Unwanted Application Access


Advertisement

Perfect Uninstaller  v.6.5.27

Perfect Uninstaller is a better way for you to perform total uninstall of any unwanted application that standard Windows Add/Remove Program can't remove. Perfect Uninstaller offers 100% total uninstall solution.

Have you ever been bothered ...

Emsa Port Blocker  v.1.0.15

What it does, is blocking unwanted tcp access from/to your computer. It is not a firewall, but up to some extent it could be regarded as a similar tool. Its purpose is to prohibit TCP access on certain ports and ip addresses. IT can also be used as a ...





Advertisement

Ez Call  v.2.0.0.0

This application helps you to make international call using Vonage call forward and extensions using your Vonage account with many more features.

 Remembers user information for future application access
 Make international call using ...

ID Cards Application  v.7.3.0.1

ID Cards Application is versatile ID card maker software designed to create high quality and great looking ID cards for professional and business users. ID Cards Application used to design different types of identification cards like personal ID cards, ...

Repair Corrupt MDB  v.3.3

Microsoft Access database is widely used application. Access Database is use all over the world organizations & individual use MS Access for keeping & maintaining databases. Since it is a largely used program there is always a chance of it getting corrupted, ...

NELiX TransaX FleXPort Code Library  v.6.2

NELiX TransaX FleXport contains documentation and examples for integrating payment processing within any application! The NELiX TransaX FleXport supports:

- Sale
- Auth
- Capture
...

Century TinyTerm Plus  v.4.53.3352

TinyTERM Plus is software you can use to provide Web-to-host access to your UNIX and IBM hosts over the Web. Provide server-based access to legacy data and mission critical applications over the Internet through the convenience and power of familiar web ...

Exceed on Demand  v.6.0

Exceed onDemand is a program that provides a permanent and reliable connection between the users and application infrastructure in order to power the critical business operations.
OpenText Exceed onDemand is serving industries as diverse as financial ...

Stellar Partition Manager for Mac  v.1.0

This application manages your Mac partition and thereby optimizing hard drive performance. With the help of Stellar Partition Manager, you can create, delete, format, hide/reveal, shift or resize partitions on your hard drives. Stellar Partition Manager ...

ITivity Secure Remote Support Solution  v.5.2.02

The iTivity solution delivers secure remote access to host servers, workstations and desktop computers. Your remote access connections are protected by a TLS-SSL encrypted tunnel from your desktop to the destination system. Since both your desktop and ...

Defragger Disk Optimizer  v.1.0

This application works to bring all the sections of a file back together. Your computer no longer needs to work as hard to find files and you are able to enjoy a more efficient PC. Defragging also creates larger pockets of available space which gives ...

SterJo StartUp Monitor  v.1.2

SterJo StartUp Monitor is application that constantly tracks the creation or modification of the startup registry and notify if some changes appears. If any application tries to put a startup registry on your system then the software will display the ...

TinyTERM  v.5. 1. 2600

The ability to easily exchange files, access other systems, and share common resources is critical.

TinyTERM is compliant with a wide range of host systems and servers, including UNIX, Linux, DEC and HP, and supports internet standard protocols.

DLL Cure  v.2 8


Automatically improve your PC performance!
Features:
-Check for all invalid and outdated DLL errors in your system application.
-Access to a large DLL file database ,DLL Cure always ensures no errors for windows registry.
-DLL Cure ...

Windows 7 Firewall Control  v.5.0.0.15

Protects your applications from undesirable network incoming and outgoing activity, controls applications internet access. Allows you to control personal information leakage via controlling software network traffic.
Manages and synchronizes port forwarding ...

Pages : 1 | 2 >
Newest Reviews