Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Recoveryfix provides one solution for all OST corruption issues ? Recoveryfix for OST to PST software. It?s programmed specifically to deal with all kinds of OST corruption issues effectively. It recovers emails, drafts, contacts and other mailbox items from corrupt OST files and makes them accessible in MS Outlook by converting them to PST format. The smartly programmed tool is capable of recovering severely corrupted, highly encrypted and password-protected OST files. Interestingly, it can recover multiple OST files simultaneously without making any data loss. The advanced tool operates in dual recovery mode ? Standard mode and Advanced mode. The first mode deals with minor OST corruptions and delivers very quick results. However, Advanced mode takes its time and deals effectively with severely corrupt OST files. The OST recovery software displays recovered OST files for preview so that you can check their content for accuracy purpose. Apart from PST, the tool provides option to convert recovered OST fi ...
  • From AKick Antivirus Total Security: Cybercrime has to skyrocket. Every day millions of PC users suffer due to hijacking and fraudulent online habits such as shopping and banking. Even your works may not complete without using the internet with surefire protection. However, online criminals easily swindle money from bank account; even they often misusing your credit card, finally they may crash down of your brand new system without any warnings. Introducing Akick antivirus total security for complete protection against viruses. Features: Comprehensive device control: Set write/read/execute easy access to external devices. Prevents malicious autorun: While using computer even lot of malicious features secretly comes in your computer, installed without your little information or permission, it is capable of blocking all of them effectively. Vulnerability Scanner: It detects and quickly informs the computer user for vulnerable applications that can be exploited to infect their PC. Email Security: This software w ...
  • A fully-functional scheduling WEB-application. The easy way for any organization to have a Internet-calendar within minutes! You simply place the OrgCalendar onto a your web site - and that's it. Calendar management is implemented at two levels: Admin Area and Public Area.The OrgCalendar gives you a customizable Resource Navigator, new Date Navigator, control over the events overlapping and a mechanism for sharing events.
  • Serial communications C/C++ and .NET library for RS232 and multi-drop RS485 and RS422 serial ports. Provides capability to easily develop C/C++ and .NET applications that access data from any serial port device. Supports 256 ports, control multiple ports simultaneously, modem control, virtual serial ports (USB to serial, Bluetooth serial), port re-entrant, hardware/software flow control, serial line status & control. etc. Royalty free.
  • Internet components - Clever Internet Suite is the native Delphi VCL for RAD Studio XE7, XE8, .NET and ActiveX. The suite includes more than 50 components for Internet development and its code is constantly being refined and improved. HTTP, FTP, SMTP, POP, IMAP, SFTP (SSH), OAUTH, SOAP, WebDAV components. Full IpV6, Unicode and 64bit support.
  • Real PC Spy software is a smart PC surveillance software that lets you know exactly what people do on a PC. It secretly records all PC and internet activity, including typed keystrokes (keylogger), chats & IMs, emails, websites visited, microphone, Facebook use, games played, online shopping and searches, video talk, videos watched, documents opened, clipboard text and more. It sends logs to your email or ftp like every 30 minutes.
  • A simple software that was created to ensure that you never worry about misplacing or forgetting passwords. Tool for restoring forgotten passwords (also in Internet Explorer). So using this application, you will no longer have to panic when you lose any of your passwords. Using: Just hover the mouse on the password and inhospitable place of asterisks see the desired password.
  • Plugin to synchronize documents of Aml Pages via an Internet using the service www.dropbox.com. Dropbox - the Web service to synchronize files via an Internet. Click on a menu command, the rest of the plugin itself does: saves the document with date compression, packed into ZIP-archive, sends data to a folder synchronization Dropbox.
  • Classical scroll shooter with the plot, in the form of dialogues between characters. The year is 2500. Earth has recently lost the war for the right to be independent and obeyed the ruler of the planet Alpha 700 - to the cruel Pascal. People are still able to fight in groups and organize resistance. Alex and Jenny - brother and sister, who have lost in this war all that was dear to them. Now the fate of Earth in their hands.
  • Skater TOTAL is the unique .NET protection tool that proves real security for your production software. Unlike Skater .NET obfuscator that makes the unauthorized reverse-engineering more difficult by symbol renaming, control-flow algorithms, encrypting etc., Skater TOTAL totally stops MSIL disassemblers. This is the assurance that no one will see your source code.
  • Monitor large and medium networks without leaving your chair! Total Network Monitor looks after your LAN no matter how large, raising alerts automatically if certain events occur. Watch network performance and get notified about the problems immediately with a variety of alerting options. You won't miss a problem no matter where you are! Total Network Monitor can notify you by email or by phone.
  • PDF Viewer SDK provides a visual control to implement your own PDF reader. Benefits: control to view PDF files; views PDF files without Adobe Reader or other tools installed; zoom in/out support; multiple pages support; copies text to clipboard; finds text in PDF. System Requirements: Visual Studio 2005-2012 and Microsoft .NET framework 2.0, 3.5, 4.00.
  • Proxy Log Explorer is the fastest and most powerful analysis application for monitoring the efficiency corporate Internet usage of your Proxy server. This application creates dynamic reports on-the-fly. Also, you can easily get virtually any subreport by just right-clicking the item you need and selecting the subreport you need. Needless to say, it can recognize log file formats automatically and extract compressed log files.
  • HTML WYSIWYG Editor Component for CMS and CRM designers. Features table editing, CSS support, customizable language localizatation. Inc. FTP class can upload images to a web server automatically or, can be used independently. HTML DOM branch status bar allows manipulation of tags, object properties and CSS classes of any HTML node. Compatible with any environment that supports ActiveX components such as VB6 , Microsoft Office 2000+ , VS.NET.
  • The task of the organization of work time is extremely important for any indie developer. It can be difficult to stay focused. Various social networks, entertainment portals and other distractions tend to attract our attention, and the work suffers as a result. Working Time Manager is a program designed to help solve these problems. It is designed to help those who are trying to deal with laziness, increase their efficiency, to get the job done..
  • IP2Location IP-COUNTRY-REGION-CITY-LATITUDE-LONGITUDE-ZIPCODE-TIMEZONE-ISP-DOMAIN-NETSPEED-AREACODE-WEATHER-MOBILE-ELEVATION-USAGETYPE is commercial lookup database that translates IP address to country, region, city, latitude, longitude, zip code, time zone, ISP, domain name, net speed, area code, idd code, weather, mobile, elevation and usage type. Database updated monthly to support latest changes in IP address re-assignment.
  • ApPHP AJAX File Uploader is an easy to use, high-performance PHP AJAX Multiple File Upload Control which allows you to upload files to web server without refreshing the page. Most of the web application available today includes a capability of user to upload files, whether it is a social media application or a CMS/Blog network platform. Upload capability of your application can be made easier and usable to the user if you are using our control.
  • Sports prediction and betting software. Generates performance-based odds for the upcoming games in any league sports, such as soccer, hockey, tennis, etc. Maintains Internet-updateable databases with the past games for over 100 soccer leagues worldwide, UEFA superleague, World/Euro Cups, NHL, NFL, MLB, and NBA. Keeps track of teams ratings in dynamics. Has built-in sophisticated bet optimizer as a powerful tool. Performs advanced tournament analysis. Features convenient intuitive user interface. Odds Wizard is able to compute fixed odds (1 X 2), double-chance odds (1X 12 2X), Asian handicap odds, fixed handicap odds, totals and correct scores with corresponding odds, half/full time odds. Handles unlimited number of arbitrary leagues with up to 1024 teams, and unlimited number of games per league. Odds Wizard 2.50 "Live Magic" has been fully integrated with the bet optimizer Stake Wizard 4, decision-making software generating an optimal betting strategy. Using sophisticated probability ...
  • Softros LAN Messenger is a instant LAN messaging software application for home or office users. It does not require a server and is very easy to install and use. The program correctly identifies all Windows XP/Vista/7/8 user accounts and works in any TCP/IP network. Softros LAN Messenger comes with a variety of handy features, like message notification alarms, files transfer, and intuitive interface. Supports Windows/Citrix terminal service.
  • The program Activity Manager allows registration of activities related to time, distance and cost. Activity Manager is modular and can be setup and expanded as desired. The program consists of a module registration, a module invoicing, a module analysis and a database. Depending on the business type Activity Manager can be used by a one-man business with a single PC up to companies with multiple employees, a network and a database server.
  • Auditing device configurations against a secure standard like the DISA STIGs is a critical defense against cyberattacks. The SecureVue STIG Profiler automates the profiling of devices on a network in preparation for a DISA STIG audit. Using the STIG Profiler, an IA Manager can quickly identify all of the nodes on the network, scan the devices for detailed asset information and generate a report.
  • FirePlotter is a real-time firewall connection or session table monitor. It provides the ability to track usage of bandwidth and traffic for Cisco PIX ASA and FortiNet FortiGate firewalls. Installed and operational in less than a minute. FirePlotter provides tabular listings and summary of sessions by Service (HTTP, FTP etc), Destination IP, Source IP and more along with graphical bandwidth usage.
  • Free photo slideshow screensaver with two main features: display your favorite photos from local or network folders in slideshow mode with beautiful transition effects and download free wallpapers from the Internet. You simply select what kind of wallpapers you want (Cars, Girls, Nature, 3D, Anime and many others) and enjoy new pictures every time the screensaver starts. And you can set any wallpaper as desktop background with a single key press.
  • Comodo Internet Security provides comprehensive protection against viruses, spyware, hackers, root-kits, Trojans, and zero-day attacks for Windows based computers. The software features full Antivirus, a powerful network Firewall, Anti-Spyware, Host Intrusion Prevention, Auto-Sandbox and Behavior Analysis of unknown files. Join the more than 10 million PC users worldwide using this free, easy-to-install and configure suite.
  • Proactive anti-malware program to clean and protect your PC from all internet threats: viruses, spyware, trojans, bots, adware and worms. It uses a triple-layer prevention engine: Surf Protection, Real-time File Guard and Behavior Blocker. This triple-layer blocks access to fraudulent and dangerous websites , scans for malware in real-time and catches zero-day threats for the ultimate protection.

Page 8 of 10
1 2 3 4 5 6 7 8 9 10

Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware