Wireless WEP Key Password Spy 1.0
Wireless WEP Key Password Spy will instantly recover all WEP keys and wireless network passwords that have been stored on your computer. To get started, click "Find Wireless WEP Keys". It will then display the adapter GUID and all recovered information associated with it including the wireless network name (SSID), the encryption type (WEP 40, WEP 104, or WPA-PSK), and the WEP key associated with each network.
PC James Bond 007 2007 5.2
PC James Bond 007 secrectly records keystrokes, screenshots, websites visited, windows opened, applications run, Skype, MSN IM, ICQ, AIM, Yahoo! IM, clipboard, emails read, docs, passwords and more. In Stealth Mode, it is completely invisible to computer users. You can set hotkey and password to access the program. Receive all logs from a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
Recover USB Drive Data 184.108.40.206
USB drive recovery utility recovers any deleted file format and folders. Restoration tool retrieve accidentally formatted files folders. Safely restore lost erased data. Software detects and repairs all missing corrupted damaged audio video picture images text doc and database files due to malfunctions virus infection and restore on disk. Supports all USB drive like pen drive flash drive memory stick thumb drive key drive. Compatible with Windows
MSN Spy Monitor 2007 5.2
Spy all version MSN IM chatting records. Spy stealthily so that the user won't know such monitoring exists. Possible usages of MSN Spy Monitor include: Spy employees, children and spouse chatting on MSN. View logging records from the program or send a report to a pre-determined email address. Use your hotkey to activate it from complete stealth mode and protect program access by password. Uninstall it easily from the program interface.
monitor, msn, spy, camera, cam, spyware, record, email, key, stroke,
PC Spy Monitor 2007 5.2
PC Spy Monitor secrectly records keystrokes, screenshots, websites visited, windows opened, applications run, Skype, MSN IM, ICQ, AIM, Yahoo! IM, clipboard, passwords, emails, docs and more. In Stealth Mode, it is completely invisible to computer users. Set hotkey and password to access the program. Send logs to a preset email or ftp at set interval. Usages: monitors employees, children, spouse and investigate crimes.
monitor, pc, spy, camera, msn, icq, aim, ie, yahoo, messenger,
QuickCrypt Library 2.50
Fast, highly optimized implementation of symmetric (private-key) encryption algorithms: DES, Triple DES (3DES), DESX, BLOWFISH, RIJNDAEL (AES-Advanced Encryption Standard), GOST. Supports 5 modes of operation. Allows to encrypt/decrypt files, memory blocks, strings, streaming data. Supports 2 interfaces: API and C++. Has no external dependencies such as MFC DLL, COM/DCOM or other component. The help file has examples in Visual Basic(VB),C,C++.
encrypt, encryption, encrypting, encrypted, algorithm, file, string, data, block, memory,
KGB Keylogger 1.21
KGB Keylogger offers you several integrated tools to monitor user activities. Log all key strokes, record clipboard entries and all web sites. All activities are secretly logged into a file, and supported with snapshots, time stamps, application names and window captions. You'll know all of the users activities minute by minute. See everything that was typed and also where and when it was typed. Can run in Stealth mode and report over email.
kgb, record, secret, keylogger, keystroke, recorder, spy, key logger, keystrokes, logger,
Ghost Keylogger 3.80
Ghost Keylogger is an invisible easy-to-use surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs invisbly on all operating systems.
keylogger, keystroke logger, passwords, ghost, ghost keylogger, key, logger, ghost, keylogger, invisible keylogger,
MP3 Keyshifter 2.0
MP3 Keyshifter is a breakthrough piece of software that allows you to change the key of any audio track and save the modified song as an MP3 or WAV file. If you use backing tracks you can now change the key to suit your vocal range at the press of a button! The only way to be 100% sure that the key of a backing track is comfortably within your range is to sing along with it in real time.
mp3 key changer, backing tracks, mp3 key shifter, key, key change, pitch change, singers, vocalist,
Chris PC-Lock 2.60
Chris PC-Lock - The best way to protect your computer privacy - developed by Chris P.C. srl. Chris PC-Lock is a useful Windows application with keyboard locking functions. Now you can enjoy your spare time without any worry that somebody unauthorized will access your computer. More than that, you can ensure that your work remains unaltered and meanwhile benefit of your children joy when playing around your laptop or desktop PC.
chris pc-lock, lock, unlock, key, keyboard, keyboard locking functions, unauthorized, laptop, desktop pc, disables access to the task manager,
PC Spy Keylogger 2.3
PC Spy Keylogger is a top-rated, invisible and easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver.
keylogger, key logger, key, logger, keylog, key log, key, log, pc, spy,
Delete Add or Remove Programs List Entries Software 7.0
This program is used for deleting unwanted (old) uninstall listings in Add/Remove Programs under Control Panel. This program will detect (recommend) which programs should be removed because they no longer exist (probably because the program folder has been deleted manually).
deleting, invalid, entries, removing, unwanted, manually, installed, clear, clearing, clean,
DoneEx XCell Compiler 1.7.2
Compile XLS into EXE (which requires MS Excel to run) with securely hidden formulas. Main features: protect compiled EXE with regkey/license from illegal copying; securely hide formulas by converting them into binary format; setup limit of work period for compiled EXE file; save/load changed data; apply your own image as a splash screen; reflect your application name, version and copyright; load data with different background and font color.
doneex, excel, xcell, xcel, compiler, spreadsheet, registration, key, licensing, license,
Data Nuker 220.127.116.11
Shreds sensitive files so they cannot be recovered or undeleted. Includes disk free space shredder - destroy previously deleted files on your hard drive. Shred Files, Folders, Recycle bin, drag & shred, DoD conform. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover the files! Also includes a scheduler & integrates with windows explorer for right click shred.
app, application, appz, backup, basta, batch, braun, business, cache, chaos,
Keyboard Collector 2.07e
Secretly log and view all keys typed, including emails, instant messages, passwords, and more. You simply choose to have it run all the time, or to start at a specific time of the day, and it runs undetected while capturing all keyboard and data entry. Even if the computer is restarted, Keyboard Collector will automatically start running again. It runs invisible, does not show when CTRL-ALT-DEL is pressed, and doesnt slow down system performance.
key, logger, keylogger, keystroke, spy, pc, windows, monitor, capture, silently,