001 Video Converter, convert any video to iPod, iPad, PSP, iPhone, Zune, Xbox360, The best video audio converters for MP4, Flv(Flash), Avi, Divx, Xvid, H.264, Mkv, Mpg (Mpeg-1,2), Wmv, Rm, Rmvb, Mov, Vob, 3GP, OGG, ASF, WMA, WAV, MP3, AC3, AAC, etc.
Asoftech Automation records all operation of mouse and keystrokes and saves them as macros. It can play back the recorded macros to automate recorded tasks any number of times.It is very easy to use and doesn't require any programming experience.
This is a great game, and is able to stand on its own alongside Treasure's other releases. If you like Contra, Metal Slug, Gunstar Heroes, Serious Sam, or anything else that involves running around and shooting a lot, you'll like this.
SpN Soldier By Zip - The Platformer in the spirit of Contra fight against international terrorism, drug trafficking and simply rascals. Enemy crowd. Blood, lumps, explosions present. Partially destructible environments.
Alien Attack-Run and Gun is an eight-bit adventure inspired by the Contra series. The game includes nine levels, with action taking place in different locations, changing as the player moves. Music: soundcloud.com/radik80
Digitally sign your files one at a time or all in a batch with the easiest code signing utility available. kSign does NOT require signcode.exe or signtool.exe or any SDKdownload from Microsoft. Best of all, it's free!
EXEJoiner is a program that can join 2 or more files (no matter their type) into 1 single executable. That executable (into which the files are included) is a small compiled program that can launch the included files 1 by 1. See www.exejoiner.com
Protect your PDF, SWF, EXE and other data against illegal use with trial limits. Protect your EXE, PDF, SWF and SCR files. Manage your serials for your shareware. Protect your exe files against cracking with crypto technologie.
The Svchost.exe process is a Windowssystem process for services that run from dynamic-link libraries (DLLs). The original svchost.exe file is located in C:\Windows\System32, but some malwares use the same name to hide their activities. So check it!
By converting a program to a service, you receive fullcontrol over its execution, you do not allow a logged user to interact with this program and you can run it in any security context regardless of the permissions granted to the current user.