Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Lighten PDF Converter helps you quickly convert PDF into 8 common document formats, including Microsoft Office (Word, Excel, PowerPoint), plain text, Rich Text Formats, csv and image format jpg. So you can get rid of the hassles of switching between PDF and the other document formats. Whatever you convert, Lighten PDF Converter Master will preserve the original text content, layouts, formatting, graphics as accurate as possible. Features: * Simple and Neat Interface Easy-to-use interface lets you view PDF files directly on the right side. It's the best choice to view a batch of PDF files. * Rich Choices of Output Formats A all-in-1 PDF Converter includes the major office document formats (docx, doc, xlsx, csv, pptx), rich text format(.rtf) plain text (.txt) and image (.jpg). * Flexible and Efficient Lighten PDF Converter can convert unlimited PDFs in extremely fast speed. You can convert only particular pages to free yourself from unnecessary waiting. Flexible output options for differ ...
  • Beautiful soap bubbles slide on top of PC desktop. Bubbles are moving from bottom to top of screen, pulsing and shining with all the rainbow colors. You can choose number of bubbles and its size, speed of bubbles movement and pulsing amplitude. Any picture file (BMP, JPEG and PNG files are supported) on your PC can be selected to use as background image, otherwise current Desktop background will be used (with all icons and opened windows on it).
  • Nevron Calendar is a powerful, yet easy to use app for showing and organizing appointments and recurring events. It is a combination between Microsoft Outlook Calendar and Google Calendar functionalities plus many more. Nevron Calendar helps you keep your busy day or company agenda well-scheduled and organized.
  • One of the leading values currently available in fleet management software. Designed to service large fleets, small fleets, and everything in between, our fleet management solution will track vehicle and driver statistics, maintenance records, fuel stats, and more. In-depth reporting gives you all the tools you need to make well informed decisions in a data driven world. We have a 5-star rating - let us show you why.
  • Atomic Clock - is a simple Windows Gadget that connect to atomic clock servers compare your local time with the current atomic time and shows difference between local computer time and actual time. You can also correct your PC's local time manually using Window Time/Date applet. Color changeable for all gadget's elements, including background.
  • Secure Eraser uses the most renowned method of data disposal and overwrites sensitive information in such a sure way that it can never be retrieved - even with specialized software. Our multiple award-winning solutions for definitively destroying data also eliminate any cross-references that could leave traces of deleted files in the allocation table of your hard drive.
  • Fast, accurate & powerful, 'Convert XLS' is the comprehensive Excel/CSV/TXT conversion tool. Convert to/from Excel, CSV, TXT etc. Batch able. Automate all your Excel processes easily. Repeat complex conversion tasks by restoring prior 'Conversion Jobs'. A 'Conversion Job' consists of all 'Conversion Tasks' that you specify to be done within the 'Convert XLS' user interface. It's the best Excel conversion tool you've never tried, until today.
  • With this Weather Monitor you can get the latest local current weather conditions and weather forecasts including temperature of the day, feels like, humidity, visibility, pressure, wind speed, wind direction, precipitation, sunrise, sunset, and more.
  • Battery Monitor especially make for laptop gadget for monitor your current battery consumption and power status from the desktop. Allow to change power scheme. Save settings to file. (File will be created - Path: %APPDATA% File: gadgetname_Settings.ini). Color changeable for all gadget's elements, including background.
  • Offline folder files (OST) are highly useful for MS Outlook users. They allow users to access emails and other mailbox items during unavailability of internet. But, vulnerability towards corruption is a major drawback of OST files. Corrupt OST files can interrupt entire Outlook email communication. To recover them and to convert in PST file format, use a professional software like Recoveryfix for OST to PST Converter. It?s an advanced software programmed for resolving all OST corruption problems. The software operates in dual data recovery mode ? Standard mode and Advanced mode. Standard Mode ? is programmed to perform accurate recovery of corrupt OST files in a very short span of time. It ensures desired results in minimum time. Advanced Mode ? If Standard mode fails to provide desired results, users can try using Advanced mode. It?s little slower than the Standard mode but ensures accurate and complete recovery. After successful recovery of OST files, the tool provides detailed preview of all reco ...
  • HR Tracking Database Software for employee and job information for businesses. HR Database Software by DB-Pros, Inc. was designed to administer HR and employment data with instant results, while maintaining the accuracy and security that is required for modern business. It is an ideal solution for small to medium sized organizations and growing businesses alike.
  • Publish your own secure website directly from your PC and remotely access your images, documents, videos, and music, or securely share them with your friends, family, and co-workers.
  • Hardwipe is a free data sanitization toolset used by activists, journalists, IT technicians and anyone needing to ensure that discarded, but sensitive, information can never be recovered by someone else. Hardwipe provides a slick user interface with optional support for 'right-click' context menus in Windows File Explorer. Use Hardwipe to conveniently and permanently erase (or 'hard wipe') data on disk and portable storage media.
  • The Network Monitor II (wired and wireless) will show you SSID, signal quality, Internal IP address, External IP address with your country flag when you are connected to the internet, network utilization, upload speed, download speed and total (both current session and global) of usage. It does not require any 3rd party applications. Resazible!
  • Managed software deployment for corporate networks. Total Software Deployment makes deploying software on any number of computers a blast. Software inventory management, automatic network scanning, and concurrent deployment of multiple types of installation packages make TSD a clear winner among remote deployment tools. Unlike competition, this tool supports advanced concurrent deployment, allowing to install multiple packages on multiple PCs.
  • Active@ Hard Disk Monitor is a disk utility that monitors the status of your hard drives and scan for bad sectors. It is based on the Self-Monitoring Analysis and Reporting Technology. This utility monitors HDD SMART parameters like Temperature, Head Flying Height and Spin-Up Time to notify a user if critical conditions occur. Disk Monitor also displays hard disk drive geometry, time of usage and the overall status of the disk's health.
  • Break Access Security software to break access password, break mdb security so as to open & re-use secured access database MDB files. Take a look on easy MDB Key tool to break access security to unlock Access database & break mdb password security. Break access security from MS Access 95/97/2000/2002/2003 database. If your password has been lost or forgotten, get MDB Key to break access database password to open secured access database instantly.
  • The EaseFilter file protector can protect your files being accessed by unauthorized user. With the EaseFilter file protector you can control the file activities on file system level, capture file open, create, overwrite, read, write, query file information, set file information, query security information, set security information, file rename, file delete, directory browsing and file close I/O requests.
  • Audit file access and change in Windows in Real-Time.Monitor the file activities on file system level, capture file open, create, overwrite, read, write, query file information, set file information, query security information, set security information, file rename, file delete, directory browsing and file close I/O requests.You can create the file access log, you will know who, when, what files were accessed.
  • Take a look on Microsoft Access Password Recovery tool to quickly recover microsoft access password. Microsoft Access Password Recovery tool recovers ms access password from password protected access database. Microsoft Access Password Recovery software help users to unlock, unprtect & unsecure mdb files of MS Access 2007/2003/2002/2000/97 database. Get MS Access Password Recovery to recover MS Access password & unlock Access database.
  • Unlock Access database with Access Database password remover tool by removing access database password instantly. Remove access database password from MS Access 95/97/2000/2002/2003 with MS Access database password remover tool. If your password has been lost or forgotten, try using Access database password removal solution to remove mdb password from password protected MDB file so as to open & break access security easily.
  • Locate Mouse Position on Screen with Freeware Mouse Locator Utility for Windows. The Location of Mouse Cursor is displayed in term of X and Y Co-Ordinates updated automatically at 200 milli seconds. The Mouse Locator Window stays on top of other Windows and can be moved around the screen with Title Bar. Small & Easy Utility to get the Mouse Cursor Position without any configuration. Download for free and enjoy the functionality offered.
  • BizCrypto for SQL Server lets you secure the data in your MS SQL Server Integration Services scripts. The product includes SSH, SFTP, FTPS, OpenPGP, AS2, SMTP, POP3, S/MIME, PGP, PKI, PDF, XML, ZIP connections and tasks.
  • The MD5 message-digest algorithm is a widely used cryptography hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptography applications, and is also commonly used to verify data integrity.SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal
  • NetstatWrapper Tool Readme File NetstatWrapper Tool: NetstatWrapper is a small windows GUI tool that can be use to run netstat command using UI. With this small tool you can run some of the netstat command line tool and see the result in Notepad, or any other configure text viewer tool. This version Support the Following Commands: 1. an List all connection and ports as number 2. anb List all connection and ports as number with the involve exe 3. ano List all connection and ports as number with the process id 4. r Show Ethernet statistics and perprotocol statistics 5. es Show the current routing table How To Use: 1. Start NetstatWrapper.exe 2. If you get a User Account Control (UAC) allow it to run Press on Yes. 3. Select the netstat command you want to use. 4. Optional: You can select a text viewer that will show the output command data. 5. Press the Run button to execute the command. 6. A text file will be open with the command result.

Page 8 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware