Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • FLYVPN supports PPTP, L2TP and OpenVPN protocols; FLYVPN can based on applications with or without VPN;FLYVPN has hundreds of VPN servers and IPs in many areas all over the world, such as the USA, South Korea, Hong Kong, China ,Taiwan,UK;FLYVPN purpose is Unblock Websites/ VOIP's,Security & Anonymity,USA/China TV/Online video Watching,USA/Korea/Taiwan Online gaming,Hide/Change Your IP; VPN for iPhone,iPad,Android,mac;
  • Download Movies ? An all-in-one leading stream downloader to download favorite online movies, streaming video, online flash and interactive VOD. ? Downloads multiple streaming video at one time with fast speed. ? Download online movies with only one click by express interface. ? Intelligently analyzes the source video URL. ? Playback of the downloaded video files saved on your PC. ? Converts the downloaded online movies to various formats as you desire and transports them to your media devices. ? Supports various popular browsers including IE, Firefox, Opera, Chrome, Safari, etc. ? Supports various video websites such as Youtube, IMDB, Blip.tv, Vimeo, Video.google, Movieweb, Video.yahoo, etc. Capture Movies ? Captures anything playing on your PC whenever you want. ? Drags a region for capture manually. ? Picks an object for capture automatically. ? Shows or hides the capture frame. ? Makes various preferred settings for the captured video/audio. ? Converts the captured streaming video/audio t ...
  • Prompt is an affordable simple teleprompter software solution for Mac and Windows. User configurable, Prompt! can save in it's own format and .txt to share between users on Mac and Windows. Features: Plain text can be imported and exported. - Simple text edit including copy, cut and paste. - Control over font size and font choice. - User control of scroll speed and smoothness using the mouse or keyboard or remote (not supplied). - Looping function for unattended use in the keyboard run mode with single display. - Prompt saves in it?s own file format (.pmt). So you can send a Prompt file to the person who will be reading and they can send it back to you with their own TABS set, masking placement and any changes to the text including the font size. - You can click and drag the Prompt window to reposition by clicking on the titlebar or the gray area in the edit area or the filename in the scrolling area. - Option to hide the desktop with black. - Macintosh or Windows playback with interchang ...
  • This product combines 16 Windows cleaning and optimization tools to keep your system running fast and secure. Hard Drive Washer deletes unnecessary data, Surf Trail Washer deletes your internet trail, Registry Washer cleans up your Registry. Startup Booster allows you to configure your Windows startup, File Washer erases data completely and File Encrypter can hide it. With Settings Organizer you configure or tune up your system ... and much more!
  • The safest and most convenient Secure Folder supports Folder lock, Folder Encrypt and Folder Hide functions. No worry about leaking own personal data to others, no worry about third party spam ware upload or steal your important files, because they cannot even find your file or only can see rubbish data. It's a safe home for your personal photos, diaries, home plans, company reports etc.
  • Outlook has many folders that you don't need, but can't delete. But with HideOutlookFolders you can HIDE them. Hide Inbox, Outbox, RSS Feeds, Sent items, Deleted Items, Drafts and more. Just a simple click and they'll be gone from the Outlook tree. This is extremely useful if you have several PST files and thus each folder several times in the folder tree.
  • The SharePoint AD Self Service web part allows users to modify their personal Active Directory account information in an easy to use, user-friendly SharePoint web part. As an AJAX web part, SharePoint AD Self Service provides users with enjoyable using experience by enabling them to bypass annoying post backs and complete the modification easily. To make changes to their AD properties, what users need to do is type in the user name and password to enter into the page where the AD Self Service web part being added. The web part will automatically detect current login user and domain, retrieving his/her information from AD and display them in the web part. Then, users can start to modify. Finally, by clicking ?save?, the whole process has been completed. Moreover, IT administrators have complete control over which properties may be changed and by whom. IT administrators and domain admin members can configure settings in SharePoint Central Administration to restrict and exclude users from changing properties ...
  • SharePoint Column/View Permission provides the ability to secure access to individual columns in list views or document libraries, making it an ideal solution for consolidating a broad spectrum of information into a centralized location without exposing secured data to unauthorized users. After configuring permissions for a SharePoint list view, only authorized users will see the content of a secure column as if it were a normal column, while unauthorized users will not see the content of the column at all. Column/View Permission also offers the ability to set individual columns as "read-only" in any list view, so that information can be viewed, but not edited, by users. With SharePoint Column/View permission, you can also assign form-level permissions for the "create new item", "edit item" and "view item" forms, allowing you to hide specific fields completely, or restrict them to read-only access so users can see them, but cannot make ...
  • With Private Folders you will find out how easy is to protect your private files. Private Folder protects your data in a natural way - it simply hides your files and folders. And your data will be hidden until you decide to reveal them. All you need to protect your data is to add your secret folders to the list. When you need to access your protected data, simply press a hotkey and type your password your files will become visible immediately!
  • Hide and Secret is a fun and addictive hidden object game and one of the hundreds of great completely free and full games available at MyPlayCity.com. Players will work through over twenty levels across a wide variety of thirty beautifully-rendered scenes to accomplish victory. A conniving thief with dreams of world domination has stolen some powerful magical artifacts from a museum and the player will have limited time to get them back.
  • Super Asterisk viewer is an most handy program which shows hidden password on dialog or web page or dial-up box, that are covered as the asterisks (*****).it support to find out Ftp password,outlook password,dial-up network password and IE password,chrome will show password by itself. whatever is using asterisk to hide true password is all supported,like MySpaceIM, AIM Pro, Google Talk, Paltalk, Digsby, FileZilla, FlashFXP, VNC, IncrediMail
  • Some of the programs main features - Go to (open) a selected website directly from the program. - File encryption for all your website logon and password details. - File encryption for your program access password. - Store also non-related website Passwords, PIN numbers and/or User names. - Optionally record notes about each individual web site. - The program will automatically record the date added, updated and last visited. - The program will automatically record the number of visits made to each website. - Define your own categories to enable the grouping of websites of the same type. - Copy your Logon ID (User Name) ready to Paste into the logon area of a website. - Copy your Logon Password ready to Paste into the logon area of a website. - Optionally view or hide your Logon ID and Passwords in the Browse List. - Tag website records in the Browse List as being a favorite. - Highlight web sites in the Browse List as an additional form of indexing. - Color websites in the Browse List as yet a ...
  • Plug-in for VirtualDub that hides faces or objects in videos. Automatic face detection with configurable parameters, all detected faces will be pixelized. Manual selection to obscure face regions or non-face objects (logos, car license plates etc.). Automatic tracking - each detected face or selected object will be tracked and obscured in subsequent frames untill it will disappear. There are no general limitations on frame side or aspect ratio, however at least 0.3 megapixels are recommended for confident face detection. HD video (1280 x 720 pixels) file is processed at 12 FPS on Core 2 2.66 GHz processor. The plug-in trial has full functionality but requires constant Internet connection during evaluation time.
  • Bsecsoft Data Locker is professional file encryption and folder lock software which offers you best way of encrypting and password protecting files and folders. It can safely protect any file and folder on your PC from being seen, read or modified. The Data Locker is easy to use, just like a safety box, and support to drag and drop the folders or files you want to hide or protect.
  • Hide Folders 2009 effectively protects data on your computer by hiding and locking your secret files. It allows you to set different protection (hide, lock, read-only) for your files and folders and protect them with a password. Powerful, and in the same time easy to use, it suits a broad range of computer users - from newcomers to experts. Download FREE trial now!
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Conceal your online identity with the click of a button. Surf anonymously, encrypt your Internet traffic, hide your IP while surfing the Internet, using forums, sending E-mails, instant messaging, playing games, and more. Compatible with all web browsers. Hiding your IP address is as simple as clicking the "Hide My IP" button, which automatically configures your web browser or other application to use a proxy server from our private proxy network. Change your IP address automatically every few minutes and cloak your browser?s User Agent and Referrer headers. Select from hundreds of our private network IPs or public proxies from all over the world. Version 5.3 now supports the Gold Pass level of service, allowing access to exclusive IP locations at Premium speeds as well as 128-bit SSL traffic encryption. Other new features include hotkey support, cookie blocking, IP history, and IP SmartSwitching to randomize your IP addresses. Our service provides hundreds of fast IPs based in the United ...
  • Power Spy software secretly logs Facebook use, keystrokes, chats & IMs, emails, web visits, games, searches, shopping history, user names, passwords and more. It supports Windows Live Messenger, Yahoo Messenger, Skype, ICQ and more. It's invisible to monitored users. However, it is easy for you to unhide its interface with hotkeys. You can receive reports remotely via email or ftp. Perfect for monitoring employees, kids and spouse.
  • PC Spy Monitor secretly monitors Facebook, chats, emails, keystrokes, passwords and sends reports to your email or ftp. It logs Windows Live Messenger, Skype, Yahoo Messenger and other IMs. It also takes photo shots of online video talk like a surveillance camera. PC Spy Monitor runs so stealthily that the monitored user won't even know it. You can use hotkey to unhide it and change settings. It is a must have tool for you to reveal the
  • Keylogger Spy Software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Keylogger Spy Software is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Hide or Encrypt any folder on your PC. With Stealth Folder, folders and files can't be deleted, viewed, modified, or run. Stealth Folder Operates in Stealth mode, special hotkey is required to pull it up. Stealth Folder is not visible in Start, Toolbar, Taskbar, Add/Remove Programs or CTL ALT DEL.
  • The free product can hide and protect folders on your computer to ensure security of your privacy. It is very useful if you want to keep your files away from peoples's prying eyes. The hidden folders are invisible in Windows Explorer and can not be found by Windows Search. Absolute Folder Hider is very easy to understand and use. Lauch the program, add folders and click Hide button. Done! You can protect your folders with just these 1-2-3
  • If you have drives in Windows Explorer that you never access, such as a USB Flash drive that you are using only for ReadyBoost, a floppy drive or a backup drive only used for a particular piece of software, then you might want to simply hide the drive from your computer. This application will only hide the drive from being displayed, applications and the command prompt will still have access to it, and you can still manually browse to the folder
  • The Right File Scrambler hides critical and personal data by replacing to random but realistic values. This tool helps you to prevent data disclosing. It operates with three text file formats (tab-delimited, CSV and files with random separators) and saves scrambling results in the same format. The program offers about two dozen of built-in data generators like e-mail, name, state, Zip code, address, etc. Try out demo version for free now!
  • Take a journey into the mystery with Deep Sea World 3D screensaver. Swim with the dolphins, admire the corals, discover the secret hide-outs of crabs inside exotic seaweed. Avoid the sharks and cramp-fish among the ancient columns and ruins, which were once home to humans and are now inhabited by creatures of the sea. Scarce sunlight that reaches these depths creates mysterious shades. Dive in and explore the secrets of the underwater world.

Page 6 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware