Maxwell


Advertisement

PowerPoint Password  v.2014.05.15

PowerPoint Password is advanced and extremely fast password recovery tool for MS PowerPoint presentations (.ppt, .pptx) and/or templates (.pot, .potx). All versions up to Office 2013 are supported.

Project Password  v.2014.05.15

Project Password is advanced and extremely fast password recovery tool for MS Project files (.mpp) and/or templates (.mpt). All versions are supported. Highly optimized code and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.





Advertisement

Project Management Course RSS

Project Management Training RSS Reader. For those going for their Project Management Certification, such as PMP Certification from PMI, You can keep up-to-date on the latest Project Management related training and course-ware, as well as project

FastModel  v.2 32

FastModel, a powerful editor with 3D visualization capability developed by FastFieldSolvers that will help you prepare your input files for FastHenry / FastCap with much more ease!

MtxVec  v.3 5

MtxVec is vectorized object oriented numerical library for .NET, Borland Delphi and Borland C++ Builder users. The library features complete support for complex numbers for all functions in single or double precision.

Hard Disk PVT System Model  v.1.0

Simulate 2D particles systems with this tool. Hard Disk PVT System simulates a two-dimensional system of particles confined between a thermal reservoir and a piston.

RenderPal V2  v.2.5.0

dedicated to network rendering across large render farms.

Bitcoin Password  v.2014.05.15

Bitcoin Password by Thegrideon Software is advanced and extremely fast passwords recovery tool for encrypted Bitcoin-Qt/bitcoind Wallets (wallet.dat). Highly optimized code and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.

Accent ZIP Password Recovery  v.4.8

Recovers lost passwords for any zip archives (classic and WinZip AES encryption). Boosted by AMD and NVIDIA video cards. Automatic password search mode. A macro language for creating mutation rules in a dictionary-based attack.

Pages : 1 | 2 | Free
Newest Reviews