Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Kernel for VHD Recovery is an outstanding software that recovers files from damaged VHD drives. Kernel for VHD Recovery software effectively restores data and allows using files without a virtual machine. With Kernel for VHD Data Recovery software, a user can impeccably recover data from existing VHD drives. Kernel for VHD Recovery software recovers all types of files such as images, video & audio files, database files, documents, media files, archives, etc. Kernel for VHD Recovery software is equipped with three recovery modes: Quick Scan, Extensive Scan, and File Trace. These recovery modes enable the user to recover the lost data based on the various data loss situations. Kernel for VHD Recovery software maintains the logical structure, formatting, and properties of the recovered files and folders. While recovering the lost files, Kernel for VHD Recovery software arranges them in their respective folders. Kernel for VHD Recovery software provides fast searching option to search the parti ...
  • Power Spy software secretly logs Facebook use, keystrokes, chats & IMs, emails, web visits, games, searches, shopping history, user names, passwords and more. It supports Windows Live Messenger, Yahoo Messenger, Skype, ICQ and more. It's invisible to monitored users. However, it is easy for you to unhide its interface with hotkeys. You can receive reports remotely via email or ftp. Perfect for monitoring employees, kids and spouse.
  • WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock you can control how long others can use your computer, disable Windows hot keys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.), lock Windows desktop, hide the Start button, lock files and folders, filter Internet content and much more.
  • Trustworthy keyboard monitoring program includes uncomplicated installation process along with best aspect which hides from desktop, control panel, add/remove programs, installation files/folders also has handy capability to get customized for specific functions. Interactive Free Spy Software for windows operating system can be straightforwardly downloaded from www.freespysoftware.mobi which is superlative and proper program for administrating system, employer, office managers, parents and many more. Reliable activity monitor application efficiently supervise online transactions of spouse and builds report in format of txt or html file according to user necessity moreover uses hot key combination or run command settings to unhide the software at the time of running mode. Pioneering Free Spy Software proffers potential to system administrator to supervise each executed activity through family members, friends or company employees on your private computer at your absence. Consistent Free Spy Software encloses a ...
  • PC Spy Monitor secretly monitors Facebook, chats, emails, keystrokes, passwords and sends reports to your email or ftp. It logs Windows Live Messenger, Skype, Yahoo Messenger and other IMs. It also takes photo shots of online video talk like a surveillance camera. PC Spy Monitor runs so stealthily that the monitored user won't even know it. You can use hotkey to unhide it and change settings. It is a must have tool for you to reveal the
  • Hideman - ideal solution for protecting your privacy and security on the Internet. Using Hideman you can: - become truly anonymous on the Internet. Your IP address will be replaced by one of our servers, and your real location will be untraceable. - Protect your data in an unsafe WiFi networks. Interests of hackers increased during the rapid growth of WiFi hotspots. Leave them with nothing with help of reliable 256-bit encryption. - Clean up internet of advertising networks.
  • Hibosoft BossComing Boss Key is a professional and reliable application designed to protect your privacy and hide sensitive information. It is a powerful, intuitive and easy to use boss key application based on virtual desktop techniques. Hibosoft BossComing Boss Key can hide window, protect your privacy and hide sensitive information from prying eyes in seconds.
  • Windows Snapshot Grabber can capture window to get Title Class Font and etc. and Windows Snapshot Grabber can set window as Topmost Enabled or Disabled Show or Hide window set Transparent capture a window Snapshot or screenshots with menus. Windows Snapshot Grabber supports capture window snapshot or capture region screenshots. Windows Snapshot Grabber also supports delay snapshot with press and release Shift it is real convenient.
  • Folder Password Lock Free can protect a folder file or any documents, videos, images that you need to lock. Simply drag-n-drop the data to be hidden to the main security window. Directories and files will be hidden immediately and secured with a password. Folder Password Lock Free is freeware software. Download it and find out how to hide a folder. Prevent access to a directory or file on Windows 7, Vista & XP. No crack, serial or key needed.
  • Company designs Keylogger Free software with full functionality and flexibility to consistent watch over entire work performed by company employees without actually being noticed them. Download cost effective Keylogger Free tool from www.keylogger.in to secretly maintain encrypted log file of unknown user actions on your personal computer or laptop in txt or html file formats as per convenient. Comprehensive keyboard monitoring application allows user to record windows login and system time modifications in simplified manner. Most innovative Keylogger Free program traces all type of web pages with complete information of name, accessed time and title of website. Keylogger Free program facilitates you to records login name and password typed in various applications by outside person on your system. Highly interactive Keylogger Free application provides the easiest way to monitor overall activities performed on PC by children, outside user, staff employees, office colleagues, friends, family members, relatives, ...
  • Folder Lock Free can password protect a folder file or any documents, videos, images that you need to lock. Simply drag-n-drop the data to be hidden to the main security window. Directories and files will be hidden immediately and secured with a password. Folder Lock free is freeware software. Download it and find out how to hide a folder the easy way. Prevent access to a directory or file on Windows 7, Vista & XP. No crack, serial or key needed.
  • CyberSafe is one of the perfect solutions for data encryption software. It provides the ultimate data security features including support for many different algorithms and encryption methods. You can hide files and folders and encrypt them so that no one can ever access your data unexpectedly. Skype chat messages, emails and Amazon S3 encryption are also supported by this powerful all-in-one solution.
  • FoxyVPN provides a secure anonymous proxy VPN tunnel between you and the Internet, for free. Hide your IP address, surf the web anonymously, and protect your online identity by encrypting all your Internet traffic. With it's parent company in the online privacy market for more than 6 years, our experience at FoxyVPN allows us to provide the highest quality proxy VPN experience for an amazing value. Download FoxyVPN now for free!
  • Is it possible to find out what web sites recently visited by kids even after they deleted all internet browser's history, cache, temp files, cookies and everything from PC? Yes, download highly reliable windows spy software from www.v-spy.com and start recording all online and offline activities of child without being noticing them. Keylogger software allowed business owners to catch all those employees sneaking around to look at websites that not related to office work. All-in-one windows spy software empowers schools and universities to keep eyes to students to know what they surfing around on the internet using computer lab PCs. Advance spyware utility allowed you to scrutinize and record web browsing habits of your spouse to catch him/her red handed in real time. Windows spy software records all typed instant messages, websites with login/password details, opened/modified documents, system logon and switch off time, chat conversation, social networking sites comments, blog posting, download/upl ...
  • Download reasonable priced Monitoring Software from http://www.digitalpccare.com that facilitates user to have full control over their computer system when they are outside and unable to monitor and come to know what activities were performed on PC by kids, friends, spouse, cousins, relatives, staff colleagues, business partners, classmate or others with the help of recorded log file of each key pressed. Most innovative PC monitoring tool automatically records all typed chat records, email conversations, website visited, password, each keystrokes typed in any application, browsing history even deleted by user, documents lists, download and accessed files. Comprehensive Monitoring Software runs as a background process in your system and nobody can detect its existence except system owner as it hides its visibility from desktop icons, start menu, add-remove programs, installation files-folders, control panel program and even from hidden files too. Outstanding Keystroke logger activities monitoring utility effec ...
  • Screen Ruler 2D is a ruler for the desktop which measures in 2 dimensions (horizontal and vertical). Furthermore, an integrated color picker shows the color under the selected corner mark in different color systems and the window information panel provides technical information about the underlying window (3 in 1). Additionally, a built-in magnifier and the direct positioning aids allow to position the ruler pixel accurately simply and fast. Features: - Translucent 2-dimensional ruler wich can be adjusted horizontal and vertical in size and positioned anywhere on the screen. - At each edge of the rectangular ruler scalable guides are available. - Display of width and height of the adjusted ruler (pixel). - Display of the positions of all ruler edges with regard to the desktop coordinates. - Positioning aids (buttons) enabling to move or extend/shrink the ruler by one pixel to each side. - Positioning of ruler by buttons or cursor keys (right, left, top, down). - Extending of ruler by buttons or curs ...
  • Lock your private files and folders with mte folder locker software, you can encrypt all file types (text, office documents, pdf, mp3, images, database files, vedio and more), mte folder locker provide a real bit per bit data encryption, mte folder locker offer the following features:- file encryption for all file types, - password protect your important folders, - no one can open locked folders without valid password even if moved to another pc, - implements strong encryption algorithm, - powerful tool to encrypt your business financial data, - mte folder lockers supports all windows os (win9x, win2000, winxp, win2003, win vista and win7), - mte folder locker works on 32-bit and 64-bit versions of operating systems, - easy to use software for data protection, - store your important files into a single encrypted file, - you can hide your private files and folders with one click, - frindly interface and windows explorer integration,- mte folder locker is completly free.
  • Barcode Maker is an effective software with advanced functionality to generate customized Barcode label in efficient manner. Professional application allows user to create barcode label in different barcode symbologies such as Code 11, Interleaved 2 of 5, Codabar, many more in Avery label structure. Cost-effective application is designed with user friendly interface that offers distinctive features and functions to create professional barcode using inbuilt Avery Label in standard size for Avery products. Printable and scannable barcode easily can be edit by using inbuilt application like Corel Draw, Photoshop and conserve edited barcode in high resolution by copying to clipboard to use in other application for barcode implementation and also save barcode settings as user preference. General purpose application easily runs at distinct Versions of Windows Operating System including Vista and ME platform without technical expertise and third party involvement. Key features of Barcode Label Designer: ? ...
  • Real Sudoku3D breaks through the barriers of conventional 2D and 3D Sudoku games, and creates a truly realistic 3D Sudoku experience. Regular Sudoku is played on a 9 by 9 grid Real Sudoku3D uses 9 layers of 9 by 9 grids. The features included in this revolutionary new game include toggling all 9 layers, slices and faces on or off, auto-fill notes, tilt lock, error checking and so much more. Players are able to see the 9x9x9 cube from any and all angles, push through the transparent cubes and try their skill in three difficulty levels. This game promises hours of endless fun.. All the layers follow standard Sudoku rules, whether viewed as Faces (from front to back), Levels (from top to bottom), or Slices (from left to right). The Real Sudoku3D interface lets you dive right in and see the game from any perspective. Toggle layers on and off at will. Turn and move the game around, zoom in and out, or fly straight through! When gliding through the cubes you feel like you can touch and play with the three dimension ...
  • Real Sudoku3D breaks through the barriers of conventional 2D and 3D Sudoku games, and creates a truly realistic 3D Sudoku experience. Regular Sudoku is played on a 9 by 9 grid Real Sudoku3D uses 9 layers of 9 by 9 grids. The features included in this revolutionary new game include toggling all 9 layers, slices and faces on or off, auto-fill notes, tilt lock, error checking and so much more. Players are able to see the 9x9x9 cube from any and all angles, push through the transparent cubes and try their skill in three difficulty levels. This game promises hours of endless fun.. All the layers follow standard Sudoku rules, whether viewed as Faces (from front to back), Levels (from top to bottom), or Slices (from left to right). The Real Sudoku3D interface lets you dive right in and see the game from any perspective. Toggle layers on and off at will. Turn and move the game around, zoom in and out, or fly straight through! When gliding through the cubes you feel like you can touch and play with the thr ...
  • Quttera URL Scanner is a standalone utility used to investigate content of a web-site and to verify whether specified web site is safe to browse. Quttera URL Scanner utilizes patent-pending heuristic and non-signature based web threats detection technology solution. It is specially crafted to analyze and detect zero-day vulnerability exploits, malicious, suspicious and potentially unsafe JavaScript content. Quttera URL Scanner delivers real-time capabilities to recognize and detect "suspicious" web-content and thus alarm user before browsing of unsafe web-sites. Quttera URL Scanner was developed by security experts to make web-browsing safer. Quttera URL Scanner benefits Provides initial capabilities for recognition and filtering of potentially suspicious web sites Provides initial capabilities for generation and management database of suspicious URLs Detection of hidden unsafe HTML content Detection of suspicious JavaScript content Detection of malicious ...
  • Quick Hide IP hides your internet identity so you can surf the web while hiding you real IP and location.Quick Hide IP redirects your Internet traffic through anonymous proxies. Websites you are visiting see the IP address of the proxy server instead of your own IP address.
  • Super Utilities is a collection of tools to fix, speed up, maintain and protect your PC! These utilities include Disk Cleaner, Registry Cleaner, Spyware Removal, Uninstall Plus, StartUp Manager, Hide Folder, Tracks Washer, Super ExeLock, Super Undelete, Driver Backup, Auto shutdown, Windows Manager, Process Manager, Super Shell and Folder Size. You can get your system running at peak performance levels in few minutes with it.
  • Storage Room a Personal Information and Password Manager to protect the privacy while editing and viewing, even if the workstation is already inflicted by a spy and for save data exchange with up to 16384 Bit strong RSA Keys. Stores and protects bookmarks, contacts, notes, appointments, movie libraries and any tabular data like passwords, license keys, credit cards, application-, document- and internet shortcuts in special designed data sheets inside Storage Room. Arrange this data sheets in a folder structures, lock and protect any amount of folders and data sheets with an additional password and password file and decide how long any of them can remain open without user interaction, before Storage Room seals them automatically. The password generator creates high secure passwords and the virtual keyboard hides keyboard input. The Internet Explorer can be automated with an entirely new, innovative and secure way and forced into any desired location. Data like passwords and login details can be transferred ...
  • LockmyDrive FreeLocker is a portable data security software offering a quick, easy in use and reliable solution for your private data protection. The software can secure any sensitive information, photos, videos, important documents protecting your files from unauthorized viewing, copying and deletion. It can be used to secure files and folders on internal and external hard drives, USB Flash drives and all types of memory cards. LockmyDrive FreeLocker (free software version) supports free locking functionality allowing you to lock your device with a password restricting access to its contents. Each user is also provided with 2 Gb of free online file storage for keeping the most valuable files in a secure place and access them whenever needed from any device connected to the Internet. Paid software versions (LockmyDrive Instant and LockmyDrive Strong) offer additional functionality. LockmyDrive Instant enables you to hide all files and folders contained on your device making them invisible and inaccessible to ...

Page 6 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware