Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: applications
Display: short descriptions | full descriptions
  • ListView icons are some of the most important graphics involved in today's Android applications, and delivering an intuitive, pleasing icon can be challenging for busy developers. Skip the hassle and depend on our Android ListView icon collection, which features over 150 attractive icons ideal for Android 2.3 and higher. Our graphics can be customized to mesh seamlessly with your application's style while conforming to current standards.
  • Powerful but easy to learn and easy to use Project Management Software. Uses Critical Path Method (CPM). Uses both Schedule and Cost Work Breakdown Structure (WBS). Online and printed Gantt charts include detail, WBS Summary and varying summary level within a chart. Optional Gantt features include start/end dates, task links, critical end, progress, activity selection and sorting. Color coding of summary versus detail activities. Variable display scaling in all ways. Task group cloning (better than templates) both from within a project and from other projects. Network diagrams and other schedule reports. Resource version: Labor use vs availability histogram, color coded by task. Resource data is used to produce Earned Value reports - Budgeted Cost for Work Scheduled (BCWS), Budgeted Cost for Work Performed (BCWP), and Actual Cost for Work Performed (ACWP). Export and import of data from Excel compatible files. Variety of intuitive data entry dialogs are integrated with the on screen displays. Also ...
  • All Icon Sets is the most economical way of getting a huge lot of stock icons. Assembling more than 200 icon collections dedicated to different topics, this mega-set offers a great opportunity to save. With more than 25,000 taskbar, application bar icons, menu and toolbar icons, graphics for ribbon UI and other control elements this set is perfect for building applications targeted to various desktop and mobile platforms.
  • .NET PDF Control - Nasosoft Pdf .NET v5.7 is a .NET library for adding PDF document capabilities in your .NET applications.Developers can implement and create powerful PDF solutions and applications that can create, manipulate, edit, fill and print PDF document. Nasosoft Components is a suite of comprehensive and powerful development tools for C#/VB .NET/Java developers, including Excel/PDF/BARCODE/RTF2HTML/HTML2RTF/RTF2TEXT file formats, Barcode write and read (EAN13,EAN8,UPCA,UPCE,BooklandEAN,Standard2of5,Code11,EAN14,Code128,Code39,Code93,PDF417,MacroPDF417,DataMatrix,Aztec,QR) components (NasosoftExcel,Nasosoft PDF,Nasosoft Compression,Nasosoft Transform,Nasosoft Barcode).
  • Asterisk Password Decryptor 64-bit instantly recovers lost passwords from most 64-bit Windows applications that store passwords hidden behind the asterisks (*****). It easily recovers passwords for e-mail accounts in Outlook x64 , Windows Mail and many other e-mail clients, FTP accounts in CuteFTP, FlashFXP, FileZilla and other FTP clients. Asterisk Password Decryptor also allows to see the hidden password on web pages in Internet Explorer x64.
  • Asterisk Password Decryptor instantly recovers lost passwords from most Windows applications that store passwords hidden behind the asterisks (*****). It easily recovers passwords for e-mail accounts in Microsoft Outlook, Windows Mail and many other e-mail clients, FTP accounts in CuteFTP, FlashFXP, FileZilla and other FTP clients. Asterisk Password Decryptor also allows to see the hidden password on web pages in Internet Explorer.
  • Silent Keylogger Free Edition is powerful free PC and Internet activity monitoring software that records everything on your PC. It secretly records all typed keystrokes, emails conversations, chats, visited websites, passwords, used applications and captures screenshots. Silent Keylogger allows you to find out what other users do on your computer in your absence. Monitor how your children use their computer online.
  • Silent Keylogger invisibly records every user activity performed on the computer in AES encrypted log files and sends to your e-mail address, FTP server or LAN path. It automatically records all typed keystrokes, emails, chats, website visited, password, used applications and captures screenshots. Silent Keylogger has password protection and hot-key combination for accessing the application. Supports preconfigured silent one-click install.
  • GWT Virtual Application System realizes the centralized application, remote access, coordination office, etc, thus creating concentrated, convenient, safe and efficient virtualization support platform for the user. Terminals do not have to install the applications. Users can quickly access to all kinds of application software on the server and will be no longer limited by the client.
  • With just two clicks, Filecats Explore imports the Windows Explorer columns into a table, so you can filter, sort and analyse. Copy information from this open-box system and paste it into your favourite applications. This cataloger is easy to use, swift yet powerful. Try it for yourself for free for 7 days - fully functional. For more features, try Filecats Metadata, which can extract hunderds of document properties.
  • Ultimate Keylogger Free Edition is a free popular all-round monitoring solution. It runs in the background and monitors all typed keystrikes, applications, passwords, clipboard, email, and visited websites' URLs. You can view the reports as HTML files. Ultimate Keylogger will help you to find out, what exactly took place in the system. You will be able to find out what your children search in the internet, and to check them.
  • Ultimate Keylogger is advanced all-round monitoring solution. It monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites. Ultimate Keylogger is completely undetectable. Process is hidden from task manager. Files are not visible. Ultimate Keylogger displays reports in web format or sends zip-compressed and encrypted activity reports invisibly via Email, FTP or LAN.
  • AggreGate Network Manager is an umbrella IT management platform. It provides out-of-the-box monitoring for IP networks, servers, routers, applications, services, traffic and performance. Product features include network discovery, L2/L3 mapping, alerting, event correlation, root cause analysis, charting, reporting, dashboards, network inventory and asset management, distributed monitoring, and more.
  • Enhance an accounting package or bookkeeper software with appealing graphics. Accounting Toolbar Icons depict numerous concepts and symbols related to accounting and bookkeeping, including currencies, financial symbols, files, customers, percentage points, and many more. More than a hundred icons are available for instant preview and immediate purchase.
  • Here is a iOS Tab Bar Icon Set, which will help each iPhone or iPad application developer get his GUI in order. The icons from this set can be used in navigation, tab bars and toolbars, as they specifically meet the icon guidelines for iOS applications. Technically, there are 565 unique app icons created in matching style in PNG format with both, black and white versions, in sizes 20x20, 30x30, 40x40, and 60x60 pixels.
  • Business Icons for Vista is a first-rate icon collection for creating a superb look for websites and applications associated with different business activities. It will provide you with the icons necessary for depicting such things as transport, commerce, communication and others. The set comes in all standard sizes from 16x16 to 256x256 in 256 and 32-bit color with semi-transparency. You can choose between ICO, PNG, GIF and BMP formats.
  • Business Icon Set is a collection of wonderfully-crafted stock icons for use in commercial and personal products, including software applications, websites, blogs and presentations. Icons are divided into such categories as Business, Finance, Transport, Money, Computer and Reports. Created with much inspiration and care, icons have a bright color palette, smooth and well-rounded edges. They are delivered in a variety of formats and sizes.
  • NTFS Partition Recovery utility helps to retrieve lost data from NTFS partitions on Windows PC. It supports to rescue deleted or lost documents, photos, compressed files, RAR files, audio files and video files etc. It can easily recover data that is accidentally deleted, damaged or corrupted and formatted. It recovers missing or deleted files from various storage drives such as pen drives, memory cards, flash cards, hard drives and HDD etc. Common scenarios leads to partitions data loses are virus or malware attack, accidental deletion of partitions, formatting errors, third party applications, while resizing partitions, power outages and improper system shutdown etc. You can use this deleted partition recovery software to retrieve back all the data from formatted partitions. Best features in NTFS partition recovery tool are 1) It was recommended by many of the experts to recover missing files on hard drive after formatting or re formatting. 2) It has fastest and secure built in scanning algorithm that wou ...
  • Crypter is a high-performance packer and protector for Windows 32bit executables Crypter can encrypt and compress any 32-bit executable without affecting its direct functionality. For instance, if you're a software developer, you can encrypt your applications before they are delivered to customers. By using Crypter, the applications will be more protected and smaller. The official Crypter website: www.crypter.com
  • A visual codeless programming system with built in support for web applications, databases, 2D drawings, web services, kiosk, ActiveX, etc. It is the first fully automated cloud computing system in the world removing client server boundary. Visual languages of programming are compiled to C#, HTML, CSS, ASPX, PHP, JS and other source files. It uses .Net types as its programming entities,thus works with all other programming languages seamlessly.
  • Developers can use UseOffice .Net with VB.NET, C#, Delphi .Net or J# etc. The UseOffice .Net able to convert in about 40 various directions. Such as: These directions of converting are supported: Requires MS Office, any version: 2000, XP, 2003, 2007 or 2010. Technical information Written in C# Requires MS Office installed Easy to integrate in any .Net 1.1, 2.0, 3.0, 3.5 and 4.0 Web and WinForms applications.
  • myCollections is an all-in-one organizer that allows you to catalog and track your multimedia content, as well as share it with others. What makes it really stand out among other similar software is that it is able to catalog all of your content?apps, books, games (there is even a specific category for NDS games), movies (including x-rated), music, and TV series. The multimedia content can be stored electronically on your computer or it can be physical media?myCollections doesn?t care and it will help you catalog it either via searching your data and reading from .NFO files or the file names themselves, via a webcam acting as a barcode reader, or by manual entry. Yes, you heard that correctly, myCollections can simply scan the barcode on the media and then search multiple online databases to retrieve all the information on the item saving you countless hours of typing. It can also be used from a USB drive. The software is free; however I highly recommend clicking the donations ...
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Visual FoxPro applications. Uses the latest 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, key generation from and password phrases. Implements buffer padding and does random byte data generation. Works with 32-bit Visual FoxPro. Win32/Win64
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Visual dBase applications. Uses the latest 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, key generation from and password phrases. Implements buffer padding and does random byte data generation. Works with 32-bit dBASE 7.0, 7.5 and dBASE Plus. Win32/Win64.
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Xbase++ applications. Uses the 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, SHA-256 cryptographic hash algorithm, key generation from text and password phrases. Implements buffer padding and does random byte data generation. Works with 32-bit Xbase++. Win32/Win64.

Page 10 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware