Home Contact Sitemap

N5 Net Software Repository

Your one-stop for all your software needs.

Search N5 Net Software Repository:

Search Files



Only Freeware

Sponsor:

Browse:

Areas Of Interest

Authors Area

Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.

Downloading RemoteDirDetector 2.0

Your download will begin in a few seconds. If it does not start you can download directly through one of the mirror sites below.

Download Sites:

Similar Products:

LASTBIT POWERPOINT PASSWORD RECOVERY 12.0.9123

Security & Privacy :: Other
img PowerPoint Password is a password recovery tool for password-protected PowerPoint presentations. PowerPoint password protection is based on strong crypto algorithms, so password recovery is a complex task. PowerPoint Password uses various password recovery methods: Plain Dictionary and Hybrid Dictionary attacks, Brute-Force attacks, and Smart-Force (TM) attacks.
Windows | Demo
Read More

SURFSOLO 2.0

Security & Privacy :: Other
img Powerful software that allows the user to get totally anonymous and at the same time protects the data exchange on the Internet.The software provides a direct encrypted link with one of the world wide SecurStar high bandwidth security proxy servers. What makes impossible any kind of IP identification. If someone tries to get you real IP number, it will only recognize Securstar server's IP number, never your's real IP number.
Windows | Shareware
Read More

MALICIOUS FILE HUNTER 2.1

Security & Privacy :: Other
img Malicious File Hunter, or MFH for short, is a security software that runs on Windows and allows IT Security Administrators to search for the presence of one or multiple files across their entire network of Windows systems. For example, if a known malicious file is found on one computer, an IT Administrator can use MFH to check if any other system on the network is infected with the same malware. Search query is based on full, partial or wild card
Windows | Demo
Read More

PRIVACY ERASER PORTABLE 6.15

Security & Privacy :: Other
img Privacy Eraser is an all-in-one privacy suite, PC optimization and cleaning tool. It cleans all of your internet history traces and past activities with one click, recovers hard drive space by deleting unnecessary and redundant files, speeds up internet surfing and browsing, boosts your PC's performance and stability making it faster, secure and more efficient.
Windows | Freeware
Read More

PRIVACY ERASER FREE 6.15

Security & Privacy :: Other
img Privacy Eraser is an all-in-one privacy suite, PC optimization and cleaning tool. It cleans all of your internet history traces and past activities with one click, recovers hard drive space by deleting unnecessary and redundant files, speeds up internet surfing and browsing, boosts your PC's performance and stability making it faster, secure and more efficient.
Windows | Freeware
Read More

ANYMP4 IPHONE GPS SPOOFER 1.0.30

Security & Privacy :: Other
img AnyMP4 iPhone GPS Spoofer can instantly help you set your iPhone location to anywhere on the map according to your demand. At the same time, it can simulate movements along a route by three modes on the map at your selected speed.
Windows | Shareware
Read More

FILE MONSTER 2.9.91.000

Security & Privacy :: Other
img File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize the file as being present anymore, yet the information hasn't really been erased.
Windows | Shareware
Read More

SUPER USB PORT LOCK 10.2.1

Security & Privacy :: Other
img Super USB Port Lock prevents data leaks through devices like USB drives, phones, tablets and other devices that are attached to your computer. It also prevents data leaks through any websites and programs.
Windows | Shareware
Read More

ABYLON SHREDDER 23.60.1

Security & Privacy :: Other
img The deletion of files with the windows recycle bin removes only the references to the files, without real clearing. In contrast to this the software abylon SHREDDER overwrite the data up to 35 times (Peter Gutman method). Afterwards the data can not be reconstructed any longer. The same goes for free space, clustertips, surf traces of the browser, file names, duplicate files or full drives.
Windows | Shareware
Read More