Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: applications
Display: short descriptions | full descriptions
  • Generate Web, Mobile and Cloud applications straight from your database with Iron Speed Designer. Quickly create visually stunning, feature-rich apps that are easy to customize and ready to deploy. In just minutes you get a complete application - pages, code and SQL - without hand-coding. You enjoy unrestricted access to all source code, and there are no run-time license fees or proprietary software requirements.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • This is the program for creating quick notes. Besides the usual note-taking, the program can copy and store the text from other applications, such as web browsers, text editors, and IM communication programs such as MSN or ICQ. Create notes by dragging and dropping selected information onto the program window. You can also drag the program and files to save their location. Pictures dragged onto the window are stored separately.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • Large Business Icons is a collection of royalty-free icons that includes a wide variety of images related to business and banking. It includes icons representing various financial operations, documents, people. Each image is provided in 6 resolutions (16x16, 24x24, 32x32, 48x48, 256x256 and 512x512 pixels), and 4 image formats (GIF, PNG, ICO and BMP). You can use these icons for desktop and online applications.
  • SterJo Password Unmask could reveal/unmask most of password text boxes containing hidden characters known as asterisk ('*****') immediately. Many applications like CuteFTP, Microsoft Outlook, other e-mail clients or login forms would save and hide their passwords with hidden chars to prevent others from seeing them. Sometimes using different passwords for each account could be forgotten and there is no way to reveal them. Run and application and open the window where the password is hidden with asterisk ('*****') characters. Click "unmask" button and you will see how the asterisks are converted into letters instantly. Copy your previously masked password and don't ever worry if you forgot outlook password, CuteFTP or any other password again.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • COVERT Pro - an innovative solution to ensure total privacy while working at the computer. Protecting against spyware programs by masking action of computer user. Its essence is to create a secure platform in which any user can run their applications, while remaining invisible to the spies. COVERT Pro blocks reading the keyboard input and monitor screen and allows you to see all system drivers, active processes and system services.
  • Lock down Windows XP/Vista/7/8 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 is perfect for kiosk setups, digital signage, trade shows, library and school labs, Internet cafes, gaming centers, media centers and other applications. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows your main application to run exclusively.
  • Devart Excel Add-ins allow you to use powerful Excel capabilities for processing and analysis of data from cloud applications and relational databases, instantly refresh the imported data from the data source, edit external data as usual excel spreadsheets and save data changes back to the data source you have imported them from.
  • RasterVect can convert any raster images (BMP, GIF, TIFF, JPEG, PNG, and so on) to a vector format. Raster images can be imported by scanning original paper images. The target vector formats (DXF,WMF,EMF,EPS and AI) are supported by most CAD applications that use vector graphics, such as AutoCAD, Adobe Illustrator, Corel Draw. There are viewing tools like scrolling, color selection, zooming and tools for vector and raster editing.
  • DAC for MySQL (also known as MySQLDAC) is the most powerful component suite for Delphi/C++Builder/MySQL. This component suite allows you to create Delphi/C++Builder applications with direct access to MySQL DB without BDE and ODBC. BLOB fields are supported. MySQLDAC was developed for easy migration of existing projects from BDE/ODBC scheme to the native one. A MySQL library is not required.
  • The 'Close all Windows' tool automatically removes all the many windows (applications) accumulated during working on the PC. The 'Window-Closer' is a small program, which resides in the system tray (next to the clock) and can be activated by a simple click or by a fast hotkey. Additional to the 'Close all Windows' functionality you get the Clipboard Cleaner and Text Hotkeys.
  • RVMedia is a set of Delphi VCL components having the following functions: receiving video from local web cameras and IP-cameras; configuring IP-cameras and controlling their rotation; reading sound from a microphone; sending and receiving video and audio data via the Internet; organizing video chats and video conferences (either as directly connected applications or using a client-server model).
  • Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, individual drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
  • Change your voice to match anyone, adjust age and gender, tone and pitch. The advanced voice morphing controllers provide easy fine-tuning. Users can create/mix parody voices, and use the voice comparator to suggest suitable voice similarity settings. The program supports most audio formats, including mp3, wma, wav, ogg, etc., and is compatible with most IM and VoIP applications, in-game chat systems, and media players.
  • Best Network Security is the best solution for corporations, universities, schools, public libraries, internet cafes and other applications where administrator has to secure and maintain a lot of network PC workstations located in different places. Best Network Security is intended for securing, protecting, and maintaining PC workstations within a corporate network. Supports over 600 different security restrictions.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • RasterVect can transform any raster images (BMP,GIF,TIFF,JPEG,PNG and so on) into a vector format. Raster images can be imported by scanning original paper images. The target vector formats (DXF,WMF,EMF,AI and EPS) are supported by most CAD applications that use vector graphics, such as Corel Draw, AutoCAD, Adobe Illustrator. There are viewing tools like color selection, scrolling, zooming and tools for vector and raster editing.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • PostgresDAC is a PostgreSQL BDE replacement for Delphi and BCB. It allows you to create Delphi/BCB5 applications with direct access to PostgreSQL DB without BDE and ODBC. Migration friendly Interface of PostgresDAC is BDE-like and TDataSet compatible. TDBImageEx component for JPEG images in BLOBs support included in package for free (with sources). Royalty-free.
  • RoboTask allows you to automate any combination of tasks on your computer, ranging from simply launching applications, to checking email, moving or backing up files to uploading/downloading, sending email and much more. The program allows you to easily create simple tasks, as well as highly complex automations, involving conditional IF/ELSE statements, loops, custom variables and other advanced options.
  • Advanced Internet Kiosk is intended for building Internet kiosks, public access PCs, or in-store terminals. It lets you disable access to files installed on your PC and prevent users from changing PC settings while gives full access to all necessary applications you specify including Internet Explorer. As a result, many people may have free access to a workstation you create, but none of them can damage (whether accidentally or intentionally) vit

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware