Introduction - If you have any usage issues, please Google them yourself
one : the use of personal information to thank PIM Personal Edition 2.0, the product primarily for personal records and the use of information. Personal information of the work mainly to explain the use and copyright. 2 : Communication recorded a : View communications were here to register 2 : Add 3 Communications recorded : T T extract records in the extraction and the preservation of relevant directory PIMData.bat document, the document has been encrypted, only in the system and look for the information. 4 : Helping the three : Electronic four albums : an information management : View information 2 : Add information 3 : control system to steal user passwords : steal the machine user name and password keyloggers : input information and records kept in ": \ Program Files \ KeyRecord \
Packet : 29782199pim-2.rar filelist
PIM\ClassXP.dll
PIM\hodll.dll
PIM\KEY.txt
PIM\PIM.exe
PIM\PIM.mdb
PIM\PIMData.bat
PIM\PIMUserLog.bat
PIM\PIM使用手册.doc
PIM