Added: July 30, 2013 | Visits: 697
Windows, Office, Product Key Code Finder Retriever Product Key Finder Professional utility allows you to recover your CD Product key for Windows or Office programs for the purposes of reinstalling / repairing your Windows or Office setup. Recover your lost key for (Windows) 2000, XP, 2003,...
Platforms: Windows
Added: October 17, 2013 | Visits: 478
KeY is usable as a white-box-testing tool. This means that KeY can create JUnit test cases from proofs (or proof attempts) based on the information obtainable from the proof tree. Since a proof tree in KeY is basically a symbolic execution tree it can provide valuable information such as...
Platforms: Mac
Released: September 07, 2015
|
Added: September 08, 2015 | Visits: 1.910
View your Windows Activation / Product Key.
Platforms: Windows, Windows 7, Windows Server, Other
Released: December 10, 2018
|
Added: December 05, 2021 | Visits: 17.711
Jumble Key definitively solves Word Jumble and Crossword puzzles. It is a powerful program, yet is quick and easy to use. Given a letter pattern, it checks all possible letter combinations with its built in dictionary and returns all valid words that it finds. For example, if you are looking...
Platforms: Windows, Windows 8, Windows 7, Windows Server
Added: April 14, 2006 | Visits: 3.777
Messenger Key recovers passwords for Mirabilis ICQ UINs. The software is easy to use - drag and drop ICQ database .dat file to the program window to recover the password. All versions of Mirabilis ICQ starting with ICQ 99 are supported. Messenger Key has online help, full install/uninstall...
Platforms: Windows
Added: August 07, 2008 | Visits: 1.008
Messenger Key recovers passwords for Mirabilis ICQ UINs. The software is easy to use - drag and drop ICQ database .dat file to the program window to recover the password. All versions of Mirabilis ICQ starting with ICQ 99 are supported. Messenger Key has online help, full install/uninstall...
Platforms: Windows
Added: August 06, 2008 | Visits: 3.319
Asterisk Key shows passwords hidden under asterisks. The tool works both with password dialog boxes and web pages. The software is easy to use - press 'Recover' button to recover all the passwords. Asterisk Key has online help, full install/uninstall support. Download this free utility...
Platforms: Windows
Added: August 09, 2008 | Visits: 1.507
With "Dynamical Passwords" you may generate passwords on any date (even each day).There is no need to remember or save all these generated passwords as far as you canremember you personal password (key) and the date. It is also useful for discovering weaklinks in a complex security system with...
Platforms: Windows
Added: August 04, 2008 | Visits: 1.843
Define a Key Combination as a Hot Key for any program. Register Hot Key(s) & Launch Programs / Open Files with Hot Key. The program sits in the System Tray, you can remove Hot Keys whenever it is not required.
Platforms: Windows
Added: August 21, 2008 | Visits: 2.996
Magic Boss Key allows you to hide the active program window immediately using a hot key. You can hide browser windows, folder windows, applications windows, all your desktop icons and taskbar when you don't want anyone to see your screens or you want to see your wallpaper. Fast, low system...
Platforms: Windows
Added: August 20, 2008 | Visits: 907
Key Dropper will randomly cause typed keys to be ignored, causing the subject to believe that he/she did not actually press the key. Neat prank for April Fool's Day. To disable, kill keydrop.exe in the task manager or reboot.
Platforms: Windows
Added: August 31, 2008 | Visits: 904
Random Key is a prank program that will type a random letter or number every 60 seconds on the subject's computer, to disable it, reboot.
Platforms: Windows
Added: August 22, 2008 | Visits: 1.999
Do you ever accidentally hit the Windows key while you're playing a game? Would you rather not go through the hassle of applying a registry edit and rebooting each time you want to enable or disable the Windows key? Windows Key Disabler is the solution. Windows Key Disabler is a small application...
Platforms: Windows
Added: August 28, 2008 | Visits: 3.169
If you have ever created a Windows shortcut you have seen the option on the Shortcut Tab called "Shortcut Key". This Shortcut key allows you to type a keyboard shortcut that you can press to start a program in Windows. However, there is no easy way to view and manage these shortcut keys. We...
Platforms: Windows
Added: August 19, 2008 | Visits: 992
My Key Ring! Password management, including filtering, sorting, launching to websites, applies Ziata proprietary "double vault" protection to your password information. This version of the software will operate in single user mode without registration or any payment.
Platforms: Windows
Added: May 19, 2010 | Visits: 1.162
Convert::GeekCode is a Perl module that can convert and generate geek code sequences. SYNOPSIS use Convert::GeekCode; # exports geek_decode() my @out = geek_decode(q( -----BEGIN GEEK CODE BLOCK----- Version: 3.12 GB/C/CM/CS/CC/ED/H/IT/L/M/MU/P/SS/TW/AT d---x s+: a-- C++++ UB++++$ P++++$...
Platforms: *nix
Added: January 01, 2010 | Visits: 1.246
Crypt::DH is a Diffie-Hellman key exchange system. SYNOPSIS use Crypt::DH; my $dh = Crypt::DH->new; $dh->g($g); $dh->p($p); ## Generate public and private keys. $dh->generate_keys; $my_pub_key = $dh->pub_key; ## Send $my_pub_key to "other" party, and receive "other" ## public key...
Platforms: *nix
Added: April 23, 2010 | Visits: 916
multpsx is a project used to generate long multiplication worksheets in PostScript. It also generates a self-checking answer key. Usage: echo "123 456" | multpsx | lpr up to 6 multiplication problems can be specified on stdin. The output sheet is intended to have the sides fold back. (The...
Platforms: *nix
Added: April 01, 2010 | Visits: 870
lMaker is a php class designed for web masters and programmers who want a simple way to generate complex, dynamic web sites from easily maintainable text files. lMaker project is designed to help automate some of the most repetitive features of website design thus leaving the web site...
Platforms: *nix
Added: March 08, 2010 | Visits: 910
Welcome to the world of Fuzzy Fingerprinting, a new technique to attack cryptographic key authentication protocols that rely on human verification of key fingerprints. It is important to note that while fuzzy fingerprinting is an attack against a protocol, it is not a cryptographic attack and...
Platforms: *nix