English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by amateur license

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: WinINSTALL 8.5
Download WinINSTALL 8.5
more info
2008-03-28
Use this purchase channel if you like to upgrade your current SharkPoint for PocketPC v2.x (express edition) license to a SharkPoint for PocketPC (professional edition) license
2008-01-29
Use this purchase channel if you like to upgrade your current SharkPoint for Windows v2.x (advanced edition) license to a SharkPoint for Windows (professional edition) license
2008-02-02
Use this purchase channel if you like to upgrade your current SharkPoint for Windows v2.x (express edition) license to a SharkPoint DualPack (PocketPC & Windows, express edition) license
2008-02-10
Use this purchase channel if you like to upgrade your current SharkPoint for Windows v1.x license to a SharkPoint DualPack v2.x (PocketPC & Windows, advanced edition) license
2008-02-16
Use this purchase channel if you like to upgrade your current SharkPoint for PocketPC v1.x license to a SharkPoint DualPack (PocketPC & Windows, advanced edition) license
2008-07-22
IntelliLock is an advanced 100% managed solution for licensing controls and applications. IntelliLock combines strong license security, highly adaptable licensing functionality/schema with reliable assembly protection.
PELock 1.06 by PELock
2005-10-26
<b>PELock</b> - is an application that allows you to protect Windows executable files (so called exe-protector). Besides that, PELock allows easy creation of application of evaluation-demo type, which use license key system.
Software Audit Protection Program 3.0 by Allied Business Systems Inc.
2005-10-26
Protect yourself and your company from the Copyright Police! Track every piece of software and its license. Stay in compliance and out of trouble. Automatic registry reader included. FREEWARE.
ICE License 2.01 by Ionworx Technology
2005-10-26
ICE License Protection is providing a high barrier against illegal copy using the power of Elliptic Curvesl Asymmetric Encryption to protect your application. Elliptic Curves encryption system allow transmission of secret information over an open cha
0.025