Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: applications
Display: short descriptions | full descriptions
  • RasterVect can transform any raster images (BMP,GIF,TIFF,JPEG,PNG and so on) into a vector format. Raster images can be imported by scanning original paper images. The target vector formats (DXF,WMF,EMF,AI and EPS) are supported by most CAD applications that use vector graphics, such as Corel Draw, AutoCAD, Adobe Illustrator. There are viewing tools like color selection, scrolling, zooming and tools for vector and raster editing.
  • This is the program for creating quick notes. Besides the usual note-taking, the program can copy and store the text from other applications, such as web browsers, text editors, and IM communication programs such as MSN or ICQ. Create notes by dragging and dropping selected information onto the program window. You can also drag the program and files to save their location. Pictures dragged onto the window are stored separately.
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • The Datastead RTSP DirectShow Source Filter SDK lets develop applications to capture RTSP, RTMP, RTP, HTTP, UDP, RTP, MMS, Shoutcast sources, decodes the streams and exposes the audio and video pins, perform text overlays, apply brightness, hue, saturation, saves the H264/AAC streams to MP4, FLV, MOV, AVI or MKV without transcoding. The filter is also able to generate new files on the fly without gap. Per-developer license, no runtime fees.
  • NTFS Partition Recovery utility helps to retrieve lost data from NTFS partitions on Windows PC. It supports to rescue deleted or lost documents, photos, compressed files, RAR files, audio files and video files etc. It can easily recover data that is accidentally deleted, damaged or corrupted and formatted. It recovers missing or deleted files from various storage drives such as pen drives, memory cards, flash cards, hard drives and HDD etc. Common scenarios leads to partitions data loses are virus or malware attack, accidental deletion of partitions, formatting errors, third party applications, while resizing partitions, power outages and improper system shutdown etc. You can use this deleted partition recovery software to retrieve back all the data from formatted partitions. Best features in NTFS partition recovery tool are 1) It was recommended by many of the experts to recover missing files on hard drive after formatting or re formatting. 2) It has fastest and secure built in scanning algorithm that wou ...
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • Per-application volume control. You want to have music on your speakers ? A good game in your headset and maybe a movie on your TV connected by HDMI? The 3 at the same time ? CheVolume is there for you and provide total control over your audio devices. Handle the volume and the sound exit of all your applications.
  • RoboTask allows you to automate any combination of tasks on your computer, ranging from simply launching applications, to checking email, moving or backing up files to uploading/downloading, sending email and much more. The program allows you to easily create simple tasks, as well as highly complex automations, involving conditional IF/ELSE statements, loops, custom variables and other advanced options.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Crypter is a high-performance packer and protector for Windows 32bit executables Crypter can encrypt and compress any 32-bit executable without affecting its direct functionality. For instance, if you're a software developer, you can encrypt your applications before they are delivered to customers. By using Crypter, the applications will be more protected and smaller. The official Crypter website: www.crypter.com
  • A visual codeless programming system with built in support for web applications, databases, 2D drawings, web services, kiosk, ActiveX, etc. It is the first fully automated cloud computing system in the world removing client server boundary. Visual languages of programming are compiled to C#, HTML, CSS, ASPX, PHP, JS and other source files. It uses .Net types as its programming entities,thus works with all other programming languages seamlessly.
  • Magic Box is a collection of applications. In it you will find some popular jokes and puzzles such as magic square, magic eye, latent image fading dollar and math transformation. Will the program learn the unknown number? Will the program learn the defined map? And what happened to that dollar? Magic box is great fun for you and your friends!
  • Developers can use UseOffice .Net with VB.NET, C#, Delphi .Net or J# etc. The UseOffice .Net able to convert in about 40 various directions. Such as: These directions of converting are supported: Requires MS Office, any version: 2000, XP, 2003, 2007 or 2010. Technical information Written in C# Requires MS Office installed Easy to integrate in any .Net 1.1, 2.0, 3.0, 3.5 and 4.0 Web and WinForms applications.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • IPHost Network Monitor is a free network and server monitoring software for tracking of performance and availability of network equipment, web/intranet sites/applications via SNMP (UNIX/Linux/Mac) and WMI, HTTP, Oracle, MySQL, MS SQL, ODBC, FTP, SMTP, POP3, IMAP, PING & more. Custom scripts or programs as monitors, including Nagios plugins. SNMP MIB. Admin tools. Regular reports by email. The free version can be used with up to 50 monitors.
  • .NET library that allows developers to build new or enhance existing apps with electronic signature functionality. The library provides a flexible API for preparing documents, collecting signatures and automating signature workflows. Its signature capture control allows users to apply signatures drawn with a mouse, touch or stylus, while audit trails and anti-tampering functionality ensure document integrity and signature authenticity.
  • AvtoK is a multi auto-clicker software for recording and playback of actions performed by your keyboard and mouse. These recordings can be played at any time, any number of times. Despite the apparent simplicity of the main window it is quite powerful in its class. Applications include games and websites that require routine actions for anything. Automate tedious and repetitive actions on the computer.
  • myCollections is an all-in-one organizer that allows you to catalog and track your multimedia content, as well as share it with others. What makes it really stand out among other similar software is that it is able to catalog all of your content?apps, books, games (there is even a specific category for NDS games), movies (including x-rated), music, and TV series. The multimedia content can be stored electronically on your computer or it can be physical media?myCollections doesn?t care and it will help you catalog it either via searching your data and reading from .NFO files or the file names themselves, via a webcam acting as a barcode reader, or by manual entry. Yes, you heard that correctly, myCollections can simply scan the barcode on the media and then search multiple online databases to retrieve all the information on the item saving you countless hours of typing. It can also be used from a USB drive. The software is free; however I highly recommend clicking the donations ...
  • ApPHP MVC Framework is designed to provide modern and rapid development of websites, web applications and web services. It implements the the Model-View-Controller (MVC) design pattern and principles, including separation of display, logic, and data layers. It provides an architecture, components and tools for developers to build a complex web applications faster and safer.
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Visual FoxPro applications. Uses the latest 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, key generation from and password phrases. Implements buffer padding and does random byte data generation. Works with 32-bit Visual FoxPro. Win32/Win64
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Visual dBase applications. Uses the latest 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, key generation from and password phrases. Implements buffer padding and does random byte data generation. Works with 32-bit dBASE 7.0, 7.5 and dBASE Plus. Win32/Win64.
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Xbase++ applications. Uses the 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, SHA-256 cryptographic hash algorithm, key generation from text and password phrases. Implements buffer padding and does random byte data generation. Works with 32-bit Xbase++. Win32/Win64.
  • IsItUp Network Monitor allows companies of all sizes to monitor critical applications and infrastructure. A wide variety of monitor types are included such as a Ping Monitor, Web site Monitor, Tcp/Ip Port Monitor, Windows Service Monitor,Disk Free space Monitor and an e-mail System Monitor. IsItUp continuously monitors multiple IP devices, Web sites, e-mail systems, windows services and alerts you by pager, e-mail, or execution of a user defined

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware