Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • 1) A professional data recovery tool, offering safe, fast, convenient and cost-effective solutions for recovering data. 2) It supports to recover any accidentally deletion of files, even after 'shift+del' deletion or empty recycle bin. 3) Lost Partition Recovery is designed to recover files due to formatting or have been lost for long time. 4) Software can recover office documents, photos, images, videos, music, emails and archive files from various disks. 5) It can recover data from hard drive, USB drive, mobile phones or any other storage media. 6) GetLostData supports FAT32, NTFS file system. 7) Supported OS: Windows 8/7/Vista/XP/2000
  • Perfect Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Android recovery software designed for Android mobile phone and tablet, pad and SD card in Android devices, 7-Data Android Recovery effectively recovers photos, pictures, video, audio, documents, emails and other files from various Android devices. Most importantly, 7-Data Android Recovery allows you to perform a do-it-yourself Android recovery without risking giving your privacy away.
  • Publish your own secure website directly from your PC and remotely access your images, documents, videos, and music, or securely share them with your friends, family, and co-workers.
  • VintaSoft Twain .NET SDK is the professional TWAIN scanning library for acquiring images from scanner or camera. SDK allows to get a list of all TWAIN devices installed in the system, get information about device capabilities, acquire images from device with or without device UI, acquire image from flatbed or document feeder, acquire images in duplex mode, use imprinter capabilities of device etc. SDK has examples of use in VB.NET, C#, ASP.NET.
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Are you tired of trying to extra pages from a PDF to use in other documents or presentations? Now you can use PDF Splitter and extract PDF files easily and faster than comparable software. PDF Splitter is easy to use and three times faster than other extraction software. What's more, it's free to use.
  • Multi-Page TIFF Editor (MPTE) is a complete solution for viewing, editing, creating and converting multipage TIFF files. This program can be useful for viewing or editing scanned documents (faxes, business papers etc.) - it is an absolutely necessary tool to work with documents in TIFF format.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Power Spy for Home secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Looking for an easy and fast way to convert images into PDF files? Don't bother with Adobe software when you can use Images to PDF absolutely free. Convert JPEGs, BMPs, PNGs, and other image formats into PDFs. You can set the margins, layouts, orientation, page size, and more of the output PDF document. What's more, you can convert the whole folder of image files into PDFs. You can also process batches of image files into PDFs.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Whether you're an independent publisher, author, big name publisher, or a company with important information, you need to brand your documents with a watermark. With PDF Watermark, you can do just that. Add a watermark to your documents easily, whether they're an image, logo, signature, url, and more! PDF Watermark supports transparent watermarks and even allows you to rotate your watermark from any angle.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Wanna play a doctor? This game especially for you! Dark night. Suddenly phone calling. Urgent call. Angry virus eat the patient. He do not wish to retreat without last fight. No time for waiting. Need your help! Now! In your arsenal strongest preparates, but its won't help without your experience and personal control. Are You ready to accept the call? Simple and fascinating gameplay with HD-graphics and original music & fx. Play & Enjoy!
  • Create help files (HTML Help, Web Help and PDF) from Microsoft Word document. Convert Word document to HTML Help (.chm), Web Help and PDF. (doc to chm, doc to help, docx to chm, doc to web, word to chm, word to help, word to web, create help file from word,help authoring tool, help authoring software Word, create chm file from Word, doc2chm) User guide: http://www.softany.com/wordtohelp/word2help.htm
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • WinCHM is a very easy-to-use help authoring tool. Not needing to learn too much, you can be master of creating HTML help(CHM), Web help, PDF and Word documents. With this powerful tool you can not only create chm file from scratch, but also convert a set of existing HTML files to a chm file. You can open an existing chm file and edit the chm file too.
  • SD memory card recovery software for digital camera or mobile phone, it effectively recovers lost, deleted, corrupted or formatted photos, video, files from various memory card types including SD Card, MicroSD, SDHC, CF Card, USB and local drives. Recovers lost, deleted, corrupted or formatted photos, videos and files; Recover photos, videos, audio files, documents, emails and more; Recover from SD/memory card, USB/local drive and mobile phone.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • PC Spy Software logs all Facebook, PC & internet activity and emails log reports to you. PC Spy Software logs all keystrokes, chats & IMs, emails, websites visited, applications, usernames, passwords, documents opened, online searches, microphone sound and more. It takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crimes.
  • Agent Thomas Rogan learns from his bride that in a building run by organization "Series 13," a crash occurred. An evil doctor was conducting hideous experiments that ended in tears and agony. The results of his experiments overflowed into nearby houses. The hero will need to get deep into the S13, to understand how to stop this nightmare from spreading.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware