Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: P :: password
Display: short descriptions | full descriptions
  • PC Spy Software logs all Facebook, PC & internet activity and emails log reports to you. PC Spy Software logs all keystrokes, chats & IMs, emails, websites visited, applications, usernames, passwords, documents opened, online searches, microphone sound and more. It takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crimes.
  • Power PC Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Parental Spy Software secretly logs all Facebook, keystrokes, chats, emails, web visits, microphone, web cam images, videos played, PC games, user names, passwords, applications, documents, clipboard and more. It records Skype, Yahoo Messenger, ICQ and others. It also takes screenshots like a surveillance camera. You can receive log reports remotely via emails or ftp and check logs on another PC or your cell phone.
  • V2 Softlogic MS Access Password Recovery Software Quickly unlocks Microsoft Access Database (*.mdb) file real login password. Tool is designed to recover Microsoft Access 95/97 and Access 2000 format database password. Database password recovery tool support all versions of Access db files including 95, 97, 2000, XP, 2002 and 2003. Recovery tool is compatible to decrypt alphabetic, numeric and special characters multilingual password. V2 Softlogic access password recovery software successfully runs on Windows XP, Vista, 7, 2000, 2003, 2008 and 8 operating system. Evaluation version of Mdb file password recovery tool revives first two characters only of actual password. Program is completely independent on Microsoft office or other plug-ins. It is standalone graphical interface application with self descriptive design. It can easily be accessed by new users without requiring extra technical skills. Just download and install V2 Softlogic Access Password Recovery tool. Run application and choose browse option to ...
  • Surveillance Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenge, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • OrgPassword provides a convenient system for storing different kinds of personal information. Using a set of templates, you can create a competently organized catalogues for your passwords, news, software, notes, private calendar, Outlook accounts. Access to all data is provided through a well encrypted password. The interface of the program is both intuitive and easy-to-use. With OrgPassword your personal information will always be at hand.
  • ASN Active Directory Reports is a simple desktop tool for Windows Active Directory Reporting. It Allows to produce reports for Active Directory objects (user, group, computer, contact, OU, fine grained password policy and gpo). This tool allows the administrator to configure advanced search settings on the reports. The generated Reports can be saved as XLS, PDF, CSV, HTML and MSWORD files.More or less attributes can be set for every report .
  • Invisible PC Keylogger secrectly records all Facebook use, keystrokes typed, Skype, Windows Live Messenger and Yahoo Messenger chats, websites visited, emails read, microphone sound, documents opened, windows opened, clipboard data, passwords typed and applications executed. It sends logs to a specified email like every 60 minutes. It is completely invisible to the monitored users. Great tool for catching cheaters, monitoring kids and employees.
  • The professional software for recovering passwords to hashes optimized for working with large hash lists. Supports over 170 hashing algorithms. Unlimited loadable hashes, dictionaries, rules, and masks. 64 bits and multithreading.
  • PC Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, MSN, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • EveryPass is a free, open source, portable password manager that provides safe storage of passwords on modern computers, tablets and phones without installing anything or needing Internet access. This is achieved using a single HTML5 file that uses the strongest possible AES encryption for user data and provides an easy to use interface that adapts to the device being used. EveryPass is open source to foster community additions and review.
  • SIW is a System Information tool that gathers detailed information about your system properties and settings. A utility that includes detailed specs for Hardware, Software and Network as well as real-time monitors for CPU, Memory, Page File usage and network traffic. Shows used TCP and UDP Ports. Windows 9x password retriever. Serial Number (CD key) for operating system and applications. Show Hidden Passwords.
  • Cozy Restaurant Reservation helps you to take and then manage reservations and customers for your restaurant. It's highly flexible, allows changing time intervals, creating numerous profiles and viewing multiple schedules at a time. You can also password protect information, create backups and export the schedule to iCal, MS Outlook, XML, HTML, PDF, XLS, TXT formats. The program gives you a customizable Date Navigator and comprehensive reminder.
  • There's 2 options for integration: 1) Basic integration - Navigate your files via the script and select the minimum permission level required. Works with all file types. 2) PHP integration - For advanced integration in PHP . Use the script in your existing site to secure your pages to a specific permission level. Works with PHP files. Features: - Add/Edit unlimited users. - Set expiry dates for users. - Set active dates for users. - Set permission levels. - Create unlimited custom permission levels. - Simple setup of permissions via interface, no coding required. - 5 css templates for the admin area. - Restrict inline content to specific permission levels. - The flexibility to restrict music, videos, documents, any files. - Forgot/Reset password functionality. - Suspend, disable, expire account. - Ajax interface. - Full source code. We also regularly develop updates and plugins for the script.
  • Encrypt and decrypt PDF files; Supports PDF user password and owner password protection; Password protect opening of the PDF document; Disable printing of the PDF document; Disable copying of text/graphics; Disable modifications to PDF the document; Password protection for PDF files with 40 or 128 bit encryption; Examples in VB, ASP, VB Script are provided.
  • Rental Calendar is designed for individuals and businesses, operating in the rental market. With its help, renters can keep track of rental units and plan to rent out resources, more efficiently than usual. The program has a handy interface to calculate and show the term of lease, helping you to make decisions quickly. There are also searching and exporting options, as well as the abilities to back up and protect the database with a password.
  • .netshrink is an executable compressor and DLL binder for .NET applications. It uses LZMA compression library and can decrease your file size even by 50%. With .netshrink you can also bind multiple DLL libraries to the output file so you can redistribute your application as a standalone file. It can also protect your files with a password.
  • Easy uploads is a file storage media streaming application designed by Filestreamers that allows you to upload, store, and stream your files from their virtually unlimited file storage server. Easy Uploads can backup,share, and stream your files free online. Upload your favorite media files to your account then stream them for quick access, or upload your favorite photos, games,software,etc to backup and store them to your free hosting account. With this software you can not only save hard drive but you can also access your files from virtually anywhere online with a download link. Send large files through email, Create your own media playlist, Then sit back and watch it play. Easy uploads was dsigned with security and hosting in mind each file uploaded through this software is encryted during the upload process and can be password protected for added security. Easy uploads has access to virtually unlimited file storage so never worry about running low on storage or hard drive. Easy uploads makes backupi ...
  • MediaProSoft Free PDF Converter is a powerful PDF toolbox that contains many effective features to work with PDF files. You can convert PDF to image, PDF to Word/TXT, image to PDF, scan to PDF, merge PDF, split PDF, print PDF out, edit metadata, add/remove password security, apply digital signature... Tons of functionalities are provided and you can find almost everything you need within a click.
  • Virtual WiFi Hotspot Virtual Wifi Hotspot is a free software router for Windows based system running Windows 7, Windows 8, Windows Server 2008 R2 and Windows Server 2012. Using Virtual Wifi Hotspot, you can share any internet connection Via Wireless Internet my come from Wifi or LAN or Cable Modem or Dial-up or Cellular, etc.. The internet can be used by any Wifi device such as Laptop or desktop or Smart Phone or iPod Touch or iPhone or Ipad or Android Phone or Zune or Netbook or PS3 or wireless printer, etc.. These Wirelessls connecting devices can connect to Virtual Wifi Hotspot just like any other WiFi Router. Virtual WiFi hotspot is protected by Password and the underlaying security is WPA2 Virtual WiFi Hotspot is a Wi-Fi wireless access point software and is completly Free. Why share your wifi Router password instede create a temporary WiFi router / Hotspot. You can view the clients connected and there IP and Mac Address
  • In the modern work place, managers effectively use network pc monitoring to ensure employee productivity and to keep an eye on undesirable system activities. Kernel Computer Activity Monitor is an advanced tool designed for this purpose. It is invisible to the PC users, as it does not appear in the Task Manager, Process List, Desktop, and Add/Remove Programs. It is a useful tool for organizations as well as individuals - investigators can use it to spy system happenings, and parents can use it to monitor the activities of children. It invisibly takes screenshots, records key strokes, monitors internet and email activities, gives information about Application accesses, saves clipboard activities, tracks passwords and notifies of print activities. Using this tool is an easy thing because of its user-friendly interface. You can configure this application to monitor and record the activities, so that your physical presence is not necessary at the time of monitoring. In addition, there is an option to receive reco ...
  • No more telling, nagging or trying to educate your children to spend less time on the home computer. No siblings' arguments: 'it's my turn now', 'you have been on it for so long...', etc. Just relax and let Fred take control. AlaTimer lets you restrict each child (Windows user) to a daily number of minutes. Sixty (60) seconds prior to this period expiring a message will pop-up, asking the user to logoff. AlaTimer could be configured to either logoff, shutdown or restart the computer, at the end of this period. Mouse hover over Fred's icon and a short message pops-up showing how long you have spent using the computer and how many more minutes are left, for the day. Click the mouse left button and the computer and Internet schedule pops up. AlaFredy configures AlaTimer - using AlaFredy a computer Administrator can read, display and/or modify all AlaTimer settings, over a (home) network, from any of the network computers. So, with AlaTime ...
  • SpyPal Free Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, clipboard, passwords, emails, documents and more. In Invisible Mode, it is completely hidden to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email every x seconds. Perfect for monitoring employees and parental control.
  • * Users can enter a long Url and create a shortened version that redirects to the original. * Users can enter a custom short url id. * IP blacklisting - ban users from either the whole site or just creating urls. * Term blacklisting - ban certain terms or website urls from being used. * Bookmark shortcut to the site - add 'create short url' link to browser for any site. * Bookmark shortcut to Twitter - shorten sites directly to Twitter. * Delayed, top/bottom framed or direct redirects. * Spam protection - Set minimum time between submissions. * Spam protection - Set maximum urls a user can create per day. * Maximum short url uses option. * Expiry date option. * Password set option. * 3 different coloured templates. * Easy Ads - Use the admin interface to easily integrate your banner ads/advert code. * Report abuse pages. * Translation admin tools. * Multiple language support. * Translation debugging tools. * Full admin area: * Easy installation.
  • iMyth Security Systems is a tool designed to help you deal with a large number of threats and intrusion issues that can target drives and devices connected via USB. It provides general protection in the form of system and USB shields, allows you to immunize your devices as well as completely block USB ports. A well structured interface iMyth Security Systems displays a user-friendly interface which is separated according to the main functions it provides. You get quick access to protection features, system tools, USB configuration, device immunization and scanning, drive monitoring and even activity logs. The application is well structured and should pose no problem to anyone when it comes to using and configuring. Lock USB ports and encrypt files Since malware takes all shapes and can be transported to your computer using a large number of containers, iMyth Security Systems allows you to avoid any risks and completely block the use of a USB port. It allows you to disable any kind of commu ...

Page 10 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware