Software Listing of Author : "Godlike Developers - Software Engineering Group, Ltd."
- Clean Uninstaller
- License: Shareware
- Price:


Clean Uninstaller: When you uninstall different software, temporary files and files not deleted in the process of uninstallation often remain on the hard disk. These files are no longer used, they take up disk space and increase disk access times.
With the help of the tool Clean Uninstaller you can solve that problem. You can also control the installation process of program, monitor installed files and changes made to the Windows registry system files during installation
System requirements:
* OS Windows Me/2000/XP/2003/VISTA x86 x64
* Minimum screen resolution 1024x768
* CPU: Pentium processor and above
* RAM: 128 Mb RAM
* HDD: 5 Mb free disk space
* Download size: 1.4M
- Publisher: Godlike Developers - Software Engineering Group, Ltd.
- Date Released:
- Download Size: 1628 KB
- Download
- Platform: Win2000, WinOther, WinServer, WinVista
- Invisible Man
- License: Freeware
- Price: 0.00


"Invisible Man" is for keeping private information and its later restoring. This is necessary in that case when you wish to do some work on the computer which must not be fixed anywhere, but you need to save the information which you had in computer before your work. To do that first you need to create "Control point" by button "Create". In the control point private information is kept. Then you can do the work you do not want to be known. Having finished your work restore information saved in "Control point" by button "Restore". Now system is keeping only the information about your computer activities which you did before creating "Control point". Do not forget to delete "Control point" from the program WinTools.net by "Delete" button.
System requirements:
* OS Windows Me/2000/XP/2003/VISTA x86 x64
*...
- Publisher: Godlike Developers - Software Engineering Group, Ltd.
- Date Released:
- Download Size: 1628 KB
- Download
- Platform: Win2000, WinOther, WinServer, WinVista
- Net Tweaker
- License: Freeware
- Price: 0.00


"Net Tweaker" tool is used for speed increasing of data transfer by changing hidden network settings. With equal speed connection on different computers different speed of data transfer is possible. The thing is TCP/IP is for transfer of packets of data. The packets can be of different degree of compression, of different size, time of life, can have different error repeats? That is why under different settings, equal speed of connection completely different speed of data transfer is possible. Changing settings with the help of "Net Tweaker" tool you can get more stable work with bad connection(at the same time you can lose some speed) or you can get higher speed of data transfer with good connection at the expense of stability which will be provided by good connection line anyway.
On default Windows network settings are...
- Publisher: Godlike Developers - Software Engineering Group, Ltd.
- Date Released:
- Download Size: 1628 KB
- Download
- Platform: Win2000, WinOther, WinServer, WinVista
- RAM Memory Booster
- License: Freeware
- Price: 0.00


This tool serves for monitoring, cleaning and optimisation of RAM. It is used for increasing of operation system performance and for releasing RAM for usage by other processes. Use this tool for working with applications which require maximum cpu priority and RAM exploitation.
System requirements:
* OS Windows Me/2000/XP/2003/VISTA x86 x64
* Minimum screen resolution 1024x768
* CPU: Pentium processor and above
* RAM: 128 Mb RAM
* HDD: 5 Mb free disk space
* Download size: 1.4M
- Publisher: Godlike Developers - Software Engineering Group, Ltd.
- Date Released:
- Download Size: 1628 KB
- Download
- Platform: Win2000, WinOther, WinServer, WinVista
- Scan Files
- License: Freeware
- Price: 0.00


When different programs are running, temporary files necessary for the proper functioning those programs are created on hard disk. Quite often these temporary files are not deleted. The temporary files remain on hard disk, occupy the space and sometimes slowing the work of your computer. The tool "Scan Files" is used for periodic cleaning of the computer from temporary and unused files.
When pressing the Scan button the tool "Scan Files" checks the hard disk for presence of unused temporary files. If a temporary file is found the tool "Scan Files" places it on a list.
After scanning you need to delete temporary files using the "Delete" button.
You can set your own criteria of searching for temporary files:
1.The "File masks" bookmark keeps the masks used for searching for these files. Using...
- Publisher: Godlike Developers - Software Engineering Group, Ltd.
- Date Released:
- Download Size: 1628 KB
- Download
- Platform: Win2000, WinOther, WinServer, WinVista
- Scan Shortcuts
- License: Freeware
- Price: 0.00


The "Shortcuts" tab of the "Scan Files" tool serves for searching, correcting or deleting shortcuts with dead references.
The method of searching for shortcuts is similar to the method which is used for work with the "Scan Files" tool.
The Start button begins the scanning of the hard disk and placing of dead shortcuts on a list.
After scanning you need to delete dead shortcuts using the "Remove" button. You can also correct shortcuts. Choose one shortcut at a time and press the "View" button.
System requirements:
* OS Windows Me/2000/XP/2003/VISTA x86 x64
* Minimum screen resolution 1024x768
* CPU: Pentium processor and above
* RAM: 128 Mb RAM
* HDD: 5 Mb free disk space
* Download size: 1.4M
- Publisher: Godlike Developers - Software Engineering Group, Ltd.
- Date Released:
- Download Size: 1628 KB
- Download
- Platform: Win2000, WinOther, WinServer, WinVista
- WinTools.net: File Shredder
- License: Freeware
- Price: 0.00


"File Shredder" is for deleting documents, programs, and other files without possibility to restore them. While deleting files on the computer the file itself is not deleted - only a part of its header is deleted. All information from the file is still kept on a hard drive but at first sight it seems to be deleted. There are special programs which can restore erased files. If you delete some of your secret files by ordinary method or by using "Recycle Bin" procedure then the files still can be restored without any problems by "unwanted person" or by Special Agencies. While deleting files the "File Shredder" tool erases information in file itself and then renames it to even prevent access to name of the file and deletes it in an ordinary way. After that sort of deleting it is not possible to define the name of the file. And if this file...
- Publisher: Godlike Developers - Software Engineering Group, Ltd.
- Date Released:
- Download Size: 1628 KB
- Download
- Platform: Win2000, WinOther, WinServer, WinVista
- WinTools.net: Startup Manager
- License: Freeware
- Price: 0.00


Many programs "consider" themselves the most important programs in a system: they place themselves in startup and in a System Tray of a system.
This leads to unreasonable using of system resources, of random access memory; and finally, to reducing processor power.
As a rule, such programs write information about themselves not in the Start section of the "Startup" menu, but in the Windows registry without leaving the option to the user and complicating the process of checking the autothread process.
The "Startup" tool monitors all records about autothread and allows to delete/add and temporarily disable records.
After temporary disabling the records you need to apply changes by pressing the Apply button.
For deleting, editing or adding records you can use "Delete", "Edit" and "Add"...
- Publisher: Godlike Developers - Software Engineering Group, Ltd.
- Date Released:
- Download Size: 1628 KB
- Download
- Platform: Win2000, WinOther, WinServer, WinVista
- Your Privacy
- License: Freeware
- Price: 0.00


While you are working on your computer the system monitors the so called "history" and saves it. All information about your work in the Internet - when and which sites you visited, of what content, which programs downloaded, with which documents you worked, which and whom you wrote, what you looked for, which folders you opened, what computers you connected to - all that and a lot of other information is left on your computer. Any person who has an access to your PC can easily access this information and monitor practically your every step. Besides he/she can collect compromising information about you. In that situation confidentiality can not be guaranteed. So much accessible information about you not only destroys your privacy but also slows down your computer. All this information is kept on your hard drive, in the system registry....
- Publisher: Godlike Developers - Software Engineering Group, Ltd.
- Date Released:
- Download Size: 1628 KB
- Download
- Platform: Win2000, WinOther, WinServer, WinVista