Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1518)
- Business (1688)
- Communications (458)
- Desktop (134)
- Development (555)
- Education (163)
- Games & Entertainment (700)
- Graphic Apps (656)
- Home & Hobby (102)
- Network & Internet (522)
- Security & Privacy (496)
- Servers (65)
- System Utilities (8708)
- Web Development (276)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
Search: to do list software for windows
SPLIT VCF INTO MULTIPLE FILES 4.0
System Utilities :: File & Disk Management
The user does not have to worry about the details associated with the vCard file contacts because the software maintains all the details related to the contacts even after conversion of a split VCF into multiple files, such as name, contact image, address, company name, business address, personal email ID, professional email address, etc.
Windows | Shareware
Read More | Download Now
SPLIT YAML FILES INTO MULTIPLE FILES SOFTWARE 7.0
System Utilities :: Text/Document Editors
This software offers a solution to users who want to split one or more YAML files into smaller ones. Simply specify the tag to split by and the software will automatically put each block of data in a separate file. With this time-saving software, you can batch-split a large YAML file into little ones instantly.
Windows | Shareware
Read More | Download Now
Security & Privacy :: Password Managers
SpotAuditor is an advanced password recovery software for recovering over 40 programs passwords including Google Chrome, Internet Explorer, Firefox, Opera, Microsoft Office Outlook, Hotmail password, PalTalk, Google Talk, ICQ, Trillian, Miranda IM, RnQ, RDP, VNC, Total Commander, SmartFTP, Far ftp, FileZilla, WS_FTP, CuteFTP, CoffeeCup Direct FTP, recovers passwords behind the asterisks.
Windows | Shareware
Read More | Download Now
Education :: Teaching & Training Tools
Basic features: It makes mouse clicks visible. It improves the perceptibility of the mouse pointer. Additionally it makes key strokes visible. Purpose: Useful for everyone who presents or teaches software to other people. For example: Teachers or Software marketing and sales personnel. You don't have to tell your audience things like "Click there with the right mouse button." all the time any more. They can see what you are doing with the mouse.
Windows | Shareware
Read More | Download Now
SPOTOUTLOOK PASSWORD RECOVERY 1.2.7
Security & Privacy :: Password Managers
SpotOutlook Password Recovery is the best tool to recover Microsoft Office Outlook passwords. The software recovers password for all versions of Outlook. SpotOutlook Password Recovery is a lightweight and very easy to use application that will help you to decrypt the passwords stored by Microsoft Office Outlook. All the mentioned features are provided with a user friendly graphical interface.
Windows | Shareware
Read More | Download Now
SPY MONITOR SCREEN RECORDER 4.22
Security & Privacy :: Covert Surveillance
Spy Monitor Screen Recorder, computer screen recorder and spy monitor software. This screen recording software allows to secretly record all computer screen activities and mouse movement into WMV or AVI files. This desktop recorder is just a surveillance camera. Every desktop activity, including keystroke typing, active window or program, browsing website, IM chatting and all other operations will display in the screen video files.
Windows | Shareware
Read More | Download Now
Security & Privacy :: Anti-Virus Tools
Spyware Process Detector detects all processes running on the computer, including hidden ones and displays their color-coded threat rating based on the intelligent analysis of all hidden properties. The program is able to detect a process that contains and executes alien code of another process. Users will see the detailed information about any selected process and detect all hidden threats, including spyware, malware, keyloggers and Trojans.
Windows | Shareware
Read More | Download Now
System Utilities :: Backup & Restore
Using SQL backup recovery tool user can recover SQL BAK files including its entire elements like triggers, tables, views, stored procedures and even deleted tables accept overwritten tables. You have to just click on a single button of SQL backup recovery software to start the recovery process and can get back solution of all your SQL Server related trouble. SQL Backup Recovery Software can recover SQL .bak files and retrieve MDF and LDF files.
Windows | Shareware
Read More | Download Now
SQL BAK FILE RECOVERY TOOL 5.0
System Utilities :: File & Disk Management
SQL BAK file recovery tool is developed with the high capability to recover corrupt, damaged, inaccessible SQL .bak files without destroying its original data integrity. The credibility of the SQL backup recovery tool is observable with the option for multithreaded export of tables in .bak files. Using this SQL Backup recovery software you can safely recover corrupt BAK files along with it elements of SQL database.
Windows | Shareware
Read More | Download Now
System Utilities :: File & Disk Management
SQL Database Repair software is smartly developed with amazing features which effectively restore the corrupt SQL Database. Corrupted files such as MDF and NDF files can easily be restored and saved in multiple types of saving options as per the user requirements. It helps to restore the tables, triggers, indices, rules, and keys of SQL server database files. It strongly supports MS SQL Server 2000, 2005, 2008, 2012, 2014, and 2016.
Windows | Shareware
Read More | Download Now
System Utilities :: File & Disk Management
SQL Decryptor as name specify decryptor whose task to change the database into readable form by performing decryption process on the SQL scripts of SQL Server 2008 or SQL Server 2005. SQL Decryptor software is mainly used for security purpose which removes encryption from SQL Scripts present in the SQL elements. SQL user?s data is in encrypted form to protect it from the hacking.
Windows | Shareware
Read More | Download Now


