Freeware: Only Free Software, Games, Tools, Utilities. Free Download Center Freeware Home New Submit Links Contact Advertise
Business| Desktop| Developer Tools| Drivers| Education| Games| Home & Personal| Internet| Multimedia| Operating Systems| Utilities
 

 


Sensitive Files

 

 East-Tec File Shredder  License: Freeware

 
  Deleting a file with Windows or with other programs will leave the file contents on your hard disk, easy to be recovered by anyone that has access to your computer. East-Tec File Shredder securely destroys (shreds) sensitive and private files beyond recovery. Simply drag and drop files to the shredder icon on your desktop, or select the files you want to destroy directly from the Windows Explorer right-click menu. The files will be gone for good.

Author:
EAST Technologies| Date: 21-08-2002 | Size: 709 KB
  -
 

 CHAOS Shredder  License: Freeware

 
  Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, there are many tools available which can let others easily recover your sensitive files even after you have formated the hard disk. Sensitive data can easily fall into the wrong hands. And because Windows is not capable of deleting information beyond recovery, you are at risk! Passwords, financial documents, even those "about last night" e-mails are fair game for the IT professionals, computer technicians or hackers. CHAOS Shredder allows you to purge, wipe and erase data with methods that far exceed US Department of Defense standards for file deletion (DOD 5220.22).

Author:
Safe Soft Corporation| Date: 22-08-2004 | Size: 287 KB
  -
 

 SuperEdi  License: Freeware

 
  SuperEdi is the ideal text editor for web site developers and programmers. Text files can be edited locally or directly on a remote server using the build-in FTP client. Syntax coloring is included for HTML, CSS and JavaScript files, and can easily be extended for other languages. You can add powerful extensions to SuperEdi using TextPipe filters or by your own automation scripts written in JScript, VBScript or Perl. SuperEdi comes with a sample multi-level clip library, which you can extend with your own frequently used text clips. Document tabs allow for quick navigation between multiple documents and the dockable directory tree helps you locate files quickly without opening the Windows Explorer. Context sensitive information is available via keyword lookup in any Windows help file, in the MSDN library or even web search engines. A list of functions or headlines is automatically extracted from the text and enables quick navigation within large documents. SuperEdi supports Unicode UTF-8, UTF-16 as well as many locale- specific encodings. Available languages: English, Dutch, German, Portuguese, Spanish, Chinese, Greek

Author:
WoLoSoft International| Date: 01-04-2005 | Size: 1218 KB
  -
 

 ICE ECC  License: Freeware

 
  ICE ECC is a file verification and repair tool. ICE ECC allows you to protect your important files and sensitive data against digital corruption using Reed-Solomon codes. Did you know that a typical CD-R/DVD-R disk can hold its data intact for only a few years? ICE ECC is the perfect solution to this problem - before you store your data, protect it against corruption with ICE ECC. ICE ECC is easy to use. To protect a file against corruption, just select the file/files/directories with the program by navigating the explorer-style window and click Create. This creates recovery file/files of the original files. You can easily control the size and number of the recovery files. When you want to verify whether the file has been modified or if the data in it has been corrupted, just select the appropriate .ecc file and click Verify. ICE ECC will then do a full analysis of the file and let you know if it has been corrupted, in that case ICE ECC will automatically recover it for you.

Author:
ICE Graphics| Date: 09-05-2005 | Size: 1119 KB
  -
 

 Lock It Down - Free Edition  License: Freeware

 
  Lock It Down Free Edition is a powerful software that locks content sensitive files and folders using advanced file encryption methods. It has options for secure mailing of encrypted files and exclusive viewing of locked files and folders. A password wallet and a file shredder are other available features.

Author:
Lock It Down| Date: 30-12-2004 | Size: 1528 KB
  -
 

 iOpus Secure Email Attachments - Encrypted and Self-extracting  License: Freeware

 
  In just a few moments, you can create an encrypted, compressed (ZIP) attachment with your sensitive documents. Ideal for sending information by email or making secure backups. Thanks to compression, iOpus SEA packages are up to 95 % smaller than the original files, saving time and money for e-mail transmission. The recipient requires no special software, because iOpus SEA packages decode themselves after the password is entered.

Author:
iOpus Software GmbH| Date: 05-03-2003 | Size: 998 KB
  -
 

 SyncBack  License: Freeware

 
  Easily backup, synchronize, or restore your files to another drive, FTP server, ZIP file, networked drive, or removable media. Highly configurable, SyncBack includes: detailed and easy to read log files; email results; simulated backups and restore; file filters; sub-directory selection; copy verification; background backups; auto-close of programs; easy and expert modes; profile groups; compare files, and an extensive context sensitive help file. As well as English, SyncBack is also available in French, Spanish, Italian, Dutch, Polish, Brazilian Portuguese, Simplified Chinese, and Traditional Chinese. Other translations, e.g. German, will be available soon. SyncBack, developed by 2BrightSparks, is a multi-award winning solution with tens of thousands of users. SyncBack provides a dependable way of ensuring digital files are safe with a simple interface that enables the first time user to backup and save their valuable data within minutes. As well as an 'Easy Mode' for essential backup, restore, and synchronization tasks, SyncBack has an 'Expert Mode' that delivers advanced functionality. If you need to backup to an FTP server or network and email the results this is where you'll fine-tune the software. Help is always close to hand if you run into difficulties. A comprehensive context sensitive help file provides easily accessible instructions and guidance about all aspects of using SyncBack. Simply click a help button at the bottom of the window you happen to have open, and you'll get taken straight to the help page for that task. In addition an extensive Frequently Asked Questions section provides all the answers you're likely to ask when carrying out a backup, restore, or synchronization task. A lively public forum is also available at the 2BrightSparks website that provides additional help and information.

Author:
2BrightSparks Pte Ltd| Date: 31-01-2005 | Size: 1948 KB
  -
 

 Lock Folder  License: Freeware

 
  Lock Folder is a new security tool that lets you lock your files and folders with your personal password. Now nobody but you can access your most sensitive information. Locking folders and files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective protection from unauthorized access, since over 80% of reported security breaches come from within the organization, not hackers! Locking files and folders is the best way to guarantee that nobody accidentally or intentionally gets access to your financial, health, private or confidential information. And since locking your files, folders or drives makes them invisible, they can not be deleted, damaged or harmed in any other ways. Even if a virus gets introduced to your system, your locked folders will not be detected, infected or harmed. Here is the important part - Lock Folder uses the encryption standards approved by the US Government. This and others innovative and reliable technologies provide the safest way to store your information well protected against hacker attacks, malicious software and dishonest employees.

Author:
Leo van Opstal| Date: 09-08-2003 | Size: 1400 KB
  -
 

 Bati Replace  License: Freeware

 
  Replacing text in multiple VB projects is no longer tedious. Find and select your project files using a subdirectory search, select the projects and the type of modules (bas, frm, cls) you want processed. Then do as many search and replace operations as you like. Bati Replace lets you do case (in)sensitive search, 'whole word search'. Supports VB V4.0, V5.0 and V6.0. This is freeware.

Author:
Huibert van Deursen| Date: 15-12-2002 | Size: 1899 KB
  -
 

 Zilla Data Nuker  License: Freeware

 
  When you delete a file from Windows it just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! This powerful program helps you shred important files & folders so that they cannot be restored & prevent attempts to recover sensitive deleted files from your hard drive by data recovery or forensic software. Shredder allows you to purge, wipe & erase data with methods that far exceed US Department of Defence standards for file deletion (DOD 5220.22). Easily automate the cleaning process with batch files, shortcuts and scheduler. Completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Overwrites all bits in selected files, including cluster slack space, with binary 1's, 0's, and/or random bit patterns. Supports complete folder deletions including subfolders. Shreds disk free space so you can even use shredder to destroy previously deleted files on your hard drive. Drag & Drop files or entire folders Delete even if the file is locked! No trails are left of any compromising or confidential information. Easily choose the number of overwrites according to your security ambitions. The higher the number the less the probability that even finest magnetic tracks could be detected. The Department of Defense (DOD 5220.22-M) recommends seven passes for top security. You can also shred files by right-clicking on them from the MS Windows Explorer or on the recycle bin and selecting the shred item on the popup context menu.

Author:
ZillaSoft.ws| Date: 28-04-2004 | Size: 4214 KB
  -
 

 Eraser  License: Freeware

 
  Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like. The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with pseudo-random data. You can also define your own overwriting methods.

Author:
Sami Tolvanen| Date: 07-01-2002 | Size: 750 KB
  -
 

 MP3RepairTool  License: Freeware

 
  Repair your MP3 files within a second! You are currently working with your MP3 files and suddenly one file does not play anymore. This sounds familiar to you? Then we may have help for you with MP3RepairTool. MP3 files are very sensitive. Just a single modified byte can make the whole file unreadable for several MP3 player. Thus it's not hard that an accident or bug in a MP3 editor corrupts a file. But this doesn't mean that the file is lost. In most cases only the beginning of the file is corrupted and audio information is still existing. With our MP3RepairTool you can cut the corrupt beginning of this file. Audio information consist of single frames, each 26 milliseconds long. MP3 Repair Tool enables you to delete the whole beginning of the file included a few frames to ensure that the whole corrupt header has been cleaned. Thus you can ensure that your file can be played again.

Author:
Aspect one| Date: 07-08-2003 | Size: 522 KB
  -
 

 Business Functions Basic Edition  License: Freeware

 
  Excel Financial Add-In with 50 functions for planning and analysis makes financial models faster to build and more reliable to maintain. Context sensitive help file, quick reference, examples of each function and tutorials.. You can also buy Standard and Pro Editions containing over 250 functions. Comprehensive context sensitive help file, quick reference, examples of each function and tutorials. (no registration required, no popups)

Author:
Business Functions Ltd| Date: 04-06-2002 | Size: 2267 KB
  -
 

 The Shredder  License: Freeware

 
  BE CAREFUL WITH THIS APPLICATION! It is a file shredder, as the name implies and if used incorrectly, it can permanently destroy files on your hard drive! I've built in lots of bells and whistles and warnings, so it should be difficult (to say the least) to blow something up and not know it! The Shredder, despite its risky nature, is a useful program that can increase your personal security by eliminating sensitive files. This program was experimental and intended to lay the foundation for file shredding techniques I have since used in many other programs.

Author:
Corby Johanneson| Date: 29-02-2000 | Size: 319 KB
  -
 

 Eraser  License: Freeware

 
  Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly.

Author:
Heidi Computers Ltd| Date: 19-01-2003 | Size: 2654 KB
  -
 

 Find & Replace  License: Freeware

 
  Find & Replace is a highly reliable solution to support software and users that process Text files or incorporate Template files in their processing. Given a text file, a search string, and a replace string, F&R will make the substitutions and put the results in an output file. The only option is case-sensitive or not. Any displayable ASCII characters can be used. F&R is provided in two forms: 1) a program file that can be run from the DOS comman

Author:
Steve Schoenfeld| Date: 31-07-2002 | Size: 23 KB
  -
 

 Sure Delete  License: Freeware

 
  Sure Delete is a tool for Windows based computers to completely remove data from your hard drive. No more worrying if your sensitive data can be recovered. No more headaches. Sure Delete is tested safe for FAT12, FAT16, FAT32, and NTFS disk formats, so you can use it in Windows™ 95, 98, NT 4.0, and Windows 2000 environments without worry. (NT/2000 users must have the appropriate permissions). Sure Delete is packed with features. Besides being able to wipe files Sure Delete now can wipe free drive space. So even if you forgot to delete the file via Sure Delete, you can just wipe the empty HD space, and you can be sure its gone. Another feature is the ability of the user to choose speed/security ratio. If you have a lot of time on your hands you could use the most secure but also the most time consuming type of wiping. However if you are short on time, and all you need is to prevent half educated snoops from recovering your data then you don't need as much security and you can set Sure Delete to use a little less secure but faster method of wiping. There are many more features which you'll just have to download Sure Delete to discover.

Author:
Michael L| Date: 18-11-2000 | Size: 427 KB
  -
 

 SHA1files  License: Freeware

 
  SHA1files is a 32 bits console application that computes the SHA1 digest of files under Windows. The main applications are     - the detection of any change in files (typically a web server directory to make sure no file has been altered - integrity check)     - the detection of duplicate files on disk (based on their actual content, not their name or location) SHA1files {/root= [/duplicates] [/ExcludeList=] | [/verify=]} /root= the directory where to begin /ExcludeList= exclude the files matching the lines contained in this text file (wildcards allowed) /verify= compare the files currently on disk against this text file containing the captured output of a previous run of SHA1files /duplicates show the duplicate files only All parameters ARE case sensitive. The lines in the ExcludeList must match the FULL path ("*/SHA1files.htm"). The distribution file SHA1files.zip contains batch files with examples how to use the program. SHA1files /root=c: est SHA1files /root=c: est /duplicates SHA1files /root=c: est /ExcludeList=SHA1ExcludeList.txt SHA1files /root=c: est > test.txt SHA1files /verify=test.txt SHA1files returns an errorlevel 0 if everything went OK, and a positive value otherwise, in order to allow specific actions in batch files depending on the results. SHA1files is freeware.

Author:
Christophe DAVID| Date: 28-07-2003 | Size: 36 KB
  -
 

 BCArchive  License: Freeware

 
  With BCArchive software you may encrypt and compress a group of files/folders to an encrypted archive (i.e. single file). You may store all you confidential files in such archive accessing it whenever you need it. All your files are encrypted, i.e. protected from unauthorized access. You may create self-extracted program containing encrypted archive and e-mail it to your friend. He/she will receive this archive and can read your files, either via knowing correct password or via using public/secret key technology. All already generated public and secret keys used in other programs can be also used in BCArchive to create encrypted archive and e-mail it to desired recipient. BCArchive uses strong symmetric encryption algorithms such as Blowfish, IDEA, Triple-DES, CAST5; secure hash algorithms: SHA-1, MD5, RIPEMD-160; asymmetric (public/secret key) algorithms such as RSA, ELGamal/Diffie-Hellman; conforms to specifications PKCS #5, PKCS #12, X.509. BCArchive is convenient software product providing you with strongest encryption technology and ability for efficient management of sensitive data.

Author:
Jetico, Inc.| Date: 22-10-2004 | Size: 2399 KB
  -
 

 P-Guard  License: Freeware

 
  KEEP YOUR DATA PRIVATE!P-Guard uses strong and certified cryptographic services, >which allow encrypt any type of sensitive user's data.>Only person, who is owner of encrypted file may decrypt this file.>Shell integration allows to use P-Guard with maximum comfort:>You can start P-Guard from right-mouse context menu or>you can easily integrate the P-Guard in your favorite file manager.

Author:
SoftMajor Com.| Date: 22-12-2002 | Size: 385 KB
  -
 

 Password Agent Lite  License: Freeware

 
  Password Agent allows you to store all your sensitive data like passwords, PIN codes, credit card numbers, software serial numbers and other textual data in a single, easy to navigate and secure database. You'll only need to remember one master password that gives access to the database. Password Agent will also help you to fill login prompts on web sites automatically. All information is grouped similar to folders on disk and it is very easy to find, even user interface is similar to Windows Explorer. Other features include unlimited-length text fields, password generator, sorting, printing, import/export, 256-bit U.S. government approved encryption, auto-lock & auto-close features for enhanced security, drag'n'drop, automatic backup, file history etc. Password Agent is resource friendly and efficient, its database files are very compact. Fully functional Lite version is completely free but limited to 25 entries per file. Upgrade to Unlimited version costs $19.95.

Author:
Ahto Tanner| Date: 15-01-2004 | Size: 1305 KB
  -
 

 Adios! Extreme Filesystem Cleaner  License: Freeware

 
  Adios! Extreme File System Cleaner by Martin Beek - safely removes 150+ application- and Windows garbage files from your computer. Empties garbage bins, Norton virus quarantine, Norton protected bins, Internet browser cache(s), sensitive usage information, memory dumps, Windows update and servicepack garbage and much more. Fully configurable. Analysis, (de-)selection and deletion stages. Uses fast low-level filesearch routines. Free download.

Author:
Martin Beek| Date: 01-02-2003 | Size: 987 KB
  -
 

 Case Converter  License: Freeware

 
  Allow you to convert any words and even file names within content of files to lower or UPPER case. If you want to convert all file names to lower or UPPER case you no need to enter each name. You need enter only extension. It very useful if you need to to move all of our hosted domains from a Windows NT platform to Linux. This is actual because Linux is case-sensitive, both for file names and file content.

Author:
ReplSoft Inc.| Date: 20-05-2004 | Size: 473 KB
  -
 

 Public Key File and Email Encryption freeware  License: Freeware

 
  DeltaCrypt OneClick Personal does it all: This Public Key Encryption Software encrypts files, text and emails with 1024-bit RSA protection, digital signatures, and unalterable public keys. It offers the basic encryption functionalities FREE OF CHARGE. Select files and folders or a combination of both and let DeltaCrypt OneClick Personal secure your sensitive data. For personal use only. DeltaCrypt applications provide sophisticated features and a user-friendly interface to keep encryption simple and easy. No special skills are required. Any format of file can be encrypted, no matter what the file extension. There is almost no limit to the volume of files that can be encrypted. One of the features of DeltaCrypt OneClick Personal is its ease of use with any email or text messaging software. From the icon in the System Tray, you can quickly encrypt or decrypt your email text …and then get back to what you were doing. Moreover,DeltaCrypt wipes out original source files, when requested at encryption, by replacing the original data with binary ‘00’. Deleted files are not transferred to the Windows’ recycle bin. When decrypting, DeltaCrypt reconstructs files identical to the original ones: same name, same time and same size. This flexible encryption program is constructed so as to permit the addition of additional plug-ins so as to meet any special requirements

Author:
Technologies Deltacrypt Inc.| Date: 08-12-2004 | Size: 1000000 KB
  -
 

 Deltacrypt oneclick encryption Personnal Use  License: Freeware

 
  DeltaCrypt OneClick Personal does it all: This Public Key Encryption Software encrypts files, text and emails with 1024-bit RSA protection, digital signatures, andunalterable public keys. It offers the basic encryption functionalities FREE OF CHARGE. Select files and folders or a combination of both and let DeltaCrypt OneClick Personal secure your sensitive data. Forpersonal use only.

Author:
Deltacrypt Technologies Inc| Date: 08-12-2004 | Size: 1 KB
  -
 

 Cleaner  License: Freeware

 
  It is known, that after deleting files in Windows, they can be restored, since the information on the disk is not deleted, and is marked as free blocks. Cleaner securely deletes file data, located in free disk space. After that the restoring of the information becomes impossible.

Author:
SoftComplete Development| Date: 25-02-2001 | Size: 153 KB
  -
 

 Free Password Helper  License: Freeware

 
  Free Password Helper is a simple program that can help you in creating passwords. The password is created based on a word or a phrase of your choice and a numerical shift mask also of your choice. For example, if you enter a word "water" and mask "00000" the password will be "water". If you change the mask to "12345", the password will change to "xcwiw". Generally, "xcwiw" is harder to break than "water". The advantage of this method of generating passwords is that you can re-generate a lost password if you can remember the starting word or phrase and the mask number that you used when you created the password. Note: The passwords generated by this software are not completely secure. Under no circumstances should you rely on these passwords to protect any sensitive information.

Author:
Sierra Vista Software| Date: 20-12-2004 | Size: 291 KB
  -
 

 Windows 2000 Protected Store Key  License: Freeware

 
  A Protected Store is provided as part of CryptoAPI, in order to provide secure storage for sensitive information such as private keys and certificates. By design, the Protected Store should always encrypt the information using the strongest cryptography available on the machine. However, the Windows 2000 implementation uses 40-bit key to encrypt the Protected Store, even if stronger cryptography is installed on the machine. This vulnerability weakens the protection on the Protected Store, but does not eliminate it. An attacker would need to gain complete administrative ontrol over the machine that houses the Protected Store in order to gain access to it, and even then would still need to mount a brute-force cryptographic attack against it. However, customers who follow the recommended remediation for this vulnerability can ensure that such an attack would be significantly more difficult, if not impossible.

Author:
Microsoft| Date: 31-07-2000 | Size: 282 KB
  -
 

 GemDoc  License: Freeware

 
  GemDoc processes SGML and XML (using the industry standard included DocBook DTD or any other DTD you specify). Maintain a single document which can be translated into a variety of formats without post-conversion formatting hassles. Write it once and it looks great in all formats! Whether it be Html, PDF, Html Help, PostScript, Text or RTF! Streamline your document writing and prevent author headaches! Comes with extensive context-sensitive help and a set of templates to build your help files. For those who have been struggling to install DocBook, this is your answer in one easy to install package and a powerful graphical interface! In addition, GemDoc converts HTML to PDF, Text, and PostScript! Time limited beta. Creates the following formats: *HTML -both as a single document or in multiple linked pages -generates an automatic index and title page -adds user designed CSS style sheets -"tidied" to produce automatically formatted and validated HTML, XML output *PDF -automatically generates table of contents and hyperlinks -can customize PDF specific title, colors, header, footer, and graphics -selectable compression levels -many other options including security restrictions *Microsoft Html Help (Chm) -automatically generates table of contents, index, search and favorites tab -automatically generates context id numbers for use in context sensitive help -provides finished Chm, and optionally, project (.hhp), table of contents (.hhc), and index (.hhk) source files for user customization -can optionally add user designed CSS style sheets *PostScript -can customize PDF specific title, header, footer, and graphics a host of other options *RTF -MicroSoft Word Compatible for Formatted Editing *Text -ASCII Text in Dos OR Unix formats -extracts and footnotes all hyperlinks for easy reference http://www.gemini1consulting.com/gemdoc/history.php

Author:
Gemini 1 Consulting, LLC| Date: 20-01-2004 | Size: 8651 KB
  -
 

 CleverCrypt Lite (Freeware)  License: Freeware

 
  Create a password protected, fully encrypted hard drive to store all of your private files in. Just copy your files into your CleverCrypt drive for total protection. <p> The instant you save data into a CleverCrypt drive, CleverCrypt automatically scrambles the data before it is saved on the drive. Once you close your drive or turn off your computer, your secure drive is automatically locked. You don’t have to remember to secure your data: CleverCrypt does it for you every time. To access your data again, simply open CleverCrypt and supply the correct passwords to access your confidential information. <p> Even if your whole computer is stolen, your data will remain locked in the virtual drive, safe from prying eyes. Without your passwords, the data is simply not there! <p> CleverCrypt is the perfect security tool for lawyers, doctors, government establishments and any practice dealing with highly sensitive information. <p> You can use CleverCrypt to protect any office documents, including spreadsheets, confidential documents, presentations, emails, client lists, accounting information and scheduling diaries. <p> CleverCrypt Lite is completely free! <p> If you like our product, please consider purchasing the full version to support our work.

Author:
Quantum Digital Security| Date: 24-08-2004 | Size: 3730 KB
  -

| 1 | 2 | 3 | 4 | 5 |

 

 
Sponsored Shareware

Universal Explorer
Powerful windows explorer
file manager and viewer.

File Manager - Windows Explorer Replacement

Disk Size Manager
Analyses hard disk space and collects statistics.

Powerful Disk Space Manager

Web Data Extractor
Email marketing software to extract specific contact.


Web Data Extractor

BackStreet Browser
Powerful Offline Browser - Download Entire Website.

Offline Browser

ListMotor
Email List Manager, operates with email stored in simple text files or csv files.

Email List Manager

 


www.DirFile.Com - Freeware Software Download |
Sensitive Files at AbcDir