Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: P :: protect
Display: short descriptions | full descriptions
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • PowerPoint Password is advanced and extremely fast password recovery tool for MS PowerPoint presentations (.ppt, .pptx) and/or templates (.pot, .potx). All versions (including PowerPoint 2013) are supported. Write-protection passwords are recoverable instantly. Several configurable attacks are available for password to open recovery. Highly optimized code and GPU (AMD, NVIDIA, Intel) utilization guarantees fastest recovery speed.
  • SpyShelter Premium is an effective and easy-to-use security application that helps you to protect your system against known and unknown custom compiled malware such as keystroke loggers. SpyShelter constantly monitors all vulnerable areas in your operating system to ensure that your personal data is being protected from information-stealing malware. Now with keystroke encryption!
  • Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history and past computer activities. It supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera, completely implements and exceeds the US Department of Defense and NSA clearing and sanitizing standard, once erased with it, your file data is gone forever and can not be recovered.
  • Pick the locks of the 13 rooms in order to get out of the castle. You, of course, are able to move and even destroy the obstacles in your path. But this must be done quickly, before time runs out. Otherwise an evil spirit awakens that protects the locks and drags you to hell.
  • Alien ships have invaded into the Solar System. Protect your sector of the space. Upgrade your ship and become a terror for the invaders.
  • Shooter Ben is a shooter-platformer developed by the Armure company. You control Ben, the sole survivor of the accident at the nuclear power plant. The game has two modes: "Story" and "survival." In the "stories" mode you need to go through 9 challenging levels full of zombies. In "survival" mode, try to say alive as long as possible, protecting yourself from the zombies. Controls: W, A, S, D - direct character. Space - change weapons.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • RegRun Suite is a complete computer security software. RegRun Platinum includes 24 system utilities for computer protection against Rootkits/Trojans/Adware/Spyware components. It increases the speed of Windows boot-up process, making the computer management easier. RegRun Suite is compatible with all known antiviral software and may be used to improve computer security.
  • Imagine yourself as a driver of a "skins" huge, humanoid armored vehicle. Save the city from an out-of-control protection system and destroy all the turrets in the neighborhood. To achieve the goal, you are given several types of weapons, but you must use your ammo wisely because the amount is limited.
  • Lotus Word Pro Password allows you to recover passwords which Lotus Word Pro files (.lwp, .mwp) are protected with. Lotus Word Pro Password recover passwords for all Lotus Word Pro security levels (Open, TeamSecurity) and file types including "small file format". Program works with all version of Lotus Word Pro documents.
  • Lotus Organizer Password by Thegrideon Software allows you to recover passwords which Lotus Organizer files (.or, .or5) are protected with. Lotus Organizer Password recover passwords for all Lotus Organizer security levels (Owner, Assistant, Reader or Private, Public, Read Only for old file types). Program works with all versions of Lotus Organizer.
  • Lotus Approach Password by Thegrideon Software allows you to recover passwords which Lotus Approach files (.apr,.apt,.dbf,.db,.vew) are protected with. Lotus Approach Password recover passwords for Lotus Approach users and groups as well. Also recovers dBase/Foxpro (.dbf) and Paradox (.db) passwords for database created in Lotus Approach. Program works with all versions of Lotus Approach files.
  • The game is set in a vast desert. You play as a magical tower, and your goal is to survive as long as possible, protected from the giant scorpion-like monsters. At your disposal are 8 kinds of magic spells that can be improved indefinitely, and with every improvement your strength grows. Hold out as long as possible and set a new record!
  • Unusual platformer-Shooter with a strategic bias. Battle to hordes of enemies using weapons and various constructions. Your purpose is not only to reflect enemy attacks, while protecting your own crystal at any cost, but also to destroy the crystals of enemies which include zombies and werewolves. In your arsenal includes building blocks, three traps, three guns and bonuses can earn you a more powerful weapon as well as money.
  • Your computer is being attacked by viruses! Protect your computer from the threat with a set of tools at your disposal. When you install the tools you increase the temperature inside the computer and then you need to buy and install the cooler (coolers). After each wave of viruses a strong boss appears. Features - Beautiful graphics Four-types of viruses (three games, plus a bonus) - Three different kinds of tools - Heating System computer.
  • According to legend, the ancient temple kept by the sacred Shuriken is able to defeat the evil dark entities. A brave Ninja goes in search of a legendary artifact to protect his village from the forces of darkness. Controls: W, A, S, D - movement U - Teleportation I - Throw Shuriken
  • SpyShelter is an effective and easy-to-use security application that helps you to protect your system against known and unknown custom compiled malware such as keystroke loggers. SpyShelter constantly monitors all vulnerable areas in your operating system to ensure that your personal data is being protected from information-stealing malware.
  • MacKeeper is the cleaning, security and optimization software with 16 tools to keep your Mac clean, protected and less complicated. The all new MacKeeper 3.x has Human Inside, a human expert assistance integrated into the software. It combines the complex algorithms of the computer technology with technical expertise and creative thinking of a live support representative who can solve your Mac problems 24-7. With it, users no longer need to look for customer support numbers or emails, just the click of a button from within the interface and their SOS signals will be heard and promptly dealt with. Users can also activate their personal Geeks-on-­Demand who can help with a multitude of issues and questions ranging from OS­-related topics to choosing the right computer. All MacKeeper experts are certified by Apple.
  • Legions of seals conspired to take over the world. Only you can protect humanity from the agile oppressor, defending the Earth through four levels of addictive arcade gameplay. Resist the tyranny!
  • Ancient pyramids fraught with secrets and great treasures. But not everyone can access them, because they are protected by riddles and traps. Today you have a chance to get at what was hidden by the ancient Egyptians. Angling mirrors and collecting jewels, open a path to the top of the pyramid and find what has accumulated for centuries! But remember, everything is buried beneath a layer of darkness and mystery!
  • X-tank is a super-weapon, able to change the course of the war. Hundreds of scientists and ordinary citizens worked on the creation of this instrument of death. And it rolled off the assembly line, with black finish that absorbs hits from energy beam weapons, powerful psychic protection, the ability to self-repair by nanobots and heavy plasma gun capable of melting a few meters of armor in seconds.
  • Website X5 is the all-in one solution to create professional, eye-catching and complete Websites, Blogs and on-line stores. No programming skills are required and you can use a simple fully-visual and intuitive interface that guarantees flexibility and customization. With WebSite X5 you can create your website in just 5 easy steps: 1. Choose between 1,500 different templates included in the program or create your own from scratch. 2. Organize your website structure: your navigation menu will be created automatically according to the sitemap. 3. Drag &Drop your content: add text, images, videos, a gallery, an e-mail form, lots of new apps, etc. 4. Customize your website: add a members' area, create a multi-language website, etc. 5. Publish your website using the built-in FTP engine. WebSite X5 has everything you need: an image editor, templates and buttons; organize your website pages into levels and create the site map; a built-in search engine; FTP engine; etc. You do not need other ...
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Protector Plus Free Windows Vulnerability Scanner is compatible with Windows 7 ,Windows Vista, Windows XP, Windows 2000, Windows 98, Windows NT, Windows Server 2003, Windows Server 2008. Once the Scan is completed, Protector Plus - Windows Vulnerability Scanner lists the vulnerabilities detected, their risk level and the download location of the patch. It also creates the log file named Protector_Plus_Windows_Vulnerability_Scan.htm in the folder from where Protector Plus - Windows Vulnerability Scanner was executed.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware