Extreme URL Generator is an easy way to generate and save a list of similar URLs. It provides clean and intuitive user interface that lets you generate hundreds and thousands of URLs with just a few mouse clicks.
Aug 15, 2013 15:52:37
Windows 98, Windows 2000, Windows XP, Windows Vista
Extreme Picture Finder 3.33 Image downloader and web picture finder in one product. Easily download all images from any website or search the web for pictures using keywords. Plus built-in image viewer and a database with thousands of websites addresses sorted by category.
Extreme Thumbnail Generator 2.0.1 Powerful, yet easy-to-use HTML photo gallery software. Make beautiful web photo albums of your digital photos with just a couple of mouse clicks and publish them on your website instantly. Includes more than 40 ready-to-use photo gallery templates.
Description: Extreme URL Generator is an easy way to generate and save a list of similar URLs. It provides clean and intuitive user interface that lets you generate hundreds and thousands of URLs with just a few mouse clicks. After the URL list is generated you can save it into a text file or copy it into the Windows clipboard with another mouse click.
But this is not all! Extreme URL Generator provides you with many options when you save the generated list of URLs into a text file. You can add prefix and suffix to every URL, save the entire list as a single line or make each URL occupy its own line in the file. So the saved file is immediately usable by many other programs.
EditURLs 2.02 This program provides the user with the capability to edit individual URL addresses in the URL Address Dropdown List in Internet Explorer. Provision is made for deletion of all
Barcode Generator 220.127.116.11 Do you want to make badges on your own? Use ultimate Barcode Generator software available with barcode designing view by which user can create innovative barcode labels with
URL Parsing Bug in IE Invites Phishing Attacks A bug in fully patched versions of Microsoft's Internet Explorer Web browser allows violations of the browser's security zones, with the result that an unknown malicious site could assume the privileges of more trusted zones.