Key Kernel


Advertisement

Key Transformation  v.8.1701

Key Transformation can customize your keyboard layout, change any key on the keyboard to other keys. Its on-screen-keyboard ( soft keyboard ) is very easy to use. Want the F1 key to type B? Want the D key to type f? Want the Shift+Enter key to press ...

My Key Ring!

My Key Ring! Password management, including filtering, sorting, launching to websites. From the 5 star award winning authors of Ziata! Elegant Outlook-like interface. Autofill, AutoUpdate, WebMonitor, LaunchAssist! Unlimited password key management. Unlimited ...





Advertisement

OneNote Password Recovery Key

OneNote Password Recovery Key recovers passwords for MS OneNote files (.one). OneNote Key works with all versions of MS OneNote. Passwords are recovered using a combination of Brute-Force, Xieve(tm) and Dictionary attacks. Has online help and full install/uninstall ...

Powerpoint Password Recovery Key

Powerpoint Password Recovery Key recovers passwords for MS Powerpoint presentations (.ppt). Powerpoint Key works with all versions of MS Powerpoint and provides recovery for all types of passwords including instant reset of File-Modify passwords. Powerpoint ...

Key Remapper

Key Remapper is an utility to remap or disable individual keys on your keyboard.

Kernel Paradox - File Repair Software  v.4.03

Kernel Recovery for Paradox - recovers data of corrupted and inaccessible .DB paradox database files corrupted due to unexpected system shutdown, software crash, deleted or damaged primary keys or foreign keys, corrupt or deleted indexes, lost or deleted ...

Kernel - JFS Partition Recovery Software  v.4.02

Nucleus Kernel for JFS recovers, undeleted data from deleted, damaged, or corrupted Linux partitions where JFS File System based operating systems, such as Debian, Ubuntu, Red Hat Linux, Mandrake Linux, Turbo Linux, SuSe Linux, are installed on the hard ...

Key Control



Tracking Control System Eliminates Lost and Stolen Company Assets

With Key Control, you can easily assign equipemnt to your employees and track them a variety of ways.

At a glance you will know which employees have been assigned ...

Kernel Solaris Data Recovery Software  v.4.04.01

Kernel Solaris recovers data from deleted, formatted, damaged, or corrupted partitions where unix based Sun Solaris operating system is installed on the hard disk. During recovery process a complete scan of the damaged solaris drive is performed to locate ...

KDT Soft. Recover Product Key Demo

Software which allows the user to recover and change a product key for Windows XP, Windows Vista, Microsoft Office and Norton Anti-Virus . This software also enables the user to change who the product is registered to.

Power Off Key

The Power Off Key utility can save your time every day by minimizing time to power off your computer. You need only one key press to shutdown. Fast and clear utility without any menus, mysterious icons at tray and additional settings. Just press ScrollLock ...

Windows Product Key Code Finder

Find your Windows product key for Windows 98, Windows ME, Windows XP, Windows 2000, Windows 2003 Server, Windows Vista, Windows Media Center Edition instantly! Many Awards! Excellent tool for network administrators, managing your software compliance, ...

Product Key Viewer Technician

Product Key Viewer Technician for Windows locates over 1,000 product keys (cd key) for many products including Microsoft Windows, Office, Corel, AutoCAD, Dreamweaver, Roxio, PC Tools, ULead, WinZip, ZoneAlarm, CyberLink, Electronic Arts, Quake, Elcom, ...

ATNSOFT Key Remapper

Key Remapper allows you to block and remap keys, mouse buttons and mouse wheel actions to other keys, mouse buttons and the mouse wheel rotation and combinations of the above actions with modifiers. It also makes it possible to emulate double mouse button ...

Isecure-key

ISecure-Key is a small application which automates USB disk encryption using the Truecrypt encryption software. It lets you encrypt your USB Stick of any size in a simple and straight forward process so that you can store your confidential data when on ...

Pages : 1 | 2 >
Newest Reviews