Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Power Spy for Home secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Address Validator (USPS address verification, international address validation): a free, easy-to-use tool to check any U.S., Canadian or international address (free for 100 addresses): + Verify U.S. and Canadian addresses (USPS/CASS certified) + Validate international addresses in 240+ countries worldwide + Address correction, standardization and re-formatting according to international standards.
  • Handy Library Software for Windows. Library management software for small school, public, corporate libraries. Easily catalog all library collections from the web using ISBN number, manage serials, manage member information, keep track of the library check-in and check-out transactions, process inventory audit. Print library circulation reports. Print library inventory reports. Define circulation rules, and more.
  • Verify thousands of email addresses with a single line of code. The .NET Email Validation Library checks syntax, performs MxRecord lookups, and validates mailboxes. Validate asynchronously over multiple processors. The library detects curse words, checks domain typos, checks top level domains and detects fake email patterns. Also detects grey listing and blocking by anti-spam software. Download a free trial today.
  • ApPHP DataValidator is a simple lightweight tool useful for primary general data checks. It handles numbers, strings, emails, URLs. A range of parameters is provided for a wide variety of different verifications. All parameters are used optionally and could be switched on and off for every specific value. The DataValidator component accepts an array or an object as data container.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Computer Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Basics for VB is a set of binary string and bit manipulation functions for VB5 / VB6. It contains the equivalent of DOS Basic's MKI$ CVI series for creating binary strings plus functions to check or set bits, to check or set bit fields and to check or set flags. There are also function to return the unsigned values of VB integer and long integers and functions to display byte, integer or long variables as a string of ones and zeros.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • System Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to a specified email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Barcodes are machine-readable symbols that represent data that allows businesses worldwide to track and inventory products.Programmers ensure that barcodes are error-free before they are stamped or printed on products. By checking your barcodes, you'll avoid printing errors, saving time and money. A Barcodes is simply gadget for barcodes checking.
  • Tool & Asset Manager will help you to keep track of your tool and asset inventory. Check in/out your assets to personnel and always know who to call to get an asset back. Get notified when an asset is overdue. Create reservations so you won't check out an asset accidentally when it should be kept in store for someone else. Easily create and print barcode labels for your assets, personnel, replacement parts and inventory locations.
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Perfect Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Whenever you face any data loss situation from Mac volumes then do not get panic instead download and install SFWare Partition Recovery Mac software in your Mac system. This recovery tool has the ability to recover data from deleted, lost or formatted data. It is developed with high technology algorithm which will easily restore data without any modification. No matter how severe is your data loss situation, this tool has the ability to sort all issues associated with data stored in Mac volumes. This tool has many inbuilt features that makes very unique tool as compared to others. It can recover data that was emptied from trash without any difficulties. Data can also be found from missing or deleted volumes. This tool has the ability to identify around 300 types of files and recovers it on the basis of its unique signature. It has the capability to recover files from hard drives, memory cards, USB drives and many more. You can also add or edit new signature of files that are not listed. Why SFWare Partitio ...
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • If you are finding it difficult to check the time in the taskbar, you can use a sidebar gadget such as Talking Clock. The Talking Clock is a unique Windows sidebar gadget that does as it says. It has the ability to tell you what time it is in a loud and clear voice. When you have installed it, it will display a digital clock on the side as well as the date for convenience.
  • The MD5 message-digest algorithm is a widely used cryptography hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptography applications, and is also commonly used to verify data integrity.SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal
  • SFWare Deleted File Recovery Mac software is a hassle free recovery tool that can easily and swiftly get back all deleted files. This software is specially designed to solve problems related to Mac Operating system. It can effortlessly restore deleted or lost files within 3-4 easy steps. It can easily restore files that emptied from Trash. This utility is designed in such a way that it can locate and retrieve deleted files from missing volumes of Mac OS. Apart from this it can also get back files from formatted volumes within few minutes. It is very easy to use so that user of all levels can execute it without any hurdles. SFWare Deleted File Recovery Mac utility works on read only mode thus it recovers file without any damage to actual content and that to with its original name. It supports recovery of files from HFS+, HFSX, FAT16 and FAT32 volumes/partitions. This recovery tool has the ability to rescue files on basis of its unique signature. It can recover deleted and lost files from internal and external ...
  • You often need to use documents (files, data tables or emails) that must meet specific constraints of content. If these documents' compliance was until then a binding task, meltingSquare Checker allows now you to automatically check them according to your own validation rules. Save valuable time to your teams and guarantee the quality of their work with this simple and scalable solution.
  • Have you got any doubts or concerns about productivity of your employees? Do you need to check on productivity of certain people in your company? Are you looking for a way of exposing exports of confidential data and information from your web?
  • Secure Hunter Error Code is a small windows GUI tool that can convert error numbers into a readable text message. The current version can convert error code numbers from the following software. 1. Window Error Code. 2. HTTP/HTML Error Code. 3. Event Log Error Code. 4. Linux(errno) Error Code. 5. Win Sock Error Code. 6. Secure Log Error Code. 7. Oracle Database Error Code. 8. MySQL Database Error Code. 9. MSSQL Database Error Code. 10. DB2 Database Error Code. Please Note: The error massage text may be change between software versions. How To Use: 1. Start SecureHunterErrorCode.exe 2. If you get a User Account Control (UAC) allow it to run - Press on Yes. 3. Enter the Error Code number you want to check/convert to string. 4. Select the error type (windows, HTML, MSSQL etc). 5. Press the Get button to see the error code message translation. 6. If needed you can copy the error message from the Error Message box.
  • iKeyMonitor iPhone Spy App is an invisible spy app for iPhone/iPad/iPod touch that logs keystrokes, passwords, calls, SMS, WhatsApp/Skype/Viber/Line/Kik/Hangouts/Facebook messages, GPS locations, websites and screenshots, and it will automatically send the logs to users by email or FTP. What does iKeyMonitor iPhone Spy App do? 1. iKeyMonitor records passwords entered and keystrokes typed on the targeted iOS device. 2. Call logging is available as well. Users can see the phone numbers, call durations and time stamps. 3. The iPhone spy app for iOS devices not only tracks incoming and outgoing text messages, but also records WhatsApp/Skype/Viber/Line/Kik/Hangouts/Facebook messages sent and received. 4. It also offers information of the GPS locations of the iOS device. 5. Another feature is websites history tracking. This invisible spy app for iPhone and iPad logs all the websites visited in Safari and shows users the URLs, time and titles. 6. What's more, it will take screensho ...
  • All-In-One Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.

Page 3 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware