Your download link is at the very bottom of the page... always.
Processed through Paypal
No account required.
Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:
| Classic Auto Login v126.96.36.199
Classic Auto Login v188.8.131.52 Microsoft changed the setup option of automatic login from version 2004 of Windows 10, for security reasons. The operating system can still log in automatically, but the setup interface is usually not available. Classic Auto Login offers an alternative means of setting up auto login. Classic Auto Login is the software implementation of a method recommended and documented by Microsoft. The documentation mentioned on this page is available in several languages. There is only one advantage of operating system level auto login, namely convenience. In all other respects, it raises serious issues due to security reasons. The issues can be divided into two groups: 1) All the data and software that are available on the computer can be accessed, run, edited, deleted by practically anyone who has physical access to the computer. 2) The password of auto login is stored in the Registry in an unencrypted text format, so you can obtain the password knowing the required method. Microsoft has officially made available a similar software (Autologon), which stores the password in an encrypted format at another place in the Registry. Despite the encryption, this method unfortunately provides no additional security compared to Classic Auto Login, as point one above is also fulfilled by this software. So the current user of the computer can find out the password if he/she uses the appropriate method. The issues described so far are also present during the configuration by netplwiz, which is available as part of the operating system. The password stored by netplwiz can be retrieved in the same way as in case of Autologon. So using auto login is not recommended in most cases. Its use is only justified in case of computers exclusively used for gaming and/or media consumption. There are some other special cases where automatic ...
|978||Jan 23, 2020
| Run as Service v184.108.40.206
Run as Service v220.127.116.11 RunAsService is a command line tool that allows you to setup a regular console application to run as a service. Below you will find descriptions and examples of how to do this. This tool requires that .NET Framework 2.0 be already installed on your computer. If you do not have .NET Framework 2.0 this tool will display a message and not run. You probably already have the .NET Framework 2.0 but if you don't you can download it here: Microsoft Download Center IMPORTANT: Any services you install using this tool will require that this tool remain on that computer in the same location in order for those services to continue functioning. Therefore before installing any services you should make sure this tool is somewhere where it can remain permanently. If you do end up moving this tool use the 'fixservices' action to fix the existing services. (details on how to use 'fixservices' can be found below) RunAsService Typing just the name of the tool without specifying any parameters. Or specifying incorrect paramters will bring you to the help screen. RunAsService install [Name] [Display Name] PathToExecutable Name The name of the service, if none is specified the name will default to the name of the executable. You might choose to give it a different name than the executable to keep some kind of existing convention, make it friendlier or make it easier to use commands like 'net start' and 'net stop' Display Name ...
|2,255||Nov 15, 2019
| ShadowGuard v18.104.22.168
ShadowGuard v22.214.171.124 ShadowGuard is designed to detect when malware or ransomware is attempting to delete File Shadow Copies and take action. Typically ransomware will attempt to delete Shadow Copies of your files prior to encrypting, so you canít restore them, but ShadowGuard can step in at this stage to stop it completely. Upon detection ShadowGuard will: Prevent the command from execution (Preserving your Shadow Copies) Terminate the application that initiated the command (This would be the potential ransomware.) ShadowGuard works by attaching itself as a debugger to certain processes, filtering out destructive commands before the process is even created. ShadowGuard can currently attach to: vssadmin.exe wmic.exe powershell.exe ShadowGuard also maintains an allowed programs list which will prevent those programs from being terminated by ShadowGuard. This is extremely useful for some backup applications which may use vssadmin.exe in order to manage volume shadow copies. Compatibility: Windows 10. Although officially unsupported, it will work on older versions of Windows back to Windows XP. How to use it: 1. Download/Install/Run the program. 2. Put a check in the box for each file you wish to guard to enable that feature. Remove the check to disable. 3. Close the program, it does not need to be running to operate. License: ShadowGuard is free for all personal and commercial usage. See included EULA for more details. Click here to visit the author's website.
|128||Feb 17, 2021
| Wagnardsoft CPU Benchmark v126.96.36.199
Wagnardsoft CPU Benchmark v188.8.131.52 A really simple tool for benchmarking and comparing CPUs. Mostly using integer for benchmarking. Requirement: -Windows 7 SP1+ -Microsoft .NET Desktop Runtime 5+ SHA1: 38EF8BA026E38C73064378F22AA1F18E96A827BC Click here to visit the author's website.
|83||Mar 15, 2021
|Showing rows 1 to 4 of 4||Showing Page 1 of 1||1|
Copyright (c) 2021