Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: applications
Display: short descriptions | full descriptions
  • RoboTask allows you to automate any combination of tasks on your computer, ranging from simply launching applications, to checking email, moving or backing up files to uploading/downloading, sending email and much more. The program allows you to easily create simple tasks, as well as highly complex automations, involving conditional IF/ELSE statements, loops, custom variables and other advanced options.
  • Advanced Internet Kiosk is intended for building Internet kiosks, public access PCs, or in-store terminals. It lets you disable access to files installed on your PC and prevent users from changing PC settings while gives full access to all necessary applications you specify including Internet Explorer. As a result, many people may have free access to a workstation you create, but none of them can damage (whether accidentally or intentionally) vit
  • Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer u
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • Copy Protect lets you copy protect your audios, videos, documents and pictures so that they cannot be duplicated, copied or distributed by illegal means. Copy Protect converts all supported formats into executable applications that run only in the drives they are prepared for. If these files are copied to another drive, they do not run and become useless. Copy Protect works in all 32-bit and 64-bit version of Windows 7.0/Vista/XP.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Magic Box is a collection of applications. In it you will find some popular jokes and puzzles such as magic square, magic eye, latent image fading dollar and math transformation. Will the program learn the unknown number? Will the program learn the defined map? And what happened to that dollar? Magic box is great fun for you and your friends!
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Change your voice to match anyone, adjust age and gender, tone and pitch. The advanced voice morphing controllers provide easy fine-tuning. Users can create/mix parody voices, and use the voice comparator to suggest suitable voice similarity settings. The program supports most audio formats, including mp3, wma, wav, ogg, etc., and is compatible with most IM and VoIP applications, in-game chat systems, and media players.
  • A stock of 86 aviation and transportation icons.Great for navigation systems, flight information desks, logistics and transportation applications. Avia Software Icons are a perfect fit for toolbars, menus, tree views, taskbars, ribbon bars, dock UI elements, buttons, splash screen and banner design. Coming soon: iPhone Icon Extractor
  • Perfect Table Icons is a library of wonderfully-crafted ready-made icons for use in various database products, including desktop and mobile software applications, online websites. The icons have a bright color palette, smooth and well-rounded edges. They are delivered in a variety of formats and sizes. This icon set includes database related icons: edit table, new table, dataset, query, database table, 3d chart, timetable, etc.
  • Perfect Security Icons is a collection of wonderfully-crafted stock icons for use in commercial and personal products, including software applications, websites, blogs and presentations. The icons have a bright color palette, smooth and well-rounded edges. They are delivered in a variety of formats and sizes. This icon set includes security icons: login, guard, firewall, signature, lock, key, shield, card file and many others.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • This is the program for creating quick notes. Besides the usual note-taking, the program can copy and store the text from other applications, such as web browsers, text editors, and IM communication programs such as MSN or ICQ. Create notes by dragging and dropping selected information onto the program window. You can also drag the program and files to save their location. Pictures dragged onto the window are stored separately.
  • LoopBe30 is a virtual MIDI device driver for transferring MIDI data between computer programs. Basically LoopBe30 provides up to 30 independent 'invisible cables' to connect MIDI outports of applications to any other application's MIDI inport. You may connect up to 8 applications to every single inport and up to 8 application to every single outport, all sending and receiving at the same time. Every port provides the full 16 MIDI channels.
  • ipMIDI - A MIDI over Ethernet Driver - MIDI over LAN. No more MIDI interfaces needed to communicate between applications on different PC's. ipMIDI is a native WDM driver, with even lower latency than a hardware legacy device and real MIDI cables.ipMIDI sends MIDI Data over Multicast UDP, not TCP/ip, so you will not have any client server hassle. Select "Ethernet Midi Port" in your audio application. That's all, no configuration, no problems.
  • Nevron User Interface has remarkable render quality and speed. Usage of pluggable renderers and palettes leverages the simplicity and extensibility of all components to a degree never experienced before. Explore rich docking library, professional and extensible command bars and set of extended Windows Forms controls designed to bring to your Windows Forms applications the latest GUI standards and technologies.
  • RasterVect can transform any raster images (BMP,GIF,TIFF,JPEG,PNG and so on) into a vector format. Raster images can be imported by scanning original paper images. The target vector formats (DXF,WMF,EMF,AI and EPS) are supported by most CAD applications that use vector graphics, such as Corel Draw, AutoCAD, Adobe Illustrator. There are viewing tools like color selection, scrolling, zooming and tools for vector and raster editing.
  • Nevron Diagram for .NET is a fully managed, extensible and powerful diagramming framework, which can help you create feature rich diagram and map solutions in WinForms and WebForms. The product has full AJAX support, VS design time support, ESRI map import and provides advanced capabilities for stunning visual impact, which you will not find in any other product - including commercial standalone diagramming applications.
  • Nevron Chart for .NET combines visual richness with a vast amount of charting and gauge types grouped together in a comprehensible and extensible API. With advanced AJAX support, VS design time support and a payload of useful features Nevron Chart for .NET is the only complete component for building rich presentational, financial, scientific and business dashboards for WinForm and WebForm deployment.
  • .NET Vision is a professional suite for creating state-of-art data presentation applications with spectacular visualization capabilities. It delivers powerful Charting and Diagramming components for Windows Forms and ASP.NET with rich functionality and exceptional features, bringing significant technological advantage to your applications with its award-winning component suite, carefully designed object model and unmatched quality.
  • Allows on pressing of a "hot" key at any moment, quickly to hide and unload process or group of processes of random access memory. Will help to hide quickly start and operation of applications without confirmation of closing and preservation of the dens belonging to them
  • Your products will look more modern and attractive with Music Icon Library. Color formats include Windows XP and 8-bit formats. Available sizes are 16x16, 24x24, 32x32 and 48x48. This icon collection includes the next icons: sound, music, phone, violin, drum, trumpet, no sound, voice chat, tuner, radio, guitar, piano, metronome, film, notes, recorder and others.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware