AutoMe is a reliable and user-friendly windows automation software and macro recorder with task scheduler, color checker. AutoMe is very easy to use, you can record robot, and run it as many time as needed. No programing needed.
Asoftech Automation records all operation of mouse and keystrokes and saves them as macros. It can play back the recorded macros to automate recorded tasks any number of times.It is very easy to use and doesn't require any programming experience.
Did you know that your computer collects information about where you go on the internet, details on forms you fill up and so on? This information represents danger to you if it is discovered by somebody. To protect yourself, use Evidence Destructor.
Evidence Exterminator cleans all PC usage history information. Clean up your cookies, history, temporaryinternet files, browser's cache, recycle bin, recent documents, and also remove all the temporary files left by your system.
FayeTRACKER is a replacement application for the netstat feature in Windows. It offers the same functionality as the netstat command, but has many more features and it makes it much easier to see how applications are connected to the Internet.
Spylocked removal tool comes from the house of SpywareSignatures.com dedicated to protecting people from all sorts of malware including Spylocked. Spylocked removal tool is absolutely free and does not show any ad.
Using the latest technology and methods to removespyware from your computer - even the most stubborn spyware. And you're even doing it riskfree because if necessary, we'll have our specialists examine and disinfect your system.
hide.me VPN released an update for its Windows app introducing some new features like IP leak Protection, DNS leak Protection, Fallback Protocol Support, Kill Switch, Auto-Connect, IPv6 protection and a lot more.
Restrict access to selected websites from your computer. Passwordprotect them. Just select a password and a list of websites to protect. When a protected website is about to be visited computeruser will be presented with a password prompt.
Internet Secure Tunneling can forward otherwise insecure TCP traffic through encryptedSSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure.