Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • HTMLock allows you to create password protected HTML pages and hide HTML source of your pages. With this tool you can encrypt HTML pages and place them on your web site, CD, DVD, or hard drive. You can password protect HTML and text files. Key features: antispam page source code protection, and password protection; templates-based protection engine, password logon form can be placed on any web page; encrypts HTML and text files
  • Protect your digital privacy! DisCryptor Business is an excellent assistant of your digital personal and business privacy protection. It hides the content of your disks against unauthorized access and creates secured area for your personal data. It is a reliable security in case of theft of portable media. The program ensures saving of your passwords, bank personal identification numbers, security keys, and other confidential data. In your workgroup, you will detect what your employees are doing during working hours, which programs they use and which web sites they visit. You will block an access to foreign media and avoid a leakage of confidential company documents. In your home environment, you can get an overview of all activities of your children on family PC. You can forbid the applications which your children may not use. You protect your private data against unauthorized activity of illegal programs which detects your keyboard activity. Even the up-to-date device will not help to anybody tryin ...
  • Start-Q is a Windows startup manager which main purpose is to make FAST Windows login process. So with Start-Q you can get to work or be entertained much much sooner. So in a sense it helps improving your productivity by improving the login experience. Start-Q also gives you the ability to fully control the launching process. For example with Start-Q you can skip some startup items or pausing the launching process. With it you can even make sure important items gets more priority from Windows and the CPU (or vice versa, i.e. less important ones get lesser attention). It provides a queue in which the launching of windows startup items can be ordered based on priority (or simply your taste). With this approach the processes created by the startup items won't compete for resources. This will resulting in faster and smoother launching/execution. Overall result is you will gain control to your PC much much sooner. It also makes advance options/parameters in creating process available to you. The ava ...
  • Customize the startup options for your PDF files. You may decide whether to hide toolbar and menubar, display document title, resize window on startup, show in full screen mode, center window, center window, show thumbnail, show outline, hide window user interface or not when your PDF document is opened and viewed. You can even specify the page layout as single page, one column, two column left, or two column right.
  • Hide Fax Numbers is a powerful and easy-to-use Microsoft Outlook Add-In for hiding or showing the fax number items of contacts on the Select Names window in Microsoft Outlook. The add-in supports general contacts and Business Contact Manager. When you click "To", "CC" or "BCC" on the new message window, the fax numbers of the contacts will be disappeared on the "Select Names" window.
  • Hide files and folders. Make your personal files invisible to file managers and search software, thus protecting your data from unauthorized access. Using Hide-Files you can hide various information: confidential documents from curious colleagues, games from the chief, adult files from children and much other. Hide-Files employs a unique technology that does not require installing drivers or services, unlike other similar software.
  • Crypto Obfuscator For .Net provides superior code protection, obfuscation, optimization and automatic exception reporting for your .Net assemblies. Crypto Obfuscator combines powerful obfuscation, encryption and optimization techniques to provide the very best protection to your .Net code against reverse-engineering. Automatic Exception Reporting makes it extremely easy to catch any unhandled exceptions and for your users to easily report these exceptions to you with a single click of a button. The exception reports include all pertinent information including full stack trace info along with the values of all method arguments and local variables, system information and optional developer defined custom data like log files, screenshots, etc. All exception reports can then be automatically download from the exception reporting service and viewed within Crypto Obfuscator. Crypto Obfuscator’s metadata reduction, assembly & resource compression and dependency embedding functionality simplifies and reduc ...
  • Key logger computer monitoring tool creates mirror image of all key hits made by external users. Key logger generates detailed report that is securely forwarded to the system admin by email or FTP. Key logger works invisibly and undetectable by all anti key recording software?s. Key stroke recording application runs as background process and also invisible in windows add/remove programs section. Key board tracker software let?s you monitor your employees activities in office and children or spouse activities at home. Software is password protected and avoids unauthorized users to make any changes in software setting. The log file generated by computer monitoring tool is encrypted and can not be modified by any unauthorized user. Advance invisible key recorder records voice chat, clip board activities and screen shots at regular intervals. Keylogger generates report either in text or html format. The surveillance tool is easy to install and use by office users and home users. Hidden keylogger could be configur ...
  • Create PDF from TEXT files with advanced features like Font embedding, Encryption, Password protection and other pdf document securities. Does not require acrobat reader to be installed for conversion. Getting started with TXT2PDF is quick and easy. Features: Fonts & Styles : Embed font into the PDF document Set Font Names Set Font Size Set Font Color Set Font styles like Italic, Bold Specify gap between lines in pixels Supports word wrapping Background color : Background color for the pdf Background Image: Use Jpeg/Bmp images for the pdf background Background Image alignment (Title, Left align, top align ...) Password Protection: Supports user and owner password. PDF Document properties: Author Keywords Subject Title Margins: Left, Right, Top and Bottom margins. Encryption: 128bit encryption Security: Disable/Enable printing from PDF. PDF Viewing Prefrences: ...
  • Keylogger software is the best computer-monitoring tool that easily records external user?s activities on the computer system in your absence. Invisible keylogger software works as background process and remains hidden from desktop items, Add/Remove program list and even hides its installation folder path. Using key logger utility, you will be able to establish full control over your computer system. Remote spy keylogger software is the best PC monitoring tool that automatically records all typed emails conversations, chat records, website visited, password and documents lists. Spy Software is password protected software; external users can not change or modify its configuration settings. Spy software allows remote computer monitoring and keystroke recording in real time. If your favorite text editor crashed suddenly you will be able to restore information you typed from the keylogger without any problems with the help of remote keylogger software. Software feature: * Undetectable keylogger program traces l ...
  • MSN Password Recovery Software Recover and retrieves misplaced login name and forgotten password if remember my password or save password option is checked in MSN Messanger Windows or MSN Messanger. MSN Password Recovery Tool supports all Windows operating systems like windows Vista, windows 2000, windows NT, windows 2003, windows 98, windows XP with full supports various MSN versions like 6.0, 7.0, 8.0 . MSN Password Recovery instantly recover and decrypts the MSN Explorer saved passwords stored on your computer. MSN Messanger password breaker tool supports all version of MSN Messanger and restore lost msn passwords without having any technical skills. MSN Email Password Recovery Retrieves all forgotten misplaced user login account passwords. MSN Messanger Password Recovery Key Features- Retrieves all forgotten hotmail account passwords * MSN Messanger deleted password recovery software has very powerful and easy to use Graphical User Interface (GUI) with supports all versions of MSN explorer. ...
  • Invisible messenger spy software that records all Yahoo! Messenger incoming and outgoing chat text. Send reports to your custom email address or ftp. You can check all recorded messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Freeware MP3 Skype Recorder is essential , must have, irreplaceable software for business person , chatter , for everybody who is using Skype to make voip calls. Calls are recorded in popular, widely used, space efficient mp3 format. MP3 records are easy to store, easy to share. MP3 Skype Recorder hides in system tray and starts recording automatically. MP3 Skype Recorder will help you to be on a safe side.
  • Bulk barcode maker software is a powerful tool to create industrial standard fonts based barcodes in sequential as well as random series. Efficient barcode builder application creates high resolution graphics, images, ribbon, labels that can be easily stored in any application like MS-excel, MS-paint and MS-word. Professional barcode generator tool is a valuable application for various small scale and large scale industries such as entertainment, pharmaceutical industries, shipping industries, super market, transportation, retail stores, libraries etc. Advance barcode builder utility support various font standards like UPCE Tray label, UCC/EAN-128, Postnet, planet, coda 11, UPCE, MSI Plessey, UPCE Stack label, UPCA, coda bar, USS-93, code 11, coda 128 set A, coda 128 set B, code 39 full ASCII, code 93, code 39, ISBN-13 and ITF 14. Standard barcode creator facilitates user by providing an option to hide barcode values and caption while generating bulk barcodes. Barcode builder tool provides customized barcode ...
  • The program is an ultimate HTML source hide, images, forms and antispam protection software from spam bots and humans. The program allows you to use any of 13 protection methods. The second generation protection technology from the HTMLock developer. The program is optimized for dual-core CPU multithreading.
  • Invisible messenger spy software that logs all incoming and outgoing AIM text chat messages. View log records from the program or send a report to a preset email / ftp. You can check all recorded incoming and outgoing messages by simply receiving emails or opening a web page. Use hotkey to unhide it from Stealth Mode and protect program access by password.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Almost everybody have at least once used those small colored sticky notes to write down something important or just leave a message for another person. Absolutely free NoteIT v1.0 is software that allows you using such sticky notes on your desktop. This program is very small and doesn’t need a lot of system resources. After installing and launching it, a special icon will appear in your tray. For creating a new note on your desktop simply right-click on this icon and select 'New Note' in pop-up menu. When a new note appears on your desktop you can type any text you like on it. Right-clicking on any note you have created gives you extensive menu with lots of text formatting preferences, like size, style, color, align and many more. Note’s appearance also can be customized. For example, you can adjust its color and transparency. Also you can hide all notes by right-clicking on the tray icon and selecting respective items in pop-up menu. Despite NoteIT v1.0 isn’t software with huge funct ...
  • HidEM is a safe, fast and easy Security Solution Software that can protect your private data - in just seconds. Simply drag and drop files, folders, pictures, videos, drives, and even programs to the HidEM DropZone, then click "Lock" and have peace of mind that only you, have total access. HidEM will help you safeguard those data from unwanted access by both hiding and locking. Also HidEM protects data from viruses, trojans, worms and spywares because once protected, it can not be opened, modified, deleted, moved nor copied. Also you can delete all traces such as internet history, cookies, recent documents, etc. in your computer with just one click.
  • HidEM is a safe, fast and easy Security Solution Software that can protect your private data - in just seconds. Simply drag and drop files, folders, pictures, videos, drives, and even programs to the HidEM DropZone, then click "Lock" and have peace of mind that only you, have total access. HidEM will help you safeguard those data from unwanted access by both hiding and locking. Also HidEM protects data from viruses, trojans, worms and spywares because once protected, it can not be opened, modified, deleted, moved nor copied. Also you can delete all traces such as internet history, cookies, recent documents, etc. in your computer with just one click.
  • Windows keylogger software is the most powerful PC surveillance application, which will record all keystrokes typed using keyboards. Best keylogger utility can obtain confidential data like login details, passwords, chat history, instant messaging emails and inserted text by intercepting keystrokes. Keystroke logging software runs hidden in the background and automatically records all keystrokes. Internet spy software offers detailed information on who uses your computer, their e-mails and chat conversations, the visited web sites. Hidden keylogger can secretly capture information on your PC without the possibility of being detected by the user. Parental control software provides the best possible solution for homes, families, small and middle offices, as well as big companies with the need to monitor hundreds of employee. Keystroke monitoring tool record not only 'simple' keystrokes, but file operations, visited web-sites, clipboard information, monitor outgoing and incoming e-mails etc. It ...
  • Make specified open programs invisible.
  • Advanced keylogger application is an undetectable keyboard monitoring tool that records the real time keystrokes activities used for various windows application (word, excel, notepad and many more) and visited websites in password protected log file with date, time and session. Keylogger is a stealth PC monitoring software which is helpful for various companies to track all activities of their employees in total invisible mode such as typed website URL, records clipboard contents, online audio chat conversations, every keystroke with special keys and automatically deliver log file to specified email address. Advance keylogger is the best parental monitoring software as it helps parents to track child PC activities through what was typed, sent, received and visited. Keystroke surveillance utility not only monitors keystroke activities but also document printed, text and images sent to the clipboard, online voice chat conversations, system login sessions and even capture desktop screenshots at definite time int ...
  • SharePoint Column/View Permission provides the ability to secure access to individual columns in list views or document libraries, making it an ideal solution for consolidating a broad spectrum of information into a centralized location without exposing secured data to unauthorized users. After configuring permissions for a SharePoint list view, only authorized users will see the content of a secure column as if it were a normal column, while unauthorized users will not see the content of the column at all. Column/View Permission also offers the ability to set individual columns as "read-only" in any list view, so that information can be viewed, but not edited, by users. With SharePoint Column/View permission, you can also assign form-level permissions for the "create new item", "edit item" and "view item" forms, allowing you to hide specific fields completely, or restrict them to read-only access so users can see them, but cannot make changes. Now you can create cus ...
  • The SharePoint AD Self Service web part allows users to modify their personal Active Directory account information in an easy to use, user-friendly SharePoint web part. As an AJAX web part, SharePoint AD Self Service provides users with enjoyable using experience by enabling them to bypass annoying post backs and complete the modification easily. To make changes to their AD properties, what users need to do is type in the user name and password to enter into the page where the AD Self Service web part being added. The web part will automatically detect current login user and domain, retrieving his/her information from AD and display them in the web part. Then, users can start to modify. Finally, by clicking ˇ°saveˇ±, the whole process has been completed. Moreover, IT administrators have complete control over which properties may be changed and by whom. IT administrators and domain admin members can configure settings in SharePoint Central Administration to restrict and exclude users from changing properti ...

Page 10 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware