Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: P :: protect
Display: short descriptions | full descriptions
  • Virus Cleaning and PC Protection Clean-up remote PCs from malware can be performed in the automatic mode and is invisible for remote user and doesn't require interruption of his work. PC protection engine shows notification in case of disabled virus protection. File system and registry clean-up from detected malware Put malware to quarantine before removing it Restoring data from quarantine by request Weak shields detection Get notification about remote PCs where antivirus protection is disabled or virus databases are out-of-date.
  • Less time, more accomplished! Only few seconds are required to perform complete PC scan to detect malware presence.Remote virus scanning. Save your time to visit each PC and check it for viruses. Instead check all PCs at once by one mouse click.Regular network virus scan. Enable regular checks by spending only few minutes to scan network for viruses with a fast scan engine.Weak shields detection. Get notification about remote PCs where antivirus protection is disabled or virus databases are out-of-date.
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • In ancient times, sea voyages were dangerous, but at the same time the adventure proved irresistible to explorers. Down there swim little people with their human concerns. Struggle with the elements, fear of sea monsters, and the mercy of nature. To earn his share winning player must have what it takes or they will sink in the storm. Choose the Captain and help him in his travels. Protect against pirates, direct passing wind to clear storms out o
  • 2030 to the Land was crushed terrible catastrophe. The Ensemble asteroid has begun to fall to The ground. The Mankind was found on galley proof of death and for the reason protection from asteroid was created unique spaceship whole with one revenge for pilot. You there is try the role cosmic Hero and rescue the Land from VWVload on asteroid. The Play is executed in bright and colorful stiletto. But track record of the fighting and increasing to d
  • Protector Plus Free Windows Vulnerability Scanner is compatible with Windows 7 ,Windows Vista, Windows XP, Windows 2000, Windows 98, Windows NT, Windows Server 2003, Windows Server 2008. Once the Scan is completed, Protector Plus - Windows Vulnerability Scanner lists the vulnerabilities detected, their risk level and the download location of the patch. It also creates the log file named Protector_Plus_Windows_Vulnerability_Scan.htm in the folder from where Protector Plus - Windows Vulnerability Scanner was executed.
  • W32/Banload Free Trojan Removal Tool will detect and remove W32/Banload Trojan completely, from your system. Download cleanbanload.exe and save it in a temporary directory. Double click on cleanbanload.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/Banload Trojan from your computer.This virus removal tool will detect and remove W32/Banload Trojan and its variants from your computer. It is a Windows based free virus removal tool designed by Proland Software Pvt Ltd. You can download the trial version of Protector Plus antivirus software by clicking on Download Antivirus button.
  • Protect files and folders situated on local media of Windows98/ME/NT/2000/XP/Vista with Easy File & Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File & Folder Protector has an easy-to-use user interface allowing you to allocate access to your files and folders between your users according to predefined timetables. Each PC user can have his..
  • Hide, lock and protect your local, network, Floppy and USB drives, and disable the AutoRun feature for them. Control access to your drives by clicking on the checkboxes located within the group boxes representing them. Disable the AutoRun feature based on drive types to disable, for instance, only all USB drives, regardless of the drive letters that can be associated with them. The program lets you protect itself from an unauthorized access.
  • His name is Joseph. He is a tireless adventurer. He had a duty to steal an ancient relic from the temple of Shiva. By these actions he revived the spirits that protected it. They came in this world to regain the relic and kill our friend. Let's accompany Joseph in his journey and return a relic back to the temple. This is an infinite runner game. You play as a guy named Joseph. He should collect coins and avoid obstacles. There are 3 different lo
  • In this game you have to defend yourself from the evil slugs, which are out to bust up your car. Fight back, earn money for killing them, and use it to buy engine upgrades, repair the car and buy different types of weapons and protective kits for your car. Enjoy the game!
  • In ancient times, one warrior protected with armor was equal to ten ordinary soldiers. Steel armor and a long sword could transform an ordinary man into a hero. And this fantastic character was invented by science fiction writers. Ancient Knight - a real person capable of repelling group assaults and take on ten opponents at once. His weapons are a sword and a brave heart.
  • Kiosk software locks down your public computer or kiosk, helping you securely display your website or application. It prevents hacking and downtime by restricting access to the system, desktop, drives, folders and programs. The software blocks the system keys and replaces the system shell for maximum protection. Secure Browser removes standard browser menus, blocks downloads, limits browsing to specified URLs and blocks inappropriate content.
  • PDF merger software support all function related with PDF document. It integrated with such usual option like split PDF into single pages or in page range, merge and make single PDF, create separate PDF files, delete pages and create one PDF, delete pages and create separate PDFs, combine two pages on one, extract pages and make single PDF, extract pages and make individual PDFs, change page size, edit PDF meta info, add password protection, watermark and bookmark on PDF. You can add sub-string with resultant file name by using suffix and prefix option. Features: * Provides several functions in one tool. * You can split, merge, delete, extract, combine, join, add, append, concatenate, cut, break and remove PDF document pages. * You can use settings as per your need. * Extract required PDF pages. * Delete blank pages from PDF file. * Change PDF page size. * Modify PDF Properties like title, author, subject and keyword. * Combine two pages as well as file. * Support both 32 and 64 bit op ...
  • Having survived the shipwreck and met the cosmic being in an unfamiliar world, your goal is just to survive at any cost even if it means destroying all creatures in this world. Free to move around the map at will, you have the only way to protect these creatures; the construction of towers. The map also contains scattered energy cells which will improve your characteristics. To pass a level you must collect cells or destroy all creatures. Will yo
  • All-in-one analysis, unprotection and data recovery for MS Access 2000-2016 (.mdb, .mdw, .mde, .mda, .accdb, .accde, .accda). With Access Forensics you can recover database password, user-level security records (to recreate lost mdw), edit database properties and access rights, remove VBA protection and more. It shows database structure, objects properties, VBA source code, Table content, etc. Recovers deleted tables, records (rows) and columns.
  • FileFort Plus provides an easy to use and automatic file backup system to protect your files. Don't take any chances with your data, back up files to virtually any storage media including CD, DVD, USB drives, FTP servers, or online accounts like Dropbox or Google Drive. Use FileFort Plus to set up scheduled file back ups for peace of mind that your all your critical data is safe and secure.
  • Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, individual drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
  • Protector Plus 2015 (32-Bit) for Windows Desktop supports Windows 7, Windows XP, Vista, 2000, Me and 98, 95 platforms. This product provides 100% protection against viruses, trojans, worms, backdoors, spyware, adware, exploits, password stealers, hack tools, rootkits and other malware. Protector Plus 2015 (32-Bit) is packed with many useful features like email scanning, InstaUpdate, Submit Sample, Heuristic scanning, memory scanning, de-activation of viruses in memory, quarantine, user defined scan tasks, compressed files scanning and many more. The email scan feature scans all the emails received before they enter the Inbox and ensures that all the emails and attachments are virus free. On detecting an infected email the virus will be removed. The real-time scan feature will scan all the files accessed and automatically removes any virus found. The InstaUpdate feature of Protector Plus 2015 (32-Bit) will automatically download the virus database updates from the developer's web site free of cost. Su ...
  • W32/Fsysna Free Trojan Removal Tool will detect and remove W32/Fsysna Trojan completely, from your system. Download cleanfsysna.exe and save it in a temporary directory. Double click on cleanfsysna.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/Fsysna Trojan from your computer.This virus removal tool will detect and remove W32/Fsysna Trojan and its variants from your computer. It is a Windows based free virus removal tool designed by Proland Software Pvt Ltd. You can download the trial version of Protector Plus antivirus software by clicking on Download Antivirus button.
  • Best Network Security is the best solution for corporations, universities, schools, public libraries, internet cafes and other applications where administrator has to secure and maintain a lot of network PC workstations located in different places. Best Network Security is intended for securing, protecting, and maintaining PC workstations within a corporate network. Supports over 600 different security restrictions.
  • Cheerful and dynamic top-view shooter. Drive and protect yourself from slippery, nasty monsters. For killing the creatures you will be paid money, the earnings dependent on the level. As you accumulate money can buy a new weapon for the car as well as killer bumpers. Keep that car running!
  • Behold the long awaited sequel to space arcade game, Space Knight. Now it's in 3D! Repel the alien invaders to defend your planet with your new ship, "Protector".
  • Advanced Desktop Shield - protect public access PCs, stop users from changing desktop wallpaper and screen saver, deleting, creating and renaming desktop icons, changing display settings and so on. Backup, restore and manage desktop layouts, which include desktop files and folders, placement of desktop icons, wallpaper and screen saver. If you choose to lock desktop layout, each time PC is rebooted, the program will return everything on the deskt
  • PhotoX software provides a quickest and easiest way to watermark your photo. Avoid unauthorized use of your product photos, stamp your product photos with watermark. You can add text or image watermark in different position of photo. You can also adjust the opacity of watermark to ensure the readability of photo. Besides watermarking, you can use other tools to protect your photos, like Grayscale, Add Strip, Thumbnail and Fade Out effect.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware