Freeware: Only Free Software, Games, Tools, Utilities. Free Download Center Freeware Home New Submit Links Contact Advertise
Business| Desktop| Developer Tools| Drivers| Education| Games| Home & Personal| Internet| Multimedia| Operating Systems| Utilities
 

 


Freeware Download: Cryptographic Algorithms

 

 CHAOS Compressor  License: Freeware

 
  Data compression utility, which allows you to quickly open, create, and modify your archives.

Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 491 KB
  -
 

 ABC CHAOS  License: Freeware

 
  What can you do with ABC CHAOS? Easily encrypt files into your personal data archive. You can be confident that the data is safely secured. The additional special protection completely excludes an opportunity of selection of the password to the encrypted information at use of the generator of the passwords and keys.

Author: Security Resources Group| Date: 10-01-2003 | Size: 368 KB
  -
 

 CHAOS Generator  License: Freeware

 
  CHAOS Generator is an application designed to generate passwords of any length and character content. CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. The passwords are displayed and can be copied to your clipboard.

Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 201 KB
  -
 

 AES Free  License: Freeware

 
  AES Free is the program that creates self-extracting encrypted AES-files for Windows. Self-extracting files are executable programs (EXEs) that contain a AES-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting AES-files simply by running it like any other program. No other software is needed. These self-extracting AES-files are ideal to storage and electronically distribute the information because they contain multiple compressed files and folders.

Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 515 KB
  -
 

 CHAOS Self Extractor  License: Freeware

 
  CHAOS Self-Extractor is the program that creates self-extracting chaos-files for Windows. Self-extracting files are executable programs (EXEs) that contain a chaos-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting chaos-files simply by running it like any other program. No other software is needed.These self-extracting chaos files are ideal to electronically distribute the information because they contain multiple compressed files and folders.

Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 531 KB
  -
 

 FineCrypt Archiver  License: Freeware

 
  FineCrypt Archiver is a powerful but easy-to-use file encryption software for protecting files on your computer with strong encryption algorithms. FineCrypt Archiver integrates with Windows shell so that you can encrypt and decrypt files from within Windows Explorer or desktop. You can choose for encryption one of 10 encryption algorithms. Package also contains integrated file wiper for permanent deletion of files from your hard disk.

Author: Crypto Systems, Inc.| Date: 11-03-2003 | Size: 2600 KB
  -
 

 CHAOS Shredder  License: Freeware

 
  Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, there are many tools available which can let others easily recover your sensitive files even after you have formated the hard disk. Sensitive data can easily fall into the wrong hands. And because Windows is not capable of deleting information beyond recovery, you are at risk! Passwords, financial documents, even those "about last night" e-mails are fair game for the IT professionals, computer technicians or hackers. CHAOS Shredder allows you to purge, wipe and erase data with methods that far exceed US Department of Defense standards for file deletion (DOD 5220.22).

Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 287 KB
  -
 

 BCArchive  License: Freeware

 
  With BCArchive software you may encrypt and compress a group of files/folders to an encrypted archive (i.e. single file). You may store all you confidential files in such archive accessing it whenever you need it. All your files are encrypted, i.e. protected from unauthorized access. You may create self-extracted program containing encrypted archive and e-mail it to your friend. He/she will receive this archive and can read your files, either via knowing correct password or via using public/secret key technology. All already generated public and secret keys used in other programs can be also used in BCArchive to create encrypted archive and e-mail it to desired recipient. BCArchive uses strong symmetric encryption algorithms such as Blowfish, IDEA, Triple-DES, CAST5; secure hash algorithms: SHA-1, MD5, RIPEMD-160; asymmetric (public/secret key) algorithms such as RSA, ELGamal/Diffie-Hellman; conforms to specifications PKCS #5, PKCS #12, X.509. BCArchive is convenient software product providing you with strongest encryption technology and ability for efficient management of sensitive data.

Author: Jetico, Inc.| Date: 22-10-2004 | Size: 2399 KB
  -
 

 EDXOR  License: Freeware

 
  EDXOR is a versatile, convenient and optimal text editor and file processor that far surpasses the capabilities of other Notepad-like applications. It offers innovative clipboard handling, cryptographic options and logic text conversions, great for education, fun, or privacy. EDXOR is small, self-contained, dependency-free and very fast. It provides over 90 menu items, including many unique functions and options, for diverse applications.

Author: Dariusz Stanislawek| Date: 01-01-2004 | Size: 35 KB
  -
 

 Penis Size-O-Matic  License: Freeware

 
  This program uses a complex set of algorithms and some hella nifty DLLs to dynamically increase and decrease the size of the user's penis using only their computer. Oh! But it doesn't really.

Author: Kevin Lyall| Date: 19-10-2003 | Size: 1870 KB
  -
 

 ClipSecure  License: Freeware

 
  ClipSecure is a simple, secure, freeware text encryption utility that operates with the Windows clipboard, and therefore can be used within any text-based program and most email clients. It uses many industry-accepted algorithms, including the AES (Rijndael) standard, to provide maximum security. Encrypt and decrypt text with one keystroke, or manually control every step of the process. File encryption is also supported. ClipSecure was designed to be a small, fast, easy-to-use security solution for those (like me) who prefer to avoid the size and complexity of programs like PGP, and yet still have industry-strength encryption. Here's your first look at ClipSecure... the paragraph above encrypted with the default AES algorithm and a password of 'test': 6CPnKHPDoy6Sd+p/e2crR77pQXNZr9umnDGyE98l2Pfcqmp8lRcvwdhcpd4j0qNK52X3SwH0NS2W OtypLte+Wn35SPxuRhixXZIWdB/FiuQacM0UFg5umM4od4+TVBQXMDX8xe7O9o9ElsjPh0ejvgM4 ZDYh9jbspJRAkNFCUbBCydtfeG8lXjDWSrajpyWb/hyFwcYpFHCokETexxNo

Author: Andrew Ferguson| Date: 20-11-2002 | Size: 330 KB
  -
 

 FastSum  License: Freeware

 
  FastSum is an extremely fast utility for your files integrity control. The high accuracy and speed attains through the usage of a well-known and time-proved cryptographic algorithm, as a matter of fact FastSum is a Windows MD5 Checker. You do not have to be afraid of these unintelligible words, all you have to know is – how to run FastSum. You can rectify the errors occurring while data transfer. For example: Network transfers, CD-R and DVD burning, software errors and much more. FastSum calculates short and strong digests of your data via MD5 algorithm to use it as references checksums for ulterior data integrity verification. FastSum is developed for easy processing of a huge files count and has usable command-line interface. To make the work easier FastSum MD5 utility for Windows provides special filters, which allow selecting only specific file types. It is an analogue of a famous md5sum software for Unix platform, it is convenient and powerful. FastSum is also a reliable way to check the changes within your data. It allows you to build a list of altered files for review while demonstrating an incredible speed of processing. Besides, this software is Unicode, so there will not be any problems working with files named in different languages.

Author: Kirill Zinov| Date: 14-06-2004 | Size: 519 KB
  -
 

 P-Guard  License: Freeware

 
  KEEP YOUR DATA PRIVATE!P-Guard uses strong and certified cryptographic services, >which allow encrypt any type of sensitive user's data.>Only person, who is owner of encrypted file may decrypt this file.>Shell integration allows to use P-Guard with maximum comfort:>You can start P-Guard from right-mouse context menu or>you can easily integrate the P-Guard in your favorite file manager.

Author: SoftMajor Com.| Date: 22-12-2002 | Size: 385 KB
  -
 

 HashCalc  License: Freeware

 
  Free calculator to compute multiple hashes, checksums and HMACs for files, text and hex strings. It allows to calculate hash (message digest), checksum and HMAC values based on the most popular algorithms: MD2, MD4, MD5, SHA1, SHA2 (SHA256, SHA384, SHA512), RIPEMD160, PANAMA, TIGER, CRC32, ADLER32, and the hash used in eDonkey (eDonkey2000,ed2k) and eMule tools. It supports 3 input data formats: file, text string and hexadecimal string. It is a very fast, easy to use and to install application. It works with large size files, supports file drag-and-drop functionality. HashCalc generates hash, check sum, and HMAC for files of any type which makes it a valuable utility to test for corruption your FTP and other download/upload transfers. With this tool you can quickly compare music, audio, sound, video, film, game, image, icon, document and other files, verify CD and hard drive files, perform checking of your .mp3, .mpeg, .mpg, .avi, .vcd, .iso, .zip, .gif, .jpg, .doc and other downloads.

Author: SlavaSoft Inc.| Date: 15-07-2004 | Size: 440 KB
  -
 

 Windows 2000 Protected Store Key  License: Freeware

 
  A Protected Store is provided as part of CryptoAPI, in order to provide secure storage for sensitive information such as private keys and certificates. By design, the Protected Store should always encrypt the information using the strongest cryptography available on the machine. However, the Windows 2000 implementation uses 40-bit key to encrypt the Protected Store, even if stronger cryptography is installed on the machine. This vulnerability weakens the protection on the Protected Store, but does not eliminate it. An attacker would need to gain complete administrative ontrol over the machine that houses the Protected Store in order to gain access to it, and even then would still need to mount a brute-force cryptographic attack against it. However, customers who follow the recommended remediation for this vulnerability can ensure that such an attack would be significantly more difficult, if not impossible.

Author: Microsoft| Date: 31-07-2000 | Size: 282 KB
  -
 

 Password Depot  License: Freeware

 
  Password Depot is a powerful and user-friendly tool to securely manage your passwords. Take advantage of the following features: -Up-to-date security algorithms for the encryption of your data -Protection by virtually uncrackable passwords, generated by the integrated password generator -Top bar for easy navigation -Auto-completion of password fields -Easy management of all your passwords -Backup and export tools for your data

Author: Stefan Richter| Date: 16-03-2003 | Size: 2360 KB
  -
 

 UserManagemeNT Lite  License: Freeware

 
  UserManagemeNT Lite is the free version of UserManagemeNT Professional, featuring advanced user creation for Windows NT and Active Directory networks including user resources, such as home directories & shares, customizable permissions, group memberships and Exchange mailboxes. UserManagemeNT Lite features a graphical user interface, advanced username and password generation algorithms and template based configuration.

Author: Tools4ever| Date: 16-08-2003 | Size: 4158 KB
  -
 

 Crypto Anywhere  License: Freeware

 
  Crypto Anywhere is secure email on the move ! Users can decrypt and encrypt messages to friends who use PGP, OpenPGP, SecExMail and many more. Crypto Anywhere allows you to make a travel floppy which can be used in internet cafe's or at work. You don't even need to install the software - just run it from the floppy disk or USB thumb drive. Encrypted messages can be sent to friends who don't even have Crypto Anywhere. Registered users can use Crypto Anywhere for commercial purposes. Crypto Anywhere implements trusted, industry standard, strong encryption algorithms based on RSA public key encryption, the Twofish block cipher, ISAAC random number generator and OpenPGP.

Author: Bytefusion Ltd.| Date: 07-04-2004 | Size: 2987 KB
  -
 

 AxCrypt  License: Freeware

 
  File encryption for Windows 95/98/ME/NT/2K/XP using the AES algorithm with 128-bit keys. It combines strong symmetric encryption with compression (automatically used if needed) and double-click editing/viewing. Encrypted files have a '.axx' extension added to their names, and are shown with a new icon. To encrypt a file, right-click it in Windows Explorer and select 'AxCrypt | Encrypt'. To edit or view an encrypted file - just double-click it. To decrypt, right-click and select 'AxCrypt | Decrypt' instead. No configuration is necessary. Run the installer, and AxCrypt is ready to use. English, German, French, Spanish, Italian or Swedish will be used for messages and dialogues depending on the language of the system. Documentation and installation scripts are in English. UNIQUE FEATURES The following are features that really set it apart from other file encryption tools, commercial as well as free: - Double-click to edit/view with any application, with automatic re-encryption when done. - Extensive optional command-line interface for scripting and programming. - Integrated shredder. - 6 languages in one executable distribution. - No options or user interface - easy to install and use. - Absolutely no configuration needed - just use it. - Secure memory handling - no keys or data in the paging file - Private branding support for commercial or corporate versions. - Open source under GNU GPL.

Author: Svante Seleborg| Date: 11-08-2003 | Size: 296 KB
  -
 

 Raster To Vector  License: Freeware

 
  Raster To Vector converter is the most powerful and absolutely free solution for digitizing vector data from image sources. It combines the power of outline vectorizing technology with many unique features such as: - Customizable noise suppression; - Autoincrease quality for small-sized objects; - Intelligent nodes optimization; - Bezier Spline smoothing; - Automatic contours creation; - Full True Color support; - Ultrahigh conversion speed and many other. You can use Raster To Vector PlugIn to process charts, drawings, maps, schemes and other similar images. Palette and True Color images are supported in BMP, JPG and GIF formats. Raster to vector conversion process is fully automatic and needs no human intervention. R2V Converter is an ultimate platform for industry-oriented solutions and has different tools to get a perfect set of vector data faster and easier. The unique intelligent conversion algorithms is the result of our extended research effort.

Author: Stas Semenov| Date: 17-08-2004 | Size: 1430 KB
  -
 

 Chilkat XML Messaging  License: Freeware

 
  Makes adding peer-to-peer XML messaging to your distributed applications easy. Integrates with Chilkat SSL, Chilkat Real-Time Compression, and Chilkat Crypt for automatic compression and security. Send and receive XML messages. Integrates with Chilkat SSL for secure messaging over SSLv3 or TLSv1. Integrates with Chilkat Crypt for automatic encryption and decryption of messages using the Rijndael, Twofish, or Blowfish symmetric encryption algorithms. Integrates with the Chilkat Real-Time Compression component for automatic compression and decompression of messages. Send and receive binary or text messages using CkData. The CkData component is handy for loading/saving data to files, accessing as binary, strings (with or without line-endings translated), Base64, Quoted-Printable, compressed, encrypted, etc. Send and receive raw binary data at the socket level if desired.

Author: Matt Fausey| Date: 04-03-2002 | Size: 1000 KB
  -
 

 MoRUN.net FREE Post It Notes  License: Freeware

 
  Free Post It Notes that offers you an easy way to keep all information you have to remember on the desktop and manage your time in a more efficient way. This is a great tool to organize information, make to-do lists or just write down imformation using post it notes. Friendly user interface lets you start using the program within minutes.You'll be amazed at how easy and quickly you can create post it sticky notes. MoRUN.net FREE Post It Notes is developed to make your work with information as convenient as possible. The appearance of computer post it notes is customized that allows you to create any post it notes you want. Various post it note settings including default settings can be modified to your preference. Using MoRUN.net FREE post it notes you can accelerate your work with post it notes using hotkeys, lock post it notes. All desktop post it notes contain information about user and time of creation. Ability to create computer post it notes with different priorities, hide post it notes or place them on the desktop, hide note's body and use transparency effect allows organize your desktop the way you want it. Post it notes are saved automatically. All information is encrypted using the strongest algorithms (with 256-bit key encryption). Download FREE Post it Notes software to keep and organize information on the computer desktop.

Author: Morun. net| Date: 05-09-2003 | Size: 68 KB
  -
 

 MoRUN.net Free Sticky Notes  License: Freeware

 
  FREE sticky notes software that offers you an easy way to keep all information you have to remember on the desktop and manage your time in a more efficient way. This is a great tool to organize information, make to-do lists or just write down imformation using personalized sticky notes. Friendly user interface lets you start using the program within minutes.You'll be amazed at how easy and quickly you can create post it sticky notes. MoRUN.net FREE Sticky Notes is developed to make your work with information as convenient as possible. The appearance of computer sticky notes is customized that allows you to create any sticky notes you want. Various sticky note settings including default settings can be modified to your preference. Using MoRUN.net FREE Sticky Notes you can accelerate your work with electronic sticky notes using hotkeys, lock sticky notes. All desktop sticky notes contain information about user and time of creation. Ability to create computer sticky notes with different priorities, hide sticky notes or place them on the desktop, hide note's body and use transparency effect allows organize your desktop the way you want it. Sticky notes are saved automatically. All information is encrypted using the strongest algorithms (with 256-bit key encryption). Download FREE Sticky Notes software to keep and organize information on the computer desktop.

Author: Morun. net| Date: 05-09-2003 | Size: 68 KB
  -
 

 FSUM  License: Freeware

 
  Free command line utility for file multi-checksum generation and verification. It allows to create/verify popular file hashes/checksums: MD2, MD4, MD5, SHA-1, SHA-2(256,384,512), RIPEMD-160, PANAMA, TIGER, CRC-32, ADLER32, and the message digest used in eMule/eDonkey (ed2k) software. Its most common use is checking files for corruption (data integrity checking). A hash/checksum calculation might be performed on data before transferring (downloading/uploading) it from one location to another. Making the same calculation after the transfer (download/upload) and comparing the former and latter results, you can check if the received data is corrupted or not. FSUM notifies about any bad, incorrect, missing file. It is a very fast, easy to use tool. Allows to recurse directories. Works with large size files. Supports .MD5 and .SFV file formats (automatically recognizes the format when verifying). Compatible with md5sum, MD5Summer, Easy MD5 Creator, SFV Checker/Verifier, WinSFV, Win CRC32.

Author: SlavaSoft Inc.| Date: 06-07-2004 | Size: 80 KB
  -
 

 MoRUN.net Sticky Notes Lite  License: Freeware

 
  Desktop sticky notes freeware that offers you an easy way to keep all information you have to remember on the desktop and manage your time in a more efficient way. This is a great tool to organize information, make to-do lists or just write down imformation using personalized sticky notes. Friendly user interface lets you start using the program within minutes.You'll be amazed at how easy and quickly you can create post it sticky notes. MoRUN.net Sticky Notes Lite is developed to make your work with information as convenient as possible. The appearance of computer sticky notes is customized that allows you to create any sticky notes you want. Various sticky note settings including default settings can be modified to your preference. Using MoRUN.net Sticky Notes Lite you can accelerate your work with electronic sticky notes using hotkeys, lock sticky notes. All desktop sticky notes contain information about user and time of creation. Ability to create computer sticky notes with different priorities, hide sticky notes or place them on the desktop, hide note's body and use transparency effect allows organize your desktop the way you want it. Sticky notes are saved automatically. All information is encrypted using the strongest algorithms (with 256-bit key encryption). Download FREE Sticky Notes software to keep and organize information on the computer desktop.

Author: Morun. net| Date: 05-09-2003 | Size: 68 KB
  -
 

 TS-WIDI Pro  License: Freeware

 
  TS-WIDI Pro performs automated recognition of polyphonic music, stored in MP1, MP2, MP3, MPP, MPA, AIF, SND, AU, WAVE formats as well as audio CD tracks. In real-time mode it instantly converts music coming through the microphone or line input of your computer into a MIDI sequence. TS-WIDI Pro contains interactive Note Editor. Recognizing pre-recorded music allows converting digital sound to MIDI format. MIDI file takes hundreds times less space than any digital sound format, which allows you to use it as a melody for your web page or make a preview of your mp3 Internet music collection. As MIDI file is, in fact, a layout of music, you can change its arrangement in contrast to digital sound. Instruments, number of voices or melody itself can be easily modified using any third-party score editor, which allows creating remixes, variations and printing musical notation. You may even put the melody in your mobile phone! On-fly recognition is a process performed in real-time, without noticeable delay. Detected notes can be either recorded or played in real time, or both. Thus you can change instruments in real-time, for example, play the guitar and get piano sound. TS-WIDI Pro provides four different note detection algorithms. A number of filtering options allows to leave aside odd notes. Monophonic methods provide recognition of one (the loudest) voice in melody but with great accuracy. Polyphonic method transcribes several voices.

Author: TallStick Software| Date: 07-05-2004 | Size: 1750 KB
  -
 

 MoRUN.net Sticker Lite  License: Freeware

 
  Windows sticky notes freeware that offers you an easy way to keep all information you have to remember on the desktop and manage your time in a more efficient way. This is a great tool to organize information, make to-do lists or just write down imformation using personalized sticky notes. Friendly user interface lets you start using the program within minutes.You'll be amazed at how easy and quickly you can create post it sticky notes. MoRUN.net Sticker Lite is developed to make your work with information as convenient as possible. The appearance of computer sticky notes is customized that allows you to create any sticky notes you want. Various sticky note settings including default settings can be modified to your preference. Using MoRUN.net Sticker Lite you can accelerate your work with electronic sticky notes using hotkeys, lock sticky notes. All desktop sticky notes contain information about user and time of creation. Ability to create computer sticky notes with different priorities, hide sticky notes or place them on the desktop, hide note's body and use transparency effect allows organize your desktop the way you want it. Sticky notes are saved automatically. All information is encrypted using the strongest algorithms (with 256-bit key encryption). Download FREE Sticky Notes software to keep and organize information on the computer desktop.

Author: Morun. net| Date: 22-07-2003 | Size: 68 KB
  -
 

 Component Conversion Utility  License: Freeware

 
  The CCU is designed to minimize the time needed to create skeleton code in a variety of languages. It allows users to define objects in a friendly GUI or to import code from a text/binary file or a database. Once components have been created or imported, the CCU can output many flavors of source code. The app is perfect for n-tier development in which coders are generally forced to redefine objects in several languages (SQL, HTML/JavaScript, Java, etc.). Beyond just creating table definitions, forms and accessor/mutator methods (respectively), the CCU propagates validation code across several languages. Use the CCU to define basic constraints (String length, number range/precision, regular expressions, etc.) and the appropriate check constraints, JavaScript validation and exception handling code (respectively) will be created. The CCU is also useful for creating backwards compatible or cross-platform versions of code. A handy SQL script, for instance, might have different syntax for various databases. Instead of managing multiple scripts, updates can be made in one place and multiple versions of the code will be output automatically. Of course, it is impossible to do perfect translation of certain algorithms or concepts. It's much easier to debug CCU output than to rewrite something from scratch, though. The app will remember which of its guesses you wish to override. This means that when you make a slight update to your code, you won't need to re-address any of your previous output customizations. And when new languages are released, you can be reasonably sure that new versions of the CCU will allow you to extrapolate from your legacy code. If you're developing an app server or a proprietary language, contact JShift ([email protected]) for licensing information. It's much easier to sell a product if prospective customers have a way to port their existing code. JShift developers can create plug-ins for new languages in as little as a few months.

Author: Hollis Waite| Date: 25-07-2003 | Size: 2415 KB
  -
 

 Interactive JPEG Optimizer  License: Freeware

 
  Interactive JPEG Optimizer is the premier solution for compressing JPEG images singly or in batches. The latest version is faster than ever, sports a brand new, more logical interface and even supports scanning! It allows you to visually see the effect of compression (something some expensive graphics packages expect you to do blind), with tools for cropping, resizing, controlling contrast/brightness and color balance - all while keeping an eye on file size and loading time for an average modem. Use Hotkeys to show and hide tool windows, view original and optimized images side by side - Interactive JPEG Optimizer never changes your original image; it always works with a copy so if you make a mistake you can start over from scratch! Tired of how long it takes to email photos to family and friends? Zipping the image helps, but graphics files, unlike plain text files can be enormous! This is strictly related to the image size and the compression algorithm used to originally store the file. Over the years, a variety of compression algorithms have been developed to reduce the size of the stored image without adversely affecting the image quality. Some of our competitors claim to take advantage of advanced compression techniques, such as variable compression, yet when we took a 63K Before image from one of our competitor's websites, we were able to achieve similar quality to their After image in under 4K - the best they could manage was almost 10K! Comprehensive online help walks you through the image optimization process step by step, clearly explaining every aspect of the image optimization process. If you need additional help Handy Productions offers free pre-sale and post-sale technical support to every user of Interactive JPEG Optimizer! This is the Must Have graphics utility for anyone who uses a digital camera, scanner, has a website or just has a lot of images on their hard drive - why not add it to your graphics toolbox today? It's FREE! Source available.

Author: John King| Date: 28-12-2003 | Size: 1047 KB
  -

| 1 |

 

 
Sponsored Shareware

Universal Explorer
Powerful
windows explorer file manager and viewer.

File Manager - Windows Explorer Replacement

Disk Size Manager
Analyses hard disk space and collects statistics.

Powerful Disk Space Manager

Web Data Extractor
Email marketing software to extract specific contact.


Web Data Extractor

BackStreet Browser
Powerful Offline Browser - Download Entire Website.

Offline Browser

 

www.DirFile.Com - Freeware Software Download

Ads: Webmaster Tool - Download Junction - ElecDir - Direct Email - HealthInfo - Web Spider