Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: application
Display: short descriptions | full descriptions
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • Q4Search is a super fast search application, designed to improve you get information while working on texts. With Q4Search you can get your search done by your favorite content directories in no time. You can look up words or phrases on any search engine or website, on a single interface. simply by clicking Ctrl-Q. It is that simple!
  • ACDSee Ultimate 8 - Loaded with all the photo editing power of ACDSee Pro 8, the cataloging and organizational prowess of ACDSee 18, added 32-bit and 64-bit image support, and a shiny new Layered Editor, ACDSee Ultimate 8 is unlike any application you have worked with before. As the first digital asset management software with layers, ACDSee Ultimate 8 is able to answer an unparalleled number of creative graphic and image composition needs.
  • Download Recycle Bin data recovery software to recover deleted recycle files back. All-in-one leading data recovery software for Recycle Bin file recovery. Quickly undelete files and folders and get back all of your files deleted and even emptied from Recycle Bin. RecoverBits data recovery software answers all common user queries like : can we recover files even after we empty trash or recycle bin, can you retrieve items deleted from the recycle bin, how to recover files from recycle bin, is there any way to restore deleted files back from Recycle Bin etc with a big YES. You can even test software recovery results by downloading and installing the Trial version of the product. Trial version allows you to search and recover all lost data from Recycle Bin. Software is designed with forensics capability to recover data from $RECYCLE.BIN. Easily recover emptied recycle bin files and restore back recovered files even after emptying Windows Recycle Bin. Works for all Windows versions like Windows 10, Windows 8.1, W ...
  • Program Protector is unique, state of art security utility that allows you to password protect programs. You can easily password protect any Windows application. Program Protector is very easy to use and does not require any special computer knowledge.
  • Change your voice to match anyone, adjust age and gender, tone and pitch. The advanced voice morphing controllers provide easy fine-tuning. Users can create/mix parody voices, and use the voice comparator to suggest suitable voice similarity settings. The program supports most audio formats, including mp3, wma, wav, ogg, etc., and is compatible with most IM and VoIP applications, in-game chat systems, and media players.
  • FLVPlayer4Free is an updated enjoyable application to play MP4 ad FLV YouTube Videos.Supporting FLV AVI DIVX XVID MP4 MPG WMV ASF MPEG M4V MKV MPEG4 3GP MOV RM F4V F4P F4A F4B video files, Provides Drag&Drop support(from files, texts, browser links), Multi language function, Full screen, playlist editor, an useful Always on top function, volume and mute commands and Play, Pause, Rewind, Fast Forward Seeking bar buttons.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • LeaderTask is a free service for task management. Itll help you to make a task list for a day/week/month/year, to arrange tasks by categories and projects, to divide them into sub-tasks, to set the reminders for the most important ones, to attach files to them and many other things. Task management realises through the applications for Windows and also for mobile devices based on Android and iOS (iPhone and iPad).
  • Automatically switch between up to four Windows power plans, depending on which applications are currently active. Using energy saving settings in your standard daily use power plan helps to lower your electricity bill; at the same time, other power plans can provide maximum performance if needed for critical applications.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • WMS Log Analyzer visitor activity analysis application for your Microsoft Windows Media Services. Unlike other analyzers, WMS Log Analyzer has been designed especially for analyzing WMS log files and supports the entire set of WMS log file data and provides the best and most complete analysis of these files. This analyzer create "multilevel" and cross-linked reports. It allows you to dig as deep into your log files as you need to.
  • Grand Piano is very easy to play and at the same time an interesting application. Now you have the opportunity to play and compose music on your computer! The program is not only a piano, but many other instruments including an organ, violin, flute, accordion, acoustic guitar, harp, drum, and so on. Play by pressing keys on the keyboard or clicking the mouse.
  • Proxy Log Explorer is the fastest and most powerful analysis application for monitoring the efficiency corporate Internet usage of your Proxy server. This application creates dynamic reports on-the-fly. Also, you can easily get virtually any subreport by just right-clicking the item you need and selecting the subreport you need. Needless to say, it can recognize log file formats automatically and extract compressed log files.
  • Zortam Mp3 Media Studio is all-in-one Mp3 application suite. It has several modules such us Zortam Mp3 Auto Tagger, Mp3 Organizer, ID3 Tag Editor, Mp3 Player, Mp3 Normalizer, Mp3 to Wav converter. With Zortam Mp3 Media Studio you can batch auto tag your Mp3 files using Zortam database. Batch auto tag process download Cover Art, Lyrics and other metadata and automatically tags your Mp3 files.
  • Zortam Mp3 Media Studio is all-in-one Mp3 application suite. It has several modules such us Zortam Mp3 Auto Tagger, Mp3 Organizer, ID3 Tag Editor, Mp3 Player, Mp3 Normalizer, Mp3 to Wav converter. With Zortam Mp3 Media Studio you can batch auto tag your Mp3 files using Zortam database. Batch auto tag process download Cover Art, Lyrics and other metadata and automatically tags your Mp3 files.
  • Thanks to this tiny application, you can store all your personal notes encrypted with you on USB. Perfect for storing passwords, access codes, personal diaries, starategic plans, and any other sort of sensible/valuable personal data, which is not meant to be seen by others. This is the security software you can rely on when it comes to saving any sort of private info.
  • ECTtracker is an eye-tracking AAC (Alternative and Augmentative Communication) program, allowing the real-time analysis of the user's eye (open or closed). This application is a part of the complex of assistive technology software created by EyeComTec (LAZgroup SA). ECTtracker implements low cost computer mediated communication for people suffering from various forms of paralysis or significantly impaired mobility.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Fake webcam 7 installs itself as a webcam on your PC and broadcasts a video. Use it with any application including Yahoo, Skype, Window Live/MSN, Gtalk, Camfrog, AIM. Also works with web apps like Justin.tv, iVideoChat, LiveVideo, UStream.tv etc. You can play all type of videos including AVI, MPEG, MPG, WMV, RM, RAM, MOV, M1V, MP2, MPA, VOB, ASF, DAT, FLV, FLV2, MP4, SWF, BMP, PNG, JPG etc.You can even use it with multiple programs simultaneously
  • EasySplitMerge is a simple application that allows you to split a large file into smaller files that are more manageable, and merge them together when you need it. If you have a large file that cannot be sent to another computer, you can quickly and easily spilt this large file into several smaller files by using this software. And hence the files can be easily transferred to another computer. After which you can then use this software to merge the splitted files back as the original file. The application automatically splits the file according to specified file size and number of pieces. It supports any file type and there are no file format restrictions. File types supported include video, audio, documents, PDF, archive files, applications, spreadsheets, pictures, and so on. It has an intuitive interface and is easy to use. Also, it supports rapid immediate split and merge/restore files without waiting. EasySplitMerge also generates a small Self-Uniting program, So anyone can restore the original file easil ...
  • Winner of People's Choice for Best Business Application Award at the Shareware Industry Conference Awards. Pay by any pay period; hourly, salaried, commissioned, non-employee workers; prints Checks, 941, W2s, 1099-MISC forms and reports galore! Built-in data backup and restore. You can pay an employee in as little as three clicks of the mouse! Over 30 years of experience make this the most user friendly and easiest to use payroll ever.
  • Skater Visual Studio 2015 Obfuscator is an obfuscation tool for .NET code protection. Prohibits reverse engineering;Obfuscated application is not recompilable;Processes any .NET application, executable or assembly;Encrypts string constants;Compatible with any .NET framework (from 1.0 to 4.6);Control flow obfuscation stops decompilers and deobfuscators;Scrambles class names, method names, field names etc.
  • CIB pdf brewer works as a virtual printer and generates PDF within all Windows applications for free (suitable for servers: Windows Terminal Server, CITRIX, network printer). With CIB pdf brewer it is also possible to create ZUGFeRD compatible invoices. Some important features among others are: file size optimization, PDF encryption, font embedding, PDF bookmarks, watermarks, stationery support, CMYK, hyperlinks and e-mail delivery after the conversion. CIB pdf brewer also Provides separate toolbar icons for ease of use within Microsoft Office. The printer provides settings to configure the PDF appearance while opening, e.g. full-screen mode or continuous double page. By using the context menu of the file explorer, files can be directly converted to PDF. The software allows joining of PDF documents and PDF attachments like images or other documents. The PDF versions 1.3 to 1.7 are supported. The software provides detailed settings for choosing the location and file name of created PDFs, e.g. auto enumeration. ...
  • These can significantly improve one's overall experience with the site, for example by adding different emoticons, or allowing video downloads from any messages posted. If users are not interested in such tasks, the plugins can be deactivated with a simple 'uncheck action'. Another novel feature is customize the display, by employing themes. they do allow users to surf content in a more stylish environment.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware