Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Print2Flash lets you easily convert any printable document (e.g. Microsoft Word, or Excel, or PDF document) to an Adobe Flash file (file with SWF extension) or to HTML page or SVG file. This file can be shared with users who don't have the software that created the original document (for example, Microsoft Word). You can view such files either with Adobe Flash Player available across a number of operating systems or with any modern browser with HTML5 support. These files can be easily published on the Web as well for fast and easy access to them from anywhere across the globe. You can view Print2Flash documents across platforms and retain the formatting, graphics, fonts, special characters, and colors of source documents, regardless of the application used to create the document. For example, if you created a Microsoft Word document on a Windows computer, you can use Print2Flash to convert it to a SWF file, and then send it to a Macintosh user and vice versa. The SWF files that Print2Flash generat ...
  • ApkHandler is a Windows application enabling its users to install/uninstall APKS that are of any provenience. This application will free you from GooglePlay and give access to apk that are developed and distributed without Google involvement.In nstall Android APks that are distributed trough any channels and be free of GooglePlay. This is a free application, there is no one in the middle to insert adds and cookies following your every move.
  • Devart ODBC Driver for SQL Azure provides high-performance and feature-rich connectivity solution for ODBC-based applications to access SQL Azure databases from Windows, Linux, MacOS, both 32-bit and 64-bit. Full support for standard ODBC API functions and data types implemented in our driver makes interaction of your database applications with SQL Azure fast, easy and extremely handy.
  • WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock, you can control how long others can use your computer, disable Windows hot keys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.), lock Windows desktop, hide the Start button, lock files and folders, filter Internet content and much more.
  • DataNumen Office Repair(DOFR) (formerly Advanced Office Repair) is a Microsoft Office data recovery suite. It includes recovery tools for corrupt or damaged MS Access databases (MS Access 95 to 2013), MS Excel worksheets (MS Excel 3 to 2013), MS Word documents (MS Word 6.0 to 2013), MS Outlook data files (MS Outlook 97 to 2013), and MS Outlook Express dbx and mbx files (MS Outlook Express 4, 5 and 6).
  • Kiosk software locks down your public computer or kiosk, helping you securely display your website or application. It prevents hacking and downtime by restricting access to the system, desktop, drives, folders and programs. The software blocks the system keys and replaces the system shell for maximum protection. Secure Browser removes standard browser menus, blocks downloads, limits browsing to specified URLs and blocks inappropriate content.
  • Q2ID is an InDesign plugin to quickly convert QuarkXPress documents in Adobe InDesign. No more re-creating documents from scratch. The Q2ID InDesign plugin gives you a big head-start on QuarkXPress to InDesign data conversion. Our Q2ID Bundle Subscription gives you access to all current Q2ID plugin versions. You will have access to Q2ID for InDesign CC, CS6, CS5.5 and CS5 both Macintosh and Windows platforms with a single purchase and License.
  • Move the WASD or arrow keys. To access the inventory press Q. When you open the inventory the top two buttons are visible. Click craft, to open the system creation. To find the thing go to her, and enter the letter E. But the subject cannot always get close so then you must work from a distance. Items should be spread in the window of creation in a certain order. There are many different types of Shawarma: 4 Conventional , 1 fennel, 1 icy, and 1
  • Change your voice to match anyone, adjust age and gender, tone and pitch. The advanced voice morphing controllers provide easy fine-tuning. Users can create/mix parody voices, and use the voice comparator to suggest suitable voice similarity settings. The program supports most audio formats, including mp3, wma, wav, ogg, etc., and is compatible with most IM and VoIP applications, in-game chat systems, and media players.
  • Security Task Manager is a computer utility designed to offer full access to Windows processes. Security Task Manager's main focus is on your computer's currently running processes, and offers a great deal of information on them: process name, CPU usage, memory usage, file name and location, security rating and more. Protector will catch any mouse movement monitoring software, and will alert you if the Windows Registry has been tampered with.
  • Manage emails stored as Outlook .msg or .eml files with MSG Viewer Pro. Search emails, and then reply or forward messages. Access Outlook email file attachments. Convert .msg to .pdf. Msg Viewer Pro doesn't require Outlook be installed. Bulk extract email file attachments. Save multiple .msg files to a single .pdf. Convert email file attachments to .pdf. Download a free .msg viewer trial today and test it out for 14 days.
  • Download a multi widget toolbox. Use an elegant and clean display with one-click access. Use widgets, including Countdown Timer, Logbook Calculator, Month view Calendar, Rich Notes Editor, Slides Whiteboard, Weather Forecast and a Stopwatch Timer. Start the widget with windows and don't worry about turning it on. Enjoy creating custom transparent themes. Change the colors, fonts, contrast and opacity of the widgets. Have great-looking widgets with a super clean and minimal layout. Move around the screen very easily. The widgets snap to a default grid on the screen. They are also resizable widgets with super easy preset sizes.
  • M3 Free Data Recovery can easily recover deleted files, recover data from formatted, RAW, inaccessible, damaged, corrupted, ost or deleted hard drive partition and support data recovery from Bitlocker encrypted drive under Windows XP/Vista/7/8/8.1.
  • Thanks to this tiny application, you can store all your personal notes encrypted with you on USB. Perfect for storing passwords, access codes, personal diaries, starategic plans, and any other sort of sensible/valuable personal data, which is not meant to be seen by others. This is the security software you can rely on when it comes to saving any sort of private info.
  • Active@ Boot Disk provides a full range of disk utilities for data recovery, secure erasure, disk imaging and more. This will save you a considerable amount of money over purchasing separate programs for each different task. You can use the bootable CD, DVD or flash drive created by the software to boot up otherwise unworkable computers to access your data and troubleshoot problems with ease.
  • Navicat Data Modeler is a easy-to-use database design tool for creating and manipulating data models. It supports various database systems, including MySQL, MariaDB, Oracle, SQL Server, PostgreSQL and SQLite. It allows users to visually design database structures, perform reverse/forward engineer process, import table structures from ODBC data sources, generate SQL files, etc. With Navicat Data Modeler's features, users can easily create high quality data models and understand database structures. - Three types of data models: Conceptual, Logical, and Physical A well-designed model increases both efficiency and data quality, and can be easily understood by a wide variety of audiences. Navicat Data Modeler 2.0 enhances communication and collaboration between business and information-technology professionals by providing the ability to design conceptual, logical, and physical models. You can draw your own shapes, lines and labels using the comprehensive range of drawing tools to enrich your model des ...
  • Navicat Data Modeler is a easy-to-use database design tool for creating and manipulating data models. It supports various database systems, including MySQL, MariaDB, Oracle, SQL Server, PostgreSQL and SQLite. It allows users to visually design database structures, perform reverse/forward engineer process, import table structures from ODBC data sources, generate SQL files, etc. With Navicat Data Modeler's features, users can easily create high quality data models and understand database structures. - Three types of data models: Conceptual, Logical, and Physical A well-designed model increases both efficiency and data quality, and can be easily understood by a wide variety of audiences. Navicat Data Modeler 2.0 enhances communication and collaboration between business and information-technology professionals by providing the ability to design conceptual, logical, and physical models. You can draw your own shapes, lines and labels using the comprehensive range of drawing tools to enrich your model des ...
  • Navicat Data Modeler is a easy-to-use database design tool for creating and manipulating data models. It supports various database systems, including MySQL, MariaDB, Oracle, SQL Server, PostgreSQL and SQLite. It allows users to visually design database structures, perform reverse/forward engineer process, import table structures from ODBC data sources, generate SQL files, etc. With Navicat Data Modeler's features, users can easily create high quality data models and understand database structures. - Three types of data models: Conceptual, Logical, and Physical A well-designed model increases both efficiency and data quality, and can be easily understood by a wide variety of audiences. Navicat Data Modeler 2.0 enhances communication and collaboration between business and information-technology professionals by providing the ability to design conceptual, logical, and physical models. You can draw your own shapes, lines and labels using the comprehensive range of drawing tools to enrich your model des ...
  • Gain full access to information stored in iOS, Apple iCloud, Windows Phone and BlackBerry 10 devices! Download device backups from Apple iCloud, Microsoft OneDrive and BlackBerry 10 servers. Use Apple ID and password, or extract binary authentication tokens from computers, hard drives and forensic disk images for acquiring iCloud data without a password. GPU-accelerated logical acquisition extracts information from password-protected backups.
  • Arcade game in black and white style. In it you will need to drive a motorcycle through a variety of challenging trails. Come accessible trails and open new ones. All in the game of their 21 game features realistic physics, and you will need to acquire the skill that would deal with it.
  • Create maintenance schedule and track expenses about your vehicles. We got solutions for any kind of fleet. Keep track of your vehicles data including repairs, tires purchase, fuel, oil changes. Easy access to all your vehicles data (drivers, purchase data, insurance, pictures, registration). Free your mind with a service schedule. Find everything faster. Know your real exploitation costs with a lot of versatile reports and graphs.
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • CallbackRegistry is a Windows SDK (library) to track and control registry access and operations, perform audit and continuous data protection. CallbackRegistry provides a driver, which calls your application when some application performs a registry operation, such as key or value reading, writing or deletion. Your application can alter the data in the request, redirect the request or deny it altogether. Or you can just log the access, if needed.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Hide Folder Ext lets you hide a folder on external or removable disks and protect it with a password. Unlike other folder hiding programs which hides and locks folders on internal hard drives, Hide Folder Ext hides files on external disks. The program can copy itself to another disk and you can run the program from disk on any computer to access your hidden folder.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware