Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: applications
Display: short descriptions | full descriptions
  • Handy and intuitive, PDF Server for Windows Server 2016 works seamlessly with most business applications. Through a familiar Print Dialog interface, you can convert existing documents to PDF. A detailed tutorial can guide you through all the functions and features at hand. Anyone looking for a solid PDF solution will find it in PDF Writer for Windows Server 2016. Backward compatible with Windows 8, Windows 7, Windows Vista, Windows XP clients.
  • ConEmu replaces the standard Windows console. It allows you to open multiple console Windows in tabs. Lots of customization options. Ships with a list of popular terminal color schemes to choose from. Also ships with plugins for popular console applications: Far Commander, cmd, Power Shell, Bash and more...
  • SecureBridge represents clients and servers for SSH, SFTP and SSL protocols as a network security solution. It can protect any TCP traffic using SSH or SSL secure transport layer protocols to provide authentication for client. It is a solution for developing applications using various IDEs as RAD Studio, Delphi, C++Builder, Lazarus (FPC) on Windows, Mac OS X, iOS, Linux, FreeBSD.
  • Generate Web, Mobile and Cloud applications straight from your database with Iron Speed Designer. Quickly create visually stunning, feature-rich apps that are easy to customize and ready to deploy. In just minutes you get a complete application - pages, code and SQL - without hand-coding. You enjoy unrestricted access to all source code, and there are no run-time license fees or proprietary software requirements.
  • Large Business Icons is a collection of royalty-free icons that includes a wide variety of images related to business and banking. It includes icons representing various financial operations, documents, people. Each image is provided in 6 resolutions (16x16, 24x24, 32x32, 48x48, 256x256 and 512x512 pixels), and 4 image formats (GIF, PNG, ICO and BMP). You can use these icons for desktop and online applications.
  • SterJo Password Unmask could reveal/unmask most of password text boxes containing hidden characters known as asterisk ('*****') immediately. Many applications like CuteFTP, Microsoft Outlook, other e-mail clients or login forms would save and hide their passwords with hidden chars to prevent others from seeing them. Sometimes using different passwords for each account could be forgotten and there is no way to reveal them. Run and application and open the window where the password is hidden with asterisk ('*****') characters. Click "unmask" button and you will see how the asterisks are converted into letters instantly. Copy your previously masked password and don't ever worry if you forgot outlook password, CuteFTP or any other password again.
  • Devart Excel Add-ins allow you to use powerful Excel capabilities for processing and analysis of data from cloud applications and relational databases, instantly refresh the imported data from the data source, edit external data as usual excel spreadsheets and save data changes back to the data source you have imported them from.
  • The 'Close all Windows' tool automatically removes all the many windows (applications) accumulated during working on the PC. The 'Window-Closer' is a small program, which resides in the system tray (next to the clock) and can be activated by a simple click or by a fast hotkey. Additional to the 'Close all Windows' functionality you get the Clipboard Cleaner and Text Hotkeys.
  • Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, individual drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
  • Best Network Security is the best solution for corporations, universities, schools, public libraries, internet cafes and other applications where administrator has to secure and maintain a lot of network PC workstations located in different places. Best Network Security is intended for securing, protecting, and maintaining PC workstations within a corporate network. Supports over 600 different security restrictions.
  • Advanced Internet Kiosk is intended for building Internet kiosks, public access PCs, or in-store terminals. It lets you disable access to files installed on your PC and prevent users from changing PC settings while gives full access to all necessary applications you specify including Internet Explorer. As a result, many people may have free access to a workstation you create, but none of them can damage (whether accidentally or intentionally) vit
  • Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer u
  • A stock of 86 aviation and transportation icons.Great for navigation systems, flight information desks, logistics and transportation applications. Avia Software Icons are a perfect fit for toolbars, menus, tree views, taskbars, ribbon bars, dock UI elements, buttons, splash screen and banner design. Coming soon: iPhone Icon Extractor
  • Perfect Table Icons is a library of wonderfully-crafted ready-made icons for use in various database products, including desktop and mobile software applications, online websites. The icons have a bright color palette, smooth and well-rounded edges. They are delivered in a variety of formats and sizes. This icon set includes database related icons: edit table, new table, dataset, query, database table, 3d chart, timetable, etc.
  • Perfect Security Icons is a collection of wonderfully-crafted stock icons for use in commercial and personal products, including software applications, websites, blogs and presentations. The icons have a bright color palette, smooth and well-rounded edges. They are delivered in a variety of formats and sizes. This icon set includes security icons: login, guard, firewall, signature, lock, key, shield, card file and many others.
  • LoopBe30 is a virtual MIDI device driver for transferring MIDI data between computer programs. Basically LoopBe30 provides up to 30 independent 'invisible cables' to connect MIDI outports of applications to any other application's MIDI inport. You may connect up to 8 applications to every single inport and up to 8 application to every single outport, all sending and receiving at the same time. Every port provides the full 16 MIDI channels.
  • ipMIDI - A MIDI over Ethernet Driver - MIDI over LAN. No more MIDI interfaces needed to communicate between applications on different PC's. ipMIDI is a native WDM driver, with even lower latency than a hardware legacy device and real MIDI cables.ipMIDI sends MIDI Data over Multicast UDP, not TCP/ip, so you will not have any client server hassle. Select "Ethernet Midi Port" in your audio application. That's all, no configuration, no problems.
  • Allows on pressing of a "hot" key at any moment, quickly to hide and unload process or group of processes of random access memory. Will help to hide quickly start and operation of applications without confirmation of closing and preservation of the dens belonging to them
  • Your products will look more modern and attractive with Music Icon Library. Color formats include Windows XP and 8-bit formats. Available sizes are 16x16, 24x24, 32x32 and 48x48. This icon collection includes the next icons: sound, music, phone, violin, drum, trumpet, no sound, voice chat, tuner, radio, guitar, piano, metronome, film, notes, recorder and others.
  • Lock down Windows XP/Vista/7/8 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 is perfect for kiosk setups, digital signage, trade shows, library and school labs, Internet cafes, gaming centers, media centers and other applications. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows your main application to run exclusively.
  • Optimized for web applications, Dynamic Webcam SDK is a browser plugin which enables users to acquire an image from a webcam, edit and then upload/save it to a database, web server or local disk. Also, it can capture a live video stream into a container and grab a snapshot to be exported to a file/binary. Dynamic Webcam SDK comes with 2 editions for different browsers: ActiveX Edition and Plugin Edition.
  • .NET library that allows developers to build new or enhance existing apps with electronic signature functionality. The library provides a flexible API for preparing documents, collecting signatures and automating signature workflows. Its signature capture control allows users to apply signatures drawn with a mouse, touch or stylus, while audit trails and anti-tampering functionality ensure document integrity and signature authenticity.
  • The TimelineFX Particle Editor is a complete solution for creating a full range of particle effects for your games and applications. Export the particle effects as static animations onto sprite sheets, animation strips or image sequences in PNG format, or if you develop for the iPhone or iPad, you can export using the PVRTC format (Mac only).
  • All-in-one Image Acquisition SDK for Web Applications; Capture images from scanners, digital cameras, and webcams in browsers. To provide the most flexibility to their customers, a lot of companies and organizations are in need of adding webcam support to their image acquisition system, so as to capture user IDs, photos and more. In response to these requirements, Dynamsoft launched its ImageCapture Suite.
  • fayetracker allows you to trace and catch hackers intrusions on your computer.The software doesn't need installing and running the program's executable is all that takes. Fayetracker can be run from USB memory sticks. After running FayeTRACKER, clicking on the ON/DISPLAY button will quickly display all the Internet connected applications, together with their IP address and port.

Page 10 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware