Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Ancient pyramids fraught with secrets and great treasures. But not everyone can access them, because they are protected by riddles and traps. Today you have a chance to get at what was hidden by the ancient Egyptians. Angling mirrors and collecting jewels, open a path to the top of the pyramid and find what has accumulated for centuries! But remember, everything is buried beneath a layer of darkness and mystery!
  • PostgresDAC is a PostgreSQL BDE replacement for Delphi and BCB. It allows you to create Delphi/BCB5 applications with direct access to PostgreSQL DB without BDE and ODBC. Migration friendly Interface of PostgresDAC is BDE-like and TDataSet compatible. TDBImageEx component for JPEG images in BLOBs support included in package for free (with sources). Royalty-free.
  • If you want certain services like remote desktop, FTP transfers or SQL-Server to be accessible from outside then hacking attempts on your server will definitely be made. AttackTracer scans your Windows event log and FTP protocols for traces of these attempts and alerts you.
  • Game "Ping Pong" represents a three-dimensional simulator of one-nominal sports game. Besides usual and pair game, there are 12 bonus games based on game in table tennis. Bonus games open for victories over section "Passage" and are accessible in the menu of "Expert" and in network game.
  • QuickBooks Forensics by Thegrideon Software is a unique data access, analysis, review, export and recovery as well as password recovery and replacement tool for QuickBooks company files (.qbw, .qba, .qbb). QuickBooks Forensics is designed to provide full direct access to all Tables / Records saved in QuickBooks database. It works with files directly without any external database engines! It works with most versions including the latest QB 2016.
  • It is a professional data recovery tool, offering safe, fast, convenient and cost-effective solutions for recovering data.It supports to recover any accidentally deletion of files, even after 'shift+del' deletion or empty recycle bin. Deep scan recovery is designed to recover formatted, corrupted partitions or lost inaccessible raw data completely. It can recover office documents, photos, images, videos, music, emails and archive files from various disks. It can recover data from hard drive, USB drive, mobile phones or any other storage media. It supports FAT32, NTFS file system and has been tested under Windows 8/7/Vista/XP/2000
  • USB Lock is the application to lock USB drives with all types of Portable drives including flash drives, hard drives, memory cards & external drives. Password Protect USB Drives USB Lock allows you to password protect and secure USB drives, External drives, Memory cards, SD cards and all other types of external storage devices. It use the most advanced techniques of data leak prevention to safeguard your data, ensuring maximum security with minimal effort. Lock External Storage Devices With USB Lock, you do not have worry about your external storage devices getting lost or stolen. Now you can Lock and encrypt all the data stored on these devices, ensuring complete peace of mind. If somehow anyone gets hold of your drive, there is nothing to worry about as they will never be able to access any data stored on that device. Simplicity with efficiency! Single Click Protection Yes, you read it right, USB Lock protects all your USB and external storage devices with just a single click. All you n ...
  • Advanced analysis and data recovery as well as password recovery and protection removal tool for MS Access 2000-2016 (.mdb, .mdw, .mde, .mda, .accdb, .accde, .accda, ...). Recovers deleted Tables, Records (Rows) and Columns. Reports and data can be exported as .csv or .xml. Properties editor is available as well as VBA code viewer. Instant password and user-level security records recovery for .mdb and high speed recovery engine for .accdb.
  • WinGuard Pro 2016 can Password Protect Programs and encrypt files on your computer. Users can add Password Protection to any Windows Program (ie Store Apps, Desktop Apps, Exe's). Lock Installers, Internet and File Explorer - that's right; if you need some extra security, WinGuard Pro 2016 can Block Software Installations, Internet, File Explorer, Harddrive Access and a whole lot more, all for free.
  • WinUtilities Free Disk Defragmenter is a Windows defragmenter software. This disk deframenter can defragment disk more efficiently and reliably. WinUtilities Free Disk Defragmenter user-friendly interface makes our defragmenter do easy and fast defragmentation. Defragmenter will accelerate the launch time of programs, improve the file access speed. You can get detailed reports for every defragmenting analyze and defragmentation action.
  • Access Password by Thegrideon Software is advanced MS Access database (mdb, mdw, mde, etc.) password recovery tool. With this tool you can recover your database passwords, user-level security records (logins from .mdw) or users and groups ids to recreate lost system.mdw (Workgroup Information) file. Access Password recovers data instantly and works with all MS Access 2.0 - 2013 databases.
  • QBW Password by Thegrideon Software is advanced QuickBooks security audit and cleanup tool as well as password recovery and replacement (reset) tool. QBW Password works with all editions (US, CA, UK) and version including QB 2016. QBW Password scans for mishandled (accessible without proper access) sensitive data and encryption keys and can cleanup records compromising data security. Lost passwords can be recovered or instantly replaced as well.
  • Recover data and repair NTFS disks and partitions automatically. NTFS Mechanic is the ultimate tool to repair the damage caused to NTFS-formatted disks. The innovative NTFS recovery tool can undelete files and folders, recover files from corrupted and re-formatted NTFS disks, unformat partitions and fix corrupted and inaccessible disks in just a few clicks.
  • Active@ Data Studio provides the complete set of disk utilities from the Active@ range of products. It provides dual-boot functionality allowing you to access your computer even if the operating system installation is damaged and won't start up. The tools offered include everything you need for data recovery, secure erasure, disk imaging, partition management and more.
  • Outlook Passwords Recovery and account settings backup is now free with Outlook Password Recovery module offered by our company. Simple download the tool and run the report called Accounts and Passwords. It is absollutely free option which can be used without limits. Backup Outlook passwords and account settings, save them to Excel, move your Outlook accounts to another computer, recover your lost Outlook passwords with this free Outlook Password Decryptor. But not only this, the software provides other usefull options and repors which can be evaluated. The tool allows to export Outlook emails, contacts and other records to separate files on your file system and preserve the Outlook folders structure. Email forensic option provides the wide access to the Outlook message tags and properties so nothing can be hidden from your eyes. But not only this, with the same outlooktransfer.com tool you may extract email addresses for your mail sending database.
  • Active@ Boot Disk provides a full range of disk utilities for data recovery, secure erasure, disk imaging and more. This will save you a considerable amount of money over purchasing separate programs for each different task. You can use the bootable CD, DVD or flash drive created by the software to boot up otherwise unworkable computers to access your data and troubleshoot problems with ease.
  • The Web Log DB exports web log data to databases via ODBC. Web Log DB uses ODBC to export data from raw log files to your database, using SQL queries. Web Log DB allows you to use the applications you have become accustomed to such as MS SQL, MS Excel, MS Access etc. Also, any other ODBC compliant application can now be used to produce the output you desire. Use Web Log DB to perform further analysis in special softs.
  • With Lens, you can easily monitor your devices on your network and draw a beautiful network diagram. Every node on the diagram can be customized. Besides the IP addresses of the node, you can set your own properties to the node. The software has a clean and friendly UI. The network diagram can be easily zoomed in, zoomed out, and dragged. Once the Lens is running, you can access it from any computer with IE installed.
  • Microsoft Windows and various programs access the registry a few hundred times a second. Therefore a fragmented registry is one of the major reasons why your computer may be so slow. WinUtilities Registry Defrag can significantly speed up your computer by helping you defragment registry, remove gaps, and make it contiguous, smaller and faster to access.
  • Edraw Office Viewer Component contains a standard ActiveX control that acts as an ActiveX document container for hosting Office documents (including Microsoft Word, Microsoft Excel, Microsoft PowerPoint, Access, Microsoft Project, and Microsoft Visio documents) in a custom form or Web page. The control is lightweight and flexible, and gives developers new possibilities for using Office in a custom solution. Support HTTP/HTTPS.
  • A library for developing software in .NET environment. Its main features include creating, importing and exporting of drawings, their visualization and printing. The library supports AutoCAD DWG, DXF, CGM, PLT, PDF, JPG, WMF, etc. Also, a developer can get access to drawing data, the structure of which is presented in accordance with the format specification, and access to additional entity data. This considerably simplifies work with drawings.
  • Abyss Creatures. Enter a world in which our hero was created. The set of islands are connected by portals filled with traps and mysterious platforms. To escape you must enter the portals. But don't hang around any area too long or it will soon be time to run! To allow access to secret levels you must collect bundles of energy which are located in more than 20 levels. Will this cube be your prison? It all depends on you!
  • Active@ Password Changer is a useful utility which helps in changing forgotten administrator system password and allowing access. It supports FAT, exFAT, NTFS, HFS+, IDE, SATA, eSATA, USB, SSD, SCSI disks and RAIDs, support for MBR and GPT disk partitioning styles. New Ultimate package includes linux-based Active@ LiveCD, being able to boot on the latest x86 & x64 UEFI secure boot systems. Can run from bootable floppy, CD or USB Flash.
  • A library for developing software in Delphi and C++Builder. It allows creating, visualizing, importing, exporting, converting and printing drawings. Also, a developer can get access to properties of entities. CAD VCL supports a large number of 2D and 3D CAD formats including AutoCAD DWG/DXF, HPGL, STP, STL, SVG, CGM, etc. The library is provided in the Delphi source code. Easy-to-use demo applications will considerably simplify starting work with
  • Change your voice to match anyone, adjust age and gender, tone and pitch. The advanced voice morphing controllers provide easy fine-tuning. Users can create/mix parody voices, and use the voice comparator to suggest suitable voice similarity settings. The program supports most audio formats, including mp3, wma, wav, ogg, etc., and is compatible with most IM and VoIP applications, in-game chat systems, and media players.

Page 5 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware