the kernel freeware downloads
Search results for «the kernel»:
Kernel Filter for Content Protection 1.0
… l content in the files is encrypted and inaccessible. Only an authorized user can access the correct content of the files.
The functionality of Kernel Filter can be extended to anti-copying, which various copy protection solutions can be derived.…
Password Kernel 1.52
… helps you manage your password information.
Seven levels of encryption makes sure that your password information is safe. Fast access to your passwords when you need them.
Automatically launch login web sites. Store notes with your passwords.…
RootKit Hook Analyzer 3.01
… niques. Inspired by all the discussions going on about the Sony CD protection rootkit, we have developed the RootKit Hook Analyzer.…
Nucleus Kernel Password Unmask 1.0
… teFTP, FlashFXP, SmartFTP etc.
All you have to do is open Kernel Password Unmask Software, then open the window having password in asterisk form; as you open the password window, the password automatically reveals itsef from behind the asterisks.…
Kernel Internet Explorer 4.02
… Kernel Internet Explorer will instantly recover the Internet Explorer's cached passwords of email accounts, autocomplete entries, protected websites.
Kernel Internet Explorer supports all versions of Internet Explorer including 6.x , 5.x and 4.x.…
Kernel Hotmail MSN Password Recovery 4.01
… Kernel Hotmail MSN Password Recovery is a pac…
Longator 2005 build 5.0.1.5
… g links and drop them on the address bar, which you can open a new web page immediately, the delicate multi-tab browsing design, which you can view multiple Web pages in tabbed windows.
You can first browse t…
DebugView 4.64
… payload: DebugView is implemented as one file.
Crash-Dump Support: DebugView can recover its buffers from a crash dump and save the output to a log file so that users can send you the output your NT driver generated right up to the time of a crash.…
RootkitRevealer 1.71
… be even more powerful since, not only can they intercept the native API in kernel-mode, but they can also directly manipulate kernel-mode data structures. A common technique for hiding the presence of a malware process is to remove the process from the kernel's list of active processes. Since proce…
Related: