Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Best Network Security is the best solution for corporations, universities, schools, public libraries, internet cafes and other applications where administrator has to secure and maintain a lot of network PC workstations located in different places. Best Network Security is intended for securing, protecting, and maintaining PC workstations within a corporate network. Supports over 600 different security restrictions.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Use the LimagitoX File Mover to move your files from anywhere to anywhere. This file mover automation tool can copy, move or delete files that are added to a specific folder. You can set file and directory filters based on the file name, date and size. Also rename, encrypt or decrypt files and rename directories (using regular expressions) when moving them to the new destination. Sold with a free update and upgrade License (Corporate License).
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Inventory and discover all computers using NEWT Professional network inventory. Get essential hardware and software information without ever having to visit a remote machine. We use advanced audit methods to retrieve the data you need into an easy-to-read spreadsheet-like view. Export all data to an MS Access database to generate detailed queries.
  • RoboTask allows you to automate any combination of tasks on your computer, ranging from simply launching applications, to checking email, moving or backing up files to uploading/downloading, sending email and much more. The program allows you to easily create simple tasks, as well as highly complex automations, involving conditional IF/ELSE statements, loops, custom variables and other advanced options.
  • Advanced Internet Kiosk is intended for building Internet kiosks, public access PCs, or in-store terminals. It lets you disable access to files installed on your PC and prevent users from changing PC settings while gives full access to all necessary applications you specify including Internet Explorer. As a result, many people may have free access to a workstation you create, but none of them can damage (whether accidentally or intentionally) vit
  • Advanced Desktop Shield - protect public access PCs, stop users from changing desktop wallpaper and screen saver, deleting, creating and renaming desktop icons, changing display settings and so on. Backup, restore and manage desktop layouts, which include desktop files and folders, placement of desktop icons, wallpaper and screen saver. If you choose to lock desktop layout, each time PC is rebooted, the program will return everything on the deskt
  • Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer u
  • Print from DOS, Unix, Linux to Windows printers: USB, GDI, PDF, e-mail, network, fax, virtual, IP. Capture PRN: , LPT1: .. LPT9: ports and redirect the print jobs, even to a printer phisically connected to the captured port. It also allows preview printing, include logos and background img, send the jobs via fax/e-mail, use specialist fonts (like barcodes), colorize the text, export in PDF, archive copies, same job to multiple printers and more.
  • 1Click & Lock up is a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from the system tray, log access attempts, and apply a custom background image. When enabled, Secu
  • The focal point of the system administration is the efficient management of user accounts and their corresponding properties. The data resides on directory servers and is accessed through the Lightweight Directory Access Protocol (LDAP). Userbooster Light is a universal LDAP client providing system administrators with all they need for managing directory data.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • RescuePRO Deluxe is an advanced application that recovers images, movies, sound files and more. This software is compatible with Memory Sticks, SD Cards, CompactFlash and most other forms of digital media. Simply insert your digital media into the reader, run the software and save the recovered files. There is no easier way to salvage those important files you thought were lost forever.
  • Copy Protect lets you copy protect your audios, videos, documents and pictures so that they cannot be duplicated, copied or distributed by illegal means. Copy Protect converts all supported formats into executable applications that run only in the drives they are prepared for. If these files are copied to another drive, they do not run and become useless. Copy Protect works in all 32-bit and 64-bit version of Windows 7.0/Vista/XP.
  • Recovery any files from hard disk (NTFS, NTFS5, FAT12/FAT16/FAT32, XFS, HFS/HFS+ partitions) and removable media, recovery deleted sms, contacts, calls from Android, Iphone, recovery Skype messages from PC. Support OS: Windows 2000/XP/2003/2008/Vista/Windows 7, Linux, Mac OS X. You can recovers files deleted without Recycle Bin or when Recycle Bin has been emptied or when the partition structure on a hard disk was changed or damaged.
  • 'Find Path Changes' is a handy program if you need to know what has changed in a directory or even in a whole hard drive. This allows you to find "lost" files in an extended directory. It also gives you the possibility to observe directories you are responsible for (for example at your working place). The program shows you changed/new/deleted files and you can react accordingly. Such changes can also trigger an e-mail message.
  • Real PC Spy software is a smart PC surveillance software that lets you know exactly what people do on a PC. It secretly records all PC and internet activity, including typed keystrokes (keylogger), chats & IMs, emails, websites visited, microphone, Facebook use, games played, online shopping and searches, video talk, videos watched, documents opened, clipboard text and more. It sends logs to your email or ftp like every 30 minutes.
  • Smart PDF Converter Pro is easy to use and extremely helpful. It will let you convert your PDFs to several formats: HTML, DOC, RTF, XLS, JPEG, TIFF, and TXT. All you need to do is to input your PDF, set an output format, an output folder and press Convert. The software features an advanced settings menu from where you can choose different conversion methods. After you convert and edit your PDFs you can easily convert them back to PDF format.
  • USB Secure can password protect any portable media including USB drives, External drives and even memory cards. It supports plug and play and automatic execution. No administrator rights or install is required on the other computer. You can take your USB drive anywhere without a fear of data leak or theft in case of a stolen or lost USB drive. USB Secure is a great program for people keeping private data on portable devices when travelling.
  • iFonebox is a professional and powerful iOS data recovery software, which can recover deleted data directly from iPhone,iPad,iPod, extract contacts,sms,call logs,notes,photos,video,calendar,reminder,voice memos from iTunes backup and extract from iCloud backup. Before recovering you can preview the data so that you can selectively recover what you need. it works well with iPhone 6 Plus/6/5S/5C/5/4S/4, iPad Air/Mini/4/3 /2/1, iPod touch etc
  • Facebook Spy Monitor is a Facebook related activity monitoring and parental control software. It secretly records PC users' Facebook private profile, emails, chats & IMs, photos, interests, contatcts and events by taking screen snapshots periodically. It also records popular Facebook instant messenging clients and Facebook related web sites and searches. See exactly what users were doing just like watching a surveillance video playback.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.

Page 1 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware