Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Security Task Manager is a computer utility designed to offer full access to Windows processes. Security Task Manager's main focus is on your computer's currently running processes, and offers a great deal of information on them: process name, CPU usage, memory usage, file name and location, security rating and more. Protector will catch any mouse movement monitoring software, and will alert you if the Windows Registry has been tampered with.
  • Manage emails stored as Outlook .msg or .eml files with MSG Viewer Pro. Search emails, and then reply or forward messages. Access Outlook email file attachments. Convert .msg to .pdf. Msg Viewer Pro doesn't require Outlook be installed. Bulk extract email file attachments. Save multiple .msg files to a single .pdf. Convert email file attachments to .pdf. Download a free .msg viewer trial today and test it out for 14 days.
  • Download a multi widget toolbox. Use an elegant and clean display with one-click access. Use widgets, including Countdown Timer, Logbook Calculator, Month view Calendar, Rich Notes Editor, Slides Whiteboard, Weather Forecast and a Stopwatch Timer. Start the widget with windows and don't worry about turning it on. Enjoy creating custom transparent themes. Change the colors, fonts, contrast and opacity of the widgets. Have great-looking widgets with a super clean and minimal layout. Move around the screen very easily. The widgets snap to a default grid on the screen. They are also resizable widgets with super easy preset sizes.
  • M3 Free Data Recovery can easily recover deleted files, recover data from formatted, RAW, inaccessible, damaged, corrupted, ost or deleted hard drive partition and support data recovery from Bitlocker encrypted drive under Windows XP/Vista/7/8/8.1.
  • Thanks to this tiny application, you can store all your personal notes encrypted with you on USB. Perfect for storing passwords, access codes, personal diaries, starategic plans, and any other sort of sensible/valuable personal data, which is not meant to be seen by others. This is the security software you can rely on when it comes to saving any sort of private info.
  • Active@ Boot Disk provides a full range of disk utilities for data recovery, secure erasure, disk imaging and more. This will save you a considerable amount of money over purchasing separate programs for each different task. You can use the bootable CD, DVD or flash drive created by the software to boot up otherwise unworkable computers to access your data and troubleshoot problems with ease.
  • Navicat Data Modeler is a easy-to-use database design tool for creating and manipulating data models. It supports various database systems, including MySQL, MariaDB, Oracle, SQL Server, PostgreSQL and SQLite. It allows users to visually design database structures, perform reverse/forward engineer process, import table structures from ODBC data sources, generate SQL files, etc. With Navicat Data Modeler's features, users can easily create high quality data models and understand database structures. - Three types of data models: Conceptual, Logical, and Physical A well-designed model increases both efficiency and data quality, and can be easily understood by a wide variety of audiences. Navicat Data Modeler 2.0 enhances communication and collaboration between business and information-technology professionals by providing the ability to design conceptual, logical, and physical models. You can draw your own shapes, lines and labels using the comprehensive range of drawing tools to enrich your model des ...
  • Navicat Data Modeler is a easy-to-use database design tool for creating and manipulating data models. It supports various database systems, including MySQL, MariaDB, Oracle, SQL Server, PostgreSQL and SQLite. It allows users to visually design database structures, perform reverse/forward engineer process, import table structures from ODBC data sources, generate SQL files, etc. With Navicat Data Modeler's features, users can easily create high quality data models and understand database structures. - Three types of data models: Conceptual, Logical, and Physical A well-designed model increases both efficiency and data quality, and can be easily understood by a wide variety of audiences. Navicat Data Modeler 2.0 enhances communication and collaboration between business and information-technology professionals by providing the ability to design conceptual, logical, and physical models. You can draw your own shapes, lines and labels using the comprehensive range of drawing tools to enrich your model des ...
  • Navicat Data Modeler is a easy-to-use database design tool for creating and manipulating data models. It supports various database systems, including MySQL, MariaDB, Oracle, SQL Server, PostgreSQL and SQLite. It allows users to visually design database structures, perform reverse/forward engineer process, import table structures from ODBC data sources, generate SQL files, etc. With Navicat Data Modeler's features, users can easily create high quality data models and understand database structures. - Three types of data models: Conceptual, Logical, and Physical A well-designed model increases both efficiency and data quality, and can be easily understood by a wide variety of audiences. Navicat Data Modeler 2.0 enhances communication and collaboration between business and information-technology professionals by providing the ability to design conceptual, logical, and physical models. You can draw your own shapes, lines and labels using the comprehensive range of drawing tools to enrich your model des ...
  • Gain full access to information stored in iOS, Apple iCloud, Windows Phone and BlackBerry 10 devices! Download device backups from Apple iCloud, Microsoft OneDrive and BlackBerry 10 servers. Use Apple ID and password, or extract binary authentication tokens from computers, hard drives and forensic disk images for acquiring iCloud data without a password. GPU-accelerated logical acquisition extracts information from password-protected backups.
  • Arcade game in black and white style. In it you will need to drive a motorcycle through a variety of challenging trails. Come accessible trails and open new ones. All in the game of their 21 game features realistic physics, and you will need to acquire the skill that would deal with it.
  • Create maintenance schedule and track expenses about your vehicles. We got solutions for any kind of fleet. Keep track of your vehicles data including repairs, tires purchase, fuel, oil changes. Easy access to all your vehicles data (drivers, purchase data, insurance, pictures, registration). Free your mind with a service schedule. Find everything faster. Know your real exploitation costs with a lot of versatile reports and graphs.
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • CallbackRegistry is a Windows SDK (library) to track and control registry access and operations, perform audit and continuous data protection. CallbackRegistry provides a driver, which calls your application when some application performs a registry operation, such as key or value reading, writing or deletion. Your application can alter the data in the request, redirect the request or deny it altogether. Or you can just log the access, if needed.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Hide Folder Ext lets you hide a folder on external or removable disks and protect it with a password. Unlike other folder hiding programs which hides and locks folders on internal hard drives, Hide Folder Ext hides files on external disks. The program can copy itself to another disk and you can run the program from disk on any computer to access your hidden folder.
  • The Personal Cloud product allows you to remotely browse and access files on your home computer from your smart phone. Instead of a cloud storage account, which allows access to the files you last uploaded to the cloud, this is a real-time view into the current contents of your computer. There is no need to upload files. If a file is on your computer then you will be able to see it and access it, without keeping up with the transfer of files.
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • M3 Bitlocker Recovery Free is the World's first free Bitlocker data recovery software to decrypt/recover data from inaccessible, corrupted, damaged or failed Bitlocker encrypted hard drive, recover deleted files from Bitlocker drive and recover deleted or lost Bitlocker partition. It supports hard drive, Memory card, USB drive, Memory Stick, etc.
  • z/Scope Classic is a SSL/SSH enabled multi-session terminal emulator for accessing AS/400 iSeries, IBM Mainframes and UNIX hosts under Windows platforms. z/Scope is solid, fast, secure, inexpensive and provides users with state-of-the-art interfaces. z/Scope Classic will take your terminal emulation experience to a superior level! z/Scope is a new concept in terminal emulation solutions, ideal to replace the old, heavy and expensive ones!
  • Game "Ping Pong" represents a three-dimensional simulator of one-nominal sports game. Besides usual and pair game, there are 12 bonus games based on game in table tennis. Bonus games open for victories over section "Passage" and are accessible in the menu of "Expert" and in network game.
  • "Skynet: Rampage" is a tactical stealth action game set in a post-apocalyptic future. To survive in this new world is not so easy, because you have to battle robots and other creatures of Skynet. Robots have advanced artificial intelligence that takes into account real sights and sounds. They can think on the fly as we can, only faster. You, in turn, will be able to use a variety of futuristic weapons and accessories, such as a laser rifle, the
  • With iNet Protector you can restrict Internet access at specified times or on demand. You can disable connection completely or limit Internet to work with allowed programs and services only. In order to fully enable Internet access, user defined password must be entered. You can easily schedule Internet availability. Timer allows you to disable Internet connection after specified amount of time. Ideal tool for parents and businesses.
  • Free batch image converter and image editing software. reaConverter Lite can handle ultra-fast batch conversions between JPEG, GIF, TIFF, PNG and BMP images with access to lots of advanced picture editing techniques such as Alteration and Orientation tools, Adjustments tools, Creative Retouching tools, Watermarking tools. reaConverter also supports most formats features and tuning like Compression, Meta-data, ICC-profiles, DPI, Bit Depth an more.
  • ACCDB Password is advanced and extremely fast password recovery tool for MS Access databases (.accdb, .accde, etc.) with CryptoAPI (Access 2007 format) and AES encryption (Access 2010 - 2016 format). Several attacks cab be queued: dictionary based, brute-force, mixed (combinations of independent dictionary, brute-force and fixed parts). Highly optimized code and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware