Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • The Customer Complaint Process Management. Automation of ISO procedure. This procedure automates the usual (and very useful) event of customer complaint.. The procedure starts with the fill in of the complaint form. On this form there is the possibility to attach files. The tasks arise the one after the other in the Tasks menu of the employees of the company.
  • Kid Key Logger Pro is a powerful, fully featured, keylogger, specifically designed for parents to record their children activity, while they let them play on their computers. Kid Key Logger Pro can log keystrokes, mouse and windows events ans also capture screenshots of your desktop. Log files can be written to disk, emailed or uploaded on a server. The key logger can be remote-controlled from another PC or from an Android device.
  • Web-based pet sitting software. You can use the web-service to show hourly availability. If you already have your own webpage you can add our online booking system to your own webpage. Calendar management is implemented at two levels: Admin Area and Public Area. The calendar gives you a customizable Resource Navigator, new Date Navigator, control over the events overlapping and a mechanism for sharing events.
  • In the modern work place, managers effectively use network pc monitoring to ensure employee productivity and to keep an eye on undesirable system activities. Kernel Computer Activity Monitor is an advanced tool designed for this purpose. It is invisible to the PC users, as it does not appear in the Task Manager, Process List, Desktop, and Add/Remove Programs. It is a useful tool for organizations as well as individuals - investigators can use it to spy system happenings, and parents can use it to monitor the activities of children. It invisibly takes screenshots, records key strokes, monitors internet and email activities, gives information about Application accesses, saves clipboard activities, tracks passwords and notifies of print activities. Using this tool is an easy thing because of its user-friendly interface. You can configure this application to monitor and record the activities, so that your physical presence is not necessary at the time of monitoring. In addition, there is an option to receive reco ...
  • Online transport rental software. You can use the web-based software to show hourly availability. If you already have your own webpage you can add our online booking system to your own webpage. Calendar management is implemented at two levels: Admin Area and Public Area.The calendar gives you a customizable Resource Navigator, new Date Navigator, control over the events overlapping and a mechanism for sharing events.
  • Car wash - booking and reservations. You can use the web-based software to show hourly availability. If you already have your own webpage you can add our online booking system to your own webpage. Calendar management is implemented at two levels: Admin Area and Public Area.The calendar gives you a customizable Resource Navigator, new Date Navigator, control over the events overlapping and a mechanism for sharing events.
  • Plagiarism Detector Accumulator Server - is a Plagiarism Detection software to compare a document against a local document database and in this way prevent unauthorized copy-pasting of any textual material already available.
  • SPYWARE FIX is your protection against spyware, adware, and other unwanted software. SPYWARE FIX is a user-friendly anti spyware program that is easy to install and use.
  • Plagiarism Detector - is a Plagiarism Detection software to quickly discover, trace and in this way prevent unauthorized copy-pasting of any textual material taken from the world wide web. It uses the Google database to send hundreds of requests per second to verify the text originality.
  • Syncplify.me Server! is the secure FTP, FTPS, and SFTP server for Windows by Syncplify, Inc. Powerful, secure, yet very easy to configure, Server! simplifies regulatory compliance and operation of a secure file transfer server. And it's totally free for personal use, including lifetime updates and upgrades (paid licenses available for other uses). Main features - Supports plain FTP, explicit FTPS (TLS), implicit FTPS (TLS), and SFTP file transfer protocols - Also provides a basic secure shell (SSH-2) and forwarding tunnels support - Runs as a system service - Supports large files (> 4 GB) Advanced features - PKI authentication with multiple key-pairs per user - Advanced FTP(S) and SFTP security settings - Automatic blacklist - Real-time monitor - Virtual folders with per-folder security - IP-based and per-user security (white-lists) - Powerful event-handling subsystem - Easy graphical Configuration Manager - Command-line Interface configuration tool
  • Colored and Stylish Bootstrap QR Generator for an Elegant QR System with lots of features, based on Bootstrap / HTML5 & CSS3 framework. Possible types: Text, URL, Telephone, SMS, Email, Email Message, vCard, meCard, WiFi access, Geo location, Calendar events. Colored QR images, jQuery UI CSS Framework, jQuery Validation, Google Url shortener, Set Image Margin, 3 generated images format, Multiple Sizes, Multiple Encoding Formats.
  • Access your Google Calendar, even when offline, directly on your Windows desktop. Events are extended with support for additional reminder types and user-defined custom fields. Events, tasks, notes, and contacts can be linked with each other, helping you to make sense of your data and access related items with minimal effort. All data can be shared over a local network, allowing your office to run more efficiently. Easy to learn and free to try.
  • DJCalendar is an Event Planner Software with a user friendly calendar organizer and scheduler for managing customer events, event contracts, invoices, and payments. Customize and Create templates, contracts, invoices, etc.. with your own company logos. Insert [Field Names] into your custom forms to have DJCalendar automatically replace fields with client's actual data when printing or emailing. SaveExport your custom forms and customer documents to PDF. Fax your documents to your customer with a single click (requires fax subscription). Accept and charge credit cards directly from DJCalendar software (requires Merchant Account). Funds are typically deposited into your checking account within 24 hours. Broadcast Email- Send contracts, invoices, payment receipts, etc.. via email Export your report data to Excel format. Contract Data Entry Form- Customize your own data entry form. Networkable - Use multiple DJCalendar programs on a network to share same client information. ...
  • DC ReturnKeyEnable allows you to access form controls using the Return key instead of Tab. This way, you don't have to switch between keys to enter codes, access controls, and navigate through your form. With DC ReturnKeyEnable, you can spend less time defining events and more time perfecting your application.
  • Socher 2014 - Olympic Games decoration for your desktop. Feel the spirit of the Olympic Games. The Polar Bear, The Hare and The Leopard liven up your desktop and will not allow to miss one of the main events of the year! Large selection of pictures will not get bored. You can also decorate your computer any image, just drag picture anywhere on the desktop and enjoy.
  • Lepide Event Log Manager is a sophisticated tool that empowers the user to avail the information about a site which includes accessed files, activity status, traversed paths, referring pages, search engines, browser related information, etc. The software archives the event logs of the entire network in a central repository which makes it extremely simple and easy to maintain them. Also, it generates timely notifications and alerts to inform the administrator whenever any critical event related to event logs takes place. Using this efficacious utility, event browsing for all the systems within the entire network can be simplified. Moreover, it facilitates you to view the specific or all windows and W3C event logs from a centralized platform. Also, it provides compliance reports for HIPAA, PCI, SOX, FISMA and GLBA and thus sustains compliance and also help in avoiding the legal hassles. The software has two editions- A Freeware edition and Enterprise edition. The users can choose any one as per their need and u ...
  • MDB Viewer Tool provides everything necessary for opening damaged Access files, viewing their content and eventually recovering records from damaged databases. Not only does the program recover database records, but also restores the original structure of corrupted databases, reconstructs any database queries, except the ones used in reports and forms, and restores relations between database elements.
  • LDS Home Information is a multi-module household database program with over 45 different functions. Enter data about each member of the family, including contact information, birthday, anniversary, and clothing size. Enter and track food storage requirements, track Family Home Evening assignments and more. There's a place to list family activities and a module that shows events for year of birth. Weight tracker function added plus much much more.
  • Stampa stima software, produzione e gestione per la stampa e le arti grafiche. Arti grafiche, fotocopie, stampa digitale, rilegatura, ecc copia del software Logic Print libero. Software per il calcolo di citazioni in 1 minuto, disegni di stampa, ordini di lavoro, scalato per numero automatica, ricalcolo immediato del lavoro, calcolo delle variazioni di costo, fatture, magazzino, ecc versione di valutazione gratuita.
  • Whenever a Windows based program is running, it's consuming memory resources - unfortunately many Windows programs do not "clean up" after themselves and often leave valuable memory "locked", preventing other programs from taking advantage of it and slowing your computer's performance! Until now, The only way to free up this "locked" memory was to reboot your computer. Not anymore, with MemOptimizer!
  • All-in-one 'smart' interface for ultimate PC security and private data protection. 9 levels of PC protection for your maximum security. Nobody can see, copy or delete your private data! Make your private files and folders invisible. Encrypt files and folders for ultimate protection. Lock your PC to prevent unauthorized access. Prevent access to any local/removable drives. Prevent data loss with secure cloud storage. Erase files permanently.
  • "Win" means for MS Windows, "Cln" is the short form of cleanup. WinCln .NET program is used to cleanup the useless files in a PC. It aims to protect your privacy by removing the sensitive data like system logs, visited website, e-mail content and more. Clean up fast : No install is needed, no time is wasted on file searching. Free of charge no advertising, no splash screen. Easy to use : User friendly interface, most functions can be accessed with 2 keystrokes or 3 mouse clicks. Easy to learn : Shortcut keys are identical with MS Windows. Web Update utility is included that allows you to quickly find software updates. Standard mode: Dump files: logs for system event, setup log, etc You can select the dump files that you like to delete. Choose the items and confirm with the permanently erase or move to recycle bin button. It will prompt you to switch to another mode or not when finished cleanup or no item found. For company, beware of removing critical syste ...
  • JiJi Account Lockout Tool is a Account Lockout and Management Tool. Account Lockout Threshold Policy helps in further Active Directory Account Lockout. Account Lockout and Management Tools will Audit Account Management Computer, Audit Account Management Policy, Audit Account Management Security. Easy to use Account Lockout Policy Security Configuration. Security Audit Policy helps to prevent Active Directory Account Lockout. Account Lockout Duration, Account Lockout Status, Account Lockout Policy are important in Account Lockout analysis. Account Lockout is a note-worthy security standard in windows, established solely to prevent intruder's access on systems. Account lockout prevents the breach, however it doesn't explain you the sources and causes for the actions explicitly. Unlocking the accounts for an unknown cause opens the gate again. The unknown cause could very well be a potential threat or a program with the expired credential. Also on the other side of the lock out action, the ...
  • SPYERA is an application that you install on a mobile phone. After installation, SPYERA secretly records events that happen on the phone and delivers this information to a web account, where you can view these reports 24x7 from any Internet enabled computer or mobile phone. SPYERA PHONE version also allows you to listen live calls, listen surroundings of the target mobile, and to know the location of the device.
  • Use Easy Disk Drive Safeguard to hide and lock your local, network, Floppy and USB drives as well as disable the AutoRun feature for them. A password protection can be applied to the program to prevent your users from changing the security settings you enforce.

Page 10 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware