Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Download reasonable priced Monitoring Software from http://www.digitalpccare.com that facilitates user to have full control over their computer system when they are outside and unable to monitor and come to know what activities were performed on PC by kids, friends, spouse, cousins, relatives, staff colleagues, business partners, classmate or others with the help of recorded log file of each key pressed. Most innovative PC monitoring tool automatically records all typed chat records, email conversations, website visited, password, each keystrokes typed in any application, browsing history even deleted by user, documents lists, download and accessed files. Comprehensive Monitoring Software runs as a background process in your system and nobody can detect its existence except system owner as it hides its visibility from desktop icons, start menu, add-remove programs, installation files-folders, control panel program and even from hidden files too. Outstanding Keystroke logger activities monitoring utility effec ...
  • Screen Ruler 2D is a ruler for the desktop which measures in 2 dimensions (horizontal and vertical). Furthermore, an integrated color picker shows the color under the selected corner mark in different color systems and the window information panel provides technical information about the underlying window (3 in 1). Additionally, a built-in magnifier and the direct positioning aids allow to position the ruler pixel accurately simply and fast. Features: - Translucent 2-dimensional ruler wich can be adjusted horizontal and vertical in size and positioned anywhere on the screen. - At each edge of the rectangular ruler scalable guides are available. - Display of width and height of the adjusted ruler (pixel). - Display of the positions of all ruler edges with regard to the desktop coordinates. - Positioning aids (buttons) enabling to move or extend/shrink the ruler by one pixel to each side. - Positioning of ruler by buttons or cursor keys (right, left, top, down). - Extending of ruler by buttons or curs ...
  • Lock your private files and folders with mte folder locker software, you can encrypt all file types (text, office documents, pdf, mp3, images, database files, vedio and more), mte folder locker provide a real bit per bit data encryption, mte folder locker offer the following features:- file encryption for all file types, - password protect your important folders, - no one can open locked folders without valid password even if moved to another pc, - implements strong encryption algorithm, - powerful tool to encrypt your business financial data, - mte folder lockers supports all windows os (win9x, win2000, winxp, win2003, win vista and win7), - mte folder locker works on 32-bit and 64-bit versions of operating systems, - easy to use software for data protection, - store your important files into a single encrypted file, - you can hide your private files and folders with one click, - frindly interface and windows explorer integration,- mte folder locker is completly free.
  • Barcode Maker is an effective software with advanced functionality to generate customized Barcode label in efficient manner. Professional application allows user to create barcode label in different barcode symbologies such as Code 11, Interleaved 2 of 5, Codabar, many more in Avery label structure. Cost-effective application is designed with user friendly interface that offers distinctive features and functions to create professional barcode using inbuilt Avery Label in standard size for Avery products. Printable and scannable barcode easily can be edit by using inbuilt application like Corel Draw, Photoshop and conserve edited barcode in high resolution by copying to clipboard to use in other application for barcode implementation and also save barcode settings as user preference. General purpose application easily runs at distinct Versions of Windows Operating System including Vista and ME platform without technical expertise and third party involvement. Key features of Barcode Label Designer: ? ...
  • Real Sudoku3D breaks through the barriers of conventional 2D and 3D Sudoku games, and creates a truly realistic 3D Sudoku experience. Regular Sudoku is played on a 9 by 9 grid Real Sudoku3D uses 9 layers of 9 by 9 grids. The features included in this revolutionary new game include toggling all 9 layers, slices and faces on or off, auto-fill notes, tilt lock, error checking and so much more. Players are able to see the 9x9x9 cube from any and all angles, push through the transparent cubes and try their skill in three difficulty levels. This game promises hours of endless fun.. All the layers follow standard Sudoku rules, whether viewed as Faces (from front to back), Levels (from top to bottom), or Slices (from left to right). The Real Sudoku3D interface lets you dive right in and see the game from any perspective. Toggle layers on and off at will. Turn and move the game around, zoom in and out, or fly straight through! When gliding through the cubes you feel like you can touch and play with the three dimension ...
  • Real Sudoku3D breaks through the barriers of conventional 2D and 3D Sudoku games, and creates a truly realistic 3D Sudoku experience. Regular Sudoku is played on a 9 by 9 grid Real Sudoku3D uses 9 layers of 9 by 9 grids. The features included in this revolutionary new game include toggling all 9 layers, slices and faces on or off, auto-fill notes, tilt lock, error checking and so much more. Players are able to see the 9x9x9 cube from any and all angles, push through the transparent cubes and try their skill in three difficulty levels. This game promises hours of endless fun.. All the layers follow standard Sudoku rules, whether viewed as Faces (from front to back), Levels (from top to bottom), or Slices (from left to right). The Real Sudoku3D interface lets you dive right in and see the game from any perspective. Toggle layers on and off at will. Turn and move the game around, zoom in and out, or fly straight through! When gliding through the cubes you feel like you can touch and play with the thr ...
  • Quttera URL Scanner is a standalone utility used to investigate content of a web-site and to verify whether specified web site is safe to browse. Quttera URL Scanner utilizes patent-pending heuristic and non-signature based web threats detection technology solution. It is specially crafted to analyze and detect zero-day vulnerability exploits, malicious, suspicious and potentially unsafe JavaScript content. Quttera URL Scanner delivers real-time capabilities to recognize and detect "suspicious" web-content and thus alarm user before browsing of unsafe web-sites. Quttera URL Scanner was developed by security experts to make web-browsing safer. Quttera URL Scanner benefits Provides initial capabilities for recognition and filtering of potentially suspicious web sites Provides initial capabilities for generation and management database of suspicious URLs Detection of hidden unsafe HTML content Detection of suspicious JavaScript content Detection of malicious ...
  • Quick Hide IP hides your internet identity so you can surf the web while hiding you real IP and location.Quick Hide IP redirects your Internet traffic through anonymous proxies. Websites you are visiting see the IP address of the proxy server instead of your own IP address.
  • Super Utilities is a collection of tools to fix, speed up, maintain and protect your PC! These utilities include Disk Cleaner, Registry Cleaner, Spyware Removal, Uninstall Plus, StartUp Manager, Hide Folder, Tracks Washer, Super ExeLock, Super Undelete, Driver Backup, Auto shutdown, Windows Manager, Process Manager, Super Shell and Folder Size. You can get your system running at peak performance levels in few minutes with it.
  • Storage Room a Personal Information and Password Manager to protect the privacy while editing and viewing, even if the workstation is already inflicted by a spy and for save data exchange with up to 16384 Bit strong RSA Keys. Stores and protects bookmarks, contacts, notes, appointments, movie libraries and any tabular data like passwords, license keys, credit cards, application-, document- and internet shortcuts in special designed data sheets inside Storage Room. Arrange this data sheets in a folder structures, lock and protect any amount of folders and data sheets with an additional password and password file and decide how long any of them can remain open without user interaction, before Storage Room seals them automatically. The password generator creates high secure passwords and the virtual keyboard hides keyboard input. The Internet Explorer can be automated with an entirely new, innovative and secure way and forced into any desired location. Data like passwords and login details can be transferred ...
  • LockmyDrive FreeLocker is a portable data security software offering a quick, easy in use and reliable solution for your private data protection. The software can secure any sensitive information, photos, videos, important documents protecting your files from unauthorized viewing, copying and deletion. It can be used to secure files and folders on internal and external hard drives, USB Flash drives and all types of memory cards. LockmyDrive FreeLocker (free software version) supports free locking functionality allowing you to lock your device with a password restricting access to its contents. Each user is also provided with 2 Gb of free online file storage for keeping the most valuable files in a secure place and access them whenever needed from any device connected to the Internet. Paid software versions (LockmyDrive Instant and LockmyDrive Strong) offer additional functionality. LockmyDrive Instant enables you to hide all files and folders contained on your device making them invisible and inaccessible to ...
  • SharePoint administrators can now assign to Users and User Groups all relative permissions at Columns-and Views-level. Permissions can even be defined using conditions, so that the values of certain fields determine permissions dynamically. Permissions settings can be imported or exported as XML file for easy management and batch permissions assignment. SharePoint Column/View Permission provides further protection on list columns and views than the SharePoint permission system does. Using it, you can safeguard the confidential column contents from access and edition by unauthorized users. SharePoint Column/View Permission allows administrators to hide or read-only columns to specified users. So unauthorized users will not see or edit the columns at all. Use SharePointBoost Column/View Permission to set "Employee ID" and "Manager" Columns as ready only. Assign view permission to specified users, full access, hidden or read-only (disable edit view). Column/View Permission also gives ...
  • Invisible messenger spy software that records all Yahoo! Messenger incoming and outgoing chat text. Send reports to your custom email address or ftp. You can check all recorded messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Assign read-only/edit permissions for individual columns within a SharePoint list view, or hide the columns entirely; Assign view-level permissions by specifying whether the view is hidden, read-only, or fully accessible for users and groups; Assign form-level permissions for the "create new item", "edit item" and "view item" forms (hide specific fields completely, or restrict them to read-only access); Assign item-level permissions to users and user-groups as items are created or modified, or retroactively apply permissions for previously existing items within a SharePoint list; Remove all custom permission settings and restore defaults for specified users or user-groups in bulk; Determine the users and user groups that will be assigned custom permission settings according to conditions specified by the SharePoint administrator. SharePoint Permissions Boost is the all-in-one SharePoint permissions management solution. This pack contains all three ...
  • The SharePoint AD Self Service web part allows users to modify their personal Active Directory account information in an easy to use, user-friendly SharePoint web part. As an AJAX web part, SharePoint AD Self Service provides users with enjoyable using experience by enabling them to bypass annoying post backs and complete the modification easily. To make changes to their AD properties, what users need to do is type in the user name and password to enter into the page where the AD Self Service web part being added. The web part will automatically detect current login user and domain, retrieving his/her information from AD and display them in the web part. Then, users can start to modify. Finally, by clicking ?save?, the whole process has been completed. Moreover, IT administrators have complete control over which properties may be changed and by whom. IT administrators and domain admin members can configure settings in SharePoint Central Administration to restrict and exclude users from changing properties ...
  • Design Grid is an easy to use design tool. The program allows you to control the sizes and proportions in your design. It has an austere design with auto-hide controls. Design Grid will be useful in designing user interfaces, web interfaces, graphic elements, for photo editing and analyzing graphs. You can download and try program for free!
  • DEKSI Shield allows you to hide and password protect your folders and set access rights using an encryption tool and protection wizard. DEKSI Shield is the most advanced, powerful and feature rich protection program for your computer system: hide files, folders, and drives, and set access rules using flexible security combinations for your most valuable data. A unique feature of DEKSI Shield is the combination of data hiding and encrypting. Features include: 1. Ability to hide files, folders, or drives from all other users (including the administrator). 2. Encrypts files and folders. 3. A mask that allows you to hide file groups (for example, c:*.doc). 4. Ability to set permissions (Read, Write, Visibility, Delete) for any files, folders, and drives. For example, you can make your files Read Only and make it impossible to delete them. 5. An access lock on your private folders and settings (My Documents, Favorites, Control Panel, Internet History, etc. 6. A protection wizard. 7. Password prote ...
  • Normally, web browsers are only allowing to view and delete browsed web history using it. It will not protect your privacy 100%. Using this tool you can change recently browsed web history. This tool very easy to use. You can view your recent browsed website list and changed them just one click.
  • FLYVPN supports PPTP, L2TP and OpenVPN protocols; FLYVPN can based on applications with or without VPN;FLYVPN has hundreds of VPN servers and IPs in many areas all over the world, such as the USA, South Korea, Hong Kong, China ,Taiwan,UK;FLYVPN purpose is Unblock Websites/ VOIP's,Security & Anonymity,USA/China TV/Online video Watching,USA/Korea/Taiwan Online gaming,Hide/Change Your IP; VPN for iPhone,iPad,Android,mac;
  • Prompt is an affordable simple teleprompter software solution for Mac and Windows. User configurable, Prompt! can save in it's own format and .txt to share between users on Mac and Windows. Features: Plain text can be imported and exported. - Simple text edit including copy, cut and paste. - Control over font size and font choice. - User control of scroll speed and smoothness using the mouse or keyboard or remote (not supplied). - Looping function for unattended use in the keyboard run mode with single display. - Prompt saves in it?s own file format (.pmt). So you can send a Prompt file to the person who will be reading and they can send it back to you with their own TABS set, masking placement and any changes to the text including the font size. - You can click and drag the Prompt window to reposition by clicking on the titlebar or the gray area in the edit area or the filename in the scrolling area. - Option to hide the desktop with black. - Macintosh or Windows playback with interchang ...
  • This product combines 16 Windows cleaning and optimization tools to keep your system running fast and secure. Hard Drive Washer deletes unnecessary data, Surf Trail Washer deletes your internet trail, Registry Washer cleans up your Registry. Startup Booster allows you to configure your Windows startup, File Washer erases data completely and File Encrypter can hide it. With Settings Organizer you configure or tune up your system ... and much more!
  • The safest and most convenient Secure Folder supports Folder lock, Folder Encrypt and Folder Hide functions. No worry about leaking own personal data to others, no worry about third party spam ware upload or steal your important files, because they cannot even find your file or only can see rubbish data. It's a safe home for your personal photos, diaries, home plans, company reports etc.
  • Outlook has many folders that you don't need, but can't delete. But with HideOutlookFolders you can HIDE them. Hide Inbox, Outbox, RSS Feeds, Sent items, Deleted Items, Drafts and more. Just a simple click and they'll be gone from the Outlook tree. This is extremely useful if you have several PST files and thus each folder several times in the folder tree.
  • The SharePoint AD Self Service web part allows users to modify their personal Active Directory account information in an easy to use, user-friendly SharePoint web part. As an AJAX web part, SharePoint AD Self Service provides users with enjoyable using experience by enabling them to bypass annoying post backs and complete the modification easily. To make changes to their AD properties, what users need to do is type in the user name and password to enter into the page where the AD Self Service web part being added. The web part will automatically detect current login user and domain, retrieving his/her information from AD and display them in the web part. Then, users can start to modify. Finally, by clicking ?save?, the whole process has been completed. Moreover, IT administrators have complete control over which properties may be changed and by whom. IT administrators and domain admin members can configure settings in SharePoint Central Administration to restrict and exclude users from changing properties ...
  • SharePoint Column/View Permission provides the ability to secure access to individual columns in list views or document libraries, making it an ideal solution for consolidating a broad spectrum of information into a centralized location without exposing secured data to unauthorized users. After configuring permissions for a SharePoint list view, only authorized users will see the content of a secure column as if it were a normal column, while unauthorized users will not see the content of the column at all. Column/View Permission also offers the ability to set individual columns as "read-only" in any list view, so that information can be viewed, but not edited, by users. With SharePoint Column/View permission, you can also assign form-level permissions for the "create new item", "edit item" and "view item" forms, allowing you to hide specific fields completely, or restrict them to read-only access so users can see them, but cannot make ...

Page 6 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware