Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Power Spy for Home secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Whenever you face any data loss situation from Mac volumes then do not get panic instead download and install SFWare Partition Recovery Mac software in your Mac system. This recovery tool has the ability to recover data from deleted, lost or formatted data. It is developed with high technology algorithm which will easily restore data without any modification. No matter how severe is your data loss situation, this tool has the ability to sort all issues associated with data stored in Mac volumes. This tool has many inbuilt features that makes very unique tool as compared to others. It can recover data that was emptied from trash without any difficulties. Data can also be found from missing or deleted volumes. This tool has the ability to identify around 300 types of files and recovers it on the basis of its unique signature. It has the capability to recover files from hard drives, memory cards, USB drives and many more. You can also add or edit new signature of files that are not listed. Why SFWare Partitio ...
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • The main difference between UnHackMe and other antirootkit software is its detection method. Precise double-checking for a Windows-based PC, which allows identifying and eliminating any types of malicious software. Instant tracking of malicious code in the system. UnHackMe was initially created as anti-rootkit software, but currently it eliminates all types of malicious software: rootkits, Trojans, worms, viruses and so on.
  • If you are finding it difficult to check the time in the taskbar, you can use a sidebar gadget such as Talking Clock. The Talking Clock is a unique Windows sidebar gadget that does as it says. It has the ability to tell you what time it is in a loud and clear voice. When you have installed it, it will display a digital clock on the side as well as the date for convenience.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Classical Checkers. Featuring....Funny balls! Starts off as an ordinary ball, but later he becomes a general! Fun game for a young Checkers amateur.
  • Hotel booking software with graphical reservation schedule, suitable for guesthouses, holiday homes, inns, motels and other logding establishments; Software allows managing of rentable units, guest management, creating offers/confirmations/invoices, planning of seasonal prices, managing additional services/packages/arrangements; incl. cashbook, statistics, cleaning lists, check in/out lists, and optional online booking system.
  • You want to know just how patient you are? Do you want to check your own feelings of anger? If you answered yes, then this game is for you. Work through difficult puzzles, to test your eyes and your luck The aim of the game is simple - you need to get a shot at the synapse. However, there will be hurdles that will make you tense.
  • Computer Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Schedule your rooms, employees and other resources with our all-in-one solution for generating quotes, invoices and reports. Link tasks, employees, equipment and other items from the user-defined database. Automatically check for conflicts on all linked items. Get an instant job costing as soon as the job is created. Print invoices per job, client or project, and much more...
  • Stratego is a military strategy board game for two, with a checkered playing field of 10 X 10 with 40 closed figures on each side. The figures are represented by cut cylinders. Thr cut side of the cylinder faces the player and displays the rank of the piece. The rank of enemy figures is revealed during attack. The goal is to detect and capture the enemy's flag. The history of the game: Stratego has its roots in medieval China.
  • The MD5 message-digest algorithm is a widely used cryptography hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptography applications, and is also commonly used to verify data integrity.SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal
  • Full-featured lottery software with predictive technology. Since 1989. This program uses neural networking technology to find a pattern to prior draws. Also features universal lottery playslip printing functions, 7,000 wheels, lottery number checking utility, context-sensitive help system, full-range import utilities (including web scraping technology), virtual lottery capability. Installer file has been digitally signed by Verisign.
  • System Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to a specified email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • SFWare Deleted File Recovery Mac software is a hassle free recovery tool that can easily and swiftly get back all deleted files. This software is specially designed to solve problems related to Mac Operating system. It can effortlessly restore deleted or lost files within 3-4 easy steps. It can easily restore files that emptied from Trash. This utility is designed in such a way that it can locate and retrieve deleted files from missing volumes of Mac OS. Apart from this it can also get back files from formatted volumes within few minutes. It is very easy to use so that user of all levels can execute it without any hurdles. SFWare Deleted File Recovery Mac utility works on read only mode thus it recovers file without any damage to actual content and that to with its original name. It supports recovery of files from HFS+, HFSX, FAT16 and FAT32 volumes/partitions. This recovery tool has the ability to rescue files on basis of its unique signature. It can recover deleted and lost files from internal and external ...
  • You often need to use documents (files, data tables or emails) that must meet specific constraints of content. If these documents' compliance was until then a binding task, meltingSquare Checker allows now you to automatically check them according to your own validation rules. Save valuable time to your teams and guarantee the quality of their work with this simple and scalable solution.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Have you got any doubts or concerns about productivity of your employees? Do you need to check on productivity of certain people in your company? Are you looking for a way of exposing exports of confidential data and information from your web?
  • Secure Hunter Error Code is a small windows GUI tool that can convert error numbers into a readable text message. The current version can convert error code numbers from the following software. 1. Window Error Code. 2. HTTP/HTML Error Code. 3. Event Log Error Code. 4. Linux(errno) Error Code. 5. Win Sock Error Code. 6. Secure Log Error Code. 7. Oracle Database Error Code. 8. MySQL Database Error Code. 9. MSSQL Database Error Code. 10. DB2 Database Error Code. Please Note: The error massage text may be change between software versions. How To Use: 1. Start SecureHunterErrorCode.exe 2. If you get a User Account Control (UAC) allow it to run - Press on Yes. 3. Enter the Error Code number you want to check/convert to string. 4. Select the error type (windows, HTML, MSSQL etc). 5. Press the Get button to see the error code message translation. 6. If needed you can copy the error message from the Error Message box.
  • Check out our new arcade battle tank shooter, BattleGround3D. There are 36 levels, each with different tasks and enemies. Evade air strikes and other hazards! Between battles, you can improve and upgrade your tank. There is also an opportunity to create a battle with set rules or against each other!
  • AgataSoft Auto PingMaster automates the process of diagnosis, in order to maintain normal operation of the network. With this easy-to-use and useful program, you will be able to automatically check the status of your Internet connection. This tool quickly displays the connection statistics, so you can easily find any problem areas in the network. Key features include: Automatic verification of one or more IP addresses and domain.
  • Power Spy (Supports x64/x86) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches, microphone and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware