Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: A :: applications
Display: short descriptions | full descriptions
  • The 'Close all Windows' tool automatically removes all the many windows (applications) accumulated during working on the PC. The 'Window-Closer' is a small program, which resides in the system tray (next to the clock) and can be activated by a simple click or by a fast hotkey. Additional to the 'Close all Windows' functionality you get the Clipboard Cleaner and Text Hotkeys.
  • Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, individual drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
  • Best Network Security is the best solution for corporations, universities, schools, public libraries, internet cafes and other applications where administrator has to secure and maintain a lot of network PC workstations located in different places. Best Network Security is intended for securing, protecting, and maintaining PC workstations within a corporate network. Supports over 600 different security restrictions.
  • Advanced Internet Kiosk is intended for building Internet kiosks, public access PCs, or in-store terminals. It lets you disable access to files installed on your PC and prevent users from changing PC settings while gives full access to all necessary applications you specify including Internet Explorer. As a result, many people may have free access to a workstation you create, but none of them can damage (whether accidentally or intentionally) vit
  • Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer u
  • A stock of 86 aviation and transportation icons.Great for navigation systems, flight information desks, logistics and transportation applications. Avia Software Icons are a perfect fit for toolbars, menus, tree views, taskbars, ribbon bars, dock UI elements, buttons, splash screen and banner design. Coming soon: iPhone Icon Extractor
  • Perfect Table Icons is a library of wonderfully-crafted ready-made icons for use in various database products, including desktop and mobile software applications, online websites. The icons have a bright color palette, smooth and well-rounded edges. They are delivered in a variety of formats and sizes. This icon set includes database related icons: edit table, new table, dataset, query, database table, 3d chart, timetable, etc.
  • Perfect Security Icons is a collection of wonderfully-crafted stock icons for use in commercial and personal products, including software applications, websites, blogs and presentations. The icons have a bright color palette, smooth and well-rounded edges. They are delivered in a variety of formats and sizes. This icon set includes security icons: login, guard, firewall, signature, lock, key, shield, card file and many others.
  • LoopBe30 is a virtual MIDI device driver for transferring MIDI data between computer programs. Basically LoopBe30 provides up to 30 independent 'invisible cables' to connect MIDI outports of applications to any other application's MIDI inport. You may connect up to 8 applications to every single inport and up to 8 application to every single outport, all sending and receiving at the same time. Every port provides the full 16 MIDI channels.
  • ipMIDI - A MIDI over Ethernet Driver - MIDI over LAN. No more MIDI interfaces needed to communicate between applications on different PC's. ipMIDI is a native WDM driver, with even lower latency than a hardware legacy device and real MIDI cables.ipMIDI sends MIDI Data over Multicast UDP, not TCP/ip, so you will not have any client server hassle. Select "Ethernet Midi Port" in your audio application. That's all, no configuration, no problems.
  • Allows on pressing of a "hot" key at any moment, quickly to hide and unload process or group of processes of random access memory. Will help to hide quickly start and operation of applications without confirmation of closing and preservation of the dens belonging to them
  • Your products will look more modern and attractive with Music Icon Library. Color formats include Windows XP and 8-bit formats. Available sizes are 16x16, 24x24, 32x32 and 48x48. This icon collection includes the next icons: sound, music, phone, violin, drum, trumpet, no sound, voice chat, tuner, radio, guitar, piano, metronome, film, notes, recorder and others.
  • Lock down Windows XP/Vista/7/8 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 is perfect for kiosk setups, digital signage, trade shows, library and school labs, Internet cafes, gaming centers, media centers and other applications. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows your main application to run exclusively.
  • Optimized for web applications, Dynamic Webcam SDK is a browser plugin which enables users to acquire an image from a webcam, edit and then upload/save it to a database, web server or local disk. Also, it can capture a live video stream into a container and grab a snapshot to be exported to a file/binary. Dynamic Webcam SDK comes with 2 editions for different browsers: ActiveX Edition and Plugin Edition.
  • .NET library that allows developers to build new or enhance existing apps with electronic signature functionality. The library provides a flexible API for preparing documents, collecting signatures and automating signature workflows. Its signature capture control allows users to apply signatures drawn with a mouse, touch or stylus, while audit trails and anti-tampering functionality ensure document integrity and signature authenticity.
  • The TimelineFX Particle Editor is a complete solution for creating a full range of particle effects for your games and applications. Export the particle effects as static animations onto sprite sheets, animation strips or image sequences in PNG format, or if you develop for the iPhone or iPad, you can export using the PVRTC format (Mac only).
  • All-in-one Image Acquisition SDK for Web Applications; Capture images from scanners, digital cameras, and webcams in browsers. To provide the most flexibility to their customers, a lot of companies and organizations are in need of adding webcam support to their image acquisition system, so as to capture user IDs, photos and more. In response to these requirements, Dynamsoft launched its ImageCapture Suite.
  • fayetracker allows you to trace and catch hackers intrusions on your computer.The software doesn't need installing and running the program's executable is all that takes. Fayetracker can be run from USB memory sticks. After running FayeTRACKER, clicking on the ON/DISPLAY button will quickly display all the Internet connected applications, together with their IP address and port.
  • Dynamic .NET TWAIN component based on .NET Framework 2.0, optimized for use in C# and VB .NET and offers support for both WinForms and WPF desktop applications. With the TWAIN library, you can control any TWAIN device - scanner, digital camera or capture card - if it has a TWAIN driver installed. After acquiring images and scanning documents, you can do some editing, and then save images in local or upload to a web server.
  • Dynamic Web TWAIN is a TWAIN scanning SDK specifically optimized for web applications. You can control any TWAIN compatible device drivers - scanner, digital camera or capture card - in a web page to acquire images, edit and then upload to web servers/databases using the TWAIN control.With the carefully designed interface and the built-in wizard mode, the TWAIN SDK is lightweight, easy to use yet very powerful.
  • The collection of Artistic Toolbar Icons includes a range of attractive and colorful icons representing all basic operations required for surfing the Internet or using various software applications. These modern-style icons are a valuable and eye-catching addition to any professional software application or a website. Artistic Toolbar Icons feature high-quality graphics and come in all sizes: 256 x 256, 48 x 48, 32 x 32, 24 x 24, 16 x 16.
  • Application Bar Icons for Windows Phone 7 is a collection of professionally designed application icons meeting all of the requirements of the Windows Phone 7 operating system. Icons have the right size, the right color, their content areas are perfectly centered and they are all 100% ready to be used in your applications.
  • Archive Toolbar Icons is a collection of stock toolbar icons for developers of archive and backup software, websites and torrent applications. These royalty-free icons represent a wide variety of concepts (archive, zip file, password key, wizard etc.) and actions (pack, unpack, view, repair etc.) related to packing, backup and archiving. Icons are available in a variety of sizes (from 16x16 to 48x48 pixels) and file formats (ICO, PNG, BMP, GIF).
  • Comodo Antivirus is the free way to rid your computer of viruses, malware, Trojans, worms, hackers, and other Internet threats. Scan any drive or file, get in-depth reports on viral activity and block suspicious files that behave like viruses do. The latest version sees a major leap forward in security and usability with a completely redesigned interface and the addition of Virus Scope technology. CAV is unbeatable at blocking zero-day threats because it automatically isolates untrusted files in a virtual environment where they cannot access the underlying operating system or sensitive user data. Under default settings, unknown and untrusted files are automatically scanned by our cloud-based virus scanners then, while the file undergoes behavior analysis on our cloud server, it is run in a sandbox on your local machine so that it cannot modify or affect data on your 'real' system. Put simply, this ground-breaking, default-deny, protection of your PC means that only trusted applications are a ...
  • Android developers can give their applications a visual edge with our selection of professionally-designed status bar icons. Covering a wide variety of themes and functions, our icons conform to Android graphics standards to deliver a reliable user experience and make incorporating them into an app as easy as possible. Adjustable depth and available vector sources make any application stand out while staying stylish.

Page 10 of 10
1 2 3 4 5 6 7 8 9 10

Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware