English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by detect backdoor spoofers

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: Excel Compare Two Worksheets & Find Differences Software 7.0
Download Excel Compare Two Worksheets & Find Differences Software 7.0
more info
2006-10-19
Use this program to search and delete duplicate data (values, records, rows and numbers) in your Oracle tables. All redundant entries are eliminated leaving behind only one unique instance. You select which fields (columns) to use as criteria.
2006-10-21
#1 Duplicate File Finder free's up space and speeds up your computer by finding duplicate files on your harddrive. It is an extremely flexible program, and you have the option of setting it to find only certain file types such as MP3, ZIP, AVI etc.
Pop Art Studio 8.0 by Fotoview
2016-04-26
Create your own Pop Art piece of art in the famous Andy Warhol or Roy Lichtenstein Style. Pop Art Studio is very easy to use. You can open an image in any format, create some amazing effects and save it.
Anti-keylogger 6.2 by Raytown Corporation LLC
2006-10-25
Anti-keylogger for Windows NT/2000/XP provides every computer with strong protection against most types of the keylogging software, both known and unknown. Anti-keylogger blocks keylogging programs activity without using of signature bases.
Active WebCam 9.2 by PY Software
2007-06-25
Active WebCam broadcasts MPEG-4 live video up to 30 fps from any web camera. The captured video can be viewed with any browser. It can be used as a surveillance system; on motion, records video and e-mails you captured images.
PC DoorGuard 3 by Astonsoft
2006-10-25
A full-featured professional anti-trojan fighter. Trojan database consists of more than 7500 trojan horses and is constantly updated. Using PDG you will easily detect and remove all known trojan horses running on your PC with a click of a button.
2007-06-05
Unsurpassed Email Protection:VisNetic MailScan for SMTP offers incredible network protection and an unsurpassed ability to detect, detain and delete infected Email
2007-05-25
Turn your WebCam into a Security Camera. No extra equipment needed. Just set the timer and leave the room. The camera will detect the first thing that moves and start recording
2006-10-25
Zone Trigger is a security-oriented motion detection software that sets itself appart from other motion detection systems because it uses Hot Spots to detect movement in specific zones of the image instead of looking for any movement, anywhere
0.030