Virtual Stopwatch Pro is a feature packed clock program for Windows 9x, NT, 2000, or XP. It functions as a stopwatch, a timer, or a clock. It features a time logging system, user defined alarms, and a configurable graphic analog/digital display.
This game is yet another 3D remake of one of the best all-time classics in the history of PC games-Tetris. BUT it is in fact LIKE NO OTHER! Download it now and we are sure that you'll find it worth looking at.
Spam Bully 2.0 Outlook Express spam filter uses Bayesian intelligence to quickly learn what you consider spam and not spam. Friends/Spammers lists, blocking by country/language, Allow/Block phrases, bounce spam, customizable language interface.
EXE Password Protector is a software solution that allows you to protect executable files from unauthorized running. This utility adds protection to any .EXE file and guarantees that access is given only to those users who know valid password.
PurgeIE Pro is a Cache and Cookie cleaner for Internet Explorer users to eliminate their surfing tracks. PurgeIE Pro includes 'secure erase' and support for Plugins. PurgeIE Pro manages its cleanup functions without requiring a system restart.
Increase your privacy and gain added convenience by easily securing and organizing your favorite sites list, user names and passwords. Lock your personal information behind 256-bit encryption in a centralized location that enables quick retrieval.
EasyLock is an enterprise grade portable data encryption solution for every computer user, from novice to expert, helping anyone turn any mobile storage device into a portable data safe: simple, fast, very secure and convenient.
The program is made of about 85 working panels each panel is specialized in a media type or a function: You can use this program to play Audio, mp3 audio cd, ogg, etc, all video file types that your codec supports, change wallpaper..
Windows Security Officer enables you to protect and totally control access to your personal computer. It offers administrative support for controlling which users are allowed to access your computer and the level of access each user may have.