Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: applications
Display: short descriptions | full descriptions
  • Lock down Windows XP/Vista/7/8 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 is perfect for kiosk setups, digital signage, trade shows, library and school labs, Internet cafes, gaming centers, media centers and other applications. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows your main application to run exclusively.
  • Devart Excel Add-ins allow you to use powerful Excel capabilities for processing and analysis of data from cloud applications and relational databases, instantly refresh the imported data from the data source, edit external data as usual excel spreadsheets and save data changes back to the data source you have imported them from.
  • RasterVect can convert any raster images (BMP, GIF, TIFF, JPEG, PNG, and so on) to a vector format. Raster images can be imported by scanning original paper images. The target vector formats (DXF,WMF,EMF,EPS and AI) are supported by most CAD applications that use vector graphics, such as AutoCAD, Adobe Illustrator, Corel Draw. There are viewing tools like scrolling, color selection, zooming and tools for vector and raster editing.
  • DAC for MySQL (also known as MySQLDAC) is the most powerful component suite for Delphi/C++Builder/MySQL. This component suite allows you to create Delphi/C++Builder applications with direct access to MySQL DB without BDE and ODBC. BLOB fields are supported. MySQLDAC was developed for easy migration of existing projects from BDE/ODBC scheme to the native one. A MySQL library is not required.
  • The 'Close all Windows' tool automatically removes all the many windows (applications) accumulated during working on the PC. The 'Window-Closer' is a small program, which resides in the system tray (next to the clock) and can be activated by a simple click or by a fast hotkey. Additional to the 'Close all Windows' functionality you get the Clipboard Cleaner and Text Hotkeys.
  • RVMedia is a set of Delphi VCL components having the following functions: receiving video from local web cameras and IP-cameras; configuring IP-cameras and controlling their rotation; reading sound from a microphone; sending and receiving video and audio data via the Internet; organizing video chats and video conferences (either as directly connected applications or using a client-server model).
  • Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, individual drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
  • Change your voice to match anyone, adjust age and gender, tone and pitch. The advanced voice morphing controllers provide easy fine-tuning. Users can create/mix parody voices, and use the voice comparator to suggest suitable voice similarity settings. The program supports most audio formats, including mp3, wma, wav, ogg, etc., and is compatible with most IM and VoIP applications, in-game chat systems, and media players.
  • Best Network Security is the best solution for corporations, universities, schools, public libraries, internet cafes and other applications where administrator has to secure and maintain a lot of network PC workstations located in different places. Best Network Security is intended for securing, protecting, and maintaining PC workstations within a corporate network. Supports over 600 different security restrictions.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • RasterVect can transform any raster images (BMP,GIF,TIFF,JPEG,PNG and so on) into a vector format. Raster images can be imported by scanning original paper images. The target vector formats (DXF,WMF,EMF,AI and EPS) are supported by most CAD applications that use vector graphics, such as Corel Draw, AutoCAD, Adobe Illustrator. There are viewing tools like color selection, scrolling, zooming and tools for vector and raster editing.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • PostgresDAC is a PostgreSQL BDE replacement for Delphi and BCB. It allows you to create Delphi/BCB5 applications with direct access to PostgreSQL DB without BDE and ODBC. Migration friendly Interface of PostgresDAC is BDE-like and TDataSet compatible. TDBImageEx component for JPEG images in BLOBs support included in package for free (with sources). Royalty-free.
  • RoboTask allows you to automate any combination of tasks on your computer, ranging from simply launching applications, to checking email, moving or backing up files to uploading/downloading, sending email and much more. The program allows you to easily create simple tasks, as well as highly complex automations, involving conditional IF/ELSE statements, loops, custom variables and other advanced options.
  • Advanced Internet Kiosk is intended for building Internet kiosks, public access PCs, or in-store terminals. It lets you disable access to files installed on your PC and prevent users from changing PC settings while gives full access to all necessary applications you specify including Internet Explorer. As a result, many people may have free access to a workstation you create, but none of them can damage (whether accidentally or intentionally) vit
  • Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer u
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • Copy Protect lets you copy protect your audios, videos, documents and pictures so that they cannot be duplicated, copied or distributed by illegal means. Copy Protect converts all supported formats into executable applications that run only in the drives they are prepared for. If these files are copied to another drive, they do not run and become useless. Copy Protect works in all 32-bit and 64-bit version of Windows 7.0/Vista/XP.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Magic Box is a collection of applications. In it you will find some popular jokes and puzzles such as magic square, magic eye, latent image fading dollar and math transformation. Will the program learn the unknown number? Will the program learn the defined map? And what happened to that dollar? Magic box is great fun for you and your friends!
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • A stock of 86 aviation and transportation icons.Great for navigation systems, flight information desks, logistics and transportation applications. Avia Software Icons are a perfect fit for toolbars, menus, tree views, taskbars, ribbon bars, dock UI elements, buttons, splash screen and banner design. Coming soon: iPhone Icon Extractor
  • Perfect Table Icons is a library of wonderfully-crafted ready-made icons for use in various database products, including desktop and mobile software applications, online websites. The icons have a bright color palette, smooth and well-rounded edges. They are delivered in a variety of formats and sizes. This icon set includes database related icons: edit table, new table, dataset, query, database table, 3d chart, timetable, etc.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware