Software Listing of Author : "Diamond Computer Systems"

DiamondCS Advanced Process Manipulation (APM) is an advanced process/module viewer and manipulation utility that allows unique control over target processes by literally becoming a part of them. Take control of a process by becoming a part of it ... Unlike conventional process viewers, DiamondCS APM doesn't control processes by remotely sending them instructions. Instead, APM safely attaches a part of itself to the target process, essentially becoming a part of that process. Once 'inside', APM is free to perform actions on behalf of the target process. For example, if it calls the ExitProcess API function, the target process terminates. Control processes in ways that aren't conventionally possible ... Because of this 'insider' nature, APM is able to do some remarkable things that aren't otherwise possible. For example, it can...

  • Platform: Win2000, Windows Server, WinOther

Are your security applications vulnerable to simple termination attacks? Advanced Process Termination (APT) is a small but powerful utility that provides ten (10) different process termination techniques, two (2) suspension/resumption techniques, and two (2) crash techniques - all at the click of a button, making it ideal for testing the resistance of software to termination attacks, as well as terminating stubborn software that just refuses to terminate!

  • Platform: Win2000, Windows Server, WinOther

CryptoSuite is easy to use encryption software for Windows. It is the best in it's class. It includes file encryption, checksums, instant messaging and more!It is very easy for others, such as family members, co workers and thieves to see files on your computer. This is where CryptoSuite comes in. It essentially allows you to hide files on your computer. CryptoSuite combines military grade encryption technology with ease of use.. DiamondCS (Est. 1986) - advanced security & analysis software for Windows. Security software specialists - anti trojan, anti virus research, free security software downloads and advice. DiamondCS Security Software.

  • Platform: Win2000, WinOther
  • DelLater
  • License: Freeware
  • Price: 0.00

Have you ever tried to delete a file, only to be frustrated by messages like these? The process cannot access the file because it is being used by another process. Cannot delete file: It is being used by another person or program. Close any programs that might be using the file and try again. Here is an easy solution. DiamondCS DelLater uses the only method recommended by Microsoft to delete files that are in use. This method is based on documentation from Microsoft that describes a function called MoveFileEx, and DelLater has been carefully designed to be technically accurate to the guidelines set forth in the article. This is the same technique used by anti-virus scanners when they're unable to delete in-use files. Although the MoveFileEx function isn't supported under Windows 95/98/ME, the article does describe how...

  • Platform: Win2000, Windows Server, WinOther

DiamondCS CSView has everything you need in a CSV file viewer and nothing you don't, making it the ideal CSV viewer for nearly all situations. CSView, like our other free utilities, is free for both commercial and non-commercial use. What is a CSV file? CSV stands for Comma Separated Values. It is a very simple and popular text-based tabular file format that is easy for both software and humans alike to generate and read. Each line in a CSV file represents a row, and each column of data is separated by a comma (hence the name). The first row (that is, the first line in the file) is treated as the header line. Due to the format specification commas can't be used in data fields as they're used to denote fields.

  • Platform: Win2000, Windows Server, WinOther

This is our implementation of the famous MD5 algorithm, and presents an easy and highly secure way of verifying the integrity of files. Single-line text, multi-line text and file contents are all supported inputs. The resulting MD5 hash is displayed in a textbox for easy clipboard copying. Software is often accompanied by an MD5 'hash' (or 'checksum'). This serves as a unique identifier for the contents of the file - if the file contents change then so does the MD5 hash, making it easy to verify the integrity of files. A brief description of MD5: The algorithm takes as input a message of arbitrary length and produces as output a 128 bit (16 byte) "fingerprint" of the input (also known as a "message digest", "checksum" or "hash"). It is conjectured that it is computationally infeasible to produce two messages having the same...

  • Platform: Win2000, Windows Server, WinOther

See which ports belong to which programs! Port Explorer shows you all the open ports on your system and what programs own them (called Port to Process mapping). Along with this ability it also has many tools including a packet sniffer, bandwidth throttling and country detection to name just a few. Port Explorer has an intuitive GUI that allows you to quickly see all your network activity, and thanks to its ease of use is allowing people everywhere to do advanced network activities. Providing unprecedented viewing and control over the sockets on your Microsoft Windows system, the data traffic going through it, and the computers that are connected to it, Port Explorer is a completely unique and powerful program that goes where few others can. In this day and age where system security means everything on the Internet, Port Explorer is a...

  • Platform: Win2000, WinOther
  • IRClean
  • License: Freeware
  • Price: 0.00

IRClean is a 100% free, standalone, compact, and easy-to-use yet very powerful anti-worm system designed to specifically combat worms that target or use IRC chat networks to propagate. It has been released into the public domain for free to help stem the growing tide of IRC-propagating worms. IRClean is very easy to use. When run, it will prompt you for a location to scan. You can scan an entire drive such as C: or a directory such as C:Mirc. Scanning can be stopped in mid-scan at any moment by pressing the Stop button. If IRClean has detected any files that have the characteristics of IRC-propagating worms, you will be alerted. Test worm included. Due to controlled design, it cannot spread or cause damage (so it is not a true worm), but is an actual real sample and demonstrates at it's most simplest how a worm can infect mIRC....

  • Platform: Win2000, Windows Server, WinOther

RegistryProt is a 100% free, standalone, compact, low-level realtime registry monitor and protector, that adds another dimension to Windows security and intrusion detection. By monitoring important locations and keys in the Windows system registry, RegistryProt will alert whenever a key is added or changed, and then give the option of accepting the key change, reverting back to the original key setting, or deleting the key. RegistryProt's most useful attribute is that it will detect the vast majority of trojans at the exact moment that they infect/install themselves into your system, and as such provides a new dimension in trojan and intrusion detection.

  • Platform: Win2000, WinOther
  • RegProt
  • License: Freeware
  • Price: 0.00

RegistryProt is a 100% free, standalone, compact, low-level realtime registry monitor and protector, that adds another dimension to Windows security and intrusion detection. By monitoring important locations and keys in the Windows system registry, RegistryProt will alert whenever a key is added or changed, and then give the option of accepting the key change, reverting back to the original key setting, or deleting the key. RegistryProt's most useful attribute is that it will detect the vast majority of trojans at the exact moment that they infect/install themselves into your system, and as such provides a new dimension in trojan and intrusion detection.

  • Platform: Win2000, Windows Server, WinOther
New Reviews

Safe In Cloud

It is quite difficult to find any computer users nowadays who do not need to use the web, for any purpose. Whether it is for education or entertainment, the web is your best resource. You also need to use various online services for banking, ...


PictBear

Nowadays, a majority of PC users resort to digital image editing once in a while. It may be required for retouching image captured in smart phones or for creating an album in Facebook. For some people, tinkering with digital images is a pastime too. ...


Panda Cloud Cleaner

PC security has become a tricky and complicated subject both for home users and network supervisors, with complexity and risk factors multiplying over the years. Using a single antivirus app may not be enough anymore. That explains why many users ...


SnapCrab

Nearly every PC users need to take screenshots from time to time, whether it is for personal or professional needs. While using the basic Windows screenshot capture method is available, it is not adequate for everyone. When you want to capture ...


BitKiller

Dealing with various types of data efficiently holds the key to success in any computing task. Apart from generating new data and modifying existing files, it becomes necessary to delete existing files at times. While most users resort to using ...


SeaMonkey, Portable Edition

Using the Internet has become a necessity for a majority of people, including those who do not use a PC regularly. To browse web, stream video or download online content, people often resort to using various third party apps. For example, using ...


TuckAway Intelligent Email Organizer Pro

Using an email software allow you to do a number of things including managing your address lists, emails and even ending memos, documents and even virtual letters. You can also use it to manage your tasks easily. The email software comes in ...


New Downloads

WidsMob Denoise

WidsMob Denoise should be an
easy noise reduction program
for both smartphones and
camcorders with different
photo ...

Soda PDF

Soda PDF Anywhere is the first
full-featured PDF solution
available both on desktop and
online. It allows users to
read, ...

sMonitor

sMonitor is a server uptime
monitor which will constantly
monitor the online status of
both local and remote servers.
It ...

Wake-On-LAN Listener

The program receives magic
packets and can be used as a
Wake-On-LAN configuration
troubleshooting tool. It
allows to ...

Handy Backup Small Server

Handy Backup Small Server is a
full-featured backup solution
for Windows Server
2016/2012/2008. Provides
backup of files, ...

Altova DatabaseSpy
Enterprise Edition

Altova DatabaseSpy Enterprise
Edition is the unique
multi-database tool from the
creators of XMLSpy. It
connects to all ...

Advanced Task Scheduler
Network

Client/Server software for
task scheduling, which allows
you to create scheduled tasks
on the server and manage them
from ...

WidsMob Retoucher

WidsMob Retoucher is the
excellent photo editor to
discover the magic of artistic
photo effects, which includes
photo ...

WidsMob Viewer

WidsMob Viewer is an excellent
photo viewing software with
super fast speed and excellent
experience. There are
different ...

MAPS.ME for Android

Access worldwide offline maps
with navigation & driving
directions! Travel easy!