Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Remotely monitor your webcam, your desktop, or your microphone with this powerful all-in-one surveillance tool. Features include motion detection , sound detection, and secure website publication with access to live video, and all detected activity.
  • Automatic Website Builder is the most advanced automatic web page generator and AdSense site builder for creating, publishing, managing and monetizing new and existing websites with the help of Google AdSense and other PPC and affiliate programs. Automatic website generator enables you to build self-updating blogs, profitable pay-per-click pages, undetectable cloaking portals, affiliate directories and other sites for virtually unlimited revenue.
  • The Alarm Clock program is exactly what it sounds like. You may enter text to display when the alarm sounds and also pick your own alarm sound. This program can be used in cooking, meetings, and any other task that would require a wake-up or general reminder. The detector window is automatically displayed in the middle of the screen and on top.
  • The main difference between UnHackMe and other antirootkit software is its detection method. Precise double-checking for a Windows-based PC, which allows identifying and eliminating any types of malicious software. Instant tracking of malicious code in the system. UnHackMe was initially created as anti-rootkit software, but currently it eliminates all types of malicious software: rootkits, Trojans, worms, viruses and so on.
  • FoneCopy can copy your iPhone Music, Movies, Photos, Contacts and more other files to the other Apple device. It can detect more than 2 devices simultaneously. Don't be afraid of losing data if your iPhone is dead or broken, FoneCopy can sync the files on your iPhone/iPad/iPod to another one with fast speed. It also allows users copy file from Android devices to iOS devices. It can supports devices such as iPhone 6/6 Plus, iPhone 5S/5C, iPad mini 2, iPad Air, iPod touch 5 and so on. Moreover, it compatible with the new iTunes 12.1. Key Features: 1. Transfer files between any two Apple devices With this free powerful software, you can copy your iPhone files to another device such as iPhone 6 or iPad Air. This FoneCopy software makes it possible to backup Text content(3 types) and Media content(13 types) from one Phone to another, even from the dead or broken one. 2. Copy files from Android devices to iOS devices Do you want to copy files from your Android device to the new iPhone? Fonecopy can ...
  • Protector Plus Free Windows Vulnerability Scanner is compatible with Windows 7 ,Windows Vista, Windows XP, Windows 2000, Windows 98, Windows NT, Windows Server 2003, Windows Server 2008. Once the Scan is completed, Protector Plus - Windows Vulnerability Scanner lists the vulnerabilities detected, their risk level and the download location of the patch. It also creates the log file named Protector_Plus_Windows_Vulnerability_Scan.htm in the folder from where Protector Plus - Windows Vulnerability Scanner was executed.
  • MDT FileRecovery PRO for Windows provides the ability to effectively detect and recover files lost due to accidental deletion, disk formatting, virus and other reasons. MDT FileRecovery PRO is an easy-to-use program with a Graphical User Interface without technical skill requirement through the whole recovery process. Lost files recovery is 100% Safe, Secure and Guaranteed!
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • COVERT Pro - an innovative solution to ensure total privacy while working at the computer. Protecting against spyware programs by masking action of computer user. Its essence is to create a secure platform in which any user can run their applications, while remaining invisible to the spies. COVERT Pro blocks reading the keyboard input and monitor screen and allows you to see all system drivers, active processes and system services to detect and
  • W32/Dofoil Free Virus Removal Tool will detect and remove W32/Dofoil Trojan completely, from your system. Download cleandofoil.exe and save it in a temporary directory. Double click on cleandofoil.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/Dofoil Trojan from your computer.This virus removal tool will detect and remove W32/Dofoil Trojan and its variants from your computer. It is a Windows based free virus removal tool designed by Proland Software Pvt Ltd. Download Protector Plus Anti-Virus Software trial version by clicking on Download Protector Plus button on the right hand side of the utility.
  • W32/Darkkomet Free Virus Removal Tool will detect and remove W32/Darkkomet Trojan completely, from your system. Download cleandarkkomet.exe and save it in a temporary directory. Double click on cleandarkkomet.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/Darkkomet Trojan from your computer.This virus removal tool will detect and remove W32/Darkkomet Trojan and its variants from your computer. It is a Windows based free virus removal tool designed by Proland Software Pvt Ltd. Download Protector Plus Anti-Virus Software trial version by clicking on Download Protector Plus button on the right hand side of the utility.
  • Ultimate Keylogger is advanced all-round monitoring solution. It monitors all activities on computer systems including applications, keyboard, passwords, clipboard, chat, email, and visited websites. Ultimate Keylogger is completely undetectable. Process is hidden from task manager. Files are not visible. Ultimate Keylogger displays reports in web format or sends zip-compressed and encrypted activity reports invisibly via Email, FTP or LAN.
  • Clean-up remote PCs from malware can be performed in the automatic mode and is invisible for remote user and doesn't require interruption of his work. PC protection engine shows notification in case of disabled virus protection. -File system and registry clean-up from detected malware -Put malware to quarantine before removing it -Restoring data from quarantine by request
  • Remote Logger is a professional remotely deployable keylogger, the best solution for monitoring your whole network. Remote Logger runs silently at the lowest level of Windows to prevent the monitored users from removing the software. Remote Logger intercepts all user names and passwords, in complete stealth mode! Remote Logger records all computer activities including keystrokes, internet history, chat convos etc. See more: www.remotelogger.com
  • Excel Recovery is a new generation recovery tool, which has been designed to restore deleted XLS or XLSX files, created in any version of Microsoft Excel with unprecedented efficiency even if your file system is damaged and your hard drive is almost dead. Using a list of signatures associated with MS Excel format, in scans disk surface, detecting the beginnings and endings of every XLS file, resurrecting file contents and other necessary data.
  • Undelete and recover Microsoft Word files from healthy and damaged hard disks. Working in two steps, it firstly gathers information from a file system, then it addresses hard disk directly to detect MS Word document, that are not represented in a file system due to different reasons. Having both scan results in its disposal, Word Recovery syncronizes them to obtain a list of MS Word documents to be recovered with their contents and file names.
  • Inactive Users Tracker automates the management of inactive user accounts. The program periodically checks all user accounts in specified domains, reports to you, and automatically disables all accounts inactive for more than a specified number of days. To detect inactivity, the tool checks the "lastLogon" attribute of accounts on every domain controller, thus guaranteeing a correct calculation of the last logon time.
  • Xerox Drivers Update Utility updates your system drivers for Xerox devices automatically with just several clicks. It will scan your system first then download and install Xerox official drivers to let your Xerox device work properly. The Xerox Driver Update Utility keeps your system up-to-date. It detects which driver updates are relevant to your computer, and then helps you install them quickly and easily.
  • WinBook Drivers Update Utility updates your system drivers for WinBook Laptops automatically with just several clicks. It will scan your system first then download and install WinBook official drivers to let your WinBook Laptop work properly. The WinBook Driver Update Utility keeps your WinBook laptop Windows system up-to-date. It detects which driver updates are relevant to your computer, and then helps you install them quickly and easily.
  • Toshiba Drivers Update Utility updates your system drivers for Toshiba Laptops automatically with just several clicks. It will scan your system first then download and install Toshiba official drivers to let your Toshiba Laptop work properly. The Toshiba Driver Update Utility keeps your Toshiba laptop Windows system up-to-date. It detects which driver updates are relevant to your computer, and then helps you install them quickly and easily.
  • SONY Drivers Update Utility updates your system drivers for SONY Laptops automatically with just several clicks. It will scan your system first then download and install SONY official drivers to let your SONY Laptop work properly. The SONY Driver Update Utility keeps your SONY laptop Windows system up-to-date. It detects which driver updates are relevant to your computer, and then helps you install them quickly and easily.
  • Netwrix Change Notifier for Active Directory is a free tool that tracks changes made to Active Directory and generates audit reports on a daily basis. Receive emails detailing changes to Active Directory users, groups and group membership, computers, organizational units and permissions, GPOs, Exchange Server configurations and permissions.
  • Realtek Drivers Update Utility updates your system drivers for Realtek devices automatically with just several clicks. It will scan your system first then download and install Realtek official drivers to let your Realtek device work properly. The Realtek Driver Update Utility keeps your system up-to-date. It detects which driver updates are relevant to your computer, and then helps you install them quickly and easily.
  • MailDetective is an effective tool for corporate mail flow monitoring. MailDetective analyzes Microsoft Exchange Server or MDaemon logs and creates comprehensive reports on sent and received mail, traffic distribution, and amount of mail for particular e-mail addresses. Reports are delivered in the form of easy to read charts and can include information on the whole corporation or on individual mail accounts.
  • W32/Reconyc Free Virus Removal Tool will detect and remove W32/Reconyc Trojan completely, from your system. Download cleanreconyc.exe and save it in a temporary directory. Double click on cleanreconyc.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/Reconyc Trojan from your computer.This virus removal tool will detect and remove W32/Reconyc Trojan and its variants from your computer. It is a Windows based free virus removal tool designed by Proland Software Pvt Ltd.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware