Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: applications
Display: short descriptions | full descriptions
  • The Network LookOut Administrator Pro allows you to see live screens of remote computers. This way, you can always watch what users are doing on the remote computer. Additionally, you have the ability to take control of a remote computer by controlling the mouse and keyboard; this is especially useful when you need to assist the person who uses the remote computer. If you are an administrator, you can easily administer remote computers.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • RasterVect can convert any raster images (BMP, GIF, TIFF, JPEG, PNG, and so on) to a vector format. Raster images can be imported by scanning original paper images. The target vector formats (DXF,WMF,EMF,EPS and AI) are supported by most CAD applications that use vector graphics, such as AutoCAD, Adobe Illustrator, Corel Draw. There are viewing tools like scrolling, color selection, zooming and tools for vector and raster editing.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • SpyPal Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • ApPHP MVC Framework is designed to provide modern and rapid development of websites, web applications and web services. It implements the the Model-View-Controller (MVC) design pattern and principles, including separation of display, logic, and data layers. It provides an architecture, components and tools for developers to build a complex web applications faster and safer.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, microphone, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a spy camera. Automatically sends logs to your email.
  • Eye movement tracking with webcam and PC, no specialized hardware required. The technology demo app shows real-time gaze tracking and heatmap generation for research of single and multiple subjects. Camera should be placed under the screen. A simple calibration procedure performed before starting tracking. A software development kit (SDK) with 30-day trial is available for integrating gaze tracking to other applications.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Blend4Web is a business ready solution which allows you to create a wide range of 3D web applications with maximum efficiency whether you are involved in showcasing products, e-learning, game development, advertising or web design. The solution is recognized around the world and extensively used by the best brands such as NASA, Dassault, General Electric, Verison, Yandex and others.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • GlassWire free firewall software helps protect your computer, privacy, and data by monitoring your network activity. Block unknown network connections with GlassWire's built in firewall tool. GlassWire also helps you monitor and protect remote servers. Are you always worried about going over your ISP bandwidth limit? GlassWire can warn you before you hit your limit and also show you what applications are hogging all your bandwidth.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • RasterVect can transform any raster images (BMP,GIF,TIFF,JPEG,PNG and so on) into a vector format. Raster images can be imported by scanning original paper images. The target vector formats (DXF,WMF,EMF,AI and EPS) are supported by most CAD applications that use vector graphics, such as Corel Draw, AutoCAD, Adobe Illustrator. There are viewing tools like color selection, scrolling, zooming and tools for vector and raster editing.
  • Text to Software makes applications automatically from subject matter expert knowledge, data from websites, human sources, documents and databases. The resulting application meets business requirements expertly and is produced 80% faster and 60% cheaper than traditional programming methods.
  • Hide ALL IP is the worlds best IP hide software, hide all your applications and games IP from snoopers & hackers, allows you to surf anonymously, prevent identity theft, and guard against hacker intrusions, all just need a click. Your IP address can link your internet activities directly to you, it can easy leak you by this IP address, Hide ALL IP protects your online identity by change your IP address to our private server's IP and routes all your internet traffic through our encrypted internet servers so that all remote servers only get a fake IP address, you are very safely. Change Your IP Address - Just click "Connect" and your IP is instantly hidden! Internet will see your fake IP, which is not associated with your real IP. Change Your Location - Our servers located in the world, you can easily connect to the different country servers. Each time you press the 'Connect' button, you will fake as this country's IP. If you want to change country, just press the &quo ...
  • SageTea Browser is a free browser designed to work exclusively with SageTea Applications. It is a cloud based browser which provides secure worry free browsing of private content.
  • PostgresDAC is a PostgreSQL BDE replacement for Delphi and BCB. It allows you to create Delphi/BCB5 applications with direct access to PostgreSQL DB without BDE and ODBC. Migration friendly Interface of PostgresDAC is BDE-like and TDataSet compatible. TDBImageEx component for JPEG images in BLOBs support included in package for free (with sources). Royalty-free.
  • Copy Protect lets you copy protect your audios, videos, documents and pictures so that they cannot be duplicated, copied or distributed by illegal means. Copy Protect converts all supported formats into executable applications that run only in the drives they are prepared for. If these files are copied to another drive, they do not run and become useless. Copy Protect works in all 32-bit and 64-bit version of Windows 7.0/Vista/XP.
  • Change your voice to match anyone, adjust age and gender, tone and pitch. The advanced voice morphing controllers provide easy fine-tuning. Users can create/mix parody voices, and use the voice comparator to suggest suitable voice similarity settings. The program supports most audio formats, including mp3, wma, wav, ogg, etc., and is compatible with most IM and VoIP applications, in-game chat systems, and media players.
  • Almost all Android applications are using a database to store data. There are many ORM solution available for automatic code generation or data access in Android applications development. But the code generated by dbHelper creator is simple, easy understandable and debuggable. Automatic code generation will eliminate all the typing errors and decrease the production time. Also it will give you a few methods that can be used again and again.
  • Free report shows the number of autocomplete list cache entries in NK2, DAT, XML files. Detailed report shows the full set of auto-complete data available. This report will help to get a list of contacts from the Auto-Complete List files. In Outlook 2007/2003, Auto-Complete Lists are stored in NK2 files. In Outlook 2010+, Auto-Complete Lists are stored in mailboxes and PST files, and in the DAT files for compatibility with older applications.
  • Magic Box is a collection of applications. In it you will find some popular jokes and puzzles such as magic square, magic eye, latent image fading dollar and math transformation. Will the program learn the unknown number? Will the program learn the defined map? And what happened to that dollar? Magic box is great fun for you and your friends!
  • Automatically log your system memory usage to a file, as both MB and as a percentage of the total memory. Monitor the memory usage of any specific application directly to a log file for later review. Log the total system memory usage, and log the top applications in order of memory usage. You can also chose to exclude specific applications.
  • Lock down Windows XP/Vista/7/8/10 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 is perfect for kiosk setups, digital signage, trade shows, library and school labs, Internet cafes, gaming centers, media centers and other applications. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows your main application to run exclusively.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware