Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: E :: explorer
Display: short descriptions | full descriptions
  • Photo EXIF Manager lets you view and edit all well-known digital photo EXIF tags. File navigation are similar the Windows Explorer. In addition to standard image tags, the program allows you to edit GPS tags. Graphical interface also allows you to view image preview. All tags are listed in the table, and grouped into three main groups: Image, Camera, GPS.
  • Verid is a collection of software for flash drives with software that does not require installation. The program was developed by LBAPSP as a game Wexed part of the program. In total, it consists of 16 programs. List of programs: 1) 7-Zip 2) CamStudio 3) CPU-Z 4) DOSBox 5) Explorer + + 6) Fyre 7) IcoFX 8) Image Viewer 9) PNotes 10) RevoUninstaller 11) Stickies 12) uTorrent 13) VirtuaWin 14) Wexed 15) WinDirStat 16) WinDjView
  • Do you want permanent access to your favorite folders? With Chameleon Folder you can open frequently used and favorite folders in Windows Explorer, Open/Save dialog boxes, archive extract windows, and on the desktop, etc. You can create your own Favorites menu containing submenus.
  • Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera, completely implements and exceeds the US Department of Defense and NSA clearing and sanitizing standard, once erased with it, your file data is gone forever and can not be recovered.
  • Proxy Log Explorer is the fastest and most powerful analysis application for monitoring the efficiency corporate Internet usage of your Proxy server. This application creates dynamic reports on-the-fly. Also, you can easily get virtually any subreport by just right-clicking the item you need and selecting the subreport you need. Needless to say, it can recognize log file formats automatically and extract compressed log files.
  • WMA Workshop Plus - fast and easy-to-use WMA to MP3 converter. WMA Workshop Plus is digital audio converter with Windows Explorer-like interface, allowing you to convert audio files of WMA, MP3, OGG Vorbis, WAV PCM format to all these formats including resampling.
  • Able Launch Bar is a window similar to the Quick Launch bar. This is Application Desktop Toolbar with built-in Windows Explorer. Able Launch Bar offers a system of shortcuts far more superior than Quick Launch. Arranged into folders, they are just the same as folders in the Explorer window. Able Launch Bar support for Drag & Drop helps quickly fill the folders with shortcuts from your desktop or start menu.
  • Never let duplicate files accumulate if a huge waste of disk space and system slowdown is the last thing you need. PCTuneUp Free Duplicate File Finder is necessary to scan the whole computer to locate duplicates because they are difficult to find in Windows Explorer. It can tremendously reduce the search and backup time. Additionally, it provides checksum algorithm for comparison as well as settings to skip hidden, protected and system files.
  • Web Log Explorer is an interactive, desktop-based log analyzer for Windows. This analyzer create "multilevel" and cross-linked reports. It allows you to dig as deep into your log files as you need to. Explore your site, proxy or other logs without any limits! Web Log Explorer supports more than 30 log file formats and can recognize log file formats automatically, extract compressed log files, process multiple log files.
  • Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera, completely implements and exceeds the US Department of Defense and NSA clearing and sanitizing standard, once erased with it, your file data is gone forever and can not be recovered.
  • Lock down Windows XP/Vista/7/8 and create a virtual embedded environment. Inteset's inexpensive Secure Lockdown version 2.0 - Internet Explorer Edition is ideal for kiosk setups, digital signage systems, trade show terminals, library and schools labs, Internet cafes, hotels, businesses kiosks, etc. Secure Lockdown removes the Windows Desktop functionality and unwanted keyboard strokes and allows Internet Explorer to run exclusively.
  • Clever Privacy Cleaner Free - free internet tracks eraser and privacy cleaner software - is specially designed for online surfers. As you work on your computer and browse the Internet, you leave behind a lot of tracks and evidence of your private life. This free privacy protector software allows selectively removing all privacy-related information from web browsers like Internet Explorer, Chrome, Firefox, Opera and Safari to protect your privacy.
  • A-PDF Explorer is a simple, lightning-fast desktop utility program that lets you to easily manage, filter (using several metadata fields like: Filename, file size, file date, Title, Subject, Author, Creator, Producer, Creation Date, Modification Date) and batch processing (add security, set initial view, extract text and image etc¡­) your large archive of PDF files
  • CBD(Copy Bad Disk) can copy files regardless of bad sectors. CBD skips the bad sectors and continue to copy the rest content of the file without stop or hang. During the copying process, you can choose to skip the current file or speed up. CBD generates a log file recording the positions of unreadable bytes of the copied file. As integrated in the context menu of Windows Explorer, using CBD is like ordinary file copying/pasting operations.
  • Asterisks Password Viewer is advanced password recovery tool that allows you to see the actual password behind the asterisks. Asterisks Password Viewer lets you see the actual password behind the asterisk. It recovers passwords to such programs as Microsoft Outlook, The BAT! and other e-mail clients, FTP clients such as CuteFTP, FlashFXP, etc. Asterisks Password Viewer also supports password recovery in Windows Internet Explorer.
  • EZ WMA MP3 Converter - fast and easy-to-use WMA OGG MP3 converter. EZ WMA MP3 Converter is digital audio converter with Windows Explorer-like interface, allowing you to convert audio files of WMA, MP3, OGG Vorbis, WAV PCM format to all these formats including resampling.
  • Asterisk Password Decryptor 64-bit instantly recovers lost passwords from most 64-bit Windows applications that store passwords hidden behind the asterisks (*****). It easily recovers passwords for e-mail accounts in Outlook x64 , Windows Mail and many other e-mail clients, FTP accounts in CuteFTP, FlashFXP, FileZilla and other FTP clients. Asterisk Password Decryptor also allows to see the hidden password on web pages in Internet Explorer x64.
  • Gold WMA Workshop is a very fast and easy-to-use WMA to MP3 converter. Gold WMA Workshop is digital audio converter with Windows Explorer-like interface, allowing you to convert audio files of WMA, MP3, OGG Vorbis, WAV PCM format to all these formats including resampling.
  • WindowManager helps you to improve your work flow by remembering and restoring the position and size of your programs and windows. Many programs don't remember their position and size between sessions and even Windows Explorer does not restore windows to their last position under Windows 7 or higher. This is where WindowManager steps in and makes sure your windows are placed exactly where you want them every time you open them.
  • Proxy Log Explorer is the fastest and most powerful analysis application for monitoring the efficiency corporate Internet usage of your Proxy server. This application creates dynamic reports on-the-fly. Also, you can easily get virtually any subreport by just right-clicking the item you need and selecting the subreport you need. Needless to say, it can recognize log file formats automatically and extract compressed log files.
  • Asterisk Password Decryptor instantly recovers lost passwords from most Windows applications that store passwords hidden behind the asterisks (*****). It easily recovers passwords for e-mail accounts in Microsoft Outlook, Windows Mail and many other e-mail clients, FTP accounts in CuteFTP, FlashFXP, FileZilla and other FTP clients. Asterisk Password Decryptor also allows to see the hidden password on web pages in Internet Explorer.
  • Web Log Explorer is an interactive free, desktop-based log analyzer for Windows. This analyzer create "multilevel" and cross-linked reports. It allows you to dig as deep into your log files as you need to. Explore your site, proxy or other logs without any limits! Web Log Explorer supports more than 30 log file formats and can recognize log file formats automatically, extract compressed log files, process multiple log files.
  • The encrypted file clipboard abylon SHAREDDRIVE is shown in the File Explorer on the desktop level and protect your secret files. The complete integration into the Explorer environment simplify using of the software. The encryption and decryption with the AES algorithm is done for each file operation automatically in the background. The file-based structure allow the simultaneous access of several users and reduce the backup data transfer volume.
  • With 4dots Free PDF Compress you can batch compress PDF documents and reduce their file size drastically.It is absolutely free, very easy to use and also multilingual.Supports drag and drop,integrated into Windows Explorer.Can be executed from the command line for inclusion in scripts.Whole folders with PDF documents can be compressed.Translated into 38 languages.Supports password protected PDF files.Does not require Adobe Acrobat installed.
  • Taking ownership of files or folders is not a simple task. Whether you use the GUI or the command line, it takes far too many steps to take ownership of files or folders. Rizonesoft Ownership will add a "Take Ownership" option under the Explorer right-click menu that will handle all the steps for you. This menu option is used to modify the Discretionary Access Control lists (DACLs). Simply put, it unlocks or gets ownership of a file or folder.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware