Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • File recovery software. You can easily recovers files created by Windows. RecoveryDesk recovers files from hard disk and removable media . You can recovers files deleted without Recycle Bin or when Recycle Bin has been emptied, removed by virus attack or power failure and when the partition structure on a hard disk was changed or damaged.
  • In the small cozy world where peace prevailed, chaos suddenly erupted. An evil alchemist creates an army of monsters in order to enslave the small world. But things are not so simple, and you must come to the aid of magical towers with which you have to stop the monsters and attack and destroy the evil alchemist. This is a new game by in the genre of tower defense.
  • In this game you have to protect the territory of your artillery base from unidentified attackers. As you progress, the pressure will grow as new species of invaders come at you. However, Allied boats, weapons and improvement bonuses will help you. The main task is to hold out against all enemy attacks as long as possible.
  • Mini game about micro war against micromachines of malevolent aliens. In this game player must protect cell against attacks of microrobots. It's things, if penetrate to the body will try to grab, to controll of the body or kill. Body as a whole consists of a plurality of cells. Small cell, if it can repel a waves of attacks micromachines - it can win the war, by means of transfering the experience of fighting to other cells.
  • Part II; Protect Santy's house. You are the snowman, and your goal is to wipe out all opponents. Use the 1,2,3,4 and F buttons to build walls. Catch a special gift, then use the F and 4 keys for.... In Snowman Attack, you will encounter the same enemies, the Demon and the Werewolf, but they are even more dangerous than before. Every 100 points scored will increase the difficulty of the game. Show off your high scores online. Enjoy!
  • You are a U.S. Army pilot. During regular military exercises enemies suddenly appeared and attacked your plane. Thanks to your piloting skills, you managed an emergency landing and survived. Once you come to, you realize that you are on a strange, uncharted island. Suddenly zombies begin to appear around you, which not plunges you into a shock that is overcome only thanks to years of combat experience. Well, now all you can do is fend off these m
  • Ax3soft Sax2 is a professional intrusion detection and prevention software (NIDS) used to detect intrusion and attacks, analyze and manage your network which excels at real-time packet capture, 24/7 network monitor, advanced protocol analysis and automatic expert detection. With insight into all operations in your network, Sax2 makes it easy to isolate and solve your network security problems - detect network vulnerabilities, identify network security threats, catch actions against of security strategy and signs of been attacked. Finally, intercept and stop these connections. Sax2 offers many kinds of intrusion analysis reports, such as events, type, source address and destination address of attacks, and many crossover reports and compositive reports. Furthermore, sax2 allows customize the time range which administrator will flexible monitor and evaluate the network security. Sax2, enhanced detection, analysis, response and management features, supports almost all common used protocols, self-conta ...
  • Big Air War - Air Attack - is next-generation air combat shooter with stunning graphics alongside great audio, effects and awesome gameplay. Beautiful levels with immersive missions to complete. Multiple extreme boss battles. Accessible to beginners, as well as hardcore shooter addicts. Shoot em-up action with plenty of sky adventures and adrenaline. The game is aimed at all gamblers, from novices to hardcore action gamers. Gamblers can try thei
  • A Windows partition, usually of FAT or NTFS, holds various files such as images, wallpapers, documents, emails, media and others. But sad thing is that these partitions can be corrupt or damaged due to various reasons, making all its files and folders completely inaccessible. The major causes of these issues are Windows reinstallation, partition deletion, reformatting of drive, system shutdown issues, virus attacks, MBR damages, bad sectors on hard drives etc. But do not be panic even if you lost the data completely. Kernel for Windows Data Recovery is an excellent computer files recovery solution that can be of extreme help in such situations. Kernel for Winnows Data Recovery is an advanced tool for recovering data from damaged and deleted Windows partitions. It retrieves data even after Master Boot Record damages and deletions. It successfully retrieves lost or deleted files and folders too. Integrated with three recovery modes - Quick scan, Extensive Scan and File Trace, it successfully retrieves lost ...
  • A secret Siberian laboratory known as "W-38" was attacked by unknown Forces. All of the laboratory creatures fled, but valuable artifacts remain inside. The laboratory shows no signs of life, from 2007 to the present day, and has no control of the terrible creatures which once resided there.
  • Chili Antivirus is the indispensable anti-virus software that protects against virus attacks. It is based on an award-winning technology as rewarded by AV-TEST with the accolades of having both the ''Best Protection'' for three consecutive years, and also ''Best Performance'' regarding its system speed. Incredibly easy to use, and secures your Mac with a single click of the button.
  • Infinite space poses various dangers - meteorites, ships of bandits, anomalies. December 26, 2094, in the lab FSP begins testing a prototype light warship AX-01. The peculiarity of the ship - neyrotehnicheskoe fiber, consume some types of energy, thereby strengthening the combat characteristics of the ship. On the same day, there is an attack on the station testing of the ship, a group of terrorists, the prototype is not able to fight at full str
  • RecoveryFix for Windows is highly advance and smart software that is capable of data lost due to corruption of Windows registry, virus attack and unexpected system shutdown. The most remarkable aspect about the software is its three integrated modes namely Quick Scan, Extensive Scan and File Trace. Each mode has been integrated with an intention to restore the lost data under any extreme conditions. While you use the tool, it doesn?t matter at all the level of corruption, as the software is very much capable of restoring data. All that a user would require to do is follow the instructions as prescribed by the software. Besides this, the utility facilitates user to tweak few settings and conduct better recovery. In fact, the tool facilitates its user with option to set or change settings accordingly. Like a user can set the software to read sectors in one attempt or even overwrite, rename or skip the duplicate files. Besides being compatible with EIDE, IDE, PAN, SATA, SCSI, ZIP and USB drive, this NTFS data re ...
  • Unzip Mac utility can be used to zip and unzip Mac files on all popular versions of Mac Machines such as Mac OS X 10.5, Lion, Leopard and Snow Leopard etc. It supports to unzip files like documents, images, media files, folders and many more. By using this application you can compress and unzip a very large size zip file within few seconds. It also provides protection to zipped files from virus and malware attacks. Unzip Mac software is useful at compressing a large number of files in a single folder and distributing them through the internet, improves memory management in Apple MacBook Pro and for backing up data etc. Uses of unzip Mac file software are faster download, multiple files in single file, easy file transfer, utilization of memory space and data security etc. Best advantage of this utility is it can compress more than 4 GB size files on Mac machines. This tool is recommended by so many industry experts to compress and uncompress files and folders on Mac Books. And one more, it is available in mark ...
  • If your server has remote desktop on a public IP, protect it from brute force attacks. Automatically block IPs that try to login with incorrect credentials X times, for X minutes. Runs as a service and protects your server. Every Windows server should have this freeware program installed.
  • You are Commander of Zero, a small unit that rescued alien beings after the attack. The goal is not to let strangers walk through the main road to the survivors' peaceful settlement in which all hope resides. This new game in the Tower Defense genre is designed for both beginners and for true hardcore gamers, with a nice interface, balance, graphics, a variety of levels, towers and enemies. - 14 different types of monsters - 6 types of towers
  • Word Password is advanced and extremely fast password recovery tool for MS Word 2007-2013 documents and templates (*.docx, *.dotx, *.docm, etc). Several attacks with number of configurable modifications are available: dictionary based (with several languages included), mask based and brute-force. Advanced keyboard layouts-aware recovery technique. Highly optimized code and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.
  • Project Password is advanced and extremely fast password recovery tool for MS Project files (.mpp) and/or templates (.mpt). All versions are supported. Passwords for MS Project files upto the version 2003 are recovered instantly. Several configurable password recovery attacks are available for MS Project 2007 / 2010 / 2013. Highly optimized code and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.
  • PowerPoint Password is advanced and extremely fast password recovery tool for MS PowerPoint presentations (.ppt, .pptx) and/or templates (.pot, .potx). All versions up to PowerPoint 2013 are supported. Write-protection passwords are recoverable instantly. Several configurable attacks are available for password to open recovery. Highly optimized code and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.
  • PDF Password is advanced and extremely fast password recovery, decryption and restrictions (print, copy, edit, etc.) removal tool for .pdf documents. All standard .pdf encryption methods are supported upto the latest used in Acrobat XI. Several attacks with number of configurable modifications are available (dictionary, mask based, brute-force, etc). Highly optimized code and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.
  • OneNote Password Password is advanced and extremely fast password recovery tool for MS OneNote notebooks (.one files). All versions up to OneNote 2013 are supported. Several configurable attacks with number of modifications are available (Dictionary based, Mask based, Brute-force, etc.). Advanced keyboard layouts-aware recovery technique. Highly optimized code and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.
  • Firefox Password by Thegrideon Software is advanced password recovery and decryption tool for Mozilla Firefox. Firefox Password allows you to recover Master Password as well as logins and passwords saved in Firefox cache (signons.sqlite database). Several configurable attacks are available for Master Password recovery. Highly optimized code (SSE, AVX) guarantees maximum performance (e.g. more than a million passwords per second on Intel i3).
  • Bitcoin Password by Thegrideon Software is advanced and extremely fast passwords recovery tool for encrypted Bitcoin-Qt/bitcoind Wallets (wallet.dat). Several configurable password recovery attacks are available: Dictionary based, Mask based and Brute-force with length and charset selectable. Advanced keyboard layouts-aware recovery technique. Highly optimized code and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.
  • The year is 2152. Humanity is at its peak... Space colonization is no longer a dream, and the program for this in full swing. Some suitable planets have already been successfully developed, and others are still being terraformed. But this gets unwanted attention. Aliens who are suspicious of our activity, not knowing who we are and where we came from, and not wanting to establish contact with us, attack our transportation hubs. The purpose is not
  • HTC Android Recovery is the safest and secure application, which is specially designed to recover data from Android phones. This application is mostly preferred by experienced industry experts and satisfied users because it scans both the internal and external phone memory. By which this tool is capable to identify lost or deleted files, including Android application package files (APK), and regain them for reuse. This fast and effective software is capable to take a preview of all recoverable files such as video, image, music files including .apk files. However, this tool has ability to scans SD cards and creates SD card replica image files to perform recovery at a later stage. Apart from it this application retrieves data from improperly mounted SD cards and corrupt file systems also. One of the important features of this tool is that it allows users to create recovery session that can be used to minimize the recovery process for the next time and after that to take preview of files that are to be recovered ...

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware