Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Everything starts with the inventory of installed software. Only if you know for sure what is really installed in your network, you can reach legal certainty. The process of inventory discovery begins with the search for computers. Only the Lan-Inspector combines various mechanisms in order to reach for even the most distant computer of your company. This freeware version is unlimited in functionality, but it can only manage 5 PCs.
  • Everything starts with the inventory of installed software. Only if you know for sure what is really installed in your network, you can reach legal certainty. The process of inventory discovery begins with the search for computers. Only the Lan-Inspector combines various mechanisms in order to reach for even the most distant computer of your company. This freeware version is unlimited in functionality, but it can only manage 5 PCs.
  • Everything starts with the inventory of installed software. Only if you know for sure what is really installed in your network, you can reach legal certainty. The process of inventory discovery begins with the search for computers. Only the Lan-Inspector combines various mechanisms in order to reach for even the most distant computer of your company. This freeware version is unlimited in functionality, but it can only manage 5 PCs.
  • Change your voice over IP and PC to phone; change voice's gender and age to have fun in online voice chat; create different voices for dubbing; morph songs and voices in songs; record voice chat, phone conversation, Internet radio, and music from online sites; add audio and background; compare changed voice to another's voice for simulation purposes; compatible with most instant messengers, PC to phone clients, game servers, and media players.
  • With over 3 million customers, Disconnect is the easiest way to protect your privacy on all of your devices. Disconnect protects you in 6 ways: Visualize Tracking - see who's following you Encrypted Internet - secure all of your online activity Safe Browsing - block 5000+ trackers Anonymous Search - search privately on Google, Bing, & more Location Control - defeat censorship Privacy Icons - easily decipher privacy policies
  • Download Recycle Bin data recovery software to recover deleted recycle files back. All-in-one leading data recovery software for Recycle Bin file recovery. Quickly undelete files and folders and get back all of your files deleted and even emptied from Recycle Bin. RecoverBits data recovery software answers all common user queries like : can we recover files even after we empty trash or recycle bin, can you retrieve items deleted from the recycle bin, how to recover files from recycle bin, is there any way to restore deleted files back from Recycle Bin etc with a big YES. You can even test software recovery results by downloading and installing the Trial version of the product. Trial version allows you to search and recover all lost data from Recycle Bin. Software is designed with forensics capability to recover data from $RECYCLE.BIN. Easily recover emptied recycle bin files and restore back recovered files even after emptying Windows Recycle Bin. Works for all Windows versions like Windows 10, Windows 8.1, W ...
  • Direct a little man through a labyrinth in this grayscale arcade game, but it's not so easy as it sounds. Many obstacles await. Features of game: Shades of gray colors create sensation of despair and hopelessness. 10 interesting levels with increasing difficulty. Can't get past a level? No problem! You always can save a checkpoint and start where you left off! Various disturbing obstacles will give you fits.
  • Quick, lightweight and very powerful PHP editor that combines features of a fully-packed PHP IDE with unmatched performance. Rapid PHP is the most complete all-in-one software for coding PHP, HTML, CSS, JavaScript and other web development languages with tools for debugging, validating, reusing, navigating and formatting your code. Features include code intelligence, PHP debugger, (S)FTP connectivity, UTF-8 support, code templates and more.
  • Total PDF Converter converts PDF to Doc, Excel, HTML, Text, CSV, TIFF, JPG, PNG, or BMP. It converts one PDF/PS/PCL/EPS/XPS file as well as a batch of them in no time. The resulting file is always prefect: the layout is strictly preserved. The program offers lots of additional options. You can combine several PDF files into one TIFF or add page numbers. Total PDF Converter works via user interface or command line. Download your free copy now!
  • MessageLock adds email encryption and zip file compression to Microsoft Outlook. It combines strong U.S. Gov't approved AES-256 bit encryption with the near-universal compatibility of the Zip file format. MessageLock delivers email encryption and zip compression for your message and/or file attachments. With version 2.2, MessageLock now integrates with the Lockbin.com web service, allowing you to send secure messages to anyone. Download a trial
  • File recovery software. You can easily recovers files created by Windows. RecoveryDesk recovers files from hard disk and removable media . You can recovers files deleted without Recycle Bin or when Recycle Bin has been emptied, removed by virus attack or power failure and when the partition structure on a hard disk was changed or damaged.
  • Tetris tests logical connection more than most other arcade games. It requires much skill in arranging shapes which are made up of blocks. Our game Tetris - Red Point combines 3 game modes: Classic, a game with an opponent on the same computer and an unusual mode, Red Point. Unique feature of Red Point is an actual red point. This pattern heats blocks to a temperature at which they are simply burned. And all the achievements can be stored online,
  • Altova DatabaseSpy 2015 Professional Edition is the unique multi-database query, design, compare, and convert tool from the creators of XMLSpy. It connects to all major databases, easing SQL editing and other tasks much more affordably than single-database solutions. Features like table browsing, data editing, SQL auto-completion, visual table design, database comparison, database conversion, and more combine to liberate data management.
  • Altova DatabaseSpy 2015 Enterprise Edition is the unique multi-database query, design, compare, and convert tool from the creators of XMLSpy. It connects to all major databases, easing SQL editing and other tasks much more affordably than single-database solutions. Features like table browsing, data editing, SQL auto-completion, visual table design, database comparison, database conversion, and more combine to liberate data management.
  • 3 chibi Arena is the venue where you can thresh different enemies by choosing one of three characters carefully. Classic arcade-style control will quickly and easily allow you to deal with the first enemies, With Barbarian, you can chop enemies front and behind like cabbage with his long sword. This makes for breathtaking combat effectiveness. Mage is a classic magician who casts fireballs from his staff. Archers have such a clever Robin Hood, wh
  • The game Flappy Bird has become a legend! But what happens when you combine the mechanics of Flappy Bird with the world of Eric Cartman? This game is a symbiosis of these two places of worship. So what are you waiting for? Try this hilarious game filled with lots of parodies of your favorite heroes!
  • CAD Password is advanced and extremely fast password recovery tool for AutoCAD drawing files (*.dwg). Several attacks can be queued: dictionary based, brute-force, mixed (combinations of independent dictionary, brute-force and fixed parts). Advanced keyboard layouts-aware recovery technique, char replacement option, etc. Highly optimized code (SSE2, AVX) and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.
  • Gain full access to information stored in iOS, Apple iCloud, Windows Phone and BlackBerry 10 devices! Download device backups from Apple iCloud, Microsoft OneDrive and BlackBerry 10 servers. Use Apple ID and password, or extract binary authentication tokens from computers, hard drives and forensic disk images for acquiring iCloud data without a password. GPU-accelerated logical acquisition extracts information from password-protected backups.
  • This Program can: 1) Rename the Recycle Bin and the Control Panel. 2) Change the owner's name and organization name entered when installing Windows. 3) Add custom text next to the clock. 4) Create a window that will open before the user's selection. 5) Block: Shut down the computer, change the desktop, start the registry, auto-run CDs and launch Task Manager. 6) Hide: The control panel, search, and desktop icons.
  • After a long journey through forests, fields and caves, a special agent finally locates the mystical bloody lake. The game combines the elements of shooter, stealth and puzzle games with great graphics!
  • Hi! My name is Mr. Slim. Where is my breakfast? Where is my coffee with a delicious croissant? Where is my dessert? Would you like to solve block puzzles and get lot of berries? It's very funny! Each maze block puzzle need some experimental ideas. If you find solve of the puzzles, you get these delicious strawberries and unblock next puzzle. You will conduct Mr. Slim through levels of maze puzzles, to come up with complex combinations and show ag
  • Zip Password is advanced and extremely fast password recovery tool for WinZip archives with a standard Zip 2.0 (.zip) or new AES (.zipx) encryption. Several configurable attacks can be queued: Dictionary, Brute-force and Mixed (combinations of independent parts based on dictionary, brute-force or fixed). Virtually endless number of combinations for mixed attacks. Highly optimized code (SSE2, AVX, AVX2) and GPU (AMD, NVIDIA, Intel) utilization.
  • Capture anything you see on your PC screen! Don't waste time cropping your captures. Take a "snapshot" of anything exactly what you need, with just a click. Irreplaceable tool for Designers, Office Workers, Business People, Analysts, Technical Writers who have to describe interfaces, menus, buttons, etc. Easy to Learn, Easy to Use Using SnapIt Screen Capture Software takes just three simple steps: 1. Start the program (click on the program?s icon). It appears minimized in a system tray. 2. Click PrtScr (Print Screen) button and select with mouse what you need to capture on the screen. After selecting the region is automatically copied to the clipboard. 3. Save a snapshot from the clipboard with any way you like: * Open Microsoft Word and create new document. Press Ctrl+v combination and paste image from the clipboard to the document. Technical Writers often use this approach to describe program interfaces. * Open Photoshop. Create new image file or open existed image ...
  • Bitcoin Password by Thegrideon Software is advanced and extremely fast passwords recovery tool for encrypted Bitcoin-Qt/bitcoind Wallets (wallet.dat). Several attacks can be queued: dictionary based, brute-force, mixed (combinations of independent dictionary, brute-force and fixed parts). Virtually endless number of combinations. Highly optimized code (SSE2, AVX, AVX2) and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.
  • Word Password is advanced and extremely fast password recovery tool for MS Word 97-2016 documents and templates (new .docx, .dotx and old .doc, .dot). Several attacks can be queued: dictionary based, brute-force, mixed (combinations of independent dictionary, brute-force and fixed parts). Instant Write and Document Protection password recovery or removal. Highly optimized code (SSE2, AVX, AVX2) and GPU (AMD, NVIDIA, Intel) utilization.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware