Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • GSM Guard allows you to control remote sites and objects equipped with security alarms, controllers, or surveillance systems that send alerts about specific events or issues via GSM, SMS, or GPRS. When installed on a server, GSM Guard receives and saves all incoming messages. If necessary, it can notify an administrator, operator, or business owner by various means. The application can monitor both stationary and mobile objects.
  • WMIX is a FREE GUI based implementation of WMI technology which performs agent-less remote administration of Windows machines with no scripting or programming necessary. Empower yourself with advanced remote client management techniques with WMIX. Generate WMI PowerShell or Visual Basic scripts using a built-in wizard to report, modify or execute actions against local or remote machines. The WQL wizard can easily create sophisticated WMI queries.
  • The Machinist Calculator has been developed to quickly solve common mathematical problems for operators at a price every machinist can afford! Cutting speed, feed rate for turning, drilling and threading; calculations for bolt circles; inch metric conversions for drills; drill sizes for tapping, trigonometric solutions and much more!
  • MiniTool Partition Wizard Professional Edition is a magic partition software optimized for business environment with advanced features such as Merge Partition, Convert Dynamic disk to Basic disk and Change cluster size. Business users and system administrators can use our magic partition software to Resize and Move partitions, Merge Partition, Change Cluster Size, Copy Partition, Copy Disk, Create, Delete and Format partitions, Convert.
  • EZTalks is a leading online video conferencing provider in the world which enables you to host unlimited HD video conferencing with anyone, anytime. EZTalks video conferencing software is powerful but easy-to-use video conferencing software, let you connect with anyone, anywhere and anytime, reduce cost and increase productivity. EZTalks video conferencing software can be widely applied to all industries such as enterprise, government, education, training, healthcare, legal, finance, military and community etc. With EZTalks video conferencing software to do whatever you want such as host online meeting, do online teaching, conduct online training, launch online video presentation, hold online webinar or give remote support etc. Besides, we also offers the server version for any enterprise or organization to deploy in their own network. Fully administer user access and privileges for secure and efficient operation. Main Features of EZTalks Video Conferencing Software: Start or schedule a me ...
  • We offer our MDI-Projektworkspace for Visual C# developers for the further development of their own products. The Workspace needs Visual C# 2008 Express and contains all source files for the construction of a form administration for the Windows-CLR. The resulting program manages the forms of an application and a base program. The Workspace consists of five projects. The source code contains multithreading and the award of license files.
  • Job Board Plus Software is a script to launch a Job Board Site. Designed to be easy to use, completely automated and requires no technical skills to administer. It includes advanced management tools for both Job Seeker and Employer and can be used in setting up a Job Board Site for specific countries, regional Job Site or a general Job Site. Different search options, multilingual interface, full administrator`s control.
  • Anti-Spyware, Anti-Virus, Anti-Spam Solution that fast and secure removes spyware, viruses, spam and other malware from your computer. Spy Emergency protects you against spyware, viruses, adware, spam, homepage hijackers, remote administration tools, dialers, keyloggers, and many other types of internet threats. It supports Internet Explorer, Mozilla Firefox and Opera Browser.
  • A1 Keylogger spy software secretly logs all their chats & IMs, emails, Facebook use, keystrokes (including user names & passwrods), video talk via web cam, YouTube videos watched, web pages opened, online searches, applications executed, documents opened, clipboard text and more. Send log reports to your email like per 60 minutes. It runs in a complete Stealth Mode. Administrator of the software can unhide and manage it easily with hotkey.
  • Adminner is a small, fast, reliable and easy to use tool for administrators to make his daily work more easier. It can manage all computers, services, programs, files, accounts, groups in LAN on a computer, and need not to login logout one by one computer! It don't need domain server or Active Directory, you can work easily in working group just like in domain. It is designed to help reduce costs, increase efficiency and reduce errors!
  • dbForge Studio for MySQL is the universal MySQL and MariaDB client for database management, administration and development. With the help of this intelligent MySQL client the work with data and code has become easier and more convenient. Devart's MySQL GUI tool provides utilities to compare, synchronize, and backup MySQL databases with scheduling, and gives possibility to analyze and report MySQL tables data.
  • Tail4win - windows tail. Tail4Win is a real-time log monitor and viewer, it can be used to view the end of a growing file. By using Tail4Win system administrator can monitor log files of server applications in real-time, e.g. Apache's error.log and access.log, or IIS, Tomcat, Resin log files. And programmer can monitor application traces easy and quickly.
  • Service Timer is a small, fast, reliable and easy to use tool for administrators to make his daily work more easier. It can control all services in your LAN, run service or programs in your LAN on time ,and need not to login logout one by one computer! It don't need domain server or Active Directory, you can work easily in working group just like in domain. It is designed to help reduce costs, increase efficiency and reduce errors!
  • HealthUse is a reliable program that enables you to restrict the computer access for children or other users. The software can lock the computer if one of the specified users logs in during the unauthorised time. The administrator can unlock the computer at any time, since it is the only one account with no limitations. For example, you can build a child account, set Monday to Friday use no more than 1 hour all day, rest for 5 minutes every 20 minutes, only use between 19:00 to 21:00; set Sunday and Saturday use no more than 2 hours all day, rest 2 minutes every 15 minutes and so on. If you are the office worker, you can create a new account for yourself, set every 10 minutes rest for 2 minutes. When rest time arrives, HealthyUse will lock the computer screen, force user to rest (administrator account can unlock computer screen at any time).
  • ICLowBidAuction script is a Low Bid Auction software for setting up a comprehensive and robust lowest unique bid auction site with 2 types of low bid auctions: Classic and Lower. Site administrator can adjust auctions time, step and other parameters. Auction payments are via PayPal and other payment processors can be integrated.
  • Ax3soft Sax2 is a professional intrusion detection and prevention software (NIDS) used to detect intrusion and attacks, analyze and manage your network which excels at real-time packet capture, 24/7 network monitor, advanced protocol analysis and automatic expert detection. With insight into all operations in your network, Sax2 makes it easy to isolate and solve your network security problems - detect network vulnerabilities, identify network security threats, catch actions against of security strategy and signs of been attacked. Finally, intercept and stop these connections. Sax2 offers many kinds of intrusion analysis reports, such as events, type, source address and destination address of attacks, and many crossover reports and compositive reports. Furthermore, sax2 allows customize the time range which administrator will flexible monitor and evaluate the network security. Sax2, enhanced detection, analysis, response and management features, supports almost all common used protocols, self-conta ...
  • The database contain geodata of the Federal Republic of Germany with geo referenced towns, municipalities, town quarters, administrative units, postal codes, telephone preselections, nature areas, landscapes, climatic zones. The data contain coordinates for navigation and geo-coding, proximity searches, distance computations and for mapping of landscape information. It is possible to assign a variety of nature and scenic information to each town.
  • Geodata International - World-wide database of countries with georeferenced towns, municipalities, postal codes and administrative units with WGS84 and UTM coordinates and elevations for geocoding, proximity search, navigation, distance calculation. The database tables are present in the file format CSV (Comma Separated Values). The character set used is UTF8. This format is used often and in most cases you can import th data directly.
  • Recovery Toolbox for Lotus Notes is an indispensable data recovery tool intended for any system administrator in an organization that heavily relies on Lotus. The work of Recovery Toolbox for Lotus Notes is based on a convenient recovery wizard that guides the user through the process. Recovery Toolbox for Lotus Notes efficiently solves the problem of ad hoc data recovery from damaged .NSF files that can be performed literally by anyone.
  • Private Shell is an easy to configure SSH client for Windows. With a useful autoconfiguration option, SSH tunneling and Secure FTP (SFTP) client, it is more than a simple SSH client. Major features include: SSH1, SSH2 support, SFTP, scripting, SOCK5, tunneling, X11 forwarding, and more. System administrators will find the silent installation feature useful to install Private Shell over a local network. Download a free evaluation version.
  • The protagonist found himself in an unknown place for him, that he will find a way out? The game is a puzzle-platformer with unusual mechanics of jumping, the character jumps itself depending on the obstacles in his way and running speed. Goal the game, is to bring the game character to the exit from level, in this you will interfere with various puzzles.
  • Now, you can see for yourself what your employees do on their desktops during office hours and that too without being physically present in front of them. Yes, it is possible with the help of computer monitoring software. It facilitates the administrator to restrict the misuse of organization?s resources by employees, unnecessary chatting, internet surfing, access to social networking sites during working hours. Administrator comes to know about the possible security breaches if any, while invisibly monitoring varied computers at the same time. Also, this advanced utility enables the user to execute commands like Shut down, Restart, Lock, remove wallpaper, start screensaver, etc. on the monitored computers. Also, administrator can schedule online as well as offline recording of the monitored computers. Offline recording of the software is helpful when admin or manager is not available on desk. This recording is saved in AVI format and can be checked later or saved for future references as a proof. For calcula ...
  • SkyCrypt is a FIPS 140-2 validated Cloud Encryption Gateway. It allows users to add 256 bit AES encryption to local drives, Google Drive, Dropbox, Bitcasa, SkyDrive or most any other cloud storage service. SkyCrypt features include : NIST FIPS 140-2 validation, AES 256 bit encryption, optional 2 factor authentication via Google Authenticator for IOS or Android, and encrypted file names
  • RecoveryFix Employee Activity Monitor is an invisible software tool that is highly useful for business managers, organizations and home users with which you can easily monitor the activities of employees, children and spouse. Employee Monitor Software helps the network administrators to review and monitor the activities of the employees around a network in real time. Using this tool, you can view the live desktop activities of a network. It also enables you to keep a close look on the employees activities by recording all the events occurred in the PCs. It records all the activities including the system processes, keystrokes, opening/closing of windows, FTP activities, website visits, internet activities, downloading etc., creating desktop screenshots and chat logs. Using this tool; you can monitor several PCs of your organization from a remote place also. This eminent Employee Monitor Software also facilitates the users to create offline logs of the monitored computer activities to view them later. Th ...
  • Sinister ship speeds silently through the dark gray clouds. It was an ordinary observation mission to scan for the existence of people on the planet which they considered to be potential candidates to be "civilized." Radar found thousands of objects in all directions, couldn't tell them much. What's going on? The pilot tried to escape, but to his dismay, he found that the ship's controls did not function properly. He survived the crash, got..

Page 6 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware