Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: P :: protect
Display: short descriptions | full descriptions
  • Shooter Ben is a shooter-platformer developed by the Armure company. You control Ben, the sole survivor of the accident at the nuclear power plant. The game has two modes: "Story" and "survival." In the "stories" mode you need to go through 9 challenging levels full of zombies. In "survival" mode, try to say alive as long as possible, protecting yourself from the zombies. Controls: W, A, S, D - direct character. Space - change weapons.
  • Alien ships have invaded into the Solar System. Protect your sector of the space. Upgrade your ship and become a terror for the invaders.
  • Imagine yourself as a driver of a "skins" huge, humanoid armored vehicle. Save the city from an out-of-control protection system and destroy all the turrets in the neighborhood. To achieve the goal, you are given several types of weapons, but you must use your ammo wisely because the amount is limited.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Your computer is being attacked by viruses! Protect your computer from the threat with a set of tools at your disposal. When you install the tools you increase the temperature inside the computer and then you need to buy and install the cooler (coolers). After each wave of viruses a strong boss appears. Features - Beautiful graphics Four-types of viruses (three games, plus a bonus) - Three different kinds of tools - Heating System computer.
  • Use Outlook Express Security to control access to Outlook Express and its databases. When it is active, Outlook Express becomes locked and no third-party programs can access its message base files and the address book. As a result, when you try to start Outlook Express, open the address book or access the files, a password will be asked to allow access. If an invalid password is entered, Outlook Express or Address Book will not be opened.
  • The game is set in a vast desert. You play as a magical tower, and your goal is to survive as long as possible, protected from the giant scorpion-like monsters. At your disposal are 8 kinds of magic spells that can be improved indefinitely, and with every improvement your strength grows. Hold out as long as possible and set a new record!
  • Hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media.
  • Hide Files & Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.
  • Legions of seals conspired to take over the world. Only you can protect humanity from the agile oppressor, defending the Earth through four levels of addictive arcade gameplay. Resist the tyranny!
  • From the technological metropolis, a robot named Kraybot set off in search of adventure and treasure. Explore beautiful locations, but make sure not to fall into the traps to protect your metallic life.
  • According to legend, the ancient temple kept by the sacred Shuriken is able to defeat the evil dark entities. A brave Ninja goes in search of a legendary artifact to protect his village from the forces of darkness. Controls: W, A, S, D - movement U - Teleportation I - Throw Shuriken
  • Ancient pyramids fraught with secrets and great treasures. But not everyone can access them, because they are protected by riddles and traps. Today you have a chance to get at what was hidden by the ancient Egyptians. Angling mirrors and collecting jewels, open a path to the top of the pyramid and find what has accumulated for centuries! But remember, everything is buried beneath a layer of darkness and mystery!
  • Unusual platformer-Shooter with a strategic bias. Battle to hordes of enemies using weapons and various constructions. Your purpose is not only to reflect enemy attacks, while protecting your own crystal at any cost, but also to destroy the crystals of enemies which include zombies and werewolves. In your arsenal includes building blocks, three traps, three guns and bonuses can earn you a more powerful weapon as well as money.
  • COVERT Pro - an innovative solution to ensure total privacy while working at the computer. Protecting against spyware programs by masking action of computer user. Its essence is to create a secure platform in which any user can run their applications, while remaining invisible to the spies. COVERT Pro blocks reading the keyboard input and monitor screen and allows you to see all system drivers, active processes and system services.
  • X-tank is a super-weapon, able to change the course of the war. Hundreds of scientists and ordinary citizens worked on the creation of this instrument of death. And it rolled off the assembly line, with black finish that absorbs hits from energy beam weapons, powerful psychic protection, the ability to self-repair by nanobots and heavy plasma gun capable of melting a few meters of armor in seconds.
  • Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, un
  • Virus Cleaning and PC Protection Clean-up remote PCs from malware can be performed in the automatic mode and is invisible for remote user and doesn't require interruption of his work. PC protection engine shows notification in case of disabled virus protection. File system and registry clean-up from detected malware Put malware to quarantine before removing it Restoring data from quarantine by request Weak shields detection Get notification about remote PCs where antivirus protection is disabled or virus databases are out-of-date.
  • Less time, more accomplished! Only few seconds are required to perform complete PC scan to detect malware presence.Remote virus scanning. Save your time to visit each PC and check it for viruses. Instead check all PCs at once by one mouse click.Regular network virus scan. Enable regular checks by spending only few minutes to scan network for viruses with a fast scan engine.Weak shields detection. Get notification about remote PCs where antivirus protection is disabled or virus databases are out-of-date.
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • In ancient times, sea voyages were dangerous, but at the same time the adventure proved irresistible to explorers. Down there swim little people with their human concerns. Struggle with the elements, fear of sea monsters, and the mercy of nature. To earn his share winning player must have what it takes or they will sink in the storm. Choose the Captain and help him in his travels. Protect against pirates, direct passing wind to clear storms out o
  • 2030 to the Land was crushed terrible catastrophe. The Ensemble asteroid has begun to fall to The ground. The Mankind was found on galley proof of death and for the reason protection from asteroid was created unique spaceship whole with one revenge for pilot. You there is try the role cosmic Hero and rescue the Land from VWVload on asteroid. The Play is executed in bright and colorful stiletto. But track record of the fighting and increasing to d
  • Protector Plus Free Windows Vulnerability Scanner is compatible with Windows 7 ,Windows Vista, Windows XP, Windows 2000, Windows 98, Windows NT, Windows Server 2003, Windows Server 2008. Once the Scan is completed, Protector Plus - Windows Vulnerability Scanner lists the vulnerabilities detected, their risk level and the download location of the patch. It also creates the log file named Protector_Plus_Windows_Vulnerability_Scan.htm in the folder from where Protector Plus - Windows Vulnerability Scanner was executed.
  • W32/Banload Free Trojan Removal Tool will detect and remove W32/Banload Trojan completely, from your system. Download cleanbanload.exe and save it in a temporary directory. Double click on cleanbanload.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/Banload Trojan from your computer.This virus removal tool will detect and remove W32/Banload Trojan and its variants from your computer. It is a Windows based free virus removal tool designed by Proland Software Pvt Ltd. You can download the trial version of Protector Plus antivirus software by clicking on Download Antivirus button.
  • Protect files and folders situated on local media of Windows98/ME/NT/2000/XP/Vista with Easy File & Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File & Folder Protector has an easy-to-use user interface allowing you to allocate access to your files and folders between your users according to predefined timetables. Each PC user can have his..

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware