Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: I :: internet
Display: short descriptions | full descriptions
  • WinUtilities Pro is an award winning collection of tools to optimize and speedup your system performance. this suite contains utilities to clean registry, temporary files on your disks, erase your application and internet browser history, cache and cookies. it also supports to defragment your disk drives and improve computer performance and stability. built-in StartUp Cleaner allows you to control startup programs that load automatically
  • Perfect Emailer is a professional high performance mass mailing management and sending software for targeted bulk email marketing campaigns and email lists building at your desktop. With Perfect Emailer, You can easily manage mass mailing lists for your subscribers, create high personalized HTM messages and newsletters and send them in just few minutes. The only requirement is an Internet connection. The program has its own internal SMTP server.
  • Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history and past computer activities. It supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera, completely implements and exceeds the US Department of Defense and NSA clearing and sanitizing standard, once erased with it, your file data is gone forever and can not be recovered.
  • Print2Flash lets you easily convert any printable document (e.g. Microsoft Word, or Excel, or PDF document) to an Adobe Flash file (file with SWF extension) or to HTML page or SVG file. This file can be shared with users who don't have the software that created the original document (for example, Microsoft Word). You can view such files either with Adobe Flash Player available across a number of operating systems or with any modern browser with HTML5 support. These files can be easily published on the Web as well for fast and easy access to them from anywhere across the globe. You can view Print2Flash documents across platforms and retain the formatting, graphics, fonts, special characters, and colors of source documents, regardless of the application used to create the document. For example, if you created a Microsoft Word document on a Windows computer, you can use Print2Flash to convert it to a SWF file, and then send it to a Macintosh user and vice versa. The SWF files that Print2Flash generat ...
  • WinLock is a comprehensive security solution for personal or publicly accessible computers. It is a program that ensures that only authorized people can access sensitive information on your computer. With WinLock, you can control how long others can use your computer, disable Windows hot keys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.), lock Windows desktop, hide the Start button, lock files and folders, filter Internet content and much more.
  • Sothink Blu-ray Creator is capable of producing high quality Blu-ray video disc out of all kinds of personal videos, including but not limited to videos downloaded from internet, shot by camcorders, SLDRs, smart phones and tablets, etc. Users can also add beautiful menus from the integrated menu templates themed on different topics.
  • Voxal is free voice changing software to edit voice recordings on a Windows PC. Voxal can be used to add effects to a recording as well as intercept and add or change audio as it comes into your microphone for voice changing on the fly. Create voices for online avatars and video games. Use a voice disguiser for anonymity over the internet. Change voices to use in voice overs or other audio projects.
  • KSnetManager is a revolutionary parental control tool that is distinct from other internet monitoring software: 1) Instead of being a hidden monitoring program, it is interactive. 2) Instead of passive monitoring, it actively controls and blocks unexpected activities. 3) It controls and monitors not only websites, but also all programs on your computer. 4) The program has a fully encrypted key logger; and much more.
  • Change your voice over IP and PC to phone; change voice's gender and age to have fun in online voice chat; create different voices for dubbing; morph songs and voices in songs; record voice chat, phone conversation, Internet radio, and music from online sites; add audio and background; compare changed voice to another's voice for simulation purposes; compatible with most instant messengers, PC to phone clients, game servers, and media players.
  • With over 3 million customers, Disconnect is the easiest way to protect your privacy on all of your devices. Disconnect protects you in 6 ways: Visualize Tracking - see who's following you Encrypted Internet - secure all of your online activity Safe Browsing - block 5000+ trackers Anonymous Search - search privately on Google, Bing, & more Location Control - defeat censorship Privacy Icons - easily decipher privacy policies
  • Record your entire screen or part of it directly to AVI or WMV, monitor your webcam or desktop remotely, broadcast your screen or webcam live over the internet, capture screenshots in JPG, record audio from any source into WAV, WMA or MP3, capture video from your tv tuner card, web browsers or media players DRM free, share your media files on your own personal web site, send media files by e-mail, or upload them via FTP.
  • Proxy Log Explorer is the fastest and most powerful analysis application for monitoring the efficiency corporate Internet usage of your Proxy server. This application creates dynamic reports on-the-fly. Also, you can easily get virtually any subreport by just right-clicking the item you need and selecting the subreport you need. Needless to say, it can recognize log file formats automatically and extract compressed log files.
  • SterJo Mail Passwords is a lightweight software that recovers forgotten mail passwords to Gmail, Yahoo, Hotmail, AOL, GMX, Zoho and some other free email services. Currently it supports the most used web browsers like Chrome, Firefox, Internet Explorer and Opera.
  • Advanced virtual camera with overlay of images, texts, and support for multiple monitors, and visual effects. Perfect for professional broadcasts over Skype, UStream, or any service or program that accepts a webcam. Add your company logo over broadcasts and other visual effects. ScreenCamera.Net supports multiple monitors and records video file in high definition.
  • Real PC Spy software is a smart PC surveillance software that lets you know exactly what people do on a PC. It secretly records all PC and internet activity, including typed keystrokes (keylogger), chats & IMs, emails, websites visited, microphone, Facebook use, games played, online shopping and searches, video talk, videos watched, documents opened, clipboard text and more. It sends logs to your email or ftp like every 30 minutes.
  • Capture anything you see on your PC screen! Don't waste time cropping your captures. Take a "snapshot" of anything exactly what you need, with just a click. Irreplaceable tool for Designers, Office Workers, Business People, Analysts, Technical Writers who have to describe interfaces, menus, buttons, etc. Easy to Learn, Easy to Use Using SnapIt Screen Capture Software takes just three simple steps: 1. Start the program (click on the program?s icon). It appears minimized in a system tray. 2. Click PrtScr (Print Screen) button and select with mouse what you need to capture on the screen. After selecting the region is automatically copied to the clipboard. 3. Save a snapshot from the clipboard with any way you like: * Open Microsoft Word and create new document. Press Ctrl+v combination and paste image from the clipboard to the document. Technical Writers often use this approach to describe program interfaces. * Open Photoshop. Create new image file or open existed image ...
  • The Personal Cloud product allows you to remotely browse and access files on your home computer from your smart phone. Instead of a cloud storage account, which allows access to the files you last uploaded to the cloud, this is a real-time view into the current contents of your computer. There is no need to upload files. If a file is on your computer then you will be able to see it and access it, without keeping up with the transfer of files.
  • With iNet Protector you can restrict Internet access at specified times or on demand. You can disable connection completely or limit Internet to work with allowed programs and services only. In order to fully enable Internet access, user defined password must be entered. You can easily schedule Internet availability. Timer allows you to disable Internet connection after specified amount of time. Ideal tool for parents and businesses.
  • DVDFab Video Converter is a full-featured and flexible File to Mobile Converter which can read almost all the popular video formats from Internet, digital camcorders, capture cards, etc, and convert video on your PC to various video/audio formats playable on the next generation consoles like PS3 and Xbox 360, and on various mobile devices in minutes. It also provides multiple settings and options for you to edit according to your needs.
  • ZOLA Repair Internet Browsers is an simple but yet advanced all-in-one tool to help you repair or reset any of the three major internet browser products available today. The tool comes with a simple gui to remove any toolbar that is installed for Internet Explorer browser and a powerful reset feature for all the three major browser products, that is able to reset them to their default state as they where originally installed.
  • SterJo Internet Explorer Passwords will reveal all passwords and usernames stored by Microsoft Internet Explorer. For each password it will show the URL and it will find the storage location. Whenever you need to sign in to a website you will be asked if you want to save the login details. Those details are stored in Windows Registry or Windows Vault which keeps a record of all saved passwords. With this tool you could reveal all those details with a simple click.
  • Restrict Internet access at specified times or on demand. Block harmful content, disable connection completely or limit Internet to work with allowed programs and services only! To fully enable or manage Internet access, a password must be entered. Easily schedule Internet availability. Timer allows you to disable Internet connection after specified amount of time. Keep kids away from Internet harms and employees away from online entertainment.
  • Archivarius 3000 is a full-featured application to search documents and e-mails on the desktop computer, your LAN and removable drives (CD, DVD and etc.). The program will extract and save full information about documents, which allows to search and overview documents even if these are physically not accessible. There are imbedded functions for quick overview and documents printing, tools for remote searching and accessing via the Internet.
  • One such email worm is the Win32 virus that modifies files so that it can automatically attach itself and an image of a fireworks display to your outgoing emails. It first showed up in 2005 and is displayed in incoming emails as an .exe file and is only activated if the file is opened. This Win32 virus automatically attaches itself to newsgroup or e-mail messages. The attachment is titled HAPPY99.EXE. You must open the attachment (click on it) in order to activate the virus. It does not show up on outgoing emails, so the person who sent it does not usually know they sent a virus with their email.
  • Once the Zhelatin worm installs itself onto your computer, it sends spam e-mails through your e-mail account to all of your contacts. Additionally, the Zhelatin worm slows your computer, reduces your available system memory and may change your system settings. Conseuqnetly, if you notice Antivirus 8 on your computer, you should remove it immediately. This program is distributed by Internet criminals who use various Trojans and other devious methods to spread their rogue programs. When installed on your computer, Antivirus 8 will block execution of legitimate Windows programs, making its removal problematic. This bogus program encourages you to believe that it is the only program able to save your PC from spyware and malware purportedly attacking your machine. In fact, your computer is unlikely to have any infection and the security threats that Antivirus 8 'detects' are completely fake. This program's purpose is to sell you a license to remove the non-existent security issues fro ...

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware