Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: applications
Display: short descriptions | full descriptions
  • SpyPal Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • The Network LookOut Administrator Pro allows you to see live screens of remote computers. This way, you can always watch what users are doing on the remote computer. Additionally, you have the ability to take control of a remote computer by controlling the mouse and keyboard; this is especially useful when you need to assist the person who uses the remote computer. If you are an administrator, you can easily administer remote computers.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • DBF is a file format which is used in database applications. It provides many features to the user to manipulate data in an efficient manner. User can easily manage large amount of data by the help of help of database files. But it sometime becomes corrupted due to many reasons. There are many causes behind corruption of .dbf file. Corruption may be cause due to virus attack, or your .dbf file gets corrupted due to if other application program collides with database application or due to software or hardware malfunction. This corruption can be repaired by using DBF file repair tool. This repair tool provides very easy interface so that an initial user also can recover their corrupted database file by the help of this tool. So, if you are unable to access your database file then you can install DBF repair tool and recover your database file easily. This tool can also recover all components that included in a dbf file like column name, table name and data types of all columns and regular key.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • The Datastead RTSP DirectShow Source Filter SDK lets develop applications to capture RTSP, RTMP, RTP, HTTP, UDP, RTP, MMS, Shoutcast sources, decodes the streams and exposes the audio and video pins, perform text overlays, apply brightness, hue, saturation, saves the H264/AAC streams to MP4, FLV, MOV, AVI or MKV without transcoding. The filter is also able to generate new files on the fly without gap. Per-developer license, no runtime fees.
  • The most complete Imaging Toolkit on the market, including .NET WinForms, WPF, ASP.NET and COM/ActiveX UserControls. Delivered as native .NET and COM/ActiveX components, GdPicture.NET SDK allows developers to compose, display, capture, annotate, clean-up, edit and print documents from within their own WinForms, WPF and WEB applications written in C#, VB.NET, VB6, Delphi, C++, MS-Access, Visual Foxpro, HTML, JavaScript, VBScript, ASP.NET, PHP…
  • RasterVect can convert any raster images (BMP, GIF, TIFF, JPEG, PNG, and so on) to a vector format. Raster images can be imported by scanning original paper images. The target vector formats (DXF,WMF,EMF,EPS and AI) are supported by most CAD applications that use vector graphics, such as AutoCAD, Adobe Illustrator, Corel Draw. There are viewing tools like scrolling, color selection, zooming and tools for vector and raster editing.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Wise Hotkey is a useful and simple tool for Windows user that help you quick launch or quick switch applications, folders or websites with shortcut key. So it can help you use computer more efficiently. Wise Hotkey is very easy to use: you can add or remove shortcut keys for any applications, folders or websites as needed; you can edit or customize the shortcuts keys; you can also temporarily disable the hotkeys when necessary.
  • Relief valve sizing calculator mainly carries out calculations based on equations specified by American petroleum institute. The equations allow engineers to size relieve devices that can be used for different industrial applications
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, microphone, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a spy camera. Automatically sends logs to your email.
  • Magic Box is a collection of applications. In it you will find some popular jokes and puzzles such as magic square, magic eye, latent image fading dollar and math transformation. Will the program learn the unknown number? Will the program learn the defined map? And what happened to that dollar? Magic box is great fun for you and your friends!
  • Standalone Ads Blocker - it is a tiny application which will save you from annoying ads. You no longer need to install bulky browser extensions, you just need push a button and advertising will be blocked! Advertising is blocked on system level, and so, advertising will disabled in all applications!
  • Print Message can automatically print email body and attachments to specified printer when email arrives to MS Outlook account or MS Exchange Server mailbox. It supports Plain, RTF, HTML email format and many type of attachments (build-in support for HTML format, graphic files through bundled 3rd party software, pdf files through acrobat reader, other formats through associated applications). InboxRULES engine is required (check our website).
  • Winlog Lite is an easy to use, flexible and convenient software package for the development of SCADA/HMI applications with a Web Server support. An integrated development environment provides a set of tools for the easy and intuitive creation of multi-language applications. An extensive library of drivers supports most communication protocols (OPC, Siemens, Omron, Allen Bradley, Modbus RTU, Modbus TCP, KNX, etc.) with electronic devices such as PLCs, controllers, indicators, etc. History files in CSV format and ODBC support provide an interface to the most common Windows applications (Excel, SQL, etc.). A simple programming language allows application enhancement and customization. Winlog Lite makes it possible to set up distributed Client/Server architectures on Intranet/Internet networks or to create web applications accessible from Internet Clients with a simple browser. Winlog Lite is the free version of Winlog Pro SCADA software, which allows development and execution of web applications (can be accessed ...
  • Business Icons package is intended primarily for developers of business applications and web designers' of the financial direction. With these icons you can easily transform the appearance of the application, and make main controls more recognizable for the end-user. The presence of a high-resolution 256 points, will help to create a recognizable design of the site with minimal cost. Smaller icons can easily be used to design buttons & hyperlink.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • This is the program for creating quick notes. Besides the usual note-taking, the program can copy and store the text from other applications, such as web browsers, text editors, and IM communication programs such as MSN or ICQ. Create notes by dragging and dropping selected information onto the program window. You can also drag the program and files to save their location. Pictures dragged onto the window are stored separately.
  • AvtoK is a multi auto-clicker software for recording and playback of actions performed by your keyboard and mouse. These recordings can be played at any time, any number of times. Despite the apparent simplicity of the main window it is quite powerful in its class. Applications include games and websites that require routine actions for anything. Automate tedious and repetitive actions on the computer.
  • Asterisk Password Decryptor 64-bit instantly recovers lost passwords from most 64-bit Windows applications that store passwords hidden behind the asterisks (*****). It easily recovers passwords for e-mail accounts in Outlook x64 , Windows Mail and many other e-mail clients, FTP accounts in CuteFTP, FlashFXP, FileZilla and other FTP clients. Asterisk Password Decryptor also allows to see the hidden password on web pages in Internet Explorer x64.
  • Asterisk Password Decryptor instantly recovers lost passwords from most Windows applications that store passwords hidden behind the asterisks (*****). It easily recovers passwords for e-mail accounts in Microsoft Outlook, Windows Mail and many other e-mail clients, FTP accounts in CuteFTP, FlashFXP, FileZilla and other FTP clients. Asterisk Password Decryptor also allows to see the hidden password on web pages in Internet Explorer.
  • ScreenCamera is a virtual camera, a desktop recorder, and a webcam splitter. You can use it as a webcam on Skype, UStream, and all video conference apps and websites. You can record your desktop and webcam together in high definition. And you can connect your webcam to ScreenCamera, and be able to use it on many applications simultaneously.
  • Protect your digital life with Acronis True Image 2016, the #1 backup solution to safeguard PCs and Macs. Acronis True Image protects your files, pictures, videos, operating system, applications, settings, and preferences. Quickly restore your entire computer to its exact previous state to the same or different hardware or restore just the files and folders you need. Now optimized for Windows 10 and the latest OS X releases.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware