Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: applications
Display: short descriptions | full descriptions
  • Conceal your online identity with the click of a button. Surf anonymously, encrypt your Internet traffic, hide your IP while surfing the Internet, using forums, sending E-mails, instant messaging, playing games, and more. Compatible with all applications. Hiding your IP address is as simple as clicking the "Hide My IP" button, which automatically configures your web browser or other application to use a proxy server from our proxy network.
  • Change your voice to match anyone, adjust age and gender, tone and pitch. The advanced voice morphing controllers provide easy fine-tuning. Users can create/mix parody voices, and use the voice comparator to suggest suitable voice similarity settings. The program supports most audio formats, including mp3, wma, wav, ogg, etc., and is compatible with most IM and VoIP applications, in-game chat systems, and media players.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Whenever you face any data loss situation from Mac volumes then do not get panic instead download and install SFWare Partition Recovery Mac software in your Mac system. This recovery tool has the ability to recover data from deleted, lost or formatted data. It is developed with high technology algorithm which will easily restore data without any modification. No matter how severe is your data loss situation, this tool has the ability to sort all issues associated with data stored in Mac volumes. This tool has many inbuilt features that makes very unique tool as compared to others. It can recover data that was emptied from trash without any difficulties. Data can also be found from missing or deleted volumes. This tool has the ability to identify around 300 types of files and recovers it on the basis of its unique signature. It has the capability to recover files from hard drives, memory cards, USB drives and many more. You can also add or edit new signature of files that are not listed. Why SFWare Partitio ...
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Top Process Monitor is simple Sidebar gadget shows the top processes on your system - the processes that are consuming the most CPU, Memory (Working Set), IO (Bytes read/written) and others. It does not require any 3rd party applications. Resizable! Save settings to file. (File will be created - Path: %APPDATA% File: gadgetname_Settings.ini). Color changeable for all gadget's elements, including background.
  • Lets you monitor the most recent stats of your NVIDIA or AMD/ATI Desktop Graphic Card. It does not require any 3rd party applications. Just the latest full feature driver from your given graphic card vendor is needed. Supported GPU's: - NVIDIA Desktop Cards (Generation: 8, 9, 100, 200, 300, 400, 500, 600) - ATI Desktop Card (Generation HD 2000, 3000, 4000, 5000, 6000, 7000) - Several NVIDIA Mobile Cards
  • The Network Monitor II (wired and wireless) will show you SSID, signal quality, Internal IP address, External IP address with your country flag when you are connected to the internet, network utilization, upload speed, download speed and total (both current session and global) of usage. It does not require any 3rd party applications. Resazible!
  • System Monitor shows your CPU core usage (supporting up to 32 cores) and RAM usage (physical, page file and full, includes virtual). It also displays all cores and RAM usage history and cores temperatures. Writing data to a log file. Supports multi CPU systems. Have many settings to customize. It does not require any 3rd party applications. Resizable! Save settings to file.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • GAMPPO (Game Performance Platform Optimizer) is softly shutting off most of active applications, unnecessary services and other Windows objects, leaving the chosen application running only, and resuming them when you're done.
  • PC Spy Software logs all Facebook, PC & internet activity and emails log reports to you. PC Spy Software logs all keystrokes, chats & IMs, emails, websites visited, applications, usernames, passwords, documents opened, online searches, microphone sound and more. It takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crimes.
  • This is the program for creating quick notes. Besides the usual note-taking, the program can copy and store the text from other applications, such as web browsers, text editors, and IM communication programs such as MSN or ICQ. Create notes by dragging and dropping selected information onto the program window. You can also drag the program and files to save their location. Pictures dragged onto the window are stored separately.
  • AvtoK is a multi auto-clicker software for recording and playback of actions performed by your keyboard and mouse. These recordings can be played at any time, any number of times. Despite the apparent simplicity of the main window it is quite powerful in its class. Applications include games and websites that require routine actions for anything. Automate tedious and repetitive actions on the computer.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • PostgresDAC is a PostgreSQL BDE replacement for Delphi and BCB. It allows you to create Delphi/BCB5 applications with direct access to PostgreSQL DB without BDE and ODBC. Migration friendly Interface of PostgresDAC is BDE-like and TDataSet compatible. TDBImageEx component for JPEG images in BLOBs support included in package for free (with sources). Royalty-free.
  • Computer Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Make any Window Always on Top with Freeware Utility for Windows. A Simple Keyboard Shortcut to make any Window to stay on Top of other Application Windows. Really easy to use and handy when your Application Window needs to stay on top of other Application Windows. Even when your Application Window does not supports the feature to stay on On Top of other Windows, you can easily and quickly mark any Window to stay on Top of other Applications.
  • The MD5 message-digest algorithm is a widely used cryptography hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptography applications, and is also commonly used to verify data integrity.SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • System Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to a specified email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Lock down Windows XP/Vista/7/8/10 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 is perfect for kiosk setups, digital signage, trade shows, library and school labs, Internet cafes, gaming centers, media centers and other applications. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows your main application to run exclusively.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware