Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Utilities
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • W32/VBS Free Virus Removal Tool will detect and remove W32/VBS Trojan completely, from your system. Download cleanvb.exe and save it in a temporary directory. Double click on cleanvb.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/VBS Trojan from your computer.This virus removal tool will detect and remove W32/VBS Trojan and its variants from your computer. It is a Windows based free virus removal tool designed by Proland Software Pvt Ltd. Protector Plus Distribution Agreement. This is a Legal Agreement between you, the distributor, and Proland Software. Through this Distribution Agreement, Proland Software grants you permission to distribute the antivirus software hereinafter referred to as Protector Plus. You can distribute Protector Plus to computer users using any method without modifying the executable and the documentation files supplied to you.
  • RecoveryFix for OST to PST works as a converter and an OST recovery software.The OST to PST converter uses quick and efficient algorithm which helps to convert the file effectively. Emails, contacts, attachments, images, email properties, sent items, drafts, journals, notes, tasks, folders with sub folders are easily converted with the software and are accessible with MS Outlook and Outlook Express. Functioning as OST recovery software, the software recovers permanently deleted emails of the ?Deleted Items? folder of the .ost file. The software is equipped with three save options which are helpful to the users in terms of saving the recovered email messages; Save as PST, Save as EML and Save as MSG.The user can preview the converted e-mails before saving them and after the analysis can save them into .pst, .eml, or .msg format. While converting OST file into PST file assure that MS Outlook or Outlook Express is installed on your computer where you are performing the conversion. The software allows process ...
  • Automatic copyings of the files chosen on a mask from the removable data carriers connected to the computer (a flash disks, removable hard drives, etc.) in the chosen folder on a local disk. In certain cases it can be used as means of automatic backup of data
  • Save your time to visit each PC and check it for viruses. Instead check all PCs at once by one mouse click. Enable regular checks by spending only few minutes to scan network for viruses with a fast scan engine. Get notification about remote PCs where antivirus protection is disabled or virus databases are out-of-date. Clean-up remote PCs from malware can be performed in the automatic mode and is invisible for remote user and doesn't require interruption of his work. PC protection engine shows notification in case of disabled virus protection. File system and registry clean-up from detected malware Put malware to quarantine before removing it Restoring data from quarantine by request
  • Spyrix Employee Monitoring - cloud-based platform for tracking your employee computer activities. Spyrix allows remote (via web account) control of employees activity in the Internet including chats, messengers , Skype, social networks Facebook, LinkedIn, Twitter, search engines Google, Yahoo, Bing, apps activity, include games. Spyrix will also make screenshots of active windows, snapshots and video from webcamera, records from microphone.
  • Sofonica Folder Soldier Free is the freeware which can protect your folders from unauthorized persons.It comes with password protection so that no one else could change its settings.It supports locking many folders in just a single click.It comes with uninstall guard which does not allow anybody else to uninstall the program until a valid password is put. The program is extremely easy to use.
  • Free Shutdown timer is the software which can automate Shutdown,restart,log off,lock,Hibernate and Standby operations.This can be very helpful if some activity is being performed on your system and you want to shut down pc after a time period.This helps in saving electricity bills.If you are habituated of listening to songs while sleeping,this software can help you.Start a song and set the interval after which shutdown should be automated.
  • Automatic removal of unnecessary files (garbage, temporary files, viruses and other harmful programs) from the removable data carriers connected to the computer (a flash disks, removable hard drives, etc.). By results of work detailed record (in the LOG file) about the connected disks, their tags, serial numbers removed from them files is created
  • Directory Security is the software that can hide the folders.This ensures the privacy and security of the private data.It comes with strong password protection so that no other person could change its settings.Any number of folders can be hidden by this software.Hiding a folder is very simple process.Just add the folders to the protected folder's list and click on button "Hide the folders".Once hidden,folders wll not appear in the pc.
  • Control and testing of IPv4-networks, fast obtaining various information on knots of system. Will help to define network safety of the chosen knot or it is simple to receive necessary data on a network and its knots. Includes the scanner of a network (subnet), the set range, for the purpose of identification of available working IP addresses (knots) with fast definition of their MAC addresses, allows to hold testing of the chosen knot to the know
  • UniPDF PDF to Word is 100% Free PDF to Word converter software to convert PDF to Word documents (doc, rtf), convert PDF to images (jpg, png, bmp, tif, gif, pcx, tga), convert PDF to HTML (html), or convert PDF to Text (txt) in batch mode, with all document texts, layouts, images and formatting ideally preserved.
  • The Gitashare SysHelper is the best system care, free system care. Not only cleaning up junk files, temporary files, malware, and invalid registry entries, but by giving your computer a boost to optimize your PC experience.
  • Detect and Remove Spyware, Adware and Remove Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers, Parasites, Rootkits, Rogue Security Products and many other types of threats. Light on System Resources and designed not to slow down your computer like many other anti-spyware products. Designed not to conflict with your existing anti-malware or anti-virus solution! Repair broken Internet Connections, Desktops, Registry Editing and more with our unique Repair System!
  • Lock down Windows XP/Vista/7/8 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 is perfect for kiosk setups, digital signage, trade shows, library and school labs, Internet cafes, gaming centers, media centers and other applications. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows your main application to run exclusively.
  • W32/ShakBlades Free Virus Removal Tool will detect and remove W32/ShakBlades Trojan completely, from your system. Download cleanshakblades.exe and save it in a temporary directory. Double click on cleanshakblades.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/ShakBlades Trojan from your computer.This virus removal tool will detect and remove W32/ShakBlades Trojan and its variants from your computer. It is a Windows based free virus removal tool designed by Proland Software Pvt Ltd. Download Protector Plus Anti-Virus Software trial version by clicking on Download Protector Plus button on the right hand side of the utility.
  • The free Svchost Process Analyzer examines all Svchost instances. This makes it easy to recognize processes that start up through Svchost and disguise their activities. This was the way the Conficker Worm, which infected millions of computers, operated. The genuine Svchost.exe is an important Windows system process and is located in the C:\Windows\System32 directory. The Svchost.exe processis often misused by spyware, Trojans or worms.
  • MDT FileRecovery PRO for Windows provides the ability to effectively detect and recover files lost due to accidental deletion, disk formatting, virus and other reasons. MDT FileRecovery PRO is an easy-to-use program with a Graphical User Interface without technical skill requirement through the whole recovery process. Lost files recovery is 100% Safe, Secure and Guaranteed!
  • PowerCryptor Password Generator allows you to create highly secure passwords that are difficult to crack or guess. Just select the criteria for the passwords you need, and click "Generate Secure Passwords". Application is designed to generate passwords of any character content. Using PowerCryptor Password Generator you do not have to think out new passwords. Password Generator will do it instead of you.
  • Leawo iPhone 4 data recovery is the best-of-all iOS data recovery tool to retrieve lost camera roll photos and videos, photo library, photo stream, messages, contacts, notes and many more directly from the devices or from iTunes backups. You can achieve iPhone 4 data recovery quickly and safely by deep scan and analyzing of the iPhone 4 or by extracting previous iTunes backups.
  • Leawo iPhone 3GS Data Recovery is the best-of-all iOS data recovery tool to retrieve lost camera roll photos and videos, photo library, photo stream, messages, contacts, notes and many more directly from the devices or from iTunes backups. You can achieve iPhone 3GS data recovery quickly and safely by deep scan and analyzing of the iPhone 3GS or by extracting previous iTunes backups.
  • Leawo iPad mini Data Recovery is the best-of-all iOS data recovery tool to retrieve lost camera roll photos and videos, photo library, photo stream, messages, contacts, notes and many more directly from the devices or from iTunes backups. You can achieve iPad mini data recovery quickly and safely by deep scan and analyzing of the iPad mini or by extracting previous iTunes backups.
  • Leawo iPad Data Recovery is the best-of-all iOS data recovery tool to retrieve lost camera roll photos and videos, photo library, photo stream, messages, contacts, notes and many more directly from the devices or from iTunes backups. You can achieve iPad data recovery quickly and safely by deep scan and analyzing of the iPad or by extracting previous iTunes backups.
  • Leawo iPad 3 Data Recovery is the best-of-all iOS data recovery tool to retrieve lost Camera Roll photos and videos, photo library, photo stream, messages, contacts, notes and many more directly from the devices or from iTunes backups. You can achieve iPad 3 data recovery quickly and safely by deep scan and analyzing of the iPad 3 or by extracting previous iTunes backups.
  • Leawo iPad 2 Data Recovery is the best-of-all iOS data recovery tool to retrieve lost camera roll photos and videos, photo library, photo stream, messages, contacts, notes and many more directly from the devices or from iTunes backups. You can achieve iPad 2 data recovery quickly and safely by deep scan and analyzing of the iPad 2 or by extracting previous iTunes backups.
  • NTFS Partition Recovery utility helps to retrieve lost data from NTFS partitions on Windows PC. It supports to rescue deleted or lost documents, photos, compressed files, RAR files, audio files and video files etc. It can easily recover data that is accidentally deleted, damaged or corrupted and formatted. It recovers missing or deleted files from various storage drives such as pen drives, memory cards, flash cards, hard drives and HDD etc. Common scenarios leads to partitions data loses are virus or malware attack, accidental deletion of partitions, formatting errors, third party applications, while resizing partitions, power outages and improper system shutdown etc. You can use this deleted partition recovery software to retrieve back all the data from formatted partitions. Best features in NTFS partition recovery tool are 1) It was recommended by many of the experts to recover missing files on hard drive after formatting or re formatting. 2) It has fastest and secure built in scanning algorithm that wou ...

Page 27 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware