Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Mousotron Pro keeps track of the distance your mouse cursor moves and also the number of times you pressed the mouse buttons. On top of that it shows the number of keystrokes. If your boss says you don't work hard enough, this is the tool to prove him wrong. Mousotron is basically just fun, but it can also be a very handy tool in RSI prevention (Repetitive Strain Injury) or the rehabilitation of it. Now supports all major languages.
  • Cycle8 FilmSpirit provides a shortcut to make a fun Hollywood trailer from your home videos in a few minutes. It is easy to make a dramatic and attractive short film with our premade templates. The software supports almost all popular video formats, such as from cell phones, camcorders, iPad, iPhone, or any other mobile devices etc. Key Functions: 1.With detailed instruction, you can turn your home videos into Hollywood movies with easiest way. 2.With the FilmSpirit preview window, you can watch your video come to life as you fill in each step of the storyboard. Preview and select the scene you want to appear in your trailer. 3.Choice from any of the 9 premade trailer templates to customize a mood just right for your movie. Templates includes Adventure, Wedding, Pets, Daily Life, Party, Sports, Creative Life, or Travel. 4.Choice from a variety of title sequences to introduce your movie and topics. 5.You can preview your original videos as a series of still pictures by adjustable in ...
  • In this technology era, Outlook application provided by Microsoft is considered as the best means of achieving effective communication through emails. It is widely used as it offers many useful attributes and users can easily keep working on the application, even if there is no internet connection by making use of a file called OST. But it is also true that OST file on Microsoft Exchange gets damaged or corrupt due to many events like Windows registry error, Microsoft Exchange server error, virus infection etc. Thus we need to convert this corrupt OST into a healthy PST file by using a powerful utility. Yodot OST to PST Converter is one such application, which you can utilize to convert your corrupted or damaged OST file into a valid PST file. Steps to convert your OST to PST is very simple and you will be able to restore and access all Microsoft Exchange elements such as emails, attachments, contacts, journals, tasks and so on after conversion process. Yodot OST to PST Converter supports converting OST f ...
  • It's great to be able to fully concentrate on the task at hand while waiting for a future task to be ready for action. Free Countdown Timer Portable can remind you about important events by playing your favorite music and showing a notification message. The countdown clock supports unlimited number of timers so that you are not restricted to the number of alarms you can have. Timers that you set will sound even if computer goes to sleep.
  • It's great to be able to fully concentrate on the task at hand while waiting for a future task to be ready for action. Free Countdown Timer can remind you about important events by playing your favorite music and showing a notification message. The countdown clock supports unlimited number of timers so that you are not restricted to the number of alarms you can have. Timers that you set will sound even if computer goes to sleep.
  • Kernel Computer Activity monitor is the software to trust when it is important to track all computer activities of employees. It captures snapshot of the target computer screen at specific intervals. One can specify maximum size of snapshots and also if snapshot should be of the active window. Every key that is pressed by user gets recorded. Administrator can check what all keys were typed after analyzing the keystrokes. Kernel Computer Activity Monitor records every internet activity ranging from browsers used, pages visited, visit time or user name. The tool enabled admin to look at the history of accessed application. Details such as name, launched time, executable path and launched by information are recorded about the application. The admin can save clipboard activities as well that can let you know everything that was copy-pasted including text and images. Kernel Computer Activity Monitor reports every email activity that is accessed without using SSL connection. The reports include date and time ...
  • Slow Boot? Slow PC? This impressive piece of software really makes a difference. Simply install and let WarpDisk do the rest. No further tweaks, configuration, or maintenance is required from your side. The software uses a technique adopted by no competitor. It effectively extends the file system with fragmentation prevention and boot optimization capabilities, dramatically boosting your Windows boot.
  • Turn this animated 3D screensaver on and the holiday atmosphere of upcoming Christmas will surround you. Special festive music and brilliant colorful graphics will bring true holiday feeling to your desktop. Now you don't even need to wait for the event. Just start this 3D screen saver and get the Christmas experience anytime you wish.
  • Turn your computer on and watch mystical overnight actions before the Halloween. Thousands of pumpkins hordes on an old graveyard and do occult preparations to the upcoming event. Seems, all that devilish Jack O'Lanterns going to execute their awful plan this night.
  • If you need portable alarm clock software for Windows, this is the software you are looking for. Free Alarm Clock Portable supports unlimited number of alarms so that you are not restricted to the number of alarms you can have. Alarms that you set will sound even if computer goes to sleep. The alarm clock can remind you about important events by playing your favorite MP3 music.
  • If you need alarm clock software for Windows, this is the software you are looking for. Free Alarm Clock supports unlimited number of alarms so that you are not restricted to the number of alarms you can have. Alarms that you set will sound even if computer goes to sleep. The alarm clock can remind you about important events by playing your favorite MP3 music.
  • Carillon Church Bells Electronic Bells Software Bell Tower Electronic Chimes for $140. Beautiful Harmonious Bells. User friendly scheduler. The best sounding bells you can get on the net. Download the demo and you will agree. Full Year Scheduling. Great outreach ministry! Set often or once all year, add music, times, seasons, events.
  • NCheck Bio Attendance, the automatic ready-to-use time tracking system with biometric fingerprint and face identification. The system may be used in a wide range of business applications, from employee time tracking to check-in at events, clubs, clinics, public and commercial facilities. + Attendance control automation system using fingerprint or face biometrics. + Fingerprint and face biometrics protect against errors or user fraud. + Ready-to-use end-user software with simple friendly user interface. + Client-server architecture for larger systems. + Printable reports generation for users attendance. + Data export to Excel or CSV. + Email notifications in case of issues. + Webcams and 100+ fingerprint reader models from 40 manufacturers supported.
  • Wallix Pro Firewall is a powerful computer firewall built to prevent intruders and malicious attacks from accessing your PC. It automatically detects and blocks attacks through a comprehensive examination of all inbound and outbound information to your computer. Wallix Pro offers an easy interface, with clear details that present you a list with all installed programs from your computer. Unwanted programs can be uninstalled by just a few clicks.
  • FireDaemon Pro is a system utility that allows you to install and run any 32-bit or 64-bit application or script (EXE, DLL, BAT CMD, .NET, Perl, Java, Python, TCL/TK) as a Windows service. FireDaemon Pro features easy service configuration via the GUI or command line, a low memory and CPU overhead, subprocess prioritization, custom environments, scheduling, popup closing, CPU binding, monitoring and logging to the event log and on-disk log files.
  • Google Desktop, Google Toolbar, Chrome, Picasa and Earth: Almost every Google application sends information back home. GoogleClean prevents Google applications from sending unnecessary personal information. User IDs can be made anonymous, personal data can be deleted and spy cookies can be destroyed.
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • PDF Decrypt is a perfect tool that lets you to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing(changing), printing, selecting text and graphics(and copying them into the Clipboard), or adding/changing annotations and form fields. Decrypted file can be opened in any PDF viewer(e.g. Adobe Acrobat Reader)without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat are supported. The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted even when the document is decrypted: printing; copying text and graphics out of the document; modifying the document; and adding or modifying text notes and AcroForm fields (using 'owner' password).
  • Windows Doctor is a comprehensive PC care utility that can help you easily protect, maintain and optimize your computer. It combines 14 essential and practical tools for Windows so that with a few mouse clicks, you can fix registry errors, clean privacies, prevent security threats, clean Windows temp files, manage startups, recover lost data, split/shred files, repair Windows, speed up system and more.
  • Slideshow Creator gives you a great chance to add any music you find suitable for the slideshow. So, if you have nice photos from your birthday party and want to revive memories of the event, it's as easy as ABC! Take the best images, add funny comments describing what is going on and adjust the right music - that's it! All this will take just a couple of minutes but the impressions will be really great! Your friends are sure to appreciate it!
  • Milesight VMS Pro (Video Management System), which compatible well with ONVIF, is one of the most innovative and most powerful video management software systems on the market and it will fulfill your highest requirements and expectations. The simple and intuitive design requires little training while providing easy access to live and recorded video, facility maps and alarms.
  • SharePoint administrators can now assign to Users and User Groups all relative permissions at Columns-and Views-level. Permissions can even be defined using conditions, so that the values of certain fields determine permissions dynamically. Permissions settings can be imported or exported as XML file for easy management and batch permissions assignment. SharePoint Column/View Permission provides further protection on list columns and views than the SharePoint permission system does. Using it, you can safeguard the confidential column contents from access and edition by unauthorized users. SharePoint Column/View Permission allows administrators to hide or read-only columns to specified users. So unauthorized users will not see or edit the columns at all. Use SharePointBoost Column/View Permission to set "Employee ID" and "Manager" Columns as ready only. Assign view permission to specified users, full access, hidden or read-only (disable edit view). Column/View Permi ...
  • Send changes notifications via SharePoint item event or customized time triggered email and SMS Optimize your company's workflow by sending detailed, fully-customizable alert e-mails and SMS messages to users whenever an item is created, modified, or deleted. Moreover, e-mail and SMS reminders are automatically sent at customizable intervals to remind employees before deadlines. Both alert emails and reminders can be sent if the specified conditions are fulfilled. Event-Triggered Alerts Users can be notified whenever an item is added, modified, and/or deleted. Time-Triggered Reminders Send time-triggered reminders to specified users. Users can be reminded within minutes, hours, days, weeks, months or years. Alert Conditions with Powerful Functions Determine at what time and under what circumstances e-mails should be sent, ensuring that users will only receive notifications that matter to them and only when they are required. Functions, operators and columns of the list are available as ...
  • SGS KeyLogger is utility that records ALL ascii keystrokes, including passwords, to special log files. Install KeyLogger and EVERY single keystroke of your computer's users type will be captured and recorded. It helps to prevent data lossing when you work with multiple programs. You can use our KeyLogger if you want to know what has been done on your PC during the time you were absent.

Page 10 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware