Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Xeno Vault have built in compressor so that you do not have to worry about Disk Space. Xeno Vault Can lock any file of any size on every Devices. Xeno Vault is Small, Light, Fast and does not slow down your PC like other locking software. Xeno Vault uses advance Algorithms so that no one can Seek & Search your Data. Xeno Vault has many Functions & Themes too and they are easy to use. Xeno Vault can hide any file from everyone and encrypt them.
  • The program, Hide Windows Freeware Edition is a small utility designed to hide windows programs, running them in the background invisible to the user. You can also set a hot key combination to hide or show these windows.
  • Help the brave ninja warrior save the world from a new evil! By negligence, the king of the small world of the evil totem released cars and now they are ruining their wonderful world! Just a few seconds of contact with the totem subjects one to evil. Use your skills to shoot accurately at the enemy, attack from the air, hide in the shadows, slip unnoticed through the dangerous enemies to find and destroy powerful caches of the evil totem!
  • My Lockbox is a privacy application, enabling you to hide and lock folders on your computer and protect them with password. The protected folder (lockbox) is hidden and locked from any user and application, no matter whether they are trying to get access - locally or from the net. To open the protected folder you must input a valid password. The program is simple, effective, and best of all - has a free edition. Download it right now!
  • Tenebris, a cinematic platformer. A game about the scary adventures in the world of nightmares. A story that will make you to balance between the reality and imagination. Will you try to kill all monsters arround? Or better you will hide behind the trees and stones to save your life? Remember only that you can't run away from death... Choose you way in the path of the night. Good luck!
  • You play a hunter, who will have to kill many different species of animals. The distance from which you killed animal is very important! The greater the distance, the more points are awarded. Hide in the trees to ambush the animals. You may also buy scaling, for a better view of the fielding play (mouse wheel or click the button "C" and "V").
  • A1 Keylogger spy software secretly logs all their chats & IMs, emails, Facebook use, keystrokes (including user names & passwrods), video talk via web cam, YouTube videos watched, web pages opened, online searches, applications executed, documents opened, clipboard text and more. Send log reports to your email like per 60 minutes. It runs in a complete Stealth Mode. Administrator of the software can unhide and manage it easily with hotkey.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Agent Thomas Rogan learns from his bride that in a building run by organization "Series 13," a crash occurred. An evil doctor was conducting hideous experiments that ended in tears and agony. The results of his experiments overflowed into nearby houses. The hero will need to get deep into the S13, to understand how to stop this nightmare from spreading.
  • The program is completely free, easy, fast and powerful. It is the best way to encode and decode any type of file, which also integrates seamlessly into Windows Explorer. Be used to hide all the sensitive data and important that we want to keep away from prying eyes. Here are the features: Disarming ease of use; Coding of any type of files; Integration in Windows Explorer for a more rapid; Creating one password for decryption (in addition to the hidden internal); Secure encryption of login passwords, pin codes, serial numbers, etc..; Inability of systems to be cracked by "Brute Force" (if the password is wrong does not display the classic error message intercepted by the crackers, but it is decoded in the wrong way the file will appear illegible). Please note that - Be careful not to forget the password, otherwise we will not be able to decode the encrypted files once!
  • Do you ever have the uncomfortable feeling that somebody is watching over your shoulder while you're using the Internet? Perhaps it's your Boss, or perhaps it's a member of your family? When they come by, you might want a quick and easy way to clean all the windows off your desktop, and hide them, and mute the sound, so that your desktop appears clean again. If so, you have found the perfect solution: Super Screen Clean. Super Screen Clean is an amazing new program that allows you to instantly hide all the windows on your desktop. You can hide ALL the windows by a HOTKEY (you can press a secret key combination), or you can even hide all windows by a secret move of your mouse! So you can INSTANTLY solve the problem, fully-guaranteed - it works every time. Later, whenever is convenient, you can simply press the HOTKEY again and all your previous windows and programs will be restored. You can even configure your regular work windows to be left shown at all times. T ...
  • Folder Lock Lite is a revolutionary concept in data security engineered for home or office use. Folder Lock Lite allows you to Lock and Hide your data, keeping your data secured and hidden at all times so that you won't have to worry about the confidentiality of your data. 'Locking' in Folder Lock refers to the process of protecting your files, folders, drives, and even programs by putting a protective lock on them.
  • Perfect Hotkey is a powerful hotkey managing and overriding utility for Windows. Perfect Hotkey lets you hide programs and windows, instantly shutdown, restart or logoff, insert canned messages, open unlimited amounts of websites, programs, games, files, folders, drives. All with your keyboard.
  • Escape2: The New Order, is an extension of the famous first-person shooter. The second part tells the story of CIA agent named Nick Lobottom, in the year 1970. The main character is sent to a secret hideout, run by Nazis, who continue to run their experiments. You go through 5 chilling levels to fight the final boss. Be sure it will not be easy.
  • IS CAD is very cost-efficient drawing software product that enables the making sketches of two-dimensional drawings, graphics, plans, diagrams. IS CAD provides user-friendly interface and powerful features for detail work with geometric elements and supports parametric graphics. - Relations highlighting and snapping makes it easier to connect or fit objects to each other or the drawing grid - Rich and customizable line style set - Convenient geometric transformation tools - Measuring instruments for automated length and square calculations - Textured and solid color fills with drag'n'drop support, and user presets - 'Symbols' can store portable groups of objects for frequent usage - Layer system allows you to either hide currently unimportant data, discard printing of some data, or activate a lock on finished objects - Multipage documents are stored in a single file - All sheets are customizable by paper format and scale - Content is automatically cropped by pap ...
  • Help funny gnome collect all the gold in its mines! Dwarf And Gold - unusual physical puzzle game in which you must remove objects to which is a dwarf, making sure that it does not fall into the abyss, or it is not devoured some of Ground Monsters that hide in burrows.
  • Classic space shooter with nice graphics. You have to score as many points surviving in outer space. Hide from meteors, destroy hundreds of space ships. All this awaits you in the new shooter - Space Blast! It's your turn to put a new record!
  • This easy-to-use privacy software effectively limits access to an unlimited number of folders and files on your computer. If you want to hide your files from prying eyes or want to protect them from being deleted or modified, install Hide Folders utility. It safely locks and hides your files and folders and grants access only if you specify the original password. Download FREE trial now!
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Flashnote is a quick notes manager for your work with any text information. When you need a rough copy to save or to process some pieces of a text, Flashnote is small, quick and convenient. Press the shortcut-key combination and a rough copy is on screen in a flash of a second. Press ESC and the program hides. It's that simple. You don't need to find a place for text, to run Notepad or your PIM. Everything gets done quickly, simply. Try it!
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Convert BATch files to EXE format with encryption. Select EXE Icon and Version properties. Run Invisible. Use mouse input. Embed additional files. Run any program Invisible. Hide and Show any Windows program by Title Bar text. ASCII Graphic Wizard. 45+ Extended commands. Print centered text. Option to Password Protect EXE. Perfect for installations and makes your batch file tamper-proof. Compatible with WinXP/2000/2003/VISTA/Win7/Win8.1 64bit
  • PhotoGUN - No more time consuming, repetitive work! Simply drag and drop a picture, a hundred or thousands of photos, to the drop-window and select operations you want to apply to them. You can perform the following operations: - Resize photos to make them more suitable for emails, blogs, websites, social networks, your personal use or for your business; - Adjust brightness, contrast and saturation to enhance the light and color balance; - Add professional touches to your photos and apply -Vignetting-, a creative effect, to draw attention to the center of the frame; - Add watermark to prevent unauthorized use and/or copyright text or company logo with a customizable transparency level and other parameters. You can also use this operation to merge your photos; - Crop to cut away unneeded image parts; - Rotate to change the image angle; - Mirror to flip the image vertically and horizontally; - Blur to hide some of the details of your photos (different levels of blurring available); - Add Borders for a decorativ ...
  • The program is designed to Lim LockFolder instantaneous protection folder password. It quickly and safely hide the information on hard disks and removable media. The program has two levels of data protection, the first a simple way to protect your data (even when data will be securely hidden), but there is also a second method, improved protection, which also encrypt data, but to hide the second method will require a little more time. On each folder, you can set a separate password, and hidden data on removable media, and they remain, and these can be opened on another computer by installing software Lim LockFolder. The program has a user-friendly and intuitive interface. For greater security, you can set a password on the program and then no one but you will not run it.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware