Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Features include: System Details Report (hardware and software), Strong Password Generator, Reboot Operations Report, File Hash Generator, Alternate Data Stream (ADS) Analysis, File Analysis Module, Find Files By Type (Content), Browser Cache Image, Movie and URL Analysis, Tor Browser detection, integrated context-sensitive help, free for home and commercial use, constantly updated with new modules. The software is digitally signed.
  • Averatec Drivers Update Utility updates your system drivers for Averatec Laptops automatically. It will scan your system first then download and install Averatec official drivers to let your Averatec Laptop work properly. The Averatec Driver Update Utility keeps your Averatec laptop Windows system up-to-date. It detects which driver updates are relevant to your computer, and then helps you install them quickly and easily.
  • Video surveillance and motion capture software. Supports unlimited number of cameras. Some key features are: unlimited cameras (including IP and USB cameras), motion detection, adjustable sensitivity for each zone, record on detection, record on schedule, password protection, SMS and MMS and Email alerts.
  • W32/NgrBot Free Virus Removal Tool will detect and remove W32/NgrBot Trojan completely, from your system. Download cleanngrbot.exe and save it in a temporary directory. Double click on cleanngrbot.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/NgrBot Trojan from your computer.This virus removal tool will detect and remove W32/NgrBot Trojan and its variants from your computer. It is a Windows based free virus removal tool designed by Proland Software Pvt Ltd. Download Protector Plus Anti-Virus Software trial version by clicking on Download Protector Plus button on the right hand side of the utility.
  • Acer Drivers Update Utility updates your system drivers for Acer devices automatically with just several clicks. It will scan your system first then download and install Acer official drivers to let your Acer device work properly. The Acer Driver Update Utility keeps your system up-to-date. It detects which driver updates are relevant to your computer, and then helps you install them quickly and easily.
  • Stratego is a military strategy board game for two, with a checkered playing field of 10 X 10 with 40 closed figures on each side. The figures are represented by cut cylinders. Thr cut side of the cylinder faces the player and displays the rank of the piece. The rank of enemy figures is revealed during attack. The goal is to detect and capture the enemy's flag. The history of the game: Stratego has its roots in medieval China.
  • Digital video monitoring. Allows you to observe by WEB-Camera. You can save by motion detector then view it, convert to AVI file. Very useful when you are out of home and want to see for your childs.
  • AnyMP4 Free iPhone Data Recovery for Mac is the versatile and most safety program, it allows users to recover deleted files from iOS Device like iPhone 6/6 Plus/5s/5c/ 5/4S, iPad 4/2, iPad Air/2, iPad mini/mini 2/3, iPad 1 and iPod touch 5. Moreover,you can also recover Camera Roll, Photo Stream and Voice Memos from iPhone 4, iPhone 3GS, iPad 1 and iPod touch 4. Besides, with this amazing Free iPhone Data Recover you are able to take out files from iTunes Backup. Key Functions 1. Directly recover lost files from your device The free program works perfectly on Mac for you to recover lost Notes, Reminder, Safari bookmark from iPhone iPhone 6/6 Plus/5S/5C/5/4S, iPad Air/mini 2/3/mini, The new iPad, iPad 4/2, iPad 1 and iPod touch 5, iPod touch 2. Except the three data types, you can also recover Camera Roll, Photo Stream and Voice Memos from iPhone 4, iPhone 3GS, iPad 1 and iPod touch 4. 2. Retrieve files from iTunes Backup You can freely get your lost data back from your iTunes Backup File. Deleted and e ...
  • Remotely monitor your webcam, your desktop, or your microphone with this powerful all-in-one surveillance tool. Features include motion detection , sound detection, and secure website publication with access to live video, and all detected activity.
  • Automatic Website Builder is the most advanced automatic web page generator and AdSense site builder for creating, publishing, managing and monetizing new and existing websites with the help of Google AdSense and other PPC and affiliate programs. Automatic website generator enables you to build self-updating blogs, profitable pay-per-click pages, undetectable cloaking portals, affiliate directories and other sites for virtually unlimited revenue.
  • The Alarm Clock program is exactly what it sounds like. You may enter text to display when the alarm sounds and also pick your own alarm sound. This program can be used in cooking, meetings, and any other task that would require a wake-up or general reminder. The detector window is automatically displayed in the middle of the screen and on top.
  • The main difference between UnHackMe and other antirootkit software is its detection method. Precise double-checking for a Windows-based PC, which allows identifying and eliminating any types of malicious software. Instant tracking of malicious code in the system. UnHackMe was initially created as anti-rootkit software, but currently it eliminates all types of malicious software: rootkits, Trojans, worms, viruses and so on.
  • FoneCopy can copy your iPhone Music, Movies, Photos, Contacts and more other files to the other Apple device. It can detect more than 2 devices simultaneously. Don't be afraid of losing data if your iPhone is dead or broken, FoneCopy can sync the files on your iPhone/iPad/iPod to another one with fast speed. It also allows users copy file from Android devices to iOS devices. It can supports devices such as iPhone 6/6 Plus, iPhone 5S/5C, iPad mini 2, iPad Air, iPod touch 5 and so on. Moreover, it compatible with the new iTunes 12.1. Key Features: 1. Transfer files between any two Apple devices With this free powerful software, you can copy your iPhone files to another device such as iPhone 6 or iPad Air. This FoneCopy software makes it possible to backup Text content(3 types) and Media content(13 types) from one Phone to another, even from the dead or broken one. 2. Copy files from Android devices to iOS devices Do you want to copy files from your Android device to the new iPhone? Fonecopy can ...
  • Protector Plus Free Windows Vulnerability Scanner is compatible with Windows 7 ,Windows Vista, Windows XP, Windows 2000, Windows 98, Windows NT, Windows Server 2003, Windows Server 2008. Once the Scan is completed, Protector Plus - Windows Vulnerability Scanner lists the vulnerabilities detected, their risk level and the download location of the patch. It also creates the log file named Protector_Plus_Windows_Vulnerability_Scan.htm in the folder from where Protector Plus - Windows Vulnerability Scanner was executed.
  • MDT FileRecovery PRO for Windows provides the ability to effectively detect and recover files lost due to accidental deletion, disk formatting, virus and other reasons. MDT FileRecovery PRO is an easy-to-use program with a Graphical User Interface without technical skill requirement through the whole recovery process. Lost files recovery is 100% Safe, Secure and Guaranteed!
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • COVERT Pro - an innovative solution to ensure total privacy while working at the computer. Protecting against spyware programs by masking action of computer user. Its essence is to create a secure platform in which any user can run their applications, while remaining invisible to the spies. COVERT Pro blocks reading the keyboard input and monitor screen and allows you to see all system drivers, active processes and system services to detect and
  • W32/Dofoil Free Virus Removal Tool will detect and remove W32/Dofoil Trojan completely, from your system. Download cleandofoil.exe and save it in a temporary directory. Double click on cleandofoil.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/Dofoil Trojan from your computer.This virus removal tool will detect and remove W32/Dofoil Trojan and its variants from your computer. It is a Windows based free virus removal tool designed by Proland Software Pvt Ltd. Download Protector Plus Anti-Virus Software trial version by clicking on Download Protector Plus button on the right hand side of the utility.
  • W32/Darkkomet Free Virus Removal Tool will detect and remove W32/Darkkomet Trojan completely, from your system. Download cleandarkkomet.exe and save it in a temporary directory. Double click on cleandarkkomet.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/Darkkomet Trojan from your computer.This virus removal tool will detect and remove W32/Darkkomet Trojan and its variants from your computer. It is a Windows based free virus removal tool designed by Proland Software Pvt Ltd. Download Protector Plus Anti-Virus Software trial version by clicking on Download Protector Plus button on the right hand side of the utility.
  • Ultimate Keylogger is advanced all-round monitoring solution. It monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites. Ultimate Keylogger is completely undetectable. Process is hidden from task manager. Files are not visible. Ultimate Keylogger displays reports in web format or sends zip-compressed and encrypted activity reports invisibly via Email, FTP or LAN.
  • Clean-up remote PCs from malware can be performed in the automatic mode and is invisible for remote user and doesn't require interruption of his work. PC protection engine shows notification in case of disabled virus protection. -File system and registry clean-up from detected malware -Put malware to quarantine before removing it -Restoring data from quarantine by request
  • Remote Logger is a professional remotely deployable keylogger, the best solution for monitoring your whole network. Remote Logger runs silently at the lowest level of Windows to prevent the monitored users from removing the software. Remote Logger intercepts all user names and passwords, in complete stealth mode! Remote Logger records all computer activities including keystrokes, internet history, chat convos etc. See more: www.remotelogger.com
  • Excel Recovery is a new generation recovery tool, which has been designed to restore deleted XLS or XLSX files, created in any version of Microsoft Excel with unprecedented efficiency even if your file system is damaged and your hard drive is almost dead. Using a list of signatures associated with MS Excel format, in scans disk surface, detecting the beginnings and endings of every XLS file, resurrecting file contents and other necessary data.
  • Undelete and recover Microsoft Word files from healthy and damaged hard disks. Working in two steps, it firstly gathers information from a file system, then it addresses hard disk directly to detect MS Word document, that are not represented in a file system due to different reasons. Having both scan results in its disposal, Word Recovery syncronizes them to obtain a list of MS Word documents to be recovered with their contents and file names.
  • Inactive Users Tracker automates the management of inactive user accounts. The program periodically checks all user accounts in specified domains, reports to you, and automatically disables all accounts inactive for more than a specified number of days. To detect inactivity, the tool checks the "lastLogon" attribute of accounts on every domain controller, thus guaranteeing a correct calculation of the last logon time.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware