|
Setup tool rapidly and handy. Our library is pleased to present a huge variety of the most good free programs, shareware, and applications. On this site you be able to get demo editions of favorite commercial programs, and try the greatest free software for your laptop or mobile appliance,gadget. Research an ultimate library of first class advanced utilities on our catalogue! Download demo versions and setup fresh apps on the computer or mobile appliance. Have a look on the fresh versions and new releases of common applications, advanced programs, and computer utilities! Download for free!
Best PC utility software, free to download and simple to use. Download now!
System software downloads for newest versions and fresh updates.
Hard disk utility software to set the situation and manage all types of disk drives.
Must - have utility software for Windows 7 to improve your system technical characteristic.
|
ZipPassword COMEBACK
|
|
Download
|
Buy now!
|
View screenshots
|
Vendor Price: $ 19
License: Commercial
File Size: 2.27 Mb
Version: 3.0
Release Date:
28 Nov 2008
OS: WinXP, Windows2003, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, Windows Vista Ultimate
System Requirements:
Windows XP, 2003 and Vista.
Company: OctaneSoft Ltd.
|
ZipPassword COMEBACK is a powerful and user friendly software to recover your lost or forgotten password for ZIP/PKZip/WinZip archives. Have you ever encrypted your zip archives? And then unfortunately forgot or lost the passwords. Don't be worried. With our powerful recovery methods: brute-force, dictionary-based and user-defined mask attacks, it can help you to recover your lost password with ease!
Key Features:
* User friendly interface.
* Works with zip-archives created using WinZip, PKZip or any other ZIP-compatible software.
* Supports Zip archives and self-extracting Zip archives (SFX).
* Supports Zip archives encrypted using "Standard Zip 2.0 encryption", "128-Bit AES encryptions" and "256-Bit AES encryptions"
* Supports "Brute-force attack", "Dictionary attack" and "Mask attack" methods.
* Custom charset support for Brute-force attack (user-defined charset).
* Ability to pause and resume recovery process.
* Ability to find all possible case combinations of the current word in dictionary. Ex: "cat", "Cat", "cAt", "caT", "CAt", " cAT", "CaT", "CAT"
* Ability to assign of Min and Max password length.
* Ability to run the recovery process in background.
* Ability to load the external dictionary.
* Custom define mask symbol and pattern corresponded to the password.
* Ability to define the password as starting and ending point for the recovery process.
* Password recovery progress bar.
* Save and open project for continuing the recovery job later.
* Running as background process.
* Minimizing to the tray.
* Full install/uninstall support.
|
More to download:
Keyboard Monitor Software
Invisible keylogger laptop monitoring software runs in the background and records all user information in log that allows you to track your computer system. Software captures session, drive location, application status, email and runs in stealth mode
Free Remote Monitoring Software
Advanced invisible Keylogger records keystrokes typed, websites visited, chat conversations, applications ran, emails sent and received, files opened etc. Software invisibly saves all keystroke information into log files with date and time.
Keylogger Spy Software
PC activities surveillance software record all press keyboard character used for various online or offline operations in log file. Keylogger program track voice chat, password, login, document text and periodically capture active windows screenshot.
|
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|