Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Elerium Excel .NET is a professional .NET component that can be used in any type of .NET (C#, VB.NET) projects. Developers can easily add functionality of create/read/write Excel files (XLS, XLSX, CSV) to WinForms / ASP.NET applications. Elerium Excel .NET has rich set of methods to edit the cells of Excel Worksheets either XLS XLSX or CSV files. Code Examples (C# VB.NET) shows how to adjust cell styles, fonts, borders etc. Elerium Excel .NET is a standalone component that compatible with .NET 2.0 and higher and does not depend on third-party libraries and Microsoft Office Automation. Key features: - Excel files XLSX, XLS, CSV. - Methods for Reading / Writing Excel files (see C# VB.NET examples). - Various cell data types (numbers, strings, dates, floating point etc.) - Multiple Excel worksheets. - Number formatting (number,currency, date, time, fraction etc.) - Font formatting (size, color, font type, italic and strikeout properties, boldness, underlining, subscript and superscript). - Cell a ...
  • Many people believe that passwords are all that's needed to keep pirating eyes away from the data stored on their computers. But if that were true, there'd be no such thing as a "hacker." While passwords are certainly helpful, it takes a lot more than that to protect the information on your computer. With malicious malware products lurking about on the Internet, it's worth having extra layers of data security on your side. Sometimes an innocent-looking website can be a hacker in disguise. Nosey coworkers, bosses, friends, and even spouses can also pose a threat to our privacy. With A+ Folder Locker, you can store files, folders, drives, and even complete software programs in special data storage "lockers." Not only do these lockers keep the names of the files and folders you store in them from being viewed, the robust level of security of the lockers make them virtually impossible to break into. A+ Folder Locker also includes a variety ...
  • With Taskbar Hide you can fully control the taskbar.Hide windows program (hide applications) or close them completely through a hotkey,or minimize them to system tray.Hide some less used icons from system tray.Reorder the windows on taskbar based on your choice.Change the icon and title of any window.Automatically maximize all new windows or only new IE windows.Set any application window always on top or show it's property.
  • A free tool which can hide and password protect your private folders so no one else can access them. It has 3 protect modes: hide, lock, and lock with password. The "hide" mode can combine with other "lock" modes to create total hidden folder. Works for Windows 7.0, Vista and XP (including their 32 and 64 bit variants)
  • Cok Free Auto Clicker is a nice zero cost software that used by clicking computer mouse auto-magically and continuously, it might simulate both left mouse click and right mouse click. You will only need to specify the time intervals of nonstop mouse click and tap the preset hotkey, planning to simply click automatically and non-stop, and planning to end this affair once you press the hotkey another time. Cok Free Auto Clicker is not a worry for using, You can study to make use of it within just 60 seconds or so. How to use Cok Free Auto Clicker 1. Specify model mouse click: left side mouse click or right click; 2. Define time length of click; 3. Specify start&pause hotkey, default is Ctrl + D, you'll be able to modify it to any hotkey for which you like. 4. Specify auto run with windows startup. In case you tick this selection on, application will begin without delay when ever computer system boot up. 5. Define auto hide to tray. Once this software launch, it would minimize to tray automatical ...
  • Real Free Keylogger secretly logs every keystroke users type on a computer keyboard while you are away. This includes their chats & IMs, emails, private documents, online searches, user name, passwords and more. It is invisible to any other users but you. You can unhide the program from Stealth Mode with your hotkey. It is a great tool to catch cheaters, protect kids and monitor employees or students.
  • Don't waste time to find and test public proxies. Just select a USA/Europe IP you wish to use from our list. Every IP address you see is 100% usable, high anonymous and secure! Both Http and Https are supported. We don't require user to input any personal info to use, we don't log and track any user behavior. We provide 3-day free trial for users to verify the service.
  • Hides your IP address while you are browsing the Internet and protects your identity. Whenever you surf the Web or do something else on the Internet, this program will totally protect you. Freely use any web browsers, instant messengers, P2P file sharing, e-mail and any other applications without fear of being exposed to others - nobody will see your real IP address anymore. This utility has a great functionality and it's simple and inexpensive.
  • Protecting and hiding folders and files on your computer prevents other users of the machine from being able to access them. If you want to make this possible, you will need third-party software. Private Folders Lite provides the perfect private folder solution to users with any level of experience, including complete novices. Private Folders Lite supports all versions of Windows as well as FAT and NTFS file systems.
  • Hide or password-protect any file instantly by clicking on it. Advanced File Vault works with all file types including pictures and movies. Once a file is locked or hidden, it is completely encrypted and none of its contents can be viewed. To lock a file or folder, simply right-click on it and select the lock option. Extremely easy to use. Online help is also available.
  • CDBFview is a plugin for Total Commander. It allows you to view DBF files in Lister's window (Also in Quick View Panel). You can: search some text in the DBF file. copy to the clipboard the selected record. hide or show deleted records. sort DBF file by clicking on a column header. set default order of records. switch Ansi/OEM charset (Autodetect Ansi/OEM is available, too).
  • trimDesk is a smart desktop tool, which can help to handle easily the Windows desktop. trimDesk can hide or show desktop icons, gadgets, taskbar and wallpaper, or start applications with your favorite desktop settings. You can define also keyboard shortcuts for all the functions. trimDesk has a very small toolbar that blends perfectly into the desktop. The tool is useful for giving presentations, protect your privacy at work, taking clean screenshots or demonstrating miscellaneous documents. trimDesk allows you to present content on your desktop in whatever way you like. Control the system volume with keyboard shortcuts or use the configurable 'Exit Windows' button to end your Windows session. With this feature you can shutdown Windows, sign out, hibernate or sleep the computer with one click directly. Alternatively, you can show the Windows shutdown dialog to select the appropriate action by pressing the 'Exit Windows' button. The tool can be configured with over 2 ...
  • The program Hide Windows Freeware Edition is a small utility designed to hide programs windows, and running it in the background, invisible mode when the program runs, but on the desktop you can not see it. You can also set a hot key combination to hide and show the windows.
  • My IP Hide is the client-end software of our encrypted proxy service. It can help you to unblock websites and protect your Internet privacy. Unblock websites: In some companies or countries (ex. China, Egypt and Iran) the management blocks some websites (ex. facebook and youtube). My IP Hide can unblock the sites. It uses encrypted connections to bypass the firewall as well as content filtering system while ordinary proxy can only bypass IP/domain block. Internet privacy: Websites know much information through your IP address. For example, from your IP we can know your country. My IP Hide can hide your IP to protect your Internet privacy. Unblock facebook: Facebook is blocked in your company or country? My IP Hide is a secure facebook proxy. It uses encrypted connections to unblock facebook. It can bypass the advanced firwall while ordinary proxy can only bypass IP/domain block. Unblock youtube: Youtube is blocked in your company or country? My IP Hide is a fast youtube proxy. It uses fast encrypt ...
  • A program that allows to connect to any Internet service through a chain of SOCKS or HTTP proxies to hide the actual IP address. It also possible to work with a programs that are not designed to support SOCKS protocol directly.
  • WonderFox Document Manager is an almighty documents management program. Users can manage your office documents on computer conveniently. You can list and backup all target documents with few clicks, instead of searching and backup them one by one. You can protect your office documents by Lock, Hide and Encryption to prevent accidental deletion or protect your privacy. You can also convert PDF to Word, Excel or Text (this feature is coming soon).
  • Kernel for VHD Recovery is an outstanding software that recovers files from damaged VHD drives. Kernel for VHD Recovery software effectively restores data and allows using files without a virtual machine. With Kernel for VHD Data Recovery software, a user can impeccably recover data from existing VHD drives. Kernel for VHD Recovery software recovers all types of files such as images, video & audio files, database files, documents, media files, archives, etc. Kernel for VHD Recovery software is equipped with three recovery modes: Quick Scan, Extensive Scan, and File Trace. These recovery modes enable the user to recover the lost data based on the various data loss situations. Kernel for VHD Recovery software maintains the logical structure, formatting, and properties of the recovered files and folders. While recovering the lost files, Kernel for VHD Recovery software arranges them in their respective folders. Kernel for VHD Recovery software provides fast searching option to search the parti ...
  • Power Spy software secretly logs Facebook use, keystrokes, chats & IMs, emails, web visits, games, searches, shopping history, user names, passwords and more. It supports Windows Live Messenger, Yahoo Messenger, Skype, ICQ and more. It's invisible to monitored users. However, it is easy for you to unhide its interface with hotkeys. You can receive reports remotely via email or ftp. Perfect for monitoring employees, kids and spouse.
  • WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer, disable Windows hot keys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.), lock Windows desktop, hide the Start button, lock files and folders, filter Internet content and much more.
  • Trustworthy keyboard monitoring program includes uncomplicated installation process along with best aspect which hides from desktop, control panel, add/remove programs, installation files/folders also has handy capability to get customized for specific functions. Interactive Free Spy Software for windows operating system can be straightforwardly downloaded from www.freespysoftware.mobi which is superlative and proper program for administrating system, employer, office managers, parents and many more. Reliable activity monitor application efficiently supervise online transactions of spouse and builds report in format of txt or html file according to user necessity moreover uses hot key combination or run command settings to unhide the software at the time of running mode. Pioneering Free Spy Software proffers potential to system administrator to supervise each executed activity through family members, friends or company employees on your private computer at your absence. Consistent Free Spy Software encloses a ...
  • PC Spy Monitor secretly monitors Facebook, chats, emails, keystrokes, passwords and sends reports to your email or ftp. It logs Windows Live Messenger, Skype, Yahoo Messenger and other IMs. It also takes photo shots of online video talk like a surveillance camera. PC Spy Monitor runs so stealthily that the monitored user won't even know it. You can use hotkey to unhide it and change settings. It is a must have tool for you to reveal the
  • Hideman - ideal solution for protecting your privacy and security on the Internet. Using Hideman you can: - become truly anonymous on the Internet. Your IP address will be replaced by one of our servers, and your real location will be untraceable. - Protect your data in an unsafe WiFi networks. Interests of hackers increased during the rapid growth of WiFi hotspots. Leave them with nothing with help of reliable 256-bit encryption. - Clean up internet of advertising networks.
  • Hibosoft BossComing Boss Key is a professional and reliable application designed to protect your privacy and hide sensitive information. It is a powerful, intuitive and easy to use boss key application based on virtual desktop techniques. Hibosoft BossComing Boss Key can hide window, protect your privacy and hide sensitive information from prying eyes in seconds.

Page 6 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware