Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: P :: protect
Display: short descriptions | full descriptions
  • Behold the long awaited sequel to space arcade game, Space Knight. Now it's in 3D! Repel the alien invaders to defend your planet with your new ship, "Protector".
  • In ancient times, one warrior protected with armor was equal to ten ordinary soldiers. Steel armor and a long sword could transform an ordinary man into a hero. And this fantastic character was invented by science fiction writers. Ancient Knight - a real person capable of repelling group assaults and take on ten opponents at once. His weapons are a sword and a brave heart.
  • USSystemCare is developed and tested by a well know IT industry in such a way so that it make your windows pc much better in terms of cpu speed and processing time. People all over the world using this optimization utility and protecting their computer system from any internet threat and cleaning invalid registry as well to make computer run faster then ever before. download it now to make you computer smooth, clean and error free.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Hordes of evil skeletons are raised, the reason for this - great impending evil! Ancient cave filled them to the brim. You son of an ancient emperor, founder of the empire! Magic touched you, dying a thousand years ago in the great battle, you have been raised, and only you can protect the people and not let the skeletons out of the ground!
  • For Android users, 4Videosoft Android Data Recovery is the best software to solve the recovery problem from your Android phone, tablet and SD card. It is powerful enough to recover various lost or deleted Android data, such as Text Messages, Messaging Attachments, Contacts, Call History and Photos, Pictures, Videos, Music and other Documents. The recovery software can also support abundant Android phones, including Samsung Galaxy S6, Samsung galaxy note 4, Sony, LG, HTC and Motorola. Key functions: 1. Recover various Android data files The 4Videosoft Android Data Recovery mainly aims to help Android users recover important data. Whether you delete your photos, music and videos accidentally, or you lost your text messages, contacts, call history or other files after formatting. Even suffering from virus attacking, you can recover all your los or deleted data (contacts, text messages, messaging attachment, call history, photos, videos, music, notes, and documents) from your Android devices. 2. Supp ...
  • Disobedient children are busy playing in the street, during wintertime. Cold, sickness and ... oh, the horror! They became annoying, snot-nosed ZOMBIES! Show your skills as a snowball fighter. Crush the little turds! Protect your Christmas gifts! Be one with the snowman.
  • A performance enhanced Tor derivative. It helps to keep your browsing habits safe and secure and protects you against monitoring. Open source and free. Features include serverless & accountless PC to PC calling via MicroSip VoIP. It integrates seamlessly into an existing Firefox installation as a new profile and it's regularly updated - we ensure you get the best out of Tor
  • Apple Maniacs sports a colorful design in the genre of Tower Defense. Apple preserves the workers that are under threat. Barbara and the demons came to the unprotected field to destroy them. Build defensive towers and collect what you need to develop your battle strategy. The enemies do not yet suspect what awaits them!
  • Protecting Water Seal was broken. You soldier named Keith, will go on a dangerous adventure to find out who broke the defense. You are waiting for nice graphics and excellent music.
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • .NET Obfuscator Ultimate is .NET protection tool to secure .NET assemblies. Obfuscation significantly aggravates reverse engineering and reduces its effectiveness. Use the obfuscator to protect your intellectual property: Obfuscated application usually is not recompilable;Encrypts string constants;Compatible with any .NET framework (1.0, 1.1, 2.0, 3.5, 4.0 and 4.5);Control flow obfuscation stops decompilers and deobfuscators.
  • Metadefender Client is the most thorough way to scan, protect and control data on a client before and after connecting to a (secure) network. Metadefender Client scans endpoints with multiple antimalware engines to check endpoints for viruses, key loggers and other malware without requiring any installation on the endpoint.
  • Orange Defender Antivirus provides 24/7 protection against malware and other computer viruses. The application features an easy-to-use interface backed up by a highly effective antivirus program.
  • Help two friends Mojo and Dacko and save their girl from the poison. To do this, they need to find an antidote from the grass. There's just one problem, that these herbs grow in the Valley of the Goblins which is full of evil creatures. You control two characters and at the same time as fast Mojo collects Rava, his friend Dako must protect him.
  • Bloodbath is a team shooter with a view from above, in which two teams fight. Immediately after the start of the game you will find yourself on the battlefield. There are 3 points on the map: yours, enemy's and neutral. Your goal is to protect your base and grab someone else's. You can also grab a neutral position to strengthen your position.
  • Empty Folder Cleaner is a free advanced utility to delete empty folders from your computer and remove the clutter in order to increase performance.Backup files of the folders that are deleted can be kept and each deletion can be undone.The user can specify filenames that will be considered as junk files using wildcards and regular expressions. Also, it is possible to specify protected folders, protected files and folders to ignore.
  • To protect your privacy, comply with regulations and prevent data breaches, BestCrypt Container Encryption delivers 'on-the-fly' data encryption that's easy to use for virtual drives and selected files or folders. BestCrypt encrypts files on Windows, Mac OS X and Linux with AES and other strong encryption algorithms. By featuring deniable encryption and dynamic containers Jetico's file encryption is the best TrueCrypt alternative. Includes BCWipe
  • Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history and past computer activities. It supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera, completely implements and exceeds the US Department of Defense and NSA clearing and sanitizing standard, once erased with it, your file data is gone forever and can not be recovered.
  • USB Secure can password protect any portable media including USB drives, External drives and even memory cards. It supports plug and play and automatic execution. No administrator rights or install is required on the other computer. You can take your USB drive anywhere without a fear of data leak or theft in case of a stolen or lost USB drive. USB Secure is a great program for people keeping private data on portable devices when travelling.
  • Soft4Boost Document Converter is an easy-to-use software application designed to view and convert various types of documents. It reads text files and converts them to PDF, DOC, DOCX, RTF, TXT, ODT, HTML, JPEG, TIFF and other formats. With Soft4Boost Document Converter you may protect your PDF files with a password, save text files as images in JPEG or GIF, convert documents to HTML and publish them as a Web page.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Pick the locks of the 13 rooms in order to get out of the castle. You, of course, are able to move and even destroy the obstacles in your path. But this must be done quickly, before time runs out. Otherwise an evil spirit awakens that protects the locks and drags you to hell.
  • Alien ships have invaded into the Solar System. Protect your sector of the space. Upgrade your ship and become a terror for the invaders.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware