|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
Wi-Fi WEP Key Generator 2.2
The Wi-Fi WEP Key Generator Utility allows you to create WEP keys that work between manufacturers. Now you can use D-Link with Linksys with Netgear with Belkin with SMC, etc. and maintain your wireless networking security without worrying about equipment WEP key incompatibilities. This tool makes it easy and convenient to keep your Wi-Fi network secure against wardrivers and other bandwidth leeches.
See also: wireless router, wireless, 3com, 3-com, U.S. Robotics, cisco, dlink, D-Link, Netgear, Linksys, 802.11g, 802.11b, Wi-Fi networks, Wi-Fi network, WEP keygen Wi-Fi, WEP key Generator, WEP key, WEP, broadband router, broadband, router, router management
Quick License Manager 2.4
Quick License Manager is an easy to use license manager that creates professional and secure license keys to protect your software against piracy. Create permanent, evaluation (trial) or computer bound license keys in a snap. A simple COM API allows you to validate the license key from within your application. With Quick License Manager, you can add licensing to your software application in less than 1 hour.
See also: Key, License, Software Piracy, License Key, License Manager, Serial Number
Spyware Nuker 3.04.34
Spyware.PCWash.com offers leading edge integrated application solutions to give you peace of mind that your computer is secure and your privacy is protected. We will protect you from unwanted Spyware, Adware, Malware, Spybot, Keyloggers, Unwanted Toolbars, Browser Hijacking, Spyware Pop-ups and more! We specialize in privacy and security software. Our Anti-Spyware application is designed to search for and eliminate all known computer parasites.
See also: browser hijacker, dialer, key logger, keylogger, trojan horse, malware, adware, anti-spyware, spyware, about:blank
KGB Free Key Logger 1.94
Free KGB Key Logger is a free keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as the caption of that window.
See also: logon, logging, logger, littlesister, Little Sister, law enforcement, keytrapper, keytrap, keystroke, keyspy, keylogwn, keylogger, keylog, keycopy, keyboard, key, government agency, grabber, gathering, internet, investigator, investigative, investigation, investigate, intrusion, interceptor, interception, intercept, intercept, intelligence, inspection, investigator, inspection, internet monitoring, intelligence gathering, industrial espionage, husband, hooking, hook, hardware keystroke recorder, hardware keylogger, hacking, hacker, hack, home security, foreign intelligence, freeware, espionage, equipment, eavsdrop, eavesdropping, eavesdropper, employee monitoring, e-mail monitoring, e-mail, email, economic espionage, desktop monitoring, data interception, desktop, computer, corporate information security policies, computer monitoring, competitor intelligence, competitive intelligence, child monitoring, cheating spouse, control, catch, capture, bugging, bug, bigbrother, Big Brother, business intelligence, background investigation, audio, access control background check, attack, accountability, access, activity monitor, key stroke, keystroke, recording, monitoring, key monitor, recorder, spy on user, keyspy, keyboard capture, keyboard monitoring, keystroke monitoring, key monitor, keystroke recording, keylogwn, keylog, key capture, keystroke capture, keystroke logging, keystroke recorder, keystroke recorder, keycopy, keyboard monitoring, keyboard monitor, keylogger stealth, keyboard logger, invisible keylogger 97, invisible keylogger, keytrap, password, passwords, password grabber, keystroke logger, password recorder, keystroke recorder, hardware keystroke recorder, Hardware KeyLogger, key logger, keylogger, spy software, military agency, monitor, monitoring, nonviral malware, nonvirus malicious programs, password, patrol, parental control, personnel security program, police, private investigator, product, program, p.i., PC, pwd, recorder, recording, surf, software, spy kids, screen capture, snapshot, snooper, snooping, snoopware, spies, spy, spy gadget, spy gear, spy on user, spysoft, spytool, spyware, surveillance, tracking, traffic, trap, trapper, trapware, Trojan, trojan, tool, utilities, video, virus, web, wife, workplace surveillance etc.
Sound Control 2.15
Sound Control is a freeware replacement Windows Sound mixer applet which together with most of the features of the standard Windows mixer it also allows you to add hot keys to adjust any combination of your sound mixer volumes. Support to control Winamp with a series of hot keys, CD Player and an On Screen Display is also included. Supports Windows 95 / 98 / NT4 / 2000 / XP and Millennium-Me.
See also: on screen display, cd player, winamp, mixers, hot keys, hotkeys, hot key, hotkey, volume, mixer, hot key, audio
e-Surveiller spy software 1.6.4
e-Surveiller is a powerful user-activity monitoring, logging and surveillance suite. With it, you can record all keystrokes, Web site visits, windows, chats, etc. of computer users on standalone computers, on a local area network and on remote computers across the Internet. You view the screens of monitored users on a LAN or across the Internet in real-time! User-activity logs are also periodically uploaded or emailed to you for analysis + MORE!
See also: surveillance, snoopware, spyware, watch, key logger, chat monitor, chat logger, PC Spy, Internet Monitor, Activity Recorder, Surveillance, Spy Cam, Logger, Investigator, Internet Investigator, monitoring, inspector, computer security, network monitor
Sticky Password 126.96.36.1994
Intelligent form filler and password manager that works with web forms and usual dialog windows. It has an unique feature named "Sticky Button" that appears on any window that had password saved for. Careful backup feature will keep all your passwords safely stored until you will need them. Also Sticky Password allows to have multiple logins and passwords for a single account and there are many other useful features.
See also: account, login, manager, password, password manager account login key safe protected fast secure encrypted, key, safe, protected, fast, secure, encrypted
Stealth Keyboard Interceptor for Win NT/2000/XP 6.0.1
Stealth Keyboard Interceptor for Windows NT/2000/ XP (SKIn2000) is a monitoring program which allows to intercept all keystrokes, mouse clicks, captions of active windows, static text and other. It has a unique set of features that makes SKIn2000 the powerful program, suitable for perfect monitoring of user's computer activity.
See also: spy, keylogger, monitoring, stealth, key logger, surveillance, detective, parental, intelligence, access control, remote, internet, trojan, hack, security, hacking
Key Sim simulates keystrokes.
It is used to automize programs which do not have command line options.
See also: Keyboard Automation Key Simulate Keystroke Command Line Option
ClickyMouse, Standard Edition 6.25
ClickyMouse software is designed to allow you to assign macros to different mouse actions and perform repetitive tasks quickly. Thanks to powerful build-in macro language (contains 150+ commands) the ClickyMouse allows a user to perform variety tasks including: inserting text, inserting time & date, file operations, clipboard operations, FTP upload & download, windows operation, sending keystrokes and mouse clicks and more.
See also: enhancement, clipboard, key, recorder, automate, debugger, script, automation, mouse, macro
HotKey Magic 1.3.1
HotKey Magic helps you consolidate your most frequently used programs, files, and folders, into a single launch-pad. HotKey Magic puts your favorite programs at your finger-tips with the magic key combination! Assigning hotkeys is a snap with HotKey Magic. You can drag and drop an existing shortcut into the HotKey Magic main window, assign a hotkey combination, and your through!
See also: HotKey, hot, key, launch, system, tray, win, shortcut, short, cut
XtraTools 2006 6.20
XtraTools 2006 - a set of applications consisting of more than 20 independent system utilities that are complimentary to the standard MS Windows utilities. XtraTools increases productivity and makes working with MS Windows easier. XtraTools 2006 contain tools: WinTools.net, Armor Tools, Extra Drive Creator Pro, RAM Saver Pro...
See also: uninstaller, disk, drive, virtual, tweaker, startup, utilities, cleaners, registry, tools, windows, generator, key, number, serial, crack, keygen, warez
Hide Folder HiBit lock 2
(1)-Protect any folder or file by : Hide, Lock, Encrypt or make a folder as a recycle Bin. (2)-The protected folders or files still protected even in other computers. (3)-The protect Operation just take 1 second at any computer. (4)-You can undelete the folder or file by Locking it.(5)-Works with FAT32, FAT16, FAT12 and FAT and all windows versions.
See also: key, password, decrypt, decrypt, Encrypter, Encryptor, Encryption, crypt, editor, encrypt, Encrypt, computers, other, in, even, filesystem, delete, undelete, recyclebin, unlock, unhide, bin, make, directory, file, lock, folder, lock, file, hide, folder, hide, system, file, recycle
MS Access Join Two Tables Software 7.0
Horizontally merge (combine, match, union) two Access tables into one by a common column (field) of data. The two tables can be located in the same Access file or two different Access files. No complicated options or SQL knowledge required. For Access experts, this is similar to an OUTER JOIN where a new table is created with the results.
See also: tie, tack, stick, splice, slap, put, merging, joining, combining, merge, union, match, combine, lock, knit, fuse, hitch, fasten, connect, conjoin, compound, relational, matched, unmatched, both, all records, columns, ms-access, rows, database, pair, mix, melt, together, db, querying, lump, innerjoin, outerjoin, inner join, outer join, cement, coalesce, clamp, blend, attach, assemble, append, affix, adhere, add, combinding, updateable, unioning, two-way, group, splitting, split, help, sql, natural, long, binary, memo, text, characters, decimal, char, guid, byte, date, currency, double, single, long, integer, summing, crosstab, updating, third, updating, unioning, microsoft, ms access, mdb, files, many, 1, one, sql, data, sql statement, first, 2nd, 1st, 3rd, normal form, normalize, into, create, generate, criteria, complicated, combination, datatype, cross, 10, 9, 8, 7, 6, 5, 4, 3, ten, nine, eight, seven, six, five, four, three, where, null, dupe, duplicate, remove, syntax, id, pid, zero, count, special, comparing, nested, both, from, select, tsql, mismatch, size, type, index, append, records, recordset, linking, link, odbc, secondary, primary key, small, large, once, twice, design, compare, xp, diff, identical, flat, upsizing, upsize, aggregate, together, internal, external, stored, relationship, sides, more than, right, left, mdb, similar, different, accessing, distinct, seperate, separate, by, linking, matching, queries, boolean, bit, second, update, fields, 2, contains, condition, all, by, scan, names, grid, same, getting, get, query, full, cartesian, returned, return, value, common, relation, single, 2003, 2007, 2000, multiple, another, new, existing
Power Spy 2007 5.0
Power Spy secrectly records keystrokes, screenshots, websites visited, windows opened, applications, MSN IM, ICQ, AIM, Yahoo! IM, Skype, clipboard, passwords, emails, documents and more. In Stealth Mode, it is completely invisible to computer users. You can set hotkey and password to access the program. Auto send logs to a preset email or ftp at set interval. Possible usages: monitors employees, children, spouse and investigate crimes.
See also: monitor, pc, spy, camera, msn, icq, aim, ie, yahoo, messenger, record, screen, shot, email, snapshot, key, stroke, logger, keylogger, password, parental, control, stealth, sniff, security, outlook, oe, express, word, documents, pad, notepad, skype
Oracle Delete (Remove) Duplicate Entries Software 7.0
Use this program to search and delete duplicate data (values, records, rows and numbers) in your Oracle tables. All redundant entries are eliminated leaving behind only one unique instance. You select which fields (columns) to use as criteria, so you can find duplicate rows based on all or some of the values in the row.
See also: oracle, oracle.com, 9i, 10g, application, server, unique, data, search, values, records, rows, numbers, database, dbs, info, information, fields, columns, eliminate, table, deleting, removing, searching, querying, queries, entry, dropping, query, clean, out, drop, edit, clear, cut, erase, discard, pull, purge, sql, command, statement, primary key, insert, select, from, where, disallow, block, stop, error, same, multiple, many, 252 key 1, identify, id, find, finding, detect, detecting, locate, locating, display, displaying, updating, selecting, weeding, myisam, function, removal, program, application, utility, tools, replicate, 4.1, 5.0, code, date, id, how to, existing, old, new, commit, deleting, temporary, varchar, heap, into, drop, distinct, increment, auto, integer, string, char, by, myphpadmin, php, list, condense, condensing, tree, set, specific, different, separate, variable, display, displaying, everything, items, objects, things, check, checking, almost, fuzzy, wizard, parts, csv, txt, keywords, multi, handle, handling, replace, joint, join, array, various, getting, get, rid, reorder, information, dbase
GuardedID Provides Powerful Online Identity Theft Protection. GuardedID's innovative keystroke encryption and anti-keylogging technology protect you from identity thief's favorite new tool - keyloggers. Industry experts state that approximately 80% of keyloggers are escaping detection by leading anti-virus programs. GuardedID secures your online credit card purchases, banking, email and browsing experience from keyloggers.
See also: guardedid, guard, keyboard, keylogger, key logging, spyware, anti-keylog, anti-spyware, anti-keylogger, guarded, encrypt, encryption, hide, protect, protection, internet explorer, ie, ie6, ie7, firefox, netscape, strikeforce, websecure, protectid
Revealer Keylogger Free Edition 1.3
Revealer Keylogger Free Edition is a free monitoring tool that logs everything that is typed on your computer. It records every keystroke even passwords behind asterisks and conversations in common instant messengers.
See also: keylogger, revealer, free, invisible, keystroke, keyloggers, key logger, key loggers, monitoring, spy, key-logger, key-loggers
SurveilStar is the powerful and easy-to-use PC monitoring, employee monitoring software that improves productivity. It records and controls all computer and Internet activities - emails, web sites, chats and instant messages, program activities, document operations, movable devices, printers, and many more. You can watch real-time screen snapshots and stop sabotage or data theft in time. SurveilStar is feature-rich, easy and intuitive.
See also: monitoring software, activity recorder, surveillance, surveilstar, spycam, surveillance software, Keylogger, software monitoring, monitor pc, network monitoring, key logger, activity monitor, computer monitoring, monitoring employeee
Unformat USB Drive Data 188.8.131.52
USB key drive data recovery software is used to recover formatted files folders data documents that have been infected due to virus attack, software, hardware malfunctions, improper system shutdown, damaged file system, power failure and some other human errors. Pen drive files rescue tool salvage inaccessible music songs, infected pictures images, deleted MS office word, access or excel documents from corrupted portable storage device.
See also: USB, pen, drive, data, recovery, software, undelete, corrupted, audio, video, songs, music, files, recover, deleted, thumb, jump, key, drive, pictures, images, documents, unformat, memory, stick, disk, retrieval, tool, salvage, lost, photos, snaps