Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • The Web Log DB exports web log data to databases via ODBC. Web Log DB uses ODBC to export data from raw log files to your database, using SQL queries. Web Log DB allows you to use the applications you have become accustomed to such as MS SQL, MS Excel, MS Access etc. Also, any other ODBC compliant application can now be used to produce the output you desire. Use Web Log DB to perform further analysis in special softs.
  • z/Scope Classic is a SSL/SSH enabled multi-session terminal emulator for accessing AS/400 iSeries, IBM Mainframes and UNIX hosts under Windows platforms. z/Scope is solid, fast, secure, inexpensive and provides users with state-of-the-art interfaces. z/Scope Classic will take your terminal emulation experience to a superior level! z/Scope is a new concept in terminal emulation solutions, ideal to replace the old, heavy and expensive ones!
  • SQLite Data Access Components (LiteDAC) is a wide set of components for fast direct access to SQLite from Delphi, C++Builder, Lazarus (and Free Pascal) for 32-bit and 64-bit Windows, Mac OS X, iOS, Android, Linux and FreeBSD platforms. LiteDAC provides both possibility of connection from Delphi to SQLite by means of native SQLite client library and direct access to SQLite by static linking of the SQLite client library into an application.
  • mightymacros Excel Utilities simplifies many repetitive tasks by providing a useful set of tools with quick and direct access from the cell short cut menu. The add-in contains tools that provide fast access, to all your important files and folders and will help you find and navigate information as you perform your daily tasks.
  • Generate Web, Mobile and Cloud applications straight from your database with Iron Speed Designer. Quickly create visually stunning, feature-rich apps that are easy to customize and ready to deploy. In just minutes you get a complete application - pages, code and SQL - without hand-coding. You enjoy unrestricted access to all source code, and there are no run-time license fees or proprietary software requirements.
  • WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock, you can control how long others can use your computer, disable Windows hot keys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.), lock Windows desktop, hide the Start button, lock files and folders, filter Internet content and much more.
  • Looking for a powerful SEO tool to perform in-depth initial analysis of a site, and uncover ALL its crawlability, accessibility and content duplication issues in a snap? Try WebSite Auditor Enterprise: on-page SEO software that provides expert opinion on any site's state of SEO. Easily see any site's meta titles & description, 404 pages, canonical tags, redirected pages, and more! Visual, white-label reports are available in a number of formats.
  • Game "Ping Pong" represents a three-dimensional simulator of one-nominal sports game. Besides usual and pair game, there are 12 bonus games based on game in table tennis. Bonus games open for victories over section "Passage" and are accessible in the menu of "Expert" and in network game.
  • PgDAC is an enhanced component library for fast direct access to PostgreSQL for Windows, Mac OS X, iOS, Android, Linux, FreeBSD for 32-bit and 64-bit platforms from Delphi, C++Builder and Lazarus. PgDAC includes full support for all PostgreSQL data types and features, including notifications, notices, and sequences. Main advantages include direct access to PostgreSQL data, Disconnected Model, Local Failover, Unicode and national charset support.
  • SDAC is a VCL/LCL/FMX component library for fast direct access to SQL Server from Delphi and C++Builder. SDAC supports all SQL Server data types and functionality, including MARS, bulk copy operations and reliable messaging. Main advantages include direct access to server data, full support of the latest versions of SQL Server, including Express and Compact editions, advanced local data handling, and optimized code base.
  • M3 Free Data Recovery can easily recover deleted files, recover data from formatted, RAW, inaccessible, damaged, corrupted, ost or deleted hard drive partition and support data recovery from Bitlocker encrypted drive under Windows XP/Vista/7/8/8.1.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Use Outlook Express Security to control access to Outlook Express and its databases. When it is active, Outlook Express becomes locked and no third-party programs can access its message base files and the address book. As a result, when you try to start Outlook Express, open the address book or access the files, a password will be asked to allow access. If an invalid password is entered, Outlook Express or Address Book will not be opened.
  • Do you want permanent access to your favorite folders? With Chameleon Folder you can open frequently used and favorite folders in Windows Explorer, Open/Save dialog boxes, archive extract windows, and on the desktop, etc. You can create your own Favorites menu containing submenus.
  • Hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media.
  • Hide Files & Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
  • Big Air War - Air Attack - is next-generation air combat shooter with stunning graphics alongside great audio, effects and awesome gameplay. Beautiful levels with immersive missions to complete. Multiple extreme boss battles. Accessible to beginners, as well as hardcore shooter addicts. Shoot em-up action with plenty of sky adventures and adrenaline. The game is aimed at all gamblers, from novices to hardcore action gamers. Gamblers can try thei
  • Lenovo Laptop to Hotspot Converter converts your Lenovo laptop to a wireless hotspot. By this software, your Lenovo laptop (Windows platform) is turned into a Wi-Fi hotspot so that you can share the Internet with your second laptop or mobile devices. Of course you do not want to carry a wireless router while on the trip. But you have to find a Wi-Fi hotspot for your mobile. Laptop to Hotspot Converter Series software make your life easier.
  • IBM Laptop to Hotspot Converter converts your IBM laptop to a wireless hotspot. By this software, your IBM laptop (Windows platform) is turned into a Wi-Fi hotspot so that you can share the Internet with your second laptop or mobile devices. Of course you do not want to carry a wireless router while on the trip. But you have to find a Wi-Fi hotspot for your mobile. Laptop to Hotspot Converter Series software make your life easier.
  • HP Laptop to Hotspot Converter converts your HP laptop to a wireless hotspot. By this software, your HP laptop (Windows platform) is turned into a Wi-Fi hotspot so that you can share the Internet with your second laptop, friends or mobile devices. Of course you do not want to carry a wireless router while on the trip. But you have to find a Wi-Fi hotspot for your mobile. Laptop to Hotspot Converter Series software make your life easier.
  • Gateway Laptop to Hotspot Converter converts your Gateway laptop to a wireless hotspot. By this software, your Gateway laptop (Windows platform) is turned into a Wi-Fi hotspot so that you can share the Internet with your second laptop or mobile devices. Of course you do not want to carry a wireless router while on the trip. But you have to find a Wi-Fi hotspot for your mobile. Laptop to Hotspot Converter Series software make your life easier.
  • FUJITSU Laptop to Hotspot Converter converts your FUJITSU laptop to a wireless hotspot. By this software, your FUJITSU laptop (Windows platform) is turned into a Wi-Fi hotspot so that you can share the Internet with your second laptop or mobile devices. Of course you do not want to carry a wireless router while on the trip. But you have to find a Wi-Fi hotspot for your mobile. Laptop to Hotspot Converter Series software make your life easier.
  • eMachines Laptop to Hotspot Converter converts your eMachines laptop to a wireless hotspot. Your eMachines laptop (Windows platform) is turned into a Wi-Fi hotspot so that you can share the Internet with your second laptop or mobile devices. Of course you do not want to carry a wireless router while on the trip. But you have to find a Wi-Fi hotspot for your mobile. Laptop to Hotspot Converter Series software make your life easier.
  • DELL Laptop to Hotspot Converter converts your DELL laptop to a wireless hotspot. By this software, your DELL laptop (Windows platform) is turned into a Wi-Fi hotspot so that you can share the Internet with your second laptop, friends or mobile devices. Of course you do not want to carry a wireless router while on the trip. But you have to find a Wi-Fi hotspot for your mobile. Laptop to Hotspot Converter Series software make your life easier.
  • Ancient pyramids fraught with secrets and great treasures. But not everyone can access them, because they are protected by riddles and traps. Today you have a chance to get at what was hidden by the ancient Egyptians. Angling mirrors and collecting jewels, open a path to the top of the pyramid and find what has accumulated for centuries! But remember, everything is buried beneath a layer of darkness and mystery!

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware