The Bewitched Mask


Advertisement

NetRouteView  v.1.15

It displays the list of all routes on your current network, including the destination, mask, gateway, interface IP address, metric value, type, protocol, age (in seconds), interface name, and the MAC address.
NetRouteView also allows you to easily ...

Venetian Mask  v.0.90.2

Venetian Mask is an image-masking software which revolves around the new user-friendly and interactive use of the standard 'magic wand' tool. Features an extensive preview system, interactive parameter adjustment and a node-based structure.Venetian Mask ...





Advertisement

The Professional Portable Encryptor  v.1.3

It haves file filter that helps you to encrypt files by the file mask. It haves settings of view. The Professional Portable Encryptor haves minimal system requirements. It's meaning that it can work on any modern PC with OS Windows.

ZIP RAR ACE Password Recovery  v.2.43

x) are supported; RAR Archives with encrypted Filenames supported; Multi-volume RAR archives are supported; ZIP Archives support; ACE Archives support; Self-extracting archives are supported; Archives created by various software packages are supported; The program is very customizable: ...

MB Zodiac Rising Sign

This is also known as the Astrological Mask. Knowing your rising sign along with your sun sign and moon sign represents your total astrological personality.

Picture Information Extractor

Features: * PIE allows to edit metadata, add or delete tags, change EXIF date/time, lossless rotate and update embedded thumbnails, without destroying the Makernote data! * PIE has the ability to rename picture files keyed to the date and time as well ...

Network Recycle Bin Tool  v.5.2.3.93


Additionally it offers you the Protect Files tool which prevents deletion of network files for specified folders according the file mask. Export and import functions help you to install software with same options on network machines. The password ...

KRyLack Archive Password Recovery  v.3.70

x) are supported; RAR Archives with encrypted Filenames supported; Multi-volume RAR archives are supported; ZIP Archives support; AES Encrytped ZIP and ZIPX (WinZIP) archives are supported; ACE Archives support; Self-extracting archives are supported; Archives created by various software packages are supported; The program is very customizable: ...

KRyLack RAR Password Recovery  v.3.70

x) are supported; RAR Archives with encrypted Filenames supported; Multi-volume RAR archives are supported; Self-extracting archives are supported; Archives created by various software packages are supported; The program is very customizable: you can ...

Rainbow Web II  v.3.4.16.10

But a young man from another world was sent by Chief Wizard to the very heart of the bewitched kingdom, and he was destined to save the magic land. The young hero managed to bring rainbow colors to the country, but this was only the beginning of the ...

Alta Sticker  v.4.0

Then you carefully (so that it doesn't get lost) place the sticker on the display mask, or somewhere else and hopefully forget about it. But you have a computer! Let Alta Sticker care about you and your time! Alta Sticker has been designed for this! ...

Machine Wash  v.1 3



Apply Wash Effect on Mask Layer - Now you can apply our popular Wash effect in the image mask layer allowing you to fine-tune the Wash effect while leaving the original image untouched*.

Easy2Convert PSD to IMAGE  v.1.0

It is possible to set default values for the quality of the produced files, the filename mask, and the width and height. These parameters can, of course, be modified, but will be used if you do not modify them. The trial version of this program can be ...

WOL Magic Packet Sender  v.1. 5. 2855

Specify the subnet mask. 4. Type MAC address of the computer to be waked up (Protocol and Port are default settings) 5. Wait for some time the computer starts and you will have access to it. To wake computers from other subnets, the MAC address and the ...

Torcap  v.2.0.1

The decision whether to route the connection through Tor or directly to the internet is based upon the application mask and host mask. When a match is found, the connection is forced to connect to the Tor SOCKS server.

Pages : 1 | 2 >
Newest Reviews