Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • StuxnetRemover - free of charge Stuxnet/Tmphider rootkit removal tool. StuxnetRemover is able to remove active infections and clear USB devices.
  • Wondershare Time Freeze 2.0 is easy-to-use and effective virtual system software. It helps users to surf online and play around with computer on virtual environment, so as to keep computer safe from virus, spyware, Trojans, worms and other threats. Key Features and Benefits of Time Freeze 2.0: 1.Easy switch between virtual system and real system: To enter virtual system, you don?t need to reboot computer; to return to the real system, just exit system protection mode, and you can save or discard virtual system data freely. Time Freeze 2.0 creates a virtual environment, on which you evaluate applications and perform other activities. While the real system is under protection, you don?t need to worry about viruses, Trojans, worms, spyware and other threats. Newly added MBR protection enhanced protection to the boot sector of hard disk so as to guarantee the normal startup of computer. 2.Virtual system performance increased 60%: Physical Memory Buffer Mode lets you save virtual system data on physica ...
  • Turn your desktop into a window into a tropical paradise! Caribbean Islands 3D Screensaver takes you on a well-deserved holiday, offering relaxation in a tropical hideaway coupled with exciting diving experience. The screensaver renders a beautiful coral reef lagoon with pristine beaches. The crystal clear turquoise ocean invites you to explore the wide variety of marine life and discover hidden wonders of the depths.
  • Invisible keylogger free download application establishes complete control on each activity and invisibly records each keystroke of every user activity like chat recording, typed text, information, visited website addresses, URLs of homepages or many more internet relevant activities in password protected log files. Windows keylogger also facilitates you with recording of username, time, folders, files and document lists of each captured activity and generates report of all recorded key events in txt, html file formats. PC keystroke monitoring application assigns hotkey combination or run command to unhide software when running in hidden mode. Best parental keylogger free download software runs in covert mode having support of major Windows operating system versions like Win 7, 98, 2000, 2003, XP, VISTA etc. Covert monitoring utility prefers some special symbols, alphanumeric characters, clipboard entries like shift, ctrl, alt, del etc. Keylogger Software installation cannot be detected by unauthorized user a ...
  • "Desktop Clock-7" is program that displays the current time on desktop window. You can resize or move the clock anywhere, hide or show it using system tray icon. The program uses color scheme of OS Windows. Settings: * Always on top: on/off; * Show logo: off/current date/custom text; * Auto run: on/off; * Show seconds: on/off.
  • Objs is an advanced tool for obfuscating JavaScript/EcmaScript code in order to hide it from the public and make it difficult to read. Objs is delivered in two versions: * Standard GUI version for desktop use; * Command line version to use on servers or within other applications; Objs is capable of obfuscating JavaScript/EcmaScript code in script files as well in HTML or other file types where the script is referenced. It has the powerful option to detect identifiers in in strings and obfuscate them as well. The user can decide which identifiers to keep intact and which to obfuscate. The program offers several options for obfuscation such as removing horizontal and vertical white space as well as choosing among short and ugly code. Obfuscation of strings is also optional and when enabled strings are obfuscated in their unicode notation. All the obfuscation settings (files, options, identifiers) can be saved in a project file which is a human readable XML file and executed even with the command line version ...
  • Explorer Tab is powerful toolbar add-on for Windows Explorer, it provides some important file management features you could most want. Tabbed interface to allow users to find and organize their files in new ways, bookmarks feature allow users to access to most used folder quickly by clicking tab without browsing file directory tree. It also provides some other features, open CMD console in any folder, show/hide hidden file and so on. There are tons of Windows Explorer alternatives on the market, all of them try to create another Windows Explorer, Invent the Wheel Again? Explorer Tab works in different way, a unique way, integrated with Windows Explorer, not replace, so it is able to work with powerful the windows Explorer in windows7 that none of other 3rd alternatives can.
  • It conceals the windows of visible programs of your own choice (including from the taskbar). When "Hide an active window" is switched on, the analogue of the "anti-boss" key is added to the window that is active at this moment. The change of the icon of the program in the system tray. The shutdown of the icon of the program in the system tray. Permanently hide windows - it automatically hides chosen windows.
  • The Privacy Photo Album utility is designed for anybody who is looking for a most useful and powerful image encryption software which can encrypt private pictures. It is a password control image viewer with the strong encryption engine to protect your privacy. You can collect pictures to several albums. Each album is a single encrypted file. Nobody will see content of albums even he(she) steals them from your storage.
  • Man's most powerful allies slumber as an unknown evil rises. Abandoned places of magic grow tainted. Foul creatures plunder the Empire's villages. One hope remains. Who can awaken the Dragons? Fight hideous monsters! Customize your character with skills, equipment and magical items! Uncover the fate of the Gemstone Dragon, and change the fate of the Empire!
  • PS Tray Factory is a system tray icons manager that will allows you to: hide low-activity icons from a system tray into menu, get fast access to hidden icons, change the order of icons in the system tray (sort system tray icons), protect tray menu with password, minimize any application to tray, restore icons in system tray area at crash or restarting Explorer.exe, change original tray icons with your own icons
  • Wondershare SafeLock is a file encryption software designed to encrypt file, lock folder stored on PC hard drive or any portable media such as USB drive to protect your privacy with advanced algorithms.Wondershare SafeLock can encrypt files of any type including Microsoft Word, Excel and PowerPoint documents. Wizard interfaces guide users through all the necessary steps needed to perform file encryption. It supports all Windows Versions including Win7, Vista, etc. Key Features: 1. Powerful and Secure Algorithms: Encrypt file and lock folder using the best and most proven cryptographic algorithms such as 256-bit AES, (now it is Advanced Encryption Standard, and was selected by NIST as a Federal Information Processing Standard in November 2001 (FIPS-197)), Blowfish, DES, 3DES, and there is no possibility for decryption by others. 2. Comprehensive Functions: Hide files/folders into another file in a second, no matter how big they are, such as a picture, MP3 or .exe file, which we refer to as &q ...
  • The Undownloadable PDF Publish it! Read it! But nothing else! You are an author, writer..., or you own documents you want to publish. However, you do not want your readers to save, on their own computers, your content. This PDF is the solution to your problem. You can read it only through this application, there is no way to save and print it. The clipboad can't receive texts or images, and it's URL is hided.
  • The sole recipient of eccentric Uncle Montgomery's dilapidated mansion in the lake district, "Little Gent" stumbles upon a trap door in the basement. Hidden underneath are vaults stuffed with gold bullion, a stash uncle Montgomery had managed, while alive, to hide from his neighbours and family. Help "Little Gent" collect all the gold nuggets, gold bullion bars and keys, but watch out for Uncle Montgomery's giant pet rats!
  • Advance keylogger is password protected monitoring software that records all computer activities and logs all information so that you can check later what?s been done in your absence. Keyboard surveillance tool records all keystrokes including typed Emails, Websites visited, documents, Chat records, usernames, passwords and other keyboard typing activities in an authenticated log file. Keylogger also takes screen snapshots periodically and automatically just like a secret camera directly point at the computer monitor. Keystroke recorder capable to deliver logs to remote computer via email feature or can be uploaded via FTP server without getting known by current users. Hidden keystroke recording utility is helpful for employer, teachers, parents and system administrators to trace activities of computer users. Keyboard monitoring software starts monitoring as soon as windows start or boot up. Stealth keylogger will not appear on the Desktop, Add/Remove Programs, Windows Task Bar, System Tray, MSConfig (Startup ...
  • Asterisk Password is a Windows dialogs and Protected Storage password recovery tool. It allows you to view passwords hidden behind the asterisks in password fields! Asterisk Password uncovers hidden passwords from password dialog boxes, Internet Explorer web pages and ActiveX controls. Yet another great feature of this program is the ability to display Windows Protected Storage contents.
  • Stealth Computer monitoring and tracking utility record all keyboard typed text, visited websites, chat conversations, print activities, launched applications, keyword searched on search engine etc into log file. Windows PC activity monitoring tool is undetectable by external users as it is hidden from desktop, start menu, add/remove program and control panel. Family keylogger software is extremely useful for those parents whose children pass much of their time on internet when they are not present at home. Keystroke monitoring program safeguard your kids from online dangers as you will be able to know what was happening on your computer in your absence. Keystroke recording software does not slow down the computer performance when running. User can simply understand software by downloading free trial version and can see a preview of computer monitoring and recording process. Features: * Record all typed keystrokes, web browsing history, print activities, chat conversations, keyword search results, email log ...
  • Wartefall, a new free HD monitor screensaver of nature, from a collection of free screensavers. It seems that a big waterfall hides some secret among the rocks. The falling water creates a silver haze over the river. The audio is the sound of splashing water and birdsong . No spy/adware, virus-free.
  • The Crifano slider selector component let's you set a range of numbers and the gap between them. Look and feel like a ruler. Easy to configure, nice and customizable graphic. On request we can add: - the ability to hide/disable some numbers - arrows to moove between the numbers.
  • Hide My Messenger is a protective tool that allows you to hide running applications and tray icons completely with a move of the mouse or a single hotkey. You can hide AIM, Windows Live, Yahoo Messenger, MIRC, Skype, Internet Explorer or another browser, Winamp, games, e-mail, etc. It’s very useful when you need privacy and don't want others to see your personal interests at home or in the office.
  • Are you ready for a new adventure and give up your holiday to search for mysteries and reveal another Legend? After your city trip to Amsterdam, this time you have chosen for a relaxing holiday. A trip to tropical paradise. No way anything will come in between that can disturb this! It all seems peaceful, but again the journey will be nothing you expected it to be. The tropical environments will bring you more than relaxing and cocktails at the beach?.. if only you knew. The jungle hides secrets you don?t know of, locals do know more, but do not reveal all?. Questions rise, irreversible decisions have to be made to finally reveal the mystery of the golden bird in Paradise. The only thing you can be sure of?. The Golden Bird has special powers that go beyond every imagination. Youda Legend: The Golden Bird of Paradise offers you: 21 hidden objects 18 mini games Tropical environments Lots of challenging puzzles Beautiful 3D design Dynamic inventory A thrilling new Legend!
  • Family Folder Hider lets you hide all your sensitive information from your kids, spouse or even hackers!. With a couple of clicks of the mouse button any folder can be instantly hidden from view and is in fact removed from all windows explorer's etc. You might have some porn pictures or video's that you want to hide from the kids, our software will let you hide the folder they are in so no one knows that they are even there.
  • Power PC Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power PC Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Hidden keylogger software is a powerful PC monitoring tool used for tracing keystrokes activities on computer system. Comprehensive Keylogger program helps to detect what your employee or children are typing in your absence. Monitoring application captures typed keystrokes including text, sent emails, searched URL`s, chat conversations and other keyboard activities at regular time intervals. Invisible keylogger software provides the facility to save recorded data in encrypted log file, which is automatically mailed to user specified e-mail address. Keylogger surveillance utility provides a secure login password protected feature and overrides all major anti-virus software and spy tools. Stealth Keylogger runs in hidden mode and do not appear in installation folder, system startup and start menu as well as in add-remove program list and records all the keyboard activities in the log file format. Keyboard monitoring software records all typed chat conversations and instant messages details on Gtalk, Yahoo messe ...
  • WodAppUpdate component should be used by your application to quickly, easily, and securely provide automatic update solution - very popular "check for updates" functionality. This way you increase value and functionality of your product because now your customers always have the most newest version - and you need only 3 lines of code to provide it! wodAppUpdate uses configuration file it finds on the server of your choice (HTTP, HTTPS or FTP) and then determines if local files need to be replaced or not. Works with any development tool capable of generating apps which can host an ActiveX control. wodAppUpdate uses configuration file it finds on the server of your choice and then determines if local files need to be replaced or not. You can send any additional information via URL to the server - and that way determine if user is allowed to update the application, if he uses regular licensed version etc - using your own server-side scripting. wodAppUpdate doesn't really care what ...

Page 10 of 10
1 2 3 4 5 6 7 8 9 10

Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware