Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • The sole recipient of eccentric Uncle Montgomery's dilapidated mansion in the lake district, "Little Gent" stumbles upon a trap door in the basement. Hidden underneath are vaults stuffed with gold bullion, a stash uncle Montgomery had managed, while alive, to hide from his neighbours and family. Help "Little Gent" collect all the gold nuggets, gold bullion bars and keys, but watch out for Uncle Montgomery's giant pet rats!
  • Advance keylogger is password protected monitoring software that records all computer activities and logs all information so that you can check later what?s been done in your absence. Keyboard surveillance tool records all keystrokes including typed Emails, Websites visited, documents, Chat records, usernames, passwords and other keyboard typing activities in an authenticated log file. Keylogger also takes screen snapshots periodically and automatically just like a secret camera directly point at the computer monitor. Keystroke recorder capable to deliver logs to remote computer via email feature or can be uploaded via FTP server without getting known by current users. Hidden keystroke recording utility is helpful for employer, teachers, parents and system administrators to trace activities of computer users. Keyboard monitoring software starts monitoring as soon as windows start or boot up. Stealth keylogger will not appear on the Desktop, Add/Remove Programs, Windows Task Bar, System Tray, MSConfig (Startup ...
  • Asterisk Password is a Windows dialogs and Protected Storage password recovery tool. It allows you to view passwords hidden behind the asterisks in password fields! Asterisk Password uncovers hidden passwords from password dialog boxes, Internet Explorer web pages and ActiveX controls. Yet another great feature of this program is the ability to display Windows Protected Storage contents.
  • Stealth Computer monitoring and tracking utility record all keyboard typed text, visited websites, chat conversations, print activities, launched applications, keyword searched on search engine etc into log file. Windows PC activity monitoring tool is undetectable by external users as it is hidden from desktop, start menu, add/remove program and control panel. Family keylogger software is extremely useful for those parents whose children pass much of their time on internet when they are not present at home. Keystroke monitoring program safeguard your kids from online dangers as you will be able to know what was happening on your computer in your absence. Keystroke recording software does not slow down the computer performance when running. User can simply understand software by downloading free trial version and can see a preview of computer monitoring and recording process. Features: * Record all typed keystrokes, web browsing history, print activities, chat conversations, keyword search results, email log ...
  • Wartefall, a new free HD monitor screensaver of nature, from a collection of free screensavers. It seems that a big waterfall hides some secret among the rocks. The falling water creates a silver haze over the river. The audio is the sound of splashing water and birdsong . No spy/adware, virus-free.
  • The Crifano slider selector component let's you set a range of numbers and the gap between them. Look and feel like a ruler. Easy to configure, nice and customizable graphic. On request we can add: - the ability to hide/disable some numbers - arrows to moove between the numbers.
  • Hide My Messenger is a protective tool that allows you to hide running applications and tray icons completely with a move of the mouse or a single hotkey. You can hide AIM, Windows Live, Yahoo Messenger, MIRC, Skype, Internet Explorer or another browser, Winamp, games, e-mail, etc. Itís very useful when you need privacy and don't want others to see your personal interests at home or in the office.
  • Are you ready for a new adventure and give up your holiday to search for mysteries and reveal another Legend? After your city trip to Amsterdam, this time you have chosen for a relaxing holiday. A trip to tropical paradise. No way anything will come in between that can disturb this! It all seems peaceful, but again the journey will be nothing you expected it to be. The tropical environments will bring you more than relaxing and cocktails at the beach?.. if only you knew. The jungle hides secrets you don?t know of, locals do know more, but do not reveal all?. Questions rise, irreversible decisions have to be made to finally reveal the mystery of the golden bird in Paradise. The only thing you can be sure of?. The Golden Bird has special powers that go beyond every imagination. Youda Legend: The Golden Bird of Paradise offers you: 21 hidden objects 18 mini games Tropical environments Lots of challenging puzzles Beautiful 3D design Dynamic inventory A thrilling new Legend!
  • Family Folder Hider lets you hide all your sensitive information from your kids, spouse or even hackers!. With a couple of clicks of the mouse button any folder can be instantly hidden from view and is in fact removed from all windows explorer's etc. You might have some porn pictures or video's that you want to hide from the kids, our software will let you hide the folder they are in so no one knows that they are even there.
  • Power PC Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power PC Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Hidden keylogger software is a powerful PC monitoring tool used for tracing keystrokes activities on computer system. Comprehensive Keylogger program helps to detect what your employee or children are typing in your absence. Monitoring application captures typed keystrokes including text, sent emails, searched URL`s, chat conversations and other keyboard activities at regular time intervals. Invisible keylogger software provides the facility to save recorded data in encrypted log file, which is automatically mailed to user specified e-mail address. Keylogger surveillance utility provides a secure login password protected feature and overrides all major anti-virus software and spy tools. Stealth Keylogger runs in hidden mode and do not appear in installation folder, system startup and start menu as well as in add-remove program list and records all the keyboard activities in the log file format. Keyboard monitoring software records all typed chat conversations and instant messages details on Gtalk, Yahoo messe ...
  • WodAppUpdate component should be used by your application to quickly, easily, and securely provide automatic update solution - very popular "check for updates" functionality. This way you increase value and functionality of your product because now your customers always have the most newest version - and you need only 3 lines of code to provide it! wodAppUpdate uses configuration file it finds on the server of your choice (HTTP, HTTPS or FTP) and then determines if local files need to be replaced or not. Works with any development tool capable of generating apps which can host an ActiveX control. wodAppUpdate uses configuration file it finds on the server of your choice and then determines if local files need to be replaced or not. You can send any additional information via URL to the server - and that way determine if user is allowed to update the application, if he uses regular licensed version etc - using your own server-side scripting. wodAppUpdate doesn't really care what ...
  • ActiveX Component that implements server side of following protocols: FTP, FTP/S (FTPS or FTP+SSL) both in explicit and implicit modes, and SFTP (secure ftp subsystem on SSH2 secured channel). Support for all 3 protocol is transparent for your programming - you have same set of events, same set of properties and methods, same control over connected users - and just one property to change to switch from one protocol to another - Protocol property! Unlike old FTP protocol support, FTPS and SFTP protocols provide security, privatekey/certificate authentication and strong encryption of data - great for insecure networks. wodFTPServer can be easily setup (using provided samples) to listen and accept such clients. Features include support for FTP, SFTP and FTPS protocols support for certificate and privatekey authentications (required or optional) set of events to control every aspect of client's connection - when he changes directory, lists directory contents, downloads file.... support f ...
  • Easily start, pause, and switch between projects' task. Set the task's rate as hourly or as a fixed amount, and let Simple Task Timer do the math. Keep track of same type of task performed across different customers Create a professional looking invoice. Include your logo and company info, then prin it or save it in PDF format. The flexible invoice details allow you to hide or include information. Know where your time goes, your most profitable type of task, average hourly rate, and much more
  • Key Logger KeyStroke Recording Software allows you find out what other users do on your computer in their absence. Key logger invisibly records keystrokes, emails conversations, chat records, website visited, password, voice chat conversations, Clipboard activities, Accessed application and captures screenshot of every user activity performed on the computer in encrypted log files and send the details at specified email id or FTP. Software works in the hidden mode and invisible on Windows operating system including Window VISTA, Window XP, Window 2000, Win NT, Win98 etc. It provides detailed report of any user activities performed on your computer system in encrypted log file in your absence. Key Logger will not appear on the Desktop, Add/Remove Programs and Control panel. Parents, Company Owners, Administrators will be able to see exactly what kids; employees have been doing online and offline. Use Hotkey combination or run command to unhide the software when running in hidden mode. Key Logger Software Fea ...
  • Keylogger spy monitoring software facilitates users to keep track of what type of keyboard activities performed on your personal computer or laptops in your absence. Keyboard recording tool secretly captures typed keystrokes text documents, send mails, websites visited, chat records, online search tracking, internet surfing, program monitoring, keylogging and various PC keyboard activities. Keylogger application records typed keystroke entries including characters, symbols, numbers, special keys and other similar keyboard operations. Keylogger recording program remains undetectable in Add/Remove list, system startup, program menu list and even no shortcut icons on Desktop. Keylogger monitoring software allows you to easily view the log files and provides facility to send encrypted log files to user specified email address. Keylogger program can be used to monitor how your employees use their work-time and to log all textual typed data. Keylogger monitoring tool provides hotkey combination or run command to un ...
  • Overviews Keep Your PC Safe from Spyware Spyware grows more sophisticated every day. There's more of it, and it's more malicious than ever before. Experts agree: ITopsoft Anti-Spyware delivers the most advanced spyware detection, blocking and removal available to beat dangerous spyware programs. Browse Where You Want, When You Want Dangerous and annoying spyware can infect your system in many different ways when you use the Internet. ITopsoft Anti-Spyware gives you 360 degrees of protection. Powerful Smart Shields offer real-time protection by blocking known and emerging spyware threats. If your PC is already infected, ITopsoft Anti-Spyware's advanced discovery methods locate and completely destroy malicious spyware that hides within your PC - even spyware that hides using rootkit technology. Download Your Favorite Music, Pictures and Videos Without Spyware Intruders File sharing programs and swapping music, photos or other files are notorious avenues for spyware infectio ...
  • Windows keystroke recorder software will let you monitor what people do when you share your computer with them. Tool secretly records all the pressed keys information and monitors what programs opened and when like chat conversations, and other keyboard typing activities. Invisible key logger adapts the hidden way to keep an eye to prevent your employees, children, others people from unofficial access of internet, and private data of your system. Remote keyboard monitoring software perform its operation in stealth mode, completely hides itself from start menu, task manager list, add-remove programs trace secret information and records keyboard activities in a password protected log file which is encrypted and can be protected with a password. Computer activity monitoring software provide feature to send log file secretly with the help of email to a specified user. Internet spy software is the simple method to record what your child, spouse or employee does on the computer behind your back. Advance Key logger ...
  • MS office Outlook password rescue program is the easiest and simple way to recover forgotten, lost or misplaced passwords. Email password rescue tool is efficient enough to restore passwords of other email accounts such as Gmail, Yahoo, Rediff, hotmail etc which are configured on outlook express email account. Microsoft office outlook password unmask tool save recovered password to a file in character format for future use. Program has capability to recover all missing incoming server and outgoing server details and also display server port number. Password rescue software uncovers secret password hidden behind asterisks character (****) of any length and supports Unicode letters also. Passwords unhide application recover passwords of outlook personal folders PST, MBX and DBX files that have authorized permission. Software is compatible with Windows 98, 2000, 2003, ME, XP, NT, Vista and windows 7. Email login password finder has following features: * Highly interactive GUI with help manual allows technical ...
  • Removable media data rescue utility supports various digital media brands including Transcend, Canon, Epson, HP, Kodak, Nikon, SanDisk, Samsung, Casio, Kingston, Sony, Konica , Toshiba and other marketing brands. Removable media data recovery software provides thumbnail preview of data before actual data recovery. Removable media data repair tool supports data restore if ?Drive not formatted? message is displayed on the personal computer or laptop. Removable media data retrieval utility supports different USB storage mass digital devices like thumb drives, micro drive, compact flash drive, smart media, multi media card, RS_MMC (Reduced multimedia card), SD (secure digital) card, mini SD card, Zip disk and other similar storage mass digital devices. Removable media data rescue software takes minimal turnaround time including analysis and recovery of files. Removable media data retrieval software also works with USB flash drive media like portable gaming system, PDA devices, mobile communicator, Mp3 player, por ...
  • Keystroke monitoring software is the most affordable monitoring programs for the persons who think that others are using their system when they are away from their home or working place. Keyboard activity logger software can track all keystrokes like typed passwords, emails and attachments, instant messages/chat sessions, all inserted texts as well as details of time if anyone worked on your computer. Keylogger application can record computer activity traces for all windows based operating system like 98, ME, 2000, NT (terminal, server and workstation editions), XP (home, professional and media center edition), server 2003 and windows Vista (Vista Starter, Vista Home Basic, Vista Home Premium, Vista Business, Vista enterprise, Vista ultimate). Undetectable Keylogger completely hides its operation from any antivirus or spyware. Software is useful in such circumstances when you need to monitor your employees who should be working, keep an eye on your kids when they surf the net, or catch a cheating spouse. Keyb ...
  • Folder Protect is a new concept in Data Security. It lets you password protect and set different access rights to your files, folders, drives, installed programs and popular extensions. Folder Protect goes beyond normal file locking and encryption by letting you decide whether to make files inaccessible, hidden, delete proof or write proof. Folder Protect is Windows 7 / Vista / 2003 / XP / 2000 compatible.
  • Conceal your online identity with the click of a button. Surf anonymously, encrypt your Internet traffic, hide your IP while surfing the Internet, using forums, sending E-mails, instant messaging, playing games, and more. Compatible with all web browsers. Hiding your IP address is as simple as clicking the "Hide My IP" button, which automatically configures your web browser or other application to use a proxy server from our proxy network.
  • Vista USB Monitor Features: Alert When a Foreign USB Drive is inserted using custom text and sound alerts. Attack Foreign USB: This will delete files on the inserted Foreign USB Mass Storage Device Foreign USB Drive Logger : You can click on ?hide? button to hide the program from users. A log of all Foreign USB Mass Storage Devices will be updated every 5 seconds to save the following information: Logging Time USB hardware Unique ID USB Size USB Name USB Letter Root directory and up to 3 folder levels file contents.
  • FUTURESTRAC version 3.2 trading software takes the challenge out of tracking the different trading times, schedules, and contract months of the most actively traded U.S. futures (derivatives) and futures options markets. Quickly display essential trading information for any number of contracts in an easy to understand visual format while you trade. A simple and intuitive user interface, detailed context-sensitive help, and numerous customization features make the program easy to learn and use. Specific features include the display of multiple futures and futures options contracts, countdown timers (open and close) for floor and/or electronic sessions, contract trading schedules, timer alerts, contract months (active and serial), contract codes, and exchange links. Countdown timers and trading schedules are easily adjustable to any world time zone. The innovative derivatives calculator calculates trade profit/loss and displays price specification data using equivalent point, quote, and cash relationships for ...

Page 10 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware