Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Free Hide IP, the best free privacy protection software, could hide your real IP address for FREE, anonymize your web surfing, keep your computer safe from hacker attacks and other risks, all with a single click. With it, you can send anonymous emails through any web based mail system, or get un-banned from restricted websites. Free Hide IP works with Internet Explorer, FireFox, Opera, Maxthon, MyIE and is compatible with all types of Internet.
  • Shortcut Antivirus protects against Microsoft LNK and PIF vulnerability, notifies user about found threats and offers option to immediately remove threats. Includes Stuxnet/Tmphider rootkit removal utility.
  • It's a USB device manager aimed to save time and extend user abilities on active work with flash-drives, portable drives, card readers and and other gadgets. It is a full-fledged tool to manage and save your portable drive data, it allows you to safely remove the drives displaying locking processes, has portable apps launch list, can automatically dismount TrueCrypt drives, lets you hide empty card reader slot drives, etc.
  • Have you ever wished that you can keep praying eyes away from your private files? With this File and Folder Hider, you can easily protect private data on your computer that you don't want anyone to see. You can lock and hide any files and folder on your system by just a few simple clicks, and the locked files will no longer be accessible by anyone but YOU. Lab Loveholic's file and folder hider is used to protect any files and folders.
  • 1. Easy and secure file protection Critical and Private files are protected easily and securely. Files are read and modified with no need of cumbersome decryption. Just one "DOUBLE CLICK" will enable you to use files with ease. 2. Secret file and message sharing Important files are opened only by those who are designated for secure file sharing. Also, secret messages are exchanged in secret through email, documents, guest books on Blogs. 3. File name protection File names are known to the right user exclusively with WitchFile explorer. 4. File history protection History of file usage is protected by keeping files opened on Windows, Document Editor and Media Player, etc. from being known to others. 5. File shredding Critical and private files casually deleted are recoverable later on. File shredding guarantees complete security by making deleted files irrecoverable. 6. Certified international safe algorithm Algorithm such as AES, 3DES, Blowfish, P.Gutmann, US ...
  • StuxnetRemover - free of charge Stuxnet/Tmphider rootkit removal tool. StuxnetRemover is able to remove active infections and clear USB devices.
  • Wondershare Time Freeze 2.0 is easy-to-use and effective virtual system software. It helps users to surf online and play around with computer on virtual environment, so as to keep computer safe from virus, spyware, Trojans, worms and other threats. Key Features and Benefits of Time Freeze 2.0: 1.Easy switch between virtual system and real system: To enter virtual system, you don?t need to reboot computer; to return to the real system, just exit system protection mode, and you can save or discard virtual system data freely. Time Freeze 2.0 creates a virtual environment, on which you evaluate applications and perform other activities. While the real system is under protection, you don?t need to worry about viruses, Trojans, worms, spyware and other threats. Newly added MBR protection enhanced protection to the boot sector of hard disk so as to guarantee the normal startup of computer. 2.Virtual system performance increased 60%: Physical Memory Buffer Mode lets you save virtual system data on physica ...
  • Turn your desktop into a window into a tropical paradise! Caribbean Islands 3D Screensaver takes you on a well-deserved holiday, offering relaxation in a tropical hideaway coupled with exciting diving experience. The screensaver renders a beautiful coral reef lagoon with pristine beaches. The crystal clear turquoise ocean invites you to explore the wide variety of marine life and discover hidden wonders of the depths.
  • Invisible keylogger free download application establishes complete control on each activity and invisibly records each keystroke of every user activity like chat recording, typed text, information, visited website addresses, URLs of homepages or many more internet relevant activities in password protected log files. Windows keylogger also facilitates you with recording of username, time, folders, files and document lists of each captured activity and generates report of all recorded key events in txt, html file formats. PC keystroke monitoring application assigns hotkey combination or run command to unhide software when running in hidden mode. Best parental keylogger free download software runs in covert mode having support of major Windows operating system versions like Win 7, 98, 2000, 2003, XP, VISTA etc. Covert monitoring utility prefers some special symbols, alphanumeric characters, clipboard entries like shift, ctrl, alt, del etc. Keylogger Software installation cannot be detected by unauthorized user a ...
  • "Desktop Clock-7" is program that displays the current time on desktop window. You can resize or move the clock anywhere, hide or show it using system tray icon. The program uses color scheme of OS Windows. Settings: * Always on top: on/off; * Show logo: off/current date/custom text; * Auto run: on/off; * Show seconds: on/off.
  • Objs is an advanced tool for obfuscating JavaScript/EcmaScript code in order to hide it from the public and make it difficult to read. Objs is delivered in two versions: * Standard GUI version for desktop use; * Command line version to use on servers or within other applications; Objs is capable of obfuscating JavaScript/EcmaScript code in script files as well in HTML or other file types where the script is referenced. It has the powerful option to detect identifiers in in strings and obfuscate them as well. The user can decide which identifiers to keep intact and which to obfuscate. The program offers several options for obfuscation such as removing horizontal and vertical white space as well as choosing among short and ugly code. Obfuscation of strings is also optional and when enabled strings are obfuscated in their unicode notation. All the obfuscation settings (files, options, identifiers) can be saved in a project file which is a human readable XML file and executed even with the command line version ...
  • Explorer Tab is powerful toolbar add-on for Windows Explorer, it provides some important file management features you could most want. Tabbed interface to allow users to find and organize their files in new ways, bookmarks feature allow users to access to most used folder quickly by clicking tab without browsing file directory tree. It also provides some other features, open CMD console in any folder, show/hide hidden file and so on. There are tons of Windows Explorer alternatives on the market, all of them try to create another Windows Explorer, Invent the Wheel Again? Explorer Tab works in different way, a unique way, integrated with Windows Explorer, not replace, so it is able to work with powerful the windows Explorer in windows7 that none of other 3rd alternatives can.
  • It conceals the windows of visible programs of your own choice (including from the taskbar). When "Hide an active window" is switched on, the analogue of the "anti-boss" key is added to the window that is active at this moment. The change of the icon of the program in the system tray. The shutdown of the icon of the program in the system tray. Permanently hide windows - it automatically hides chosen windows.
  • The Privacy Photo Album utility is designed for anybody who is looking for a most useful and powerful image encryption software which can encrypt private pictures. It is a password control image viewer with the strong encryption engine to protect your privacy. You can collect pictures to several albums. Each album is a single encrypted file. Nobody will see content of albums even he(she) steals them from your storage.
  • Man's most powerful allies slumber as an unknown evil rises. Abandoned places of magic grow tainted. Foul creatures plunder the Empire's villages. One hope remains. Who can awaken the Dragons? Fight hideous monsters! Customize your character with skills, equipment and magical items! Uncover the fate of the Gemstone Dragon, and change the fate of the Empire!
  • Keylogger Spy Software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Keylogger Spy Software is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • PS Tray Factory is a system tray icons manager that will allows you to: hide low-activity icons from a system tray into menu, get fast access to hidden icons, change the order of icons in the system tray (sort system tray icons), protect tray menu with password, minimize any application to tray, restore icons in system tray area at crash or restarting Explorer.exe, change original tray icons with your own icons
  • Wondershare SafeLock is a file encryption software designed to encrypt file, lock folder stored on PC hard drive or any portable media such as USB drive to protect your privacy with advanced algorithms.Wondershare SafeLock can encrypt files of any type including Microsoft Word, Excel and PowerPoint documents. Wizard interfaces guide users through all the necessary steps needed to perform file encryption. It supports all Windows Versions including Win7, Vista, etc. Key Features: 1. Powerful and Secure Algorithms: Encrypt file and lock folder using the best and most proven cryptographic algorithms such as 256-bit AES, (now it is Advanced Encryption Standard, and was selected by NIST as a Federal Information Processing Standard in November 2001 (FIPS-197)), Blowfish, DES, 3DES, and there is no possibility for decryption by others. 2. Comprehensive Functions: Hide files/folders into another file in a second, no matter how big they are, such as a picture, MP3 or .exe file, which we refer to as &q ...
  • The Undownloadable PDF Publish it! Read it! But nothing else! You are an author, writer..., or you own documents you want to publish. However, you do not want your readers to save, on their own computers, your content. This PDF is the solution to your problem. You can read it only through this application, there is no way to save and print it. The clipboad can't receive texts or images, and it's URL is hided.
  • The sole recipient of eccentric Uncle Montgomery's dilapidated mansion in the lake district, "Little Gent" stumbles upon a trap door in the basement. Hidden underneath are vaults stuffed with gold bullion, a stash uncle Montgomery had managed, while alive, to hide from his neighbours and family. Help "Little Gent" collect all the gold nuggets, gold bullion bars and keys, but watch out for Uncle Montgomery's giant pet rats!
  • Advance keylogger is password protected monitoring software that records all computer activities and logs all information so that you can check later what?s been done in your absence. Keyboard surveillance tool records all keystrokes including typed Emails, Websites visited, documents, Chat records, usernames, passwords and other keyboard typing activities in an authenticated log file. Keylogger also takes screen snapshots periodically and automatically just like a secret camera directly point at the computer monitor. Keystroke recorder capable to deliver logs to remote computer via email feature or can be uploaded via FTP server without getting known by current users. Hidden keystroke recording utility is helpful for employer, teachers, parents and system administrators to trace activities of computer users. Keyboard monitoring software starts monitoring as soon as windows start or boot up. Stealth keylogger will not appear on the Desktop, Add/Remove Programs, Windows Task Bar, System Tray, MSConfig (Startup ...
  • Power Spy Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power Spy Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Asterisk Password is a Windows dialogs and Protected Storage password recovery tool. It allows you to view passwords hidden behind the asterisks in password fields! Asterisk Password uncovers hidden passwords from password dialog boxes, Internet Explorer web pages and ActiveX controls. Yet another great feature of this program is the ability to display Windows Protected Storage contents.
  • Stealth Computer monitoring and tracking utility record all keyboard typed text, visited websites, chat conversations, print activities, launched applications, keyword searched on search engine etc into log file. Windows PC activity monitoring tool is undetectable by external users as it is hidden from desktop, start menu, add/remove program and control panel. Family keylogger software is extremely useful for those parents whose children pass much of their time on internet when they are not present at home. Keystroke monitoring program safeguard your kids from online dangers as you will be able to know what was happening on your computer in your absence. Keystroke recording software does not slow down the computer performance when running. User can simply understand software by downloading free trial version and can see a preview of computer monitoring and recording process. Features: * Record all typed keystrokes, web browsing history, print activities, chat conversations, keyword search results, email log ...
  • Wartefall, a new free HD monitor screensaver of nature, from a collection of free screensavers. It seems that a big waterfall hides some secret among the rocks. The falling water creates a silver haze over the river. The audio is the sound of splashing water and birdsong . No spy/adware, virus-free.

Page 8 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware