Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Internet :: Tools & Utilities
Sort by: date | product title | rating | downloads | popularity
Display: short descriptions | full descriptions
  • Internet Speed Booster is the powerful easy way to speed up your internet connection. With Internet Speed Booster you can speed up you internet connection,utilize your memory,utilize your internet connection and change your windows settings.Net Pinger prevents you from being disconnected from your ISP.Speed Booster optimizes the way your PC sends and receives data over the internet.RAM Booster allows you to free physical memory or RAM on your PC.
  • Lookup IP address of your internet connection.
  • Pro Scan Features : Ping Computers. Does not require administrative privileges. Detects hardware (MAC) addresses even across routers. Detects your internal and external IP addresses. Scans for listening TCP ports and SNMP services. You can mount and explore network resources. Supports Wake-On-LAN. Support Telnet and FTP to connect the system. Support HTTP to connect the system. It is absolutely free, and does not contain any adware/spyware/malware.
  • Photo Hosting Uploader is a handy free tool to upload photos on free photo hosting at Winsoftmagic. Easily upload, link and share your photos. Use it to host your photos for blogs, forums, message boards, auctions and more. Direct image linking allowed, fast and reliable servers. No photo resolution limits, no registrations required. This is a free photo hosting service and free software!
  • Blog Finder is the easiest and fastest way to locate related blogs in any niche you choose. It will help you to compile a list of blogs you can leave comments on and build a ton of backlinks instantly! Watch this short video to see yourself how insanely powerful and easy Blog Finder is!
  • z/Scope Classic (also known as z/Scope Warp) is a SSL/SSH enabled multi-session terminal emulator for accessing AS/400 iSeries, IBM Mainframes and UNIX hosts under Windows platforms. z/Scope is solid, fast, secure, inexpensive and provides users with state-of-the-art interfaces. z/Scope Classic will take your terminal emulation experience to a superior level! z/Scope is a new concept in terminal emulation solutions, ideal to replace the old, heavy and expensive ones!
  • Bandwidth Meter Pro is an easy to use network software for bandwidth usage monitoring and reporting. It monitors traffic of all network connections on your computer and displays graphical and numerical download and upload speeds in real-time. It logs bandwidth use and provides how much bandwidth was used by each network connection on your computer in daily, weekly and monthly.
  • Save Craigslist search results and the first homepage of each search result. Save results as a text file or an HTML file.
  • VE Desktop for Microsoft Visual Studio is a one-of-a-kind solution that provides application developers with the capability to test application readiness for the network, before releasing the application to network testing and production. When in the network performance testing phase, this network-aware application development process will have surely saved you time on being able to rollout and deliver.
  • Shunra's VE Desktop Standard emulates a Wide Area Network (WAN) network link so you can test applications under a variety of current and potential network conditions from your desktop. Isolate network impairments such as latency, jitter, packet loss and bandwidth and solve potential problems prior to rollout. Predict real-life application performance over the networks, find and fix problems, determine capacity requirements, and much more.
  • Shunra's VE Network Catcher Lite is a free, standalone network monitoring tool that records and displays latency and packet loss between your PC and any internet site. This freeware tool is ideal for monitoring the quality of your network link.
  • Save tons of time copying and pasting from the web by getting search engine results saved directly onto your computer through the software. Utilize the power of all the search engines in just a single click. Export all search results into a simple, easy to read file which can be kept for future reference. Have all your search results listed in one full page acts like your own personal all-in-one search engine on your desktop!
  • Fill new and saved Web forms automatically. Login to protected Web sites without having to remember a gazillion passwords. EasyFiller makes it easy to save any forms you fill on Web sites, and fills them in later without you having to type. Your logins, passwords and personal data are securely encrypted and kept in a safe place - no one will be able to use your personal information without your consent!
  • A fast, powerful and inexpensive telnet client application. TN3270 Plus connects Windows PCs to IBM mainframe, AS/400, and UNIX systems via TCP/IP. TN3270 Plus delivers 3270, 5250, VT100, VT220 and ANSI terminal emulation and 3287 and 5250 printer emulation. Advanced features include keyboard mapping, multiple sessions, macros, scripts, DDE, WinHLLAPI, LPD, FTP, SSH and SSL. All packaged in a lightweight, reliable and easy to use product.
  • It is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.
  • Rhino Terminal is a full-featured terminal emulation client for secure remote access, file transfer, and data tunneling. Clear user interface, scripting technology and ability to connect and log on to a remote host with a single mouse click make your work productive and comfortable. Rhino Terminal offers emulation of different terminal types: ANSI, VT52, VT100, VT220, Linux, XTerm; support of SSH, TELNET and Serial communication protocols.
  • Save many Google Calendar events to your local computer at once. Save results as a text file or Excel file.
  • It is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office
  • It is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.
  • Backlinks checker program provides complete information of reciprocal links status from a pre-defined list of advertiser URLs on publisher?s website. Reciprocal link monitoring application maintains status of backlink URL?s on advertiser?s website. Advanced weblink checker utility automatically alerts users through e-mail notification in case of problems related to links such as link is not found on the publisher website, link has been removed or advertiser link cannot be displayed etc. Reciprocal link checker tool provides facility to improve page rank of your site and increases popularity of website on various search engines by evaluating links pointed to the advertiser domain. Backlinks checker program generates report of link status details in text or html file format as per requirement. Backlink monitoring utility provides interactive graphical user interface wizard that helps users to operate software easily. Website backlinks analyzer tool instantly finds direct link, java script link, incoming link, i ...
  • It is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.
  • Proxy Server Finder Software Tool Find Live Proxies Fast and Effortlessly. Locates Free Proxy Servers around the internet Tests each proxies to be alive, what type, and many other criteria. Filters allow you to remove dead proxies and various other variables. End result is a clean proxy list to be imported into any proxy supported software you may be running
  • It is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.
  • It is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.
  • It is hard to imagine an office without access to e-mail. E-mail is often the number one business tool, responsible for effective communication, making sales, providing support and generating leads. Mail Access Monitor is a simple tool that analyses mail server logs and shows how much traffic is being used by e-mail, who sends and receives most messages, where the messages are being send to and if e-mail abuse takes place in your office.

Page 22 of 30
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware