Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Exciting puzzle game in which you have to go through 11 levels, with increasingly complex tasks. Your aim is to twist the object so as to fit it over the faces of another! The game is very addictive, and you'll want to play it again and again!
  • Free FTP Client is a Windows-based File Transfer Protocol (FTP) application that allows you to utilize the capabilities of FTP without having to know all the details of the protocol itself. Free FTP Client simplifies FTP by offering a user-friendly Windows interface instead of a cumbersome command-line utility. Free FTP Client gives novice PC users the ability to upload, download, and edit files on remote FTP servers around the world.
  • You have been assigned the role of ball control, passing all sorts of obstacles. Going from level to level you will face increasing complexity. Great game, one of a kind, and a fascinating puzzle and arcade. Speed Ball will entertain absolutely everyone!
  • Highly configurable backup program with intuitive explorer style interface. Performs full, incremental, differential and mirror backups. Has wizards for backup & restore, powerful file filters and scheduler. Creates standard zips or exact copies of files, spans to multiple disks, keeps track of file versions, has built-in CD/DVD burner, backs up to SFTP/FTP, backs up open files, sends email notifications, command line and AES encryption support.
  • This program offers conversion of DOC, XLS, HTML, JPEG, TIFF, TXT and RTF from and to PDF format. It features easy to work with interface, batch conversion and a lot of additional settings which are easy to adjust. It provides three easy ways to convert your files to PDF for your convenience and also a lot of flexible choices when converting from PDF to another format. It comes with step by step instructions and runs on all Windows systems.
  • NetBull is the best and most undetectable keylogger you can find on the Internet. By using the latest in computer monitoring techniques, NetBull keylogger tracks all activities that occur on the monitored computer (Internet browsing, keyboard usage, user names and passwords, messenger conversations, programs used, Facebook activity, emails etc. etc.). The official website for NetBull keylogger: www.netbull.com
  • Real PC Spy software is a smart PC surveillance software that lets you know exactly what people do on a PC. It secretly records all PC and internet activity, including typed keystrokes (keylogger), chats & IMs, emails, websites visited, microphone, Facebook use, games played, online shopping and searches, video talk, videos watched, documents opened, clipboard text and more. It sends logs to your email or ftp like every 30 minutes.
  • Tipard iOS Data Recovery for Mac is excellent and powerful iPhone/iPad/iPod data recovery software for Mac users. Tipard iOS Data Recovery for Mac is used for recovering lost files from iOS devices (iPhone, iPad and iPod touch) and iTunes backups. It support four interface language: English, French, German, Japanese. What's more, it highly compatible with the new iOS 8, iTunes 12 and iPhone 6/6 Plus, iPad Air, iPad mini, iPod touch, etc. Key Functions: 1. Recover the file you need from iOS devices on Mac For iPhone 6/6 Plus/5s/5c/5/4S, iPad 4/3/2/Air, iPad mini/mini 2 and iPod touch 5, it can help you recover 8 kinds of lost data such as contacts, messages, WhatsApp, call history, calendar, notes, reminders and safari bookmarks. For iPhone 4/3GS, iPad 1 and iPod touch 4, iOS data recovery can recover Text files includes contacts, messages, call history, App document, calendar and notes, etc; and Media files includes photos, message attachments, voice memos, App photos/videos/audio. 2. Reco ...
  • Unicorn network analyzer is an Ethernet network analyzer (aka. packet sniffer or protocol analyzer) for network monitoring and troubleshooting purposes. It performs real-time packet capturing, 24/7 network monitoring, advanced protocol analyzing, in-depth packet decoding, and automatic expert diagnosing. Unicorn network analyzer offers a summary-to-detail, intuitive, easy-to-use graphical interface that network engineers can use to rapidly analyze and troubleshoot enterprise networks, Officers of a company can use to monitor user activity on network. it can also be used for debugging protocol implementations by aficionados that want to learn more about how network protocols work. Key Features 1. Real-Time packet capture and analyze 2. Rapidly troubleshoot enterprise networks 3. A variety of alarms notice 4. A variety of logs
  • MDT FileRecovery is an easy-to-use program with a Graphical User Interface without technical skill requirement through the whole recovery process. Simply launch the software, specify the disk where lost data located, click 'Next' button, all the deleted files will be listed.
  • C-Organizer Lite is a personal information manager with elegant design and all the necessary features: it lets you plan your day, set alarms and keep an Address Book with photos. Also this program includes a Tasks manager and a Notebook. The program employs simple and user-friendly interface to make working with this software simple and intuitive. C-Organizer was created to help you plan your personal and professional life.
  • The main character (Torkvin) must save the world from evil. He will be the hardest journey. On the road waiting for a superhero many carnivorous plants, hazardous mechanical obstacles mutated frogs and traitors Killkriters. Torkvina face deadly battles with terrifying commanders of the forces of evil and the power that destroys his country and innocent people! Gameplay: You will have: 3 levels infested by evil enemies. 3 Evil and very dangerous
  • The game details the events of the largest and bloodiest war in history known as World War II. Command one of the most legendary tanks of the era, the T-34. Relive key battles of the Second World War and in the end strive to put an end to the bloodshed. You will face several types of enemy tanks. Your goal is to destroy everything around you to help bring about world peace.
  • Forget about bloated user interfaces and incomprehensible help authoring tools: HelpNDoc provides the most advanced functionalities in their simplest form. Creating HTML and CHM help files is usually a painful process but thanks to HelpNDoc you may surprise yourself enjoying it! Producing Word and PDF manuals, ePub and Kindle eBooks is as easy while the amazing template engine will let you generate iPhone specific documentation websites in a snap
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • A-PDF AutoCAD to PDF is a fast, affordable way to batch convert AutoCAD Drawings into professional-quality documents in the popular PDF file format. Its easy-to-use interface allows you to batch create PDF files even support monitor hot directory. A-PDF AutoCAD to PDF supports Font embedding, compression and multi-language. A-PDF AutoCAD to PDF supports bookmark, watermark, security, page number, properties and viewer setting.
  • In the dense forests of the Slav has long lived sorcerer Stavr. Great power bestowed bright gods of the wise magician, he opened his will alone. In the ancient forest temple towering wooden Chury strict faces Perun, Veles and Yaril. Not once asked Stavr, bringing the gods with gifts to send him to whom he could pass his wisdom and strength to teach the same to hold fast two-handed sword. The gods heard the sorcerer. One day, walking along the for
  • CE Compiler is a tool to configure and run Google's Closure Compiler/Stylesheet, HTML Compressor and Yahoo's YUI Compressor for Javascript and Cascading Style Sheet (CSS). It provides a user interface that makes it easy to configure and run the above java JAR programs. It also enables you to select and compile/compress multiple files in a directory.
  • Sky Aces - Kampf der Reichsadler is an arcade aviation simulator dedicated to the events of WWI, and the airplanes participating in the conflict over the Western Front. This updated version includes improved graphics, better frame rates, new features, improved user interface & HUD plus experimental support for local network games with two players. The distinctive features of the game are models of airplanes of elaborate detail.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • SpyKing PC Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, web sites, user names, passwords, web cam images, apps, microphone, clipboard and more. It supports Skype, Yahoo Messenger and others. It also takes screenshots like a surveillance camera. You can receive reports remotely via email or ftp as often as you wish. Open these reports on another PC or on your cell phone browser.
  • Falco Viewer is for quick and easy graphics viewing. It has a user-friendly interface, features such as: rotation, zoom in/out, and supports file saving in popular formats. The main advantage it has over a standard viewer is its very fast image processing speed. Also, you may rapidly zoom in and out, even with high resolution images from digital cameras.
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • AVSbackup is a multi-thread application for reserve data copying. AVSbackup has a built-in system for automatic reserve copying of files and folders from their initial locations to the other folders and discs of the same computer or other computer of a local network. The application supports reserve copying of FTP and cloud storages (Dropbox, Box, Google Drive, SkyDrive) in both directions (download and upload) and reserve copying of databases to the file(s). Full, incremental and differentiated reserve copying is supported. Data can be restored both in the initial location and in the location selected by the user. AVSbackup maintains a log of events, which can be automatically e-mailed. The application supports program monitoring and manual task initiation via Web interface (the Internet connection is necessary). AVSbackup supports Zip compression of the reserved data, which is maintained optionally, with 256-bit AES encryption.
  • AVSbackup is a multi-thread application for reserve data copying. AVSbackup has a built-in system for automatic reserve copying of files and folders from their initial locations to the other folders and discs of the same computer or other computer of a local network. The application supports reserve copying of FTP and cloud storages (Dropbox, Box, Google Drive, SkyDrive) in both directions (download and upload) and reserve copying of databases to the file(s). Full, incremental and differentiated reserve copying is supported. Data can be restored both in the initial location and in the location selected by the user. AVSbackup maintains a log of events, which can be automatically e-mailed. The application supports program monitoring and manual task initiation via Web interface (the Internet connection is necessary). AVSbackup supports Zip compression of the reserved data, which is maintained optionally, with 256-bit AES encryption.

Page 3 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware