Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • The year is 2318, and a third world war has brought great destruction. Mankind was forced to descend into caves to escape the lingering radiation. Huge machines - robots designed by scientists, were sent to different planets to collect resources and search for a new home. But even on other planets competition between Earth's nations continued to increase. Robots are growing in number, and their arms growing more and more powerful. Thus begins ano
  • Cemetery Warrior - Frightful and dynamic 3D shooter. You have 3 weapons at your disposal - an endless machine gun, rocket launcher and plasma gun. Unlike other games where you're given a limited amount of missiles, here you can just keep 'em coming! Realistic physics - the enemies fly off, pound on the walls and hang from the fence!
  • An alien invasion has begun, and we have only one chance to stop them. You are our last hope to wipe them out. The fate of humanity now depends on you! Work hard and be smart, so you may stay alive !!!
  • Can you collect all the keys without getting lost? The Maze is a game in which you have to look for clues. The keys are at the end of the mazes, which grow increasingly complicated. At the beginning of each there is a chart that can help guide you. Solve all of the mazes, find all the keys and you will find yourself in a room with a big surprise!
  • In a galaxy far, far away, on a small, friendly planet known as Verivell, life went on as usual as ominous clouds gathered. A hostile race of invaders, eager to destroy and wreak chaos gathered an army under the leadership of Dr. Crash. At any moment enemy ships will attack Verivell... Civilians are in panic, a city is in flames. Who will save this world from destruction?
  • Power Spy for Home secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Audio Silence Remover Pro helps to remove silence from multiple audio files together. You can just give it a list of files to trim as opposed to having to do them individually. It comes with a minimalistic, user-friendly interface that integrates straightforward controls, making it highly accessible and efficient at the same time. According to your preference, you can either trim the silence at the beginning, end, beginning and end or perform a total trim of the audio file, which removes all the silence within your recording. This software is really handy to remove unwanted silent parts. It will also trim audio files size and just the relevant audio tracks will be left for you.
  • Meet the newest taxi driving simulator. Take the wheel of 9 different machines and become the best taxi driver in town! But it doesn't end here, as you will start your own taxi service and hire different drivers to create the best taxi service in town.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • The Broken Slender is a new part of the game about the famous Slender Man! Surf the gloomy dark forest, listen to the sounds around you, and beware of the Thin Man! Do not forget to monitor the status of your flashlight batteries! For a complete immersion in the game we strongly recommend playing with headphones;) Are you sure that you have left no one behind?
  • You are the captain of a big warship, that was created to destroy enemy submarines. Enemies will attack you and the further you go - the stronger the weapons they use against you will be. Bonuses and the store will help you. when you destroy the enemy you get bonus and scores that you may spend in the store bying lives, shields, mines. You need to successfully pass 30 levels to defeat them. Be careful! Even a little mistake can destroy you.
  • Abettor-Clipboard can copy and store up to 500 different clips, text or graphic. It has a superb encryption system with which you can sign in to all your web sites as well as send and recieve encrypted emails while only having to remember one master password. You can also allocate hot keys or macros to clips and paste them directly from your keyboard.
  • Conceal your online identity with the click of a button. Surf anonymously, encrypt your Internet traffic, hide your IP while surfing the Internet, using forums, sending E-mails, instant messaging, playing games, and more. Compatible with all applications. Hiding your IP address is as simple as clicking the "Hide My IP" button, which automatically configures your web browser or other application to use a proxy server from our proxy network.
  • Whether you're an independent publisher, author, big name publisher, or a company with important information, you need to brand your documents with a watermark. With PDF Watermark, you can do just that. Add a watermark to your documents easily, whether they're an image, logo, signature, url, and more! PDF Watermark supports transparent watermarks and even allows you to rotate your watermark from any angle.
  • Free Outlook backup tool. Back up Email archive, Contacts, Calendar and other folders automatically. Fast incremental backup will be done regardless if Microsoft Outlook is running or not. Schedule Outlook backup or back up PST files manually. Use Enterprise Edition to create fully customizable Outlook and Exchange backup on your corporate network. Monitor and manage the backup process on multiple workstations from one place using Admin tool.
  • Change your voice to match anyone, adjust age and gender, tone and pitch. The advanced voice morphing controllers provide easy fine-tuning. Users can create/mix parody voices, and use the voice comparator to suggest suitable voice similarity settings. The program supports most audio formats, including mp3, wma, wav, ogg, etc., and is compatible with most IM and VoIP applications, in-game chat systems, and media players.
  • Aiseesoft Mod Video Converter is a professional MOD Converter used to convert MOD/TOD video and other popular video/audio files to any video(AMV, ASF, AVI, DivX, Flash H264, FLV, SWF, H.264 AVI, H.264/MPEG-4, MKV, DV, MOV, M4V MPEG-4, MPEG-1, MPEG-2, MPEG-4, MTV, VOB, WMV, XviD, VCD, WebM, HD video) and audio(AAC, AC3, AMR, M4A, MKA, MP2, AU, MP3, AIFF, OGG, FLAC, WAV, WMA) format. Moreover, it will bring you much faster converting speed with AMD APP and NVIDIA CUDA technolog, and it supports the popular iPhone 6/6 Plus/5S/5C, iPad Air 2, iPad mini 3 and Samsung Galaxy Note 3, etc. Key Features 1.Convert MOD to other video/audio formats This software offers you the best way to convert MOD to any current video format of MPG, MPEG, MPEG2, VOB, MP4, M4V, RM, RMVB, WMV, ASF, QT, TS, MKV, AVI, 3GP, FLV, MPV, MOD, TOD etc. and audio format of MP3, MP2, AAC, AC3, WAV, WMA, M4A, RM, RAM, OGG, AU, AIF, AIFF, APE, FLAC, NUT and so on. 2.Edit output files You can adjust video Brightness, Contrast, Saturation ...
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Outlook Passwords Recovery and account settings backup is now free with Outlook Password Recovery module offered by our company. Simple download the tool and run the report called Accounts and Passwords. It is absollutely free option which can be used without limits. Backup Outlook passwords and account settings, save them to Excel, move your Outlook accounts to another computer, recover your lost Outlook passwords with this free Outlook Password Decryptor. But not only this, the software provides other usefull options and repors which can be evaluated. The tool allows to export Outlook emails, contacts and other records to separate files on your file system and preserve the Outlook folders structure. Email forensic option provides the wide access to the Outlook message tags and properties so nothing can be hidden from your eyes. But not only this, with the same outlooktransfer.com tool you may extract email addresses for your mail sending database.
  • What could be better than good old-fashioned street fight? For example, one like in Street Fighter 2015? This game is a real find for lovers of classic computer fights in the style of Mortal Combat or its analogs. Just you and a keyboard to take on the tough guys! Or have your friend join the action in multiplayer mode using the second part of your keyboard to make your fight more interesting.
  • RoboMail is a comprehensive mass mail software, which has a built-in e-mail server to send out e-mail without using ISP's server. You can prepare personalized e-mail easily. You can send newsletter, product release, and promotion to customers easily and stands out from tons of junk mails. Enjoy email marketing with RoboMail and explore business opportunities.
  • Mission: Escape from Island - great shooter on the passage with amazing modern graphics! Immerse yourself in the story of a soldier, trapped by destiny into the territory of the enemy army, where nobody can help him and he can rely only on himself! Will he survive in this hell - depends on you. Good luck and have fun!
  • Running in the jungle is a classic, fun, endless runner in the form an arcade game with elements of action. Your goal is to climb as high as possible on your way to meet a variety of enemies, from which you need to jump to the side to avoid! Compete for the top spot in the online high score table. Good luck!
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • The Network Recycle Bin Tool allows you to recover deleted files. Once you have this tool in your system, it will automatically keep a track of all the network deleted files and you can easily recover them. Instead of removing the files, this tool sends them directly to its predefined recycle bin folder. Additionally it offers you the Protect Files tool which prevents deletion of network files for specified folders according the file mask.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware