Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Binary Uptime refers to the time during which a system is working without failure and has had zero downtimes. Over a period of time, a system can end up slowing down or breaking down due to excessive usage. One way of checking the current uptime of the system is through the Performance tab of the task manager and via the command prompt. However, one might need more information to get a better comparison of system performance by checking the uptime from numerous intervals. System Uptime Full Plus is a Windows Gadget that displays the system uptime from the time of system installation, current uptime and uptime of the last time the system was used. It also displays some general information, including operating system type, version, date and time of operating system installation. This way you can compare your system?s uptime since the first time the OS was installed to the last and current usage. The gadget also displays the date and time of the last system usage which can be quite handy to track if the system i ...
  • Atomic Clock - is a simple Windows Gadget that connect to atomic clock servers compare your local time with the current atomic time and shows difference between local computer time and actual time. You can also correct your PC's local time automatically or manually using Window Time/Date applet. The interface of the tool is based on a small window where you can check out the local and service time and date, along with the difference between them. Atomic Clock can also guide you if you want to synchronize the local time with the server time. From the 'Settings' area you can change the layout size and make the app get the time from the server at a custom interval, as well as change the time and date format. In addition, you can disable sounds, enable update notifications, hide the title and copyright text, as well as customize colors for the interface (e.g. background, local time, synchronize, error messages). Options provided by the operating system let you move Atomic Clock anywhere ...
  • Play free Dolphin Checkers with traditional rules, you must jump if possible. Make your move and king me! Increase your ranking playing at easy, medium, and hard skill levels to become a Checkers master! Checkers, also called Droughts or straight checkers, is a form of the checkers board game played on an 8x8 board with 12 pieces on each side that may only initially move and capture diagonally forwards.
  • Medical Tests Meaning. What does the test result mean? SmrtX Medical Tests Analyzer automates, organizes, and explains complex patient's laboratory tests for tracking crucial information required for making quick and prudent lab test analysis. Medical Tests Analyzer can explain what every test means and what it checks for. The main goal of this software is to help you spot certain "signs" on the lab report to ask your doctor about.
  • MakeGIF creates animated GIFs from command line in batch mode. It is a visual command line processor. You can use pictures created by MS Paint, Adobe Photoshop etc. MakeGIF has optimization tools for making your GIFs smaller. You can add hidden signatures to your GIFs to protect them from unauthorized use on the Web and check presence of your signature. Also you can create GIFs with fixed sizes (for example, for mobile phone screens).
  • Auto Shutdown Windows 8 is the most enhanced software on Windows platform that helps you to turn off your personal computer automatically. This utility has various powerful program that designed by the most experience professionals of best organization in the globe. Features of Auto Shutdown Windows 8 Software are below: 1) Efficient software that can perform on different Windows platforms (including Win 8, Win Vista, Win 7, Win XP and so forth). 2) By making use of this software, you can perform various tasks such as you can schedule your computer to shutdown in particular time, restart, or log off your computer. 3) It is very safe and secure application that comes up with free of cost and will not make any destruction to other programs as well. 4) It has most advanced algorithms that help you to shutdown your PC in just a couple of minutes. 5) The Graphical User Interfaces of this application are very effective and simple to use that can operate by all levels of computer users. To get more informatio ...
  • ExEinfo PE Win32 bit identifier by A.S.L. - exe pe checker for packers ,exeprotectors ,packer detector with solve hint for unpack . Internal zip ripper exe pe ripper ... VBasicfake sign added. .NET detector , analyze executable. Non executable file detection.
  • Use Outlook Duplicate Email Remover to search and remove email duplicates. It can handle thousands of emails at one instance, and you have the ability to manually check everything that has been detected and to cancel or remove found duplicate emails.
  • Use Outlook Duplicate Contact Remover to search and remove contact duplicates. It can handle thousands of contacts at one instance, and you have the ability to manually check everything that has been detected and to cancel or remove found duplicate contacts.
  • Computer Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Update Drivers on Windows can efficiently update all Drivers on Windows OS based computer. By using this tool you can update your sound drivers, wireless Drivers, video card Drivers and USB Drivers etc. Driver updater Windows supports all latest versions of Windows Operating Systems like Windows 8, Windows 7, XP and Vista etc. This utility is the best solution for all your Windows OS driver problems. You can use this driver updater tool in various situations like when you're peripheral Drivers not working like mouse, scanners, printers etc, computer unable to identify any internal or external Drivers and display drivers are stopped responding etc. Best advantage of this application is it scans your whole system and check missing and expired device drivers and also it increase PC performance by updating device drivers. It comes with good user friendly interface so that everyone can understand easily how to work with software. This effective utility is offered in demo version, which allows you to test ...
  • SSE Setup is a free, easy to use, install creator ( setup builder ) to make installers for your software. Unlike many other products, it's full-featured, trusted, mature, and incredibly easy! Create your installer in minutes, not days. Makes small EXE's/ZIP's or burn to CD/DVD. All the basics plus multi-language, Internet updating, detailed prerequisite checks, 64-bit, non-admin, Microsoft Access deployment, more! SSE: Simple, Smart, Easy!
  • Our simple email reminder add-in works in the following way - it sends you an email reminder to your email (which can be checked on your smart phone) reminding you of your appointment. This can be customized to send emails if your pop up reminder was not dismissed within ten minutes, or has been flagged as high priority.
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Malicious File Hunter, or MFH for short, is a security software that runs on Windows and allows IT Security Administrators to search for the presence of one or multiple files across their entire network of Windows systems. For example, if a known malicious file is found on one computer, an IT Administrator can use MFH to check if any other system on the network is infected with the same malware. Search query is based on full, partial or wild card
  • All-In-One Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • System Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to a specified email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Computer Auto Turn Off Software is a tool which can turn off your computer or laptop automatically when it is not being used. With the help of this outstanding program you can save the power because it will turn off the computer automatically when you do not need, instead of sleep mode. This amazing utility is very much beneficial for the people who use laptop because it saves the energy of battery by turn it off automatically. Generally people used to keep their system idle while downloading large files so in such case if you are downloading completed early and you are checking after 2 hours then waste of power happens for 2 hours. So in such kind of cases Computer Auto Turn Off Software will be very helpful for you. The automatic shut down procedure can set on different file system such as NTFS, NTFS5 and ReFS. Computer Auto Turn Off Software supports Windows 8, 7, vista, XP and 2003. It has very easy user interface so that users can use if without facing a single difficulty. So if you are thinking that th ...
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Track items that you check in and out in large quantities. This package contains databases with the minimum number of data fields. You can use the solution in the form provided (simple form) or you can easily customize it (add data fields).
  • In this game you will be presented with a shape made with lines on a grid. You need to recreate the same shape either flipped or rotated or flipped and rotated according to the instructions. You create the shape by dragging the lines to the dots on the grid. After you have finished the shape you click the \"finished\" button to have your answer checked. If you are correct you can go to the next level and if you are wrong the game will be over. Th
  • 360 Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Power PC Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.

Page 6 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware