English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by masked edit

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: Zilla Anonymous Surfer 3.0.0.3
Download Zilla Anonymous Surfer 3.0.0.3
more info
WS_FTP Password Recoverer 2.5 by Froebis Interactive
2005-10-25
WS_FTP Password Recoverer will recover all the passwords and host addresses to most versions of WS_FTP. The passwords are stored in the .ini files located in the WS_FTP folder.
2005-10-26
Lost or forgotten passwords for E-mail programs, instant messaging software such as AIM and Yahoo Pager, website accounts, Hotmail, MSIE AutoComplete fields, windows screen savers, and many more software programs can be instantly recovered.
2008-09-02
You don't need to be a hacker in order to recover a lost password from an Office document. This utility supports a wide range of Office document formats and includes a Wizard that helps you to choose a proper password recovery strategy.
2006-08-02
Professional, very customizable random string generator, that can generate 100 000s passwords, serial numbers, pins, msked strings, usernames, and more in seconds.
Dupe Destroyer 5.2 by Froebis Interactive
2006-11-25
Dupe Destroyer 5.2 removes duplicate entries from one or more wordlists very quick. These lists could contain passwords, E-Mail addresses, words from a dictionary, etc... All lists are processed in RAM, which causes a processing that is very fast.
InputMask 3.5 by Data Research Group
2007-06-09
An ASP.NET server control that allows users to input data into a masked text box.
InputMask 3.5 by Data Research Group
2007-09-15
An ASP.NET server control that allows users to input data into a masked text box.
2007-10-18
Hotmail password recovery tool can easily unmasks your lost, forgotten, missing or masked MSN and Hotmail accounts passwords. This software is very useful for users having multiple MSN/Hotmail accounts who couldn’t remember their passwords easily.
2008-01-22
Generate millions of strong passwords, serial numbers, key codes, usernames, pronounceable passwords that strictly follow rules you define. Control precisely which characters can be used, how often they can appear, and where they need to be placed.
0.021