Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: P :: password
Display: short descriptions | full descriptions
  • .netshrink is an executable compressor and DLL binder for .NET applications. It uses LZMA compression library and can decrease your file size even by 50%. With .netshrink you can also bind multiple DLL libraries to the output file so you can redistribute your application as a standalone file. It can also protect your files with a password.
  • Easy uploads is a file storage media streaming application designed by Filestreamers that allows you to upload, store, and stream your files from their virtually unlimited file storage server. Easy Uploads can backup,share, and stream your files free online. Upload your favorite media files to your account then stream them for quick access, or upload your favorite photos, games,software,etc to backup and store them to your free hosting account. With this software you can not only save hard drive but you can also access your files from virtually anywhere online with a download link. Send large files through email, Create your own media playlist, Then sit back and watch it play. Easy uploads was dsigned with security and hosting in mind each file uploaded through this software is encryted during the upload process and can be password protected for added security. Easy uploads has access to virtually unlimited file storage so never worry about running low on storage or hard drive. Easy uploads makes backupi ...
  • MediaProSoft Free PDF Converter is a powerful PDF toolbox that contains many effective features to work with PDF files. You can convert PDF to image, PDF to Word/TXT, image to PDF, scan to PDF, merge PDF, split PDF, print PDF out, edit metadata, add/remove password security, apply digital signature... Tons of functionalities are provided and you can find almost everything you need within a click.
  • Virtual WiFi Hotspot Virtual Wifi Hotspot is a free software router for Windows based system running Windows 7, Windows 8, Windows Server 2008 R2 and Windows Server 2012. Using Virtual Wifi Hotspot, you can share any internet connection Via Wireless Internet my come from Wifi or LAN or Cable Modem or Dial-up or Cellular, etc.. The internet can be used by any Wifi device such as Laptop or desktop or Smart Phone or iPod Touch or iPhone or Ipad or Android Phone or Zune or Netbook or PS3 or wireless printer, etc.. These Wirelessls connecting devices can connect to Virtual Wifi Hotspot just like any other WiFi Router. Virtual WiFi hotspot is protected by Password and the underlaying security is WPA2 Virtual WiFi Hotspot is a Wi-Fi wireless access point software and is completly Free. Why share your wifi Router password instede create a temporary WiFi router / Hotspot. You can view the clients connected and there IP and Mac Address
  • In the modern work place, managers effectively use network pc monitoring to ensure employee productivity and to keep an eye on undesirable system activities. Kernel Computer Activity Monitor is an advanced tool designed for this purpose. It is invisible to the PC users, as it does not appear in the Task Manager, Process List, Desktop, and Add/Remove Programs. It is a useful tool for organizations as well as individuals - investigators can use it to spy system happenings, and parents can use it to monitor the activities of children. It invisibly takes screenshots, records key strokes, monitors internet and email activities, gives information about Application accesses, saves clipboard activities, tracks passwords and notifies of print activities. Using this tool is an easy thing because of its user-friendly interface. You can configure this application to monitor and record the activities, so that your physical presence is not necessary at the time of monitoring. In addition, there is an option to receive reco ...
  • No more telling, nagging or trying to educate your children to spend less time on the home computer. No siblings' arguments: 'it's my turn now', 'you have been on it for so long...', etc. Just relax and let Fred take control. AlaTimer lets you restrict each child (Windows user) to a daily number of minutes. Sixty (60) seconds prior to this period expiring a message will pop-up, asking the user to logoff. AlaTimer could be configured to either logoff, shutdown or restart the computer, at the end of this period. Mouse hover over Fred's icon and a short message pops-up showing how long you have spent using the computer and how many more minutes are left, for the day. Click the mouse left button and the computer and Internet schedule pops up. AlaFredy configures AlaTimer - using AlaFredy a computer Administrator can read, display and/or modify all AlaTimer settings, over a (home) network, from any of the network computers. So, with AlaTime ...
  • SpyPal Free Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, clipboard, passwords, emails, documents and more. In Invisible Mode, it is completely hidden to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email every x seconds. Perfect for monitoring employees and parental control.
  • * Users can enter a long Url and create a shortened version that redirects to the original. * Users can enter a custom short url id. * IP blacklisting - ban users from either the whole site or just creating urls. * Term blacklisting - ban certain terms or website urls from being used. * Bookmark shortcut to the site - add 'create short url' link to browser for any site. * Bookmark shortcut to Twitter - shorten sites directly to Twitter. * Delayed, top/bottom framed or direct redirects. * Spam protection - Set minimum time between submissions. * Spam protection - Set maximum urls a user can create per day. * Maximum short url uses option. * Expiry date option. * Password set option. * 3 different coloured templates. * Easy Ads - Use the admin interface to easily integrate your banner ads/advert code. * Report abuse pages. * Translation admin tools. * Multiple language support. * Translation debugging tools. * Full admin area: * Easy installation.
  • iMyth Security Systems is a tool designed to help you deal with a large number of threats and intrusion issues that can target drives and devices connected via USB. It provides general protection in the form of system and USB shields, allows you to immunize your devices as well as completely block USB ports. A well structured interface iMyth Security Systems displays a user-friendly interface which is separated according to the main functions it provides. You get quick access to protection features, system tools, USB configuration, device immunization and scanning, drive monitoring and even activity logs. The application is well structured and should pose no problem to anyone when it comes to using and configuring. Lock USB ports and encrypt files Since malware takes all shapes and can be transported to your computer using a large number of containers, iMyth Security Systems allows you to avoid any risks and completely block the use of a USB port. It allows you to disable any kind of commu ...
  • The protection of your sensitive data is often disregarded. But the encrypting of diaries, pictures or other secret documents with the AES- or Blowfish-Algorithm is relatively simple. With the help of the Easy Encryption Technologie (EEnTe) you need only to enter a password or to insert the EC MoneyCard or certificate smartcard (PKCS). The software in additional support the compressing in the ZIP-format and signing of files.
  • Free Decrypt Excel Password Recovery to recover the forgotten password of the Excel workbook or worksheet to open or modify it. It can decrypt the excel password the custom mode according as the range of the character which you maybe used numbers, characters, letters, space, brackets etc.
  • Free Split Join Decrpyt Pdf Master is a convenientl PDF tool. It can decrypt the pdf password, and remove the limitation of pdf password protection. You can decrypt the password with three mode. It provides many of way to split and join pdf files according as your need. The custom formula mode let you freely split and merge pdf file with a simple formula.
  • PC Monitoring Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • PowerCryptor is a program to password protects your documents, photos, music, videos and other. Just right-click on file or folder in windows explorer and choose Encrypt. PowerCryptor makes it as easy to open, edit and save encrypted files, as it is to work with unencrypted files. You can securely erase your files beyond recovery. This way, your privacy protection is ensured and no one will be able to access your confidential data.
  • This simple program lets you store a list of your various passwords, user ID's, combination locks, etc. The file is encrypted for added security.
  • Invisible Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Remote Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Convert any document to PDF is completely simple. You just have to print the document and that's that. PDF Creator Pro includes a virtual print driver that simply does all the work for you. Major features include Convert e-mail to Adobe PDF files; Achieve web pages as Adobe PDF files; Optimize Adobe PDF output; Quickly regenerate a PDF file; Embed fonts of your choose; Apply passwords and assign permissions; Remove sensitive and hidden data.
  • Perfect Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Home PC Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • With Free PDF Protector 4dots you can batch protect many PDF documents with passwords.It is absolutely free, very easy to use and also multilingual.You can set both a user password (used for opening the PDF documents) and an owner password (used for settings various permissions such as content copying, commenting,printing, form field fill-in).Whole folders with PDF documents and their subfolders can be selected to be protected.Drag and drop.
  • My WIFI Router, a free virtual WiFi router software which can convert your Windows XP, 7 & 8 laptop/PC into a WiFi Hotspot with one click. You can easily share the internet connection with your friends and peers anytime and anywhere. Use Cases of My WIFI Router: If you are also suffering at these: 1. On the road: Airports, Hotels, and Coffee Shops know this and charge accordingly for Wi-Fi access or only supply you with an Ethernet jack 2. At home: You still don?t have a wireless router or need a Wi-Fi extender for the week signal of your home router; 3. At School and work: Your colleges, schools, businesses, and private institutions have restrictive limits on the amount of devices an individual can have registered to their wireless networks. My WIFI Router is what you need! Main Features of My WIFI Router 1. Easy to creates a secure and customizable wifi hotspot Just 3 steps: Install My WIFI Router -> Set your own a hotspot name and passwords ?> Start, now you have conve ...
  • Information and task resource for all Business, both startup or existing. Contains, sample documents, agreements and Policies to help. Tools include Sick Leave and Vacation tracking, employee information entry and display, daily planning functions, to do list organizer. Now contains a company equipment tracking functions as well as locations to store and track passwords, plus much more.
  • PDF To JPG Expert is a free easy-to-use but powerful tool that converts PDF documents to images in batch mode. It can convert PDF to JPG, PDF to PNG, PDF to TIFF, PDF to PCX, PDF to PSD and to more image formats.This free PDF to JPG converter supports dragging and dropping of PDF documents to be converted and does not require Adobe Acrobat or Adobe Reader to be installed.It also supports converting password protected documents. Multilingual.

Page 10 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware