Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Spy Patrol is a user-friendly spy software that runs hidden in the background. Spy Patrol records in stealth mode all th keystrokes typed, passwords, websites visited, chats etc. and takes screen shots of the active windows. Spy Patrol records all the user passwords (including the system logon password!). Spy Patrol captures the emails sent and received, and the messenger conversations are recorded as well! See more at www.spy-patrol.com
  • Locate Mouse Position on Screen with Freeware Mouse Locator Utility for Windows. The Location of Mouse Cursor is displayed in term of X and Y Co-Ordinates updated automatically at 200 milli seconds. The Mouse Locator Window stays on top of other Windows and can be moved around the screen with Title Bar. Small & Easy Utility to get the Mouse Cursor Position without any configuration. Download for free and enjoy the functionality offered.
  • Make any Window Always on Top with Freeware Utility for Windows. A Simple Keyboard Shortcut to make any Window to stay on Top of other Application Windows. Really easy to use and handy when your Application Window needs to stay on top of other Application Windows. Even when your Application Window does not supports the feature to stay on On Top of other Windows, you can easily and quickly mark any Window to stay on Top of other Applications.
  • BitLocker Password by Thegrideon Software is advanced passwords recovery tool for encrypted BitLocker and BitLocker to Go volumes protected with User password. Several attacks can be queued: dictionary based, brute-force, mixed (combinations of independent dictionary, brute-force and fixed parts). Advanced keyboard layouts-aware recovery technique. Highly optimized code (SSE2, AVX, AVX2) and GPU (AMD, NVIDIA, Intel) utilization.
  • Simple, portable and lightweight tool, lets you burn flash drive with multiple ISO. BootLine helps you to install Windows 7,8,10 or run live images like Kaspersky Rescue Disk or CloneZilla from USB stick without formatting it. Bootline is portable version of web service bootline.net - you can burn your multiple ISO to flash drive online in your browser.
  • Bitcoin Password by Thegrideon Software is advanced and extremely fast passwords recovery tool for encrypted Bitcoin-Qt/bitcoind Wallets (wallet.dat). Several attacks can be queued: dictionary based, brute-force, mixed (combinations of independent dictionary, brute-force and fixed parts). Virtually endless number of combinations. Highly optimized code (SSE2, AVX, AVX2) and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.
  • The MD5 message-digest algorithm is a widely used cryptography hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptography applications, and is also commonly used to verify data integrity.SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal
  • NetstatWrapper Tool Readme File NetstatWrapper Tool: NetstatWrapper is a small windows GUI tool that can be use to run netstat command using UI. With this small tool you can run some of the netstat command line tool and see the result in Notepad, or any other configure text viewer tool. This version Support the Following Commands: 1. an List all connection and ports as number 2. anb List all connection and ports as number with the involve exe 3. ano List all connection and ports as number with the process id 4. r Show Ethernet statistics and perprotocol statistics 5. es Show the current routing table How To Use: 1. Start NetstatWrapper.exe 2. If you get a User Account Control (UAC) allow it to run Press on Yes. 3. Select the netstat command you want to use. 4. Optional: You can select a text viewer that will show the output command data. 5. Press the Run button to execute the command. 6. A text file will be open with the command result.
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Free data recovery software to recover lost deleted photo, video, file, partition, document from hard disk, memory card, flash drive on Windows and mobile phone. Five different data recovery modes are integrated to recover files under almost any conditions including: accidentally deleted files, damaged or formatted hard drive; lost or deleted partition; photo or video lost from local drive, memory card, camera; file lost from mobile phone.
  • Access 2007 Password by Thegrideon Software allows you to reset password of any encrypted Access 2007 database (.accdb) regardless of its length and complexity! The processing time is approximately equal to just 5-6 characters password search with the fastest software. Access 2007 Password also allows you to re-protect modified database (encrypt back with unknown password), so protected database can be edited without password recovery.
  • SFWare Deleted File Recovery Mac software is a hassle free recovery tool that can easily and swiftly get back all deleted files. This software is specially designed to solve problems related to Mac Operating system. It can effortlessly restore deleted or lost files within 3-4 easy steps. It can easily restore files that emptied from Trash. This utility is designed in such a way that it can locate and retrieve deleted files from missing volumes of Mac OS. Apart from this it can also get back files from formatted volumes within few minutes. It is very easy to use so that user of all levels can execute it without any hurdles. SFWare Deleted File Recovery Mac utility works on read only mode thus it recovers file without any damage to actual content and that to with its original name. It supports recovery of files from HFS+, HFSX, FAT16 and FAT32 volumes/partitions. This recovery tool has the ability to rescue files on basis of its unique signature. It can recover deleted and lost files from internal and external ...
  • Rapid PDF Count will show you how many pages are in many pdf's and generate reports for you with a few mouse clicks. Unicode file and reporting support, pdf portfolio file support - automatically extracts files from the pdf portfolio and counts the single pdf's, Zip archive support, Rar archive support, 7z archive support, count words in a pdf, count file size, pages & number of files, count words per page, count characters per page, no text page
  • You often need to use documents (files, data tables or emails) that must meet specific constraints of content. If these documents' compliance was until then a binding task, meltingSquare Checker allows now you to automatically check them according to your own validation rules. Save valuable time to your teams and guarantee the quality of their work with this simple and scalable solution.
  • RoboMirror is a GUI front-end for the quite popular Robocopy.exe command-line utility for Windows. Robocopy is shipped with Windows since Vista and available as free SDK tool for previous Windows versions (RoboMirror already includes it). It allows to robustly synchronize two directory trees, both locally and across the network. It is therefore often used for mirroring purposes, e.g., as a powerful yet free backup utility.
  • Deleted important data by accident? Virus attack causes data loss? Need your data but iPhone got lost or damaged? Lost all your data after failed jailbreak or iOS upgrade? Yes you can recover your lost data with iMyfone D-Back iPhone Data Recovery Expert! iMyfone D-Back provides 4 recovery modes: Smart Recovery, Recover from iCloud backup, Recover from iTunes backup, Directly recover from iOS device. 19+ types files are supported to recover: messages, notes, call history, contacts, photos, videos, WeChat history and attachments, Skype history and attachments, WhatsApp history and attachments, Safari history, Voice memo etc. All iOS devices are supported including the newest iPhone 6s/6s plus. Key features: Intelligently analyse according lost data scenario to select how to recover your lost data in the easiest way; Preview lost data after scan; More files types are supported; Supported iDevice: iPhone 6s/6s plus/6/6 plus/5/5s/5c/4s/4, iPad Pro/Mini3/Mini2/Mini/4/2/Air 2/Air/with Retina disp ...
  • Fast text manipulation and data extraction. Fix websites, database extracts and electronic text with EasyPattern multi-line search and replace, convert end of line characters, ASCII-EBCDIC, OEM-ANSI, 150 Unicode conversions, Unicode search/replace, extract emails, add/remove lines/columns, add line numbers, sort, split, join, JScript/VBScript, restrict to line/column ranges and CSV/Tab-delimited fields. Winner SIA 2003 "Best Application".
  • Altova DiffDog 2016 Professional Edition is the powerful diff / merge tool for files and folders. This easy-to-use synchronization utility quickly compares and merges text or source code files and diverse directories via its intuitive visual interface. It also provides advanced XML-aware differencing and editing capabilities based on those popularized in Altova XMLSpy. DiffDog is available in 32-bit and 64-bit versions.
  • CTG Network Manager - IT Network Management and monitoring Software that provides any IT Department with the ability to track all aspects of an IT assets life cycle from purchase, to deployment, inventory, software management, status monitoring, incident resolution, and record keeping, through to its retirement. Windows based Software designed for IT asset and configuration management. Also includes CTG Network Map and CTG Network Scanner
  • LuJoSoft CopyAndPaste is a simple copy and paste manager. When I say simple it means that it's simple to use, because is power is great. I decided to create this program because of all the time I use windows copy and paste function, as you know the function is very limited, only the last copy is available to paste. With LuJoSoft CopyAndPaste no more you will have at your disposal all the copy you did since you started the application.
  • With KeyLord you can keep your passwords, credit card and bank account numbers, and other sensitive information in a tree-like structure, secured with passwords or X.509 certificates for increased protection. Powerful and flexible password generator, included in KeyLord, lets you create unique and cryptographically strong passwords, which are possible to remember.
  • Have you got any doubts or concerns about productivity of your employees? Do you need to check on productivity of certain people in your company? Are you looking for a way of exposing exports of confidential data and information from your web?
  • IbidInfo OST to PST Converter is a trustworthy and effective program to migrate OST file to proportionate personal storage (PST) format. The product securely converts all mail objects of OST record and saves them in latest PST document, alongside offering alternative to save as PDF, RTF, EML, & MSG and HTML formats according to necessity. Using IbidInfo OST recovery tool user can restore mail messages with attachments, calendar, task, appointment, notes, and journal; additionally restore the designing of HTML and RTF emails incorporated into OST document. The fundamental interface of the product has the choices to choose the OST document from a known area or discover it from the operating system. Later than to selecting the offline storage (OST) file, it changes over the record to produce the relating PST file. After the change, you can watch the preview of recoverable things in the product interface. The elegant "Find" alternative aides in finding a specific email out of the bundl ...
  • StegHide UI allows you to easily hide a file inside another one using steganography. Not a replacement to encryption, but they can be combined to better serve your privacy. Can hide all types of files, including word documents, text files, password databases and others. It's an easy to use interface for the renowned command line application steghide, which is included in this package. Features - Simple GUI - Embed a File - Extract a File - Simple Command Line Interface - Encryption - Windows Context Menu - Desktop & Start Menu Shortcut
  • Able Launch Bar is a window similar to the Quick Launch bar. This is Application Desktop Toolbar with built-in Windows Explorer. Able Launch Bar offers a system of shortcuts far more superior than Quick Launch. Arranged into folders, they are just the same as folders in the Explorer window. Able Launch Bar support for Drag & Drop helps quickly fill the folders with shortcuts from your desktop or start menu.

Page 21 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware