiple compressed files and folders.
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 531 KB
|
|
- |
|
Disaster Preparedness Kit License: Freeware
|
|
|
What would you do if your basic services... water, gas, electricity or telephones... were cut off? Are you prepared to administer first aid? Do you have sufficient food, water and clothing to survive for several days if necessary? What is your Disaster Preparedness Plan? Do you even have one? Answers to these questions and much more are outlined for you in precise detail in the Disaster Preparedness Kit. Learn about: The Four Steps To Safety Your Disaster Preparedness Kit Children and Disasters Special Needs For Seniors and People With Disabilities Consideration For Your Pets Resources The Disaster Preparedness Kit is provided to you absolutely FREE. Give it away to your friends, family and neighbors. Display it on your website.
Author: www.Digital-Product-Sales.com| Date: 28-02-2005 | Size: 93 KB
|
|
- |
|
Ultimate Spy Personal License: Freeware
|
|
|
Ultimate Spy Personal Edition is a sophisticated keyboard spying tool / keylogger and activity monitor that lets you see what others are doing on your workstation in your absence. A greatly appreciated, FREE tool. Records all the keystrokes, with advanced filter settings. Runs in super stealth mode. Auto starts with windows. Not even visible in Run registry. Includes Log Analyser to view log. Home Edition is also available which is best suited for parents to monitor whom their children talking to & what they're talking about. Home Edition is a great tool to ensure safety of your children, while they surf around & chat with strangers! Lite & Pro Editions of the same software are also available. Lite version includes support for log emailing to specified address on daily basis. Pro version supports remote administration etc. Check out product home page for further details. http://raheel.yi.org/ultimatespy/
Author: EASTLAND SOFTWARES| Date: 1-12-2002 | Size: 1156 KB
|
|
- |
|
TIREAL WEBCAM GUARD License: Freeware
|
|
|
The powerful motion detector on the basis of the usual Web Camera for protection of private houses, apartments and offices. Application of the program: - Protection of private houses, apartments and offices without expenditures for the expensive equipment. - Organization of translation from the Web Camera to your web site. - Daily comfortable use of the Web Camera for the video-record and saving snapshots.
Author: TIREAL company| Date: 02-03-2005 | Size: 885 KB
|
|
- |
|
EuroCheck License: Freeware
|
|
|
Check your fonts, printer, keyboard and operating system for euro symbol support. A easy to use wizard. EuroCheck is freeware. EuroCheck was developed in cooperation with the German "Federal Office of Safety in the information technique". It's available in English, German, French, Spain, Italian, Dutch and Polish language. That software doesn't record activities, doesn't require runtimes, doesn't require installation, doesn't write to the registry, doesn't modify files outside of its own directories, isn't adware.
Author: A. & M. Neuber GbR| Date: 14-10-2004 | Size: 240 KB
|
|
- |
|
Spamdel License: Freeware
|
|
|
Security tray-based utility, dial-up manager/modem/cable/DSL/sound and visual prompts enabled. Filters email, categorises spam and lets you view and delete mail on the server before it reaches your PC and more. Advantages of Spamdel over other mail utilities include its many features, ease of use, and inter-operability with any email program eg Outlook Express, Outlook, TheBat! and so on. Unlike most other email utilities, Spamdel does all its work on the server which means a tremendous increase in safety against virus attacks and spam.
Author: AGM| Date: 31-10-2004 | Size: 1200 KB
|
|
- |
|
KidRocket Web Browser - Kids Browser License: Freeware
|
|
|
KidRocket is a FREE Kids Web Browser, designed for Kids to safely surf the internets top child related web sites. Each human edited, hand picked site offers many fun, educational and interactive activities for children and parents alike. New password-protected Parental Admin Area, New GUI, over 200 custom colors, offline Math Flashcards for addition, subtraction, multiplication and division, no internet connection required. Keep your children safe on the web, learn, play games and have fun with KidRocket! Freeware, Flash games, Parental controls.
Author: KidRocket.org| Date: 01-11-2004 | Size: 1793 KB
|
|
- |
|
CHAOS Shredder License: Freeware
|
|
|
Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, there are many tools available which can let others easily recover your sensitive files even after you have formated the hard disk. Sensitive data can easily fall into the wrong hands. And because Windows is not capable of deleting information beyond recovery, you are at risk! Passwords, financial documents, even those "about last night" e-mails are fair game for the IT professionals, computer technicians or hackers. CHAOS Shredder allows you to purge, wipe and erase data with methods that far exceed US Department of Defense standards for file deletion (DOD 5220.22).
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 287 KB
|
|
- |
|
SplitSafe License: Freeware
|
|
|
SplitSafe: Security–Software mit TÜV-Zertifikat SplitSafe protects your data on notebooks and PCs from unwanted access. Comparable to the concept of a pirate´s treasure map that is torn in two parts, SplitSafe divides your data and saves it on two different storage media, e.g. your notebook´s hard disk and a USB memory drive. What makes SplitSafe different from today´s security technologies? Known procedures like encryption and password protection are not safe when it comes to hacker attacks or careless use of passwords. SplitSafe closes this security gap by physically dividing the data onto two storage media and offers data security that has been certified by the German authority for product quality, the TÜV. The data is divided in such a way, that the individual parts do not allow access, reading, changing or reconstruction of the original information. All you have to do for perfect data protection is to keep your mobile storage device, e.g. a USB memory stick, apart from your notebook or PC. How does SplitSafe work? After the installation of SplitSafe an additional virtual hard disk will be available in your Windows system. Once you have connected a mobile storage medium to your notebook or PC you can save the files you want to protect on your virtual hard disk and you can access, copy open, change or delete the files as usual. If you save a file on your virtual SplitSafe drive, the data is automatically divided.
Author: Living Byte Software GmbH| Date: 23-07-2004 | Size: 2599 KB
|
|
- |
|
Imaginary Web Server License: Freeware
|
|
|
An unprotected Windows computer connected to the Internet is in danger of being broken into by outside intruders who continuously scan the Internet for security holes. Many computers use a firewall for protection. Unfortunately, firewalls can be bypassed by clever attackers. The Imaginary Web Server (IWS) makes the attackers think that they have found a web server which is no longer active. When they come to your computer, the server will give them an error message and send them to http://some.imaginaryplace.com - some imaginary place on the web. Now, don't worry, you will not be sending them to some unsuspecting web site! Whiz Kid Technomagic has secured the imaginaryplace.com domain and delegated the some.imaginaryplace.com subdomain, so they will, indeed, find the "new" location of "your" web site. They will go there and leave your computer in peace. Meanwhile, your computer remains perfectly safe from these attackers. No matter what file they try to access on your computer, no matter what command they try to execute on your computer, your IWS always reacts the same way. It never lets them access the inside of your computer but always sends them off. Some attackers try a different approach. Instead of trying to get to your files, they try to upload files to your system. Often these are scripts or programs they want to run on your computer. The Imaginary Web Server will, again, tell them there no longer is anywhere to upload files on your system and will send them away. Some attackers try to upload huge files, just to keep your system busy and to slow down your Internet access. The IWS shuts the door on them. Other attackers try to sneak in a hidden web server on your system and let that server cooperate with the attackers. But only one web server can exist on your computer. With IWS running, they cannot run. And if they start running first, IWS will tell you that another web server is already running, so you can find it and disable it.
Author: G. Adam Stanislav| Date: 25-02-2003 | Size: 28 KB
|
|
- |
|
eStream PanelBar.NET Lite License: Freeware
|
|
|
eStream PanelBar.NET is a flexible, affordable and easy to integrate component for building expandable/collapsible menu systems. eStream PanelBar.NET allows developers to create powerful and attractive menus for their web sites or web applications in just a few lines of code. The product offers out of the box support for XP styled and Outlook styled navigations. The ASP.NET menu control was developed specifically for ASP.NET. -- Written with C# -- Leverages .NET's managed execution (memory management, automatic garbage collection and type-safety). Supports viewstate, postbacks and other .NET extras. -- Flexible Programming Options -- Program the objects in VS.NET designer, any available .NET language, or load state using XML file. -- Expand/Collapse -- Different types of Expand/Collapse behaviors are available. You can have a single click expand one group and collapse another (only one group is expanded at a time), or each group can behave independantly (multiple groups expanded). -- Highly Customizable Look -- Colors, sizes, borders and fonts can all be customized to visually integrate with any project. Also supports custom image replacement throughout. Appearance customization can be accomplished with or without CSS. -- Sizing Options -- Specify fixed dimensions, dynamically resize (percentage based) or let a Group size to it's own content. -- Animation and Float -- Many expand effects: Barn, Pixelate, Fade, Iris, GradientWipe, Zigzag and more. -- Client-side Events -- In addition to navigating to a URL, you can invoke custom JavaScript functions at the browser when the user clicks on Items. And many more!
Author: eStream| Date: 05-04-2004 | Size: 370 KB
|
|
- |
|
Power Manga License: Freeware
|
|
|
Power Manga, developed by TLK Games, belongs already to the legacy of the space adventure. It is one of the best Arcade Game developed under GNU General Public License. The present version for Windows is as neat as exciting. 42 levels, more than 200 sprites, some 14 guards that you must destroy with an arsenal of impressive space fight weaponry gearing handy and fast patrol space vessels. The players have to imagine their own strategy to manage their energy, fire power and chances of surviving in an utterly hostile world. After a peace treaty about free interplanetary circulation that was concluded 150 years ago, the whole space has been turned into a giant floating trash. Meteorites deviated from their trajectories and with wild pirates, each of them representing a deadly danger for the peaceful navigators infest the space. That is the reason why the Governors of the Sidereal Spaces have created this Special Fast Intervention Patrol with the mission to clear the ways of these nuisances to improve the safety of the voyagers. This elite unit has been named POWERMANGA. You have been selected to patrol a spatial ship of this unit and you are going to fly along the Milky Way in a fine spatial vessel. But be careful to keep away from the streams of meteorites that will charge you periodically. Also avoid the Wardens, those pirates who try to racket you and steal your energy and your food or even try to disintegrate your spaceship. The energy that you collect allows you to repair the damages caused by these fights. If by chance, you load energy to the limits of your spatial ship, you will explode a thermonuclear process that will return to ashes and dust any enemy.
Author: TLK Games| Date: 31-01-2005 | Size: 7191 KB
|
|
- |
|
Recover Fixed/Floppy Disk License: Freeware
|
|
|
RECOVER Fixed/Floppy Disk v1.4 ( 5-star rated). Folder / File level Data Recovery Utility for Hard Disk Drives and Floppy Disks. RECOVER Fixed/Floppy Disk handles File Allocation Table (FAT) damage and subfolder damage. If FAT damage should not affect you, just defragment the file system as often as you can. If subfolder damage should not affect you, save the subfolder to a safe location. This FREEWARE version would not save the Root Folder for later use. RECOVER Fixed/Floppy Disk handles these error conditions at individual folder level. Recovers all the files from the specified directory on 16-bit and 12-bit FAT file systems in DOS and WINDOWS even if both copies of the FAT have considerable number of damaged sectors, if the disk involved had been regularly defragmented. If FAT is good, FAT1 or FAT2 can be used. All you need to do is put all your important files in a few directories (note: entire drives can be ZIPped up and sent to the backup drive) and defrag that backup drive after each update and if you want to be playful enough, note down the first sector of file(s) or if you want 100 percent safety, save the subdirectory having your important data as a file somewhere else. IF YOU DEFRAG FLOPPY/HDD REGULARLY, YOU GET THE UTMOST BENEFIT. Supports FAT12 File Systems (Floppies) from DOS to WINDOWS 98SE and FAT16 File Systems in DOS, WINDOWS 3.1/3.11, WINDOWS 95, and (up to 2 GB partitions in) WINDOWS 95-OSR2, WINDOWS 98 and WINDOWS 98SE (HDD can be 120 GB). This program is certainly for those who backup because backup programs never talk about uncertainties w.r.t. FAT and Directory entries. A floppy ora FAT16 partition needed to get started. You can find out the TECHIE in you.
Author: Systech Software| Date: 05-11-2001 | Size: 37 KB
|
|
- |
|
avast! 4 Home Edition License: Freeware
|
|
|
avast! 4 Home Edition is a free complete ICSA certified antivirus software for home noncommercial use. avast! obtained VB100% awards in 2002/3 Virus Bulletin comparative reviews under Windows XP Pro. avast! Home Edition includes the following components: On Demand Scanner - with Skinnable Simple Interface - just select what do you want to scan in which way and press the Play button. On Access Scanner - resident scanning of all files being opened, read and written and behavior blocker monitoring dangerous actions of viruses. E-mail scanner easily integrates with most mail clients and it checks both incoming and outgoing mails, it provides heuristic analysis of mail content to protect against new Worms. Resident protection for IM programs (MSN Messenger, ICQ, Yahoo Messenger, AIM, mIRC, Trillian) and P2P programs (Kazaa, KazaaLite, DirectConnect, DC++, WinMX etc.). Boot Time Scanner - scans disks in the same way and in the same time as Windows CHKDSK does (on NT/2000/XP only). Explorer Scanner - right click on the object allows you to scan it. Screen Saver Scanner - integrates with your Screen Saver to scan PC during your coffee breaks. Virus Chest - safety isolated folder to store infected, suspicious and even some system files - to restore them. True incremental updates are based on iAVS technology and they are available for virus definition file update and for program upgrade. The update files of size under 100 KB are available at least twice a week and within couple of hours in the case of emergency of new virus. avast! automatically checks for new updates - downloads, installs and loads them without restart or logoff. Program upgrades are available time to time, they are incremental too (about 300 KB). You will download a 60 days fully functional demo. You will obtain the free license key by E-mail after the registration at http://www.avast.com/i_kat_207.php?lang=ENG. Download, install, try, register, update and relax!
Author: ALWIL Software| Date: 24-10-2003 | Size: 7276 KB
|
|
- |
|
Zilla Data Nuker License: Freeware
|
|
|
When you delete a file from Windows it just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! This powerful program helps you shred important files & folders so that they cannot be restored & prevent attempts to recover sensitive deleted files from your hard drive by data recovery or forensic software. Shredder allows you to purge, wipe & erase data with methods that far exceed US Department of Defence standards for file deletion (DOD 5220.22). Easily automate the cleaning process with batch files, shortcuts and scheduler. Completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Overwrites all bits in selected files, including cluster slack space, with binary 1's, 0's, and/or random bit patterns. Supports complete folder deletions including subfolders. Shreds disk free space so you can even use shredder to destroy previously deleted files on your hard drive. Drag & Drop files or entire folders Delete even if the file is locked! No trails are left of any compromising or confidential information. Easily choose the number of overwrites according to your security ambitions. The higher the number the less the probability that even finest magnetic tracks could be detected. The Department of Defense (DOD 5220.22-M) recommends seven passes for top security. You can also shred files by right-clicking on them from the MS Windows Explorer or on the recycle bin and selecting the shred item on the popup context menu.
Author: ZillaSoft.ws| Date: 28-04-2004 | Size: 4214 KB
|
|
- |
| 1 |
|
|
Universal Explorer
Powerful windows explorer file manager and viewer.

Disk Size Manager Analyses hard disk space and collects statistics.

Web Data Extractor Email marketing software to extract specific contact.
 BackStreet Browser Powerful Offline Browser - Download Entire Website.
ListMotor Email List Manager, operates with email stored in simple text files or csv files.

|