|
|
Security
|
R-Firewall License: Freeware
|
|
|
R-Firewall is an effective and easy-to-use solution to secure your on-line activity. It protects a computer connected to a local network and/or to the Internet against any intrusions, attacks, trojans, spyware, and other external and internal threats. R-Firewall also filters out inappropriate Internet pages content and blocks dangerous active components you may get while browsing over the Internet or receiving e-mail massages. Automatic configuration during setup allows you securely surf the Internet right after the software installation. Mobile users can create multiple and easily switchable configurations for specific network environments (Internet surfing at home, office local networks, or public Wi-Fi spots).
Author: R-tools technology Inc.| Date: 23-12-2004 | Size: 3399 KB
|
|
- |
|
OpenSSL License: Freeware
|
|
|
By using the Open SSL 0.9.7c library, developers can write applications that take advantage of Secure Sockets Layer (SSL v2/v3), Transport Layer Security (TLS v1). The Open SSL library uses the included full-strength general-purpose cryptography library, which can be used by itself. Security features such as the following can be implemented: · Data integrity: An application can detect if data has been modified during transmission. · Authenticity: An application can verify the identity of the sender using certificates. · Privacy: An application can ensure that no intermediary between the sender and the recipient can understand the data. Transport Layer Security is an extension of SSL. It is now overseen by an international standards organization. It provides the same capabilities as SSL (data integrity, authenticity, and privacy between client and server), but takes advantage of newer, more advanced cryptographic technology. It is backwards compatible with SSL. The cryptographic library includes a multitude of encryption algorithms. The symmetric, or private key, encryption algorithms offered include Rijndael (now officially the Advanced Encryption Standard, or AES, algorithm of the U.S. government), IDEA, DES, 3DES, RC2, RC4, and Blowfish. The asymmetric, or private/public key, encryption algorithms include RSA, DSA, and Diffie-Hellman. Also included are message digest algorithms such as MD2, MD5, MDC2, and SHA, whose resulting hashes can be used by digital signature schemes to digitally sign documents. The Open SSL library uses some but not all of these algorithms. To compile for the Win32 platform, Perl or compiling under Cygwin is required. Some of the encryption routines/algorithms are covered by patents.
Author: ComponentSpot| Date: 30-09-2003 | Size: 2879 KB
|
|
- |
|
SplitSafe License: Freeware
|
|
|
SplitSafe: Security–Software mit TÜV-Zertifikat SplitSafe protects your data on notebooks and PCs from unwanted access. Comparable to the concept of a pirate´s treasure map that is torn in two parts, SplitSafe divides your data and saves it on two different storage media, e.g. your notebook´s hard disk and a USB memory drive. What makes SplitSafe different from today´s security technologies? Known procedures like encryption and password protection are not safe when it comes to hacker attacks or careless use of passwords. SplitSafe closes this security gap by physically dividing the data onto two storage media and offers data security that has been certified by the German authority for product quality, the TÜV. The data is divided in such a way, that the individual parts do not allow access, reading, changing or reconstruction of the original information. All you have to do for perfect data protection is to keep your mobile storage device, e.g. a USB memory stick, apart from your notebook or PC. How does SplitSafe work? After the installation of SplitSafe an additional virtual hard disk will be available in your Windows system. Once you have connected a mobile storage medium to your notebook or PC you can save the files you want to protect on your virtual hard disk and you can access, copy open, change or delete the files as usual. If you save a file on your virtual SplitSafe drive, the data is automatically divided.
Author: Living Byte Software GmbH| Date: 23-07-2004 | Size: 2599 KB
|
|
- |
|
PAL PC Tracker Lite License: Freeware
|
|
|
PAL PC Tracker is a computer tracking and theft recovery software system. PC Tracker allows the user to do their own monitoring and works with both Laptops and Desktop computers. Every time you boot your computer and have an Internet connection, PC Tracker sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer.
Author: PAL Solutions Ltd.| Date: 01-04-2003 | Size: 1200 KB
|
|
- |
|
AES Free License: Freeware
|
|
|
AES Free is the program that creates self-extracting encrypted AES-files for Windows. Self-extracting files are executable programs (EXEs) that contain a AES-file and the software necessary to decompress the contents. Users can decompress the contents of a self-extracting AES-files simply by running it like any other program. No other software is needed. These self-extracting AES-files are ideal to storage and electronically distribute the information because they contain multiple compressed files and folders.
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 515 KB
|
|
- |
|
TradUtil License: Freeware
|
|
|
TradUtil is an editor and repair tool for the CompuTrac and MetaStock 3.01 security pricing data formats. Both end-of-day and intraday file formats are supported. Manipulation of DOP files is supported for compatibility with the CompuTrac data format although many programs no-longer require these to be able to read and write the data. The front end has a file manager/explorer style front end which facilitates copying and moving of data files between directories. The utility uses a standard windows MDI Interface to allow multiple editor and/or directory windows to be open at one time.
Author: Twaddle Software| Date: 21-08-2003 | Size: 1487 KB
|
|
- |
|
DynamicalPassword License: Freeware
|
|
|
With "Dynamical Passwords" you may generate passwords on any date (even each day). There is no need to remember or save all these generated passwords as far as you can remember you personal password (key) and the date. It is also useful for discovering weak links in a complex security system with many passwords protected elements/units.
Author: Igor| Date: 02-12-2002 | Size: 11 KB
|
|
- |
|
Keyboard Spectator Free License: Freeware
|
|
|
Keyboard Spectator is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as the caption of that window. Thus, this software combines two very important qualities - it records all typed data, so that you won't lose it when your computer unexpectedly crashes, and it keeps the record of all keyboard activity. It allows you to monitor your children's activity at home or to make sure your employees do not use company's computers inappropriately. There are three versions of keylogger Keyboard Spectator - Free, Standard and Pro. Keyboard Spectator Free is absolutely free, contains all basic features described above and is intended for non-commercial use at home as a keylogger. Keylogger Keyboard Spectator Standard and Pro is a well known, highly praised IT security oriented software that goes beyond recording keystrokes. While it was originally created for corporations and small businesses, it is becoming increasingly popular for home use as well. The main reason for that is extended capabilities of Pro or Standard versions. Industry experts regard Keyboard Spectator Standard and Pro as the best low-cost non-invasive software from the key logger family. All major corporations use keyboard loggers to prevent loss of data and to monitor employees' activity; large part of them chose Keyboard Spectator from www.refog.com Keyboard Spectator is sold on a try-before-you-buy basis, which means there are no up front costs. You are given substantial time period to try and test the software to make sure this is the application you've been searching for. Download Keyboard Spectator now.
Author: ReFog Software| Date: 2-82-2004 | Size: 1279 KB
|
|
- |
|
Jetico Personal Firewall License: Freeware
|
|
|
Jetico Personal Firewall checks every packet that comes in or out of your computer. Using configuration sets for Security Policy you define how your computer is connected to the local network and the whole Internet. Your computer may be completely hidden from any unfriendly attempts to access your hard drive while you are able to access any web sites you want and you decide on which applications are allowed to access Internet and which are not. With Jetico Personal Firewall you feel secure, safe and protected while enjoying all Internet activities.
Author: Jetico, Inc.| Date: 17-02-2004 | Size: 2688 KB
|
|
- |
|
Chilkat Digital Certificates Component License: Freeware
|
|
|
Chilkat Certificate makes it easy to get information about the security certificates that are stored on your computer. It also allows you to easily add certificates to a certificate store, remove certificates from a store, or find a certificate that should be used for a particular purpose, such as secure email.
Author: Matt Fausey| Date: 18-12-2002 | Size: 1000 KB
|
|
- |
|
dsCrypt License: Freeware
|
|
|
dsCrypt is AES/Rijndael file encryption software with simple, multi-file, drag-and-drop operations. It features optimal implementation, performance and safety measures. dsCrypt uses an advanced encryption algorithm and offers unique options for enhanced security. FEATURES - extensively tested and widely accepted algorithm - BruteHalt and exceptional resistance to brute-force password search - inherent resistance to brute-force key search - Secure PassPad and immunity to keylogger-infested environments - disclosed implementation and code details - secure use of system resources - verified data and file processing - efficient user interface and operation - speedy performance - really small executable file - self-contained and dependency-free - installation-and-pollution-free - freeware status and unrestricted distribution
Author: Dariusz Stanislawek| Date: 01-01-2003 | Size: 25 KB
|
|
- |
|
ManageEngine WiFi Manager License: Freeware
|
|
|
WiFi Manager is a combined WLAN security and management software for 802.11 a/b/g networks. It presents a Web-based view of all wireless networks operating in your building, access points available inside each network, status of those access points, channel at which they operate, mobile clients connected to them and their signal strength/ noise values, and association history. You can configure/ upgrade firmware of access points using this software. And once integrated with RF sensors, WiFi Manager becomes a full-fledged wireless IDS system generating more than 40 different security alarms on rogue APs, intrusions, denial-of-service attacks, and vulnerabilities. WiFi Manager can monitor both wired and wireless LANs. It automatically discovers access points, routers, switches, servers, desktops, and printers, and monitors them for availability, health, errors, and utilization. Note: Free Edition manages 3 access points and 10 wired devices.
Author: AdventNet, Inc.| Date: 30-11-2004 | Size: 20480 KB
|
|
- |
|
Easy Menu License: Freeware
|
|
|
There are many hard disk menu systems but none as simple and flexible as Easy Menu. Unlike most systems which only allow you nine items to a page, Easy Menu can accomodate up to 200 and any of those can call sub menus which can also hold up to 200 items. You can select programs from Easy Menu by the arrow keys, by typing the number or with full alphabetic search. Easy Menu includes a unique security system. Instead of just password protecting individual programs, you can also annotate each program as "User" or "Administrator only". When you lock to user items, the programs which are for the administrator only, simply dissapear from the menu. You can also prevent users from exiting to the DOS prompt ! If you administer DOS PCs, Easy Menu is the ideal front end..
Author: John Turnbull| Date: 26-12-2003 | Size: 200 KB
|
|
- |
|
Hide Files & Folders License: Freeware
|
|
|
Hide Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access to the file or folder, otherwise not. Hide Files and Folders does not modify your media: in protecting your files or folders, it just uses a high-reliability VXD driver working at Windows kernel level. This guarantees that Hide Files and Folders will never lose your data, as may happen if you use other file- and folder-protecting software. Due to unique technology, the program also lets you protect system files and folders such as the Windows System, Registry and Swap files. Go ahead! Download the program right now! You will find it very easy to use.
Author: IM-Soft| Date: 08-10-2004 | Size: 808 KB
|
|
- |
|
cryptlib License: Freeware
|
|
|
Cryptlib by Peter Gutmann is a security toolkit that allows even less experienced programmers to add strong encryption and authentication services to their programs, security features that are becoming more and more indispensable. The library attempts to hide the low-level details of encryption/decryption and authentication from programmers, allowing them to quickly make their projects more secure. Some of the symmetric encryption (private key) and authentication algorithms that cryptlib supports include the following: · AES (Rijndael) · Blowfish · DES, 3DES · RC2, RC4, RC5 The following hash algorithms are available in the library: · MD2, MD4, MD5 · RIPEMD-160 · SHA It offers services such as: · S/MIME · SSL/TLS · ssh It features various hashed message authentication code algorithms: · HMAC-MD5, HMAC-SHA, HMAC-RIPEMD-160 Finally, asymmetric (public/private key) encryption algorithms such as the following are available: · Diffie-Hellman, DSA, RSA cryptlib can also be used with a variety of crypto devices (for example, Fortezza cards and Smart cards). The library is free if used in personal, freeware, or shareware projects. The library is written in C. ActiveX and C++ wrappers are provided. The project is OSI Certified Open Source Software.
Author: ComponentSpot| Date: 10-03-2004 | Size: 1347 KB
|
|
- |
|
Free Parental Control License: Freeware
|
|
|
Detects and removes explicit adult material Removes Cookies, Cache and URLs of explicit websites visited.
Author: Proxymis Multimedia| Date: 01-01-2003 | Size: 700 KB
|
|
- |
|
SPAM Shredder License: Freeware
|
|
|
SPAM Shredder is an anti-spam email client that automatically classifies incoming emails as spam or non-spam. SPAM Shredder is a spam filtering software that lets you remove spam emails just from the mail server without pulling them down into your Inbox. SPAM Shredder ensures the efficient and easy control under incoming emails, thus helping to save your time and money! Applying the SPAM Shredder allows to determine up to 99.9% of spam emails. SPAM Shredder is a powerful and comfortable email client with effective spam filtering and good privacy and security protection.
Author: Safe Soft Corporation| Date: 22-08-2004 | Size: 983 KB
|
|
- |
|
The Shredder License: Freeware
|
|
|
BE CAREFUL WITH THIS APPLICATION! It is a file shredder, as the name implies and if used incorrectly, it can permanently destroy files on your hard drive! I've built in lots of bells and whistles and warnings, so it should be difficult (to say the least) to blow something up and not know it! The Shredder, despite its risky nature, is a useful program that can increase your personal security by eliminating sensitive files. This program was experimental and intended to lay the foundation for file shredding techniques I have since used in many other programs.
Author: Corby Johanneson| Date: 29-02-2000 | Size: 319 KB
|
|
- |
|
Keyboard Spectator Lite License: Freeware
|
|
|
Keyboard Spectator is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as the caption of that window. Thus, this software combines two very important qualities - it records all typed data, so that you won't lose it when your computer unexpectedly crashes, and it keeps the record of all keyboard activity. It allows you to monitor your children's activity at home or to make sure your employees do not use company's computers inappropriately. There are two versions of Keyboard Spectator - Lite and Pro. Keyboard Spectator Lite is free, contains all basic features described above and is intended for non-commercial use. Keyboard Spectator Pro is a well known, highly praised IT security oriented software that goes beyond recording keystrokes. Originally created for corporations and small businesses, it is becoming increasingly popular for home use. The main reason for that is the extended capabilities of Pro version.Unlike KS Lite, it can run invisibly in the background, record names of all executed programs, supports multi-user operating systems, has multi-lingual support, provides password reminder option and is highly stable and secure. Industry experts regard Keyboard Spectator Pro as the best low-cost non-invasive software from the key logger family. All major corporations use keyboard loggers to prevent loss of data and to monitor employees' activity; large part of them chose Keyboard Spectator from www.refog.com Keyboard Spectator is sold on a try-before-you-buy basis, which means there are no up front costs. You are given substantial time period to try and test the software to make sure this is the application you've been searching for. Download Keyboard Spectator now.
Author: ReFog Software| Date: 05-10-2003 | Size: 439 KB
|
|
- |
|
SoftPerfect Personal Firewall License: Freeware
|
|
|
SoftPerfect Personal Firewall is a free network firewall designed to protect your PC against attacks from the Internet or via a local area network. SoftPerfect Personal Firewall offers customizable security using user-defined rules for packet filtering. It works at a low level and also allows you to create rules based on non-IP protocols such as ARP. SoftPerfect Personal Firewall supports multiple network adapter configurations. This allows you to apply a rule, for example, for just a modem connection or you could apply separate rules for each system interface. With a flexible filtering system, trusted MAC address checking feature and separate network adapter configuration you can even use it on a router or a server. SoftPerfect Personal Firewall has a learning mode, which prompts you for required actions when it detects an unknown packet. This helps you to create customized rules quickly. The program is easy to use, comes with a set of predefined rules and it is completely free. Additional features include password protection, logging and more.
Author: SoftPerfect Research| Date: 22-09-2004 | Size: 900 KB
|
|
- |
|
MyOdd Desktop Application License: Freeware
|
|
|
MyOdd is a complex application that allows you to take control of your desktop and processes currently running on your system. With a higher level of security you can prevent or simply limit the use of any application, (even if you are not the administrator). For example could prevent your kid from playing games after 8:00 pm so they can do their homework… You can take screen shots on regular basis to see what other users where doing while you were away. With MyOdd Desktop management software you can hide applications at the click of a button, or even hide groups of applications using a different set of keys. Any hotkey that you choose will stop, start or hide any software you want. With a simple update function you get the latest version for maximum protection. Now with MyOdd Desktop management software you can hide applications at the click of a button, or even hide groups of applications using a different set of keys. Some of the security options allow you to... -Take a picture of the screen at regular intervals or when a new application is started. -Control, monitor, what is running on your system -Who is running what, and when they were running it. -When a certain application can run, (great if you need to ensure your kids are not playing more than they really should). -A complete logging system allows you to monitor who used what application. And much more... The help manual offers a tutorial as well as a Frequently asked question section. An advanced web update system ensures that you have all the latest versions available at all time. By http://www.myoddweb.com
Author: MyOddweb.com| Date: 01-02-2004 | Size: 2537 KB
|
|
- |
|
Charlies Angel Code Breaker License: Freeware
|
|
|
Your mission is to prove that you have what it takes to get past the ultimate security system. You are faced with a walls of code blocks, which you must break through. Clear them all and you are one step closer to gaining full access to the main computer system and the secrets the hold.
Author: Free Web Games| Date: 10-01-2005 | Size: 560 KB
|
|
- |
|
Ascella Log Monitor License: Freeware
|
|
|
Allows users to monitor events recorded in the Application, Security, System logs, dispatches the notifications about events via LAN, which can be received by the Windows NT4/2000 Messenger service, and using e-mail, SMS and ICQ (via e-mail gates)
Author: AAR Software Ltd.| Date: 21-07-2002 | Size: 700 KB
|
|
- |
|
Imaginary Web Server License: Freeware
|
|
|
An unprotected Windows computer connected to the Internet is in danger of being broken into by outside intruders who continuously scan the Internet for security holes. Many computers use a firewall for protection. Unfortunately, firewalls can be bypassed by clever attackers. The Imaginary Web Server (IWS) makes the attackers think that they have found a web server which is no longer active. When they come to your computer, the server will give them an error message and send them to http://some.imaginaryplace.com - some imaginary place on the web. Now, don't worry, you will not be sending them to some unsuspecting web site! Whiz Kid Technomagic has secured the imaginaryplace.com domain and delegated the some.imaginaryplace.com subdomain, so they will, indeed, find the "new" location of "your" web site. They will go there and leave your computer in peace. Meanwhile, your computer remains perfectly safe from these attackers. No matter what file they try to access on your computer, no matter what command they try to execute on your computer, your IWS always reacts the same way. It never lets them access the inside of your computer but always sends them off. Some attackers try a different approach. Instead of trying to get to your files, they try to upload files to your system. Often these are scripts or programs they want to run on your computer. The Imaginary Web Server will, again, tell them there no longer is anywhere to upload files on your system and will send them away. Some attackers try to upload huge files, just to keep your system busy and to slow down your Internet access. The IWS shuts the door on them. Other attackers try to sneak in a hidden web server on your system and let that server cooperate with the attackers. But only one web server can exist on your computer. With IWS running, they cannot run. And if they start running first, IWS will tell you that another web server is already running, so you can find it and disable it.
Author: G. Adam Stanislav| Date: 25-02-2003 | Size: 28 KB
|
|
- |
|
RegistryProt License: Freeware
|
|
|
RegistryProt is a 100% free, standalone, compact, low-level realtime registry monitor and protector, that adds another dimension to Windows security and intrusion detection. By monitoring important locations and keys in the Windows system registry, RegistryProt will alert whenever a key is added or changed, and then give the option of accepting the key change, reverting back to the original key setting, or deleting the key. RegistryProt's most useful attribute is that it will detect the vast majority of trojans at the exact moment that they infect/install themselves into your system, and as such provides a new dimension in trojan and intrusion detection.
Author: Diamond Computer Systems| Date: 18-10-2001 | Size: 68 KB
|
|
- |
|
HSLAB Logger Lite License: Freeware
|
|
|
The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media. Using this software to become possible to receive the information about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file name or keyword) or to CD/DVD/Zip and other removable media. This is very useful for the rigid control over use of computer systems in business and for the parental control over children's actions. The program is NOT keylogger and does not write any keystrokes! This is a principle position. The information, collected by the program is more enough for the control over use of a computer and without recording of the user's passwords. Using this software you can: - record user's activity; - record actions only the selected users or all users; - record the restricted actions or all actions; - use a ban list for prevention of some actions; - rectrict access to removable drives end execute some actions when the restriction occur; - rectrict access to programs end execute some actions when the restriction occur; - rectrict access by keywords end execute some actions when the keyword found; At access to removable drives you can set the following actions: - write information about this event to log and continue; - eject removable media and continue; - shutdown Windows. At access to programs you can set the following actions: - write information about this event to log and continue; - kill restricted program and continue; - shutdown Windows.
Author: Oleg Golub| Date: 04-03-2003 | Size: 1816 KB
|
|
- |
|
CleverCrypt Lite (Freeware) License: Freeware
|
|
|
Create a password protected, fully encrypted hard drive to store all of your private files in. Just copy your files into your CleverCrypt drive for total protection. <p> The instant you save data into a CleverCrypt drive, CleverCrypt automatically scrambles the data before it is saved on the drive. Once you close your drive or turn off your computer, your secure drive is automatically locked. You don’t have to remember to secure your data: CleverCrypt does it for you every time. To access your data again, simply open CleverCrypt and supply the correct passwords to access your confidential information. <p> Even if your whole computer is stolen, your data will remain locked in the virtual drive, safe from prying eyes. Without your passwords, the data is simply not there! <p> CleverCrypt is the perfect security tool for lawyers, doctors, government establishments and any practice dealing with highly sensitive information. <p> You can use CleverCrypt to protect any office documents, including spreadsheets, confidential documents, presentations, emails, client lists, accounting information and scheduling diaries. <p> CleverCrypt Lite is completely free! <p> If you like our product, please consider purchasing the full version to support our work.
Author: Quantum Digital Security| Date: 24-08-2004 | Size: 3730 KB
|
|
- |
|
ServerMask License: Shareware
|
|
|
A major security issue is the exposure of a Web server’s identity via its HTTP header. Broadcasting this data makes it easier for a potential intruder to complete their first hacking task: identifying your operating system and Web server. ServerMask 2.0 obscures the identity of a Windows Web server by removing the most obvious signs that you are running IIS. This ISAPI filter removes or modifies unnecessary HTTP and SMTP response data.
Author: Port80 Software| Date: 01-11-2002 | Size: 612 KB
|
|
- |
|
Net-It Now License: Freeware
|
|
|
Free Net-It Now is a simple, client-side utility that converts any Windows-based file to the compressed CSF (Content Sealed Format) format and let users add Visual Rights persistent security, including password protection, expiration dates, and feature restrictions. Publish files directly to a Web page with embedded viewer or attach directly to an e-mail message. Files are viewable with the free Brava! Reader.
Author: Informative Graphics Corp| Date: 20-08-2004 | Size: 6659 KB
|
|
- |
|
Kinar KeepSafe FreeMail License: Freeware
|
|
|
Kinar KeepSafe is the easiest to use secure email solution available today.Based on patent pending Universal Digital ID (TM) technology, FreeMail provides the enterprise level security without any prior setup, use of passwords, or manual key/certificate exchange. Simply download, install and activate your existing email account as a secure e-mail account. Then you'll be ready to send encrypted e-mail and attachments to anyone with an email address. It's that simple. It is the only secure email solution that allows you to use public-private key cryptography with anyone, beyond the boundaries of an organization. KeepSafe works as a standalone email application or with popular e-mail applications. Also, it is deeply integrated with Microsoft Outlook and Outlook Express. FreeMail allows an unlimited number of encrypted messages to up to ten other users. Also check out KeepSafe Professional. It allows you to send restricted documents - documents that cannot be shared or forwarded by the recipient with other users. Now you can ensure that your pictures or documents do not end up in the wrong hands or all over the Internet. Kinar KeepSafe does NOT install any spyware or adware. Your emails go through your email gateways; NOT through any Kinar servers. Kinar does not collect any private information about you. Get the power of Universal Digital ID working for you.
Author: Kinar, Inc.| Date: 04-08-2004 | Size: 4749 KB
|
|
- |
| 1 | 2 | 3 | 4 | 5 |
|
|
Universal Explorer
Powerful windows explorer file manager and viewer.

Disk Size Manager Analyses hard disk space and collects statistics.

Web Data Extractor Email marketing software to extract specific contact.
 BackStreet Browser Powerful Offline Browser - Download Entire Website.
ListMotor Email List Manager, operates with email stored in simple text files or csv files.

|