Driver Cleaner Pro 1.5 A utility that helps you completely remove parts of drivers left after uninstalling old drivers. The program is intended for ATI, nVidia, Creative, Realtek, SIS, 3Dfx, S3 and more drivers » 05.03.2006 - 2.69 MB - 98/ME/XP - Trial, $9.99
AutoHotkey 22.214.171.124 Automate almost anything by sending keystrokes and mouse clicks. Create hotkeys for keyboard, joystick, and mouse. Expand abbreviations as you type them. Remap keys and buttons on your keyboard, joystick, and mouse » 11.02.2018 - 2.92 MB - Windows XP/7/8/10 - Free
PCBoost 126.96.36.1998 Increases computer performance by allocating higher portions of CPU power to active applications and games. Enhances processor intensive software to run at even faster speeds » 05.03.2018 - 4.26 MB - Windows XP/7/8/10 - Trial, $9.40
WinUtilities Free Edition 15.2 All-in-One system cleaning and optimization suite. More than 20 award winning system utilities in one bundle » 12.03.2018 - 6.27 MB - Windows XP/7/8/10 - Free
WinUtilities Pro 15.2 A collection of tools to optimize your system performance » 12.03.2018 - 6.27 MB - Windows XP/7/8/10 - Trial, $29.99
Auslogics BoostSpeed 10.0.6.0 An optimization suite that will boost Internet connections, tweak Windows to its peak performance, clean the Registry & block annoying ads » 07.03.2018 - 19.98 MB - Windows XP/7/8/10 - Trial, $24.95
GameGain 188.8.131.528 A program to enhance gaming. Increases overall speed and squeezes out every last bit of performance your computer is capable of » 05.03.2018 - 3.25 MB - Windows XP/7/8/10 - Trial, $11.99
PCMedik 184.108.40.2068 Enhances PC performance, increases overall speed, and attempts to squeeze out every last bit of performance your computer is capable of » 05.03.2018 - 3.32 MB - Windows XP/7/8/10 - Trial, $10
Printer Activity Monitor is a software for monitoring the efficiency of your company's printers usage. With Printer Activity Monitor you can find out which documents have been printed on each of the selected printers, which employees use printers most actively, the number of pages printed, which computer sent the documents for printing, etc. Printer Activity Monitor immediately identifies any employees who overuse or abuse company printers. It also allows you to plan you printing budget properly, so you don't have to buy extra ink, cartridges and paper "just in case". Finally it shows the real use of each printer, so you can re-rout network document flow instead of purchasing new printers. The program comes in two modules. The first one conveniently sits in the tray and tracks every document that is printed. The second module takes this data and generates reports and diagrams. For example, you can build a report that shows how many documents were printed with a specified printer during the past two months. Or you can have a breakdown of printer use (in pages printed) by each employee or workstation. Finally, you can have a printing budget for each department (number of pages allowed to be printed in a period of time) and put weekly statistics on the wall.
Why download and run an extra launch bar when you can use AddaButton to add "launch" buttons directly to Internet Explorer's own toolbar? Enjoy convenient access to any program or document directly from I.E.'s toolbar while browsing the web via custom buttons that you design. These buttons use absolutely no additional system resources or desktop space. Add up to twenty buttons to I.E.'s toolbar to launch any program or document. Configure file to launch, command-line parameters, caption, menu text, icon, and even the text that I.E. shows in it's status bar when the mouse cursor is over the "Tools" menu item for each button added. Drag and drop files onto the program to automatically define all properties for a button pointing to that file. Delete buttons or edit their properties at any time through the program. Built-in interactive tutorial walks you step-by-step through program usage.
Creates and supports encrypted virtual disks which are visible as regular drives with corresponding drive letters (e.g., D:, K:, Z:, i.e. with any drive letter that is not used by another system device). The data stored on a BestCrypt disk is stored in the container file. A container is a file, so it is possible to backup a container, move or copy it to other disk (CD-ROM or network, for instance) and continue to access your encrypted data using BestCrypt. Any free drive letter in the system may be used to mount and to open an encrypted file-container for access. When the virtual disk is opened, you can read and write data as if it were a conventional removable disk. BestCrypt containers may be stored on an unlimited number of physical drives. Any type of physical media may be used to store and access the data on the BestCrypt containers: hard drives, removable media, magneto-optical devices etc. Included in BestCrypt is Swap File Encryption utility. (The swap file is a Windows system file that is used for virtual memory support. It can store portions of documents, that you were or are working with, in an opened form on the hard drive. Even if you have used a powerful program to encrypt one of your original documents, Windows can copy that document in whole or in part to the Swap file in decrypted form.) Also included is the BCWipe utility you can run to prevent unauthorised retrieval of deleted files and to wipe these files from your disks. The utility can also wipe all the free space on a specified disk as well as file slacks.