Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • SHSi - A small program mainly for Windows XP users, which is capable of displaying the vital information of the three main components of computer: CPU, memory and the display's video card. Convenient tool to keep tabs on your PC. The program requires no installation.
  • Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, individual drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
  • Protector Plus 2015 (32-Bit) for Windows Desktop supports Windows 7, Windows XP, Vista, 2000, Me and 98, 95 platforms. This product provides 100% protection against viruses, trojans, worms, backdoors, spyware, adware, exploits, password stealers, hack tools, rootkits and other malware. Protector Plus 2015 (32-Bit) is packed with many useful features like email scanning, InstaUpdate, Submit Sample, Heuristic scanning, memory scanning, de-activation of viruses in memory, quarantine, user defined scan tasks, compressed files scanning and many more. The email scan feature scans all the emails received before they enter the Inbox and ensures that all the emails and attachments are virus free. On detecting an infected email the virus will be removed. The real-time scan feature will scan all the files accessed and automatically removes any virus found. The InstaUpdate feature of Protector Plus 2015 (32-Bit) will automatically download the virus database updates from the developer's web site free of cost. Su ...
  • W32/Fsysna Free Trojan Removal Tool will detect and remove W32/Fsysna Trojan completely, from your system. Download cleanfsysna.exe and save it in a temporary directory. Double click on cleanfsysna.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/Fsysna Trojan from your computer.This virus removal tool will detect and remove W32/Fsysna Trojan and its variants from your computer. It is a Windows based free virus removal tool designed by Proland Software Pvt Ltd. You can download the trial version of Protector Plus antivirus software by clicking on Download Antivirus button.
  • HP Drivers Update Utility updates your system drivers for HP devices automatically to let your HP device work properly. The HP Driver Update Utility keeps your system up-to-date. It detects which driver updates are relevant to your computer, and then helps you install them quickly and easily. It supports HP printers, laptops, computers, digital cameras, servers etc.
  • Best Network Security is the best solution for corporations, universities, schools, public libraries, internet cafes and other applications where administrator has to secure and maintain a lot of network PC workstations located in different places. Best Network Security is intended for securing, protecting, and maintaining PC workstations within a corporate network. Supports over 600 different security restrictions.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Use the LimagitoX File Mover to move your files from anywhere to anywhere. This file mover automation tool can copy, move or delete files that are added to a specific folder. You can set file and directory filters based on the file name, date and size. Also rename, encrypt or decrypt files and rename directories (using regular expressions) when moving them to the new destination. Sold with a free update and upgrade License (Corporate License).
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Inventory and discover all computers using NEWT Professional network inventory. Get essential hardware and software information without ever having to visit a remote machine. We use advanced audit methods to retrieve the data you need into an easy-to-read spreadsheet-like view. Export all data to an MS Access database to generate detailed queries.
  • RoboTask allows you to automate any combination of tasks on your computer, ranging from simply launching applications, to checking email, moving or backing up files to uploading/downloading, sending email and much more. The program allows you to easily create simple tasks, as well as highly complex automations, involving conditional IF/ELSE statements, loops, custom variables and other advanced options.
  • Advanced Internet Kiosk is intended for building Internet kiosks, public access PCs, or in-store terminals. It lets you disable access to files installed on your PC and prevent users from changing PC settings while gives full access to all necessary applications you specify including Internet Explorer. As a result, many people may have free access to a workstation you create, but none of them can damage (whether accidentally or intentionally) vit
  • Advanced Desktop Shield - protect public access PCs, stop users from changing desktop wallpaper and screen saver, deleting, creating and renaming desktop icons, changing display settings and so on. Backup, restore and manage desktop layouts, which include desktop files and folders, placement of desktop icons, wallpaper and screen saver. If you choose to lock desktop layout, each time PC is rebooted, the program will return everything on the deskt
  • Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer u
  • Print from DOS, Unix, Linux to Windows printers: USB, GDI, PDF, e-mail, network, fax, virtual, IP. Capture PRN: , LPT1: .. LPT9: ports and redirect the print jobs, even to a printer phisically connected to the captured port. It also allows preview printing, include logos and background img, send the jobs via fax/e-mail, use specialist fonts (like barcodes), colorize the text, export in PDF, archive copies, same job to multiple printers and more.
  • 1Click & Lock up is a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from the system tray, log access attempts, and apply a custom background image. When enabled, Secu
  • The focal point of the system administration is the efficient management of user accounts and their corresponding properties. The data resides on directory servers and is accessed through the Lightweight Directory Access Protocol (LDAP). Userbooster Light is a universal LDAP client providing system administrators with all they need for managing directory data.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • RescuePRO Deluxe is an advanced application that recovers images, movies, sound files and more. This software is compatible with Memory Sticks, SD Cards, CompactFlash and most other forms of digital media. Simply insert your digital media into the reader, run the software and save the recovered files. There is no easier way to salvage those important files you thought were lost forever.
  • Copy Protect lets you copy protect your audios, videos, documents and pictures so that they cannot be duplicated, copied or distributed by illegal means. Copy Protect converts all supported formats into executable applications that run only in the drives they are prepared for. If these files are copied to another drive, they do not run and become useless. Copy Protect works in all 32-bit and 64-bit version of Windows 7.0/Vista/XP.
  • Recovery any files from hard disk (NTFS, NTFS5, FAT12/FAT16/FAT32, XFS, HFS/HFS+ partitions) and removable media, recovery deleted sms, contacts, calls from Android, Iphone, recovery Skype messages from PC. Support OS: Windows 2000/XP/2003/2008/Vista/Windows 7, Linux, Mac OS X. You can recovers files deleted without Recycle Bin or when Recycle Bin has been emptied or when the partition structure on a hard disk was changed or damaged.
  • 'Find Path Changes' is a handy program if you need to know what has changed in a directory or even in a whole hard drive. This allows you to find "lost" files in an extended directory. It also gives you the possibility to observe directories you are responsible for (for example at your working place). The program shows you changed/new/deleted files and you can react accordingly. Such changes can also trigger an e-mail message.
  • Real PC Spy software is a smart PC surveillance software that lets you know exactly what people do on a PC. It secretly records all PC and internet activity, including typed keystrokes (keylogger), chats & IMs, emails, websites visited, microphone, Facebook use, games played, online shopping and searches, video talk, videos watched, documents opened, clipboard text and more. It sends logs to your email or ftp like every 30 minutes.

Page 1 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware