Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Can you keep all passwords and access data in your mind? The abylon KEYSAFE is a simply password manager to administrate all your secret passwords. You need only one MASTER-password or alternatively a removable media, CD, chip card or certificate as key. The stored data can pull simply with the mouse into the input fields of your browsers or program window (Drag&Drop). With abylon KEYGENERATOR the software also offer a random password generator.
  • Lepide Event Log Manager is a sophisticated tool that empowers the user to avail the information about a site which includes accessed files, activity status, traversed paths, referring pages, search engines, browser related information, etc. The software archives the event logs of the entire network in a central repository which makes it extremely simple and easy to maintain them. Also, it generates timely notifications and alerts to inform the administrator whenever any critical event related to event logs takes place. Using this efficacious utility, event browsing for all the systems within the entire network can be simplified. Moreover, it facilitates you to view the specific or all windows and W3C event logs from a centralized platform. Also, it provides compliance reports for HIPAA, PCI, SOX, FISMA and GLBA and thus sustains compliance and also help in avoiding the legal hassles. The software has two editions- A Freeware edition and Enterprise edition. The users can choose any one as per their need and u ...
  • Anti-Spyware, Anti-Virus, Anti-Spam Solution that fast and secure removes spyware, viruses, spam and other malware from your computer. Spy Emergency protects you against spyware, viruses, adware, spam, homepage hijackers, remote administration tools, dialers, keyloggers, and many other types of internet threats. It supports Internet Explorer, Mozilla Firefox and Opera Browser.
  • Remote Utilities is remote desktop software for network administration in a Windows domain network. It is closely integrated with Active Directory and provides remote installation across multiple PCs as well as AD authentication support. Remote Utilities can run as a service and grant full control over the remote PC to the administrator in 15 different connection modes, including the view remote screen and power control modes.
  • HR Tracking Database Software for employee and job information for businesses. HR Access Database Software by DB-Pros, Inc. was designed to administer HR and employment data with instant results, while maintaining the accuracy and security that is required for modern business. It is an ideal solution for small to medium sized organizations and growing businesses alike.
  • Today in the engineered world many users have major problems with the multitude of passwords. With the software abylon LOGON SSO Pro, the user only authenticate once at the windows logon and have additionally an automatic access to password protected applications. The program boasts with high flexibility, centralized administration and enhanced protection against keyloggers and phishing attacks.
  • Navicat for MariaDB provide a native environment for MariaDB database management and administration.It works with any MariaDB database servers from version 5.1 or above and supports all MariaDB objects types.MariaDB database are not only support the majority of features, it also sustain the additional functions. Secure Connection, for the secure connection, MariDB establish a secure SSH session through SSH Tunneling in Navicat. You can enjoy a strong authentication and secure encrypted communications between two hosts.The authentication methods can use a password or public/private key pair and Navicat comes with HTTP Tunneling while your ISPs do not allow direct connections to their database servers but allow establishing HTTP connections. HTTP Tunneling is a method for connecting to a server that use the same protocol and the same port as a webserver does. Object Designer, you can create, modify and design database objects using our professional object designers. Object designer is available for all database ...
  • FTPshell Server is a Secure FTP Server and SSH2 Secure Shell Server available in a single software package. It simultaneously supports file transfer and remote access using FTP, FTPS, SFTP, Telnet, and Secure Shell. FTPshell Server can be administered using the control panel from the local computer. Users can be authenticated using local windows system accounts, active directory, or FTPshell Server specific accounts. Many advanced features such as download and upload resuming and file integrity verification using CRC, MD5, and SHA are also supported. FTPshell Server has passed the rigorous testing program for running on Windows Vista and has officially been certified for Windows Vista and Windows Server 2012 by Microsoft. A complete list of features is available on the product website at www.ftpshell.com. FTPshell Server is the only windows software solution you will ever need to support multiple internet file transfer protocols. Download it now and evaluate it free for 30 days.
  • Sysax Multi Server is a Secure FTP Server and SSH2 Secure Shell Server combined into a single product. It simultaneously supports remote access and file transfer using FTP, FTPS, SFTP, Telnet, and Secure Shell. It also supports web based file transfer using HTTP and HTTPS. Sysax Multi Server can be administered using the control panel from the local computer or remotely through a browser based web adiministration interface. Users can be authenticated using local windows system accounts, active directory, or Sysax Server specific accounts. Sysax Multi Server enables the execution of server scripts based on the triggers generated by user actions. For example, a script can be executed whenever a user has successfully logged in or has downloaded a file. The script can be used to send email notifications, perform additional file transfers and local file processing, or even run other programs. Many advanced features such as download and upload resuming and file integrity verification using CRC, MD5, and SH ...
  • Do you want to know how your employees are using their internet? Just try RecoveryFIX Employee Activity Monitor, a sophisticated tool for internet activity monitoring. The software is easy to install and requires no specific skill set to operate. With this tool, you can easily get details of website visited, and date and time of visiting. You also can have the screenshots and logs of all the activities.
  • UserGate Proxy & Firewall is a UTM (Unified Threat Management) class solution for sharing and monitoring employees' access to the local and Internet resources, for filtering FTP and HTTP traffic, as well as for administrating the network in your company. The product can be used in small- and mid-sized companies instead of relying on large and expensive hardware or software alternatives.
  • Hide, lock and protect your local, network, Floppy and USB drives, and disable the AutoRun feature for them. Control access to your drives by clicking on the checkboxes located within the group boxes representing them. Disable the AutoRun feature based on drive types to disable, for instance, only all USB drives, regardless of the drive letters that can be associated with them. The program lets you protect itself from an unauthorized access.
  • Best Network Security is the best solution for corporations, universities, schools, public libraries, internet cafes and other applications where administrator has to secure and maintain a lot of network PC workstations located in different places. Best Network Security is intended for securing, protecting, and maintaining PC workstations within a corporate network. Supports over 600 different security restrictions.
  • Protect your computer and restrict access to Internet with Security Administrator. This nice password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, Printers, System and Internet Options. You can disable your boot keys, cont
  • Comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to every corner of PC workstation, apply executable patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. In total, 1st Network Admin supports over 600 different security restrictions, options and tweaks.
  • Access Administrator Pro is intended for controlling access to files and folders situated on local media of Windows win98/ME/NT/2000/XP/vista at Windows kernel level. It alows to allocate access to files and folders between users according to predefined schedules, and protects system files and folders such as the Windows System, Registry and Swap files.
  • Password management with synchronization. SecuStar administrates your passwords safely and clearly. Furthermore SecuStar can synchronize between several PCs, so you have access to your passwords from all the devices you are working with. SecuStar stores your password data using the AES-256 algorithm, which is approved in the U.S. for state documents classified top secret.
  • Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and..
  • Web-based school calendar software. Easily publish calendars online, share your calendars with others and much more. Teachers or administrators can post events that appear on targeted calendars, the school website, and on homepages of each student and parent. You can quickly create color-coded online calendars for different types of events, for example: class schedules, tests, sports events, performances, meetings, etc.
  • Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, individual drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
  • Cayo Admin Assistant(tm) delivers the missing layer of Automation and IT Rule enforcement for your Microsoft Infrastructure while unifying on-premises, mobile and cloud administration. Admin Assistant is at work even when you are not. By automating day-to-day administration and enforcement of IT business policies, Admin Assistant ensures systems are secure and run as intended. Watch a demo or buy a permanent license at Cayosoft.com.
  • Manage calendars, contacts and tasks. Synchronize with internet calendars and contacts. Subscribe to internet calendars. Access your data through any third-party cloud network, or share the data in your home/office network. Use groups, subgroups, drag & drop options for keeping records. Print labels and envelopes, calendars and address books with customizable templates. Advanced installer does not require administrator access.
  • SQL Server Restore Toolbox is powerful and efficient way of database recovery in MS SQL Server format. This program provides small size of its binaries, friendly interface and powerful engine of data restoration, suitable in all instances of SQL analysis. Sure it is designed for database administrators, but the ease of interface allows other users to execute the same processes on their computers when it is necessary.
  • Kernel Computer Activity monitor is the software to trust when it is important to track all computer activities of employees. It captures snapshot of the target computer screen at specific intervals. One can specify maximum size of snapshots and also if snapshot should be of the active window. Every key that is pressed by user gets recorded. Administrator can check what all keys were typed after analyzing the keystrokes. Kernel Computer Activity Monitor records every internet activity ranging from browsers used, pages visited, visit time or user name. The tool enabled admin to look at the history of accessed application. Details such as name, launched time, executable path and launched by information are recorded about the application. The admin can save clipboard activities as well that can let you know everything that was copy-pasted including text and images. Kernel Computer Activity Monitor reports every email activity that is accessed without using SSL connection. The reports include date and time ...
  • Help Maggie run her magical farm. Use your magic powers to grow a small farm into a prosperous enterprise! Care for the animals, grow plants and make enchanted goods! Earn trophy achievements and keep the sinister business man from shutting your farm down. Make ice creams, sweaters, strawberry pies and lots more in this fun time management game!

Page 3 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware