Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: P :: protect
Display: short descriptions | full descriptions
  • LastHope is a very fascinating Tower Defense game where you have to protect the crystals of dark creatures. You will be hooked instantly!
  • Protecting Water Seal was broken. You soldier named Keith, will go on a dangerous adventure to find out who broke the defense. You are waiting for nice graphics and excellent music.
  • The city was attacked by evil invaders, and now the task of protecting civilians lies with you! Help stop the attack, repelling wave after wave of enemy attacks! At your disposal is a gun which can be improved and used as a powerful weapon to build strength. But if that is not enough, you have to put mines under the city wall, and if necessary deploy a super bomb that can destroy all the enemies at the same time! However, the additional might..
  • Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera, completely implements and exceeds the US Department of Defense and NSA clearing and sanitizing standard, once erased with it, your file data is gone forever and can not be recovered.
  • Able Spyware Scan and Destroy provides real-time anti-spyware protection against spyware, viruses, keyloggers, spyware cookies, adware, Trojan horses, spybots, browser hijackers, and phishing attacks. It actively monitor and protect the PC from uninvited software attacks.Able Spyware Scan and Destroy can detect and remove a multitude of spyware files and viruses from your computer. It prevents viruses from being installed in the first place.
  • Anti-Spyware, Anti-Virus, Anti-Spam Solution that fast and secure removes spyware, viruses, spam and other malware from your computer. Spy Emergency protects you against spyware, viruses, adware, spam, homepage hijackers, remote administration tools, dialers, keyloggers, and many other types of internet threats. It supports Internet Explorer, Mozilla Firefox and Opera Browser.
  • Protector Plus Free Windows Vulnerability Scanner is compatible with Windows 7 ,Windows Vista, Windows XP, Windows 2000, Windows 98, Windows NT, Windows Server 2003, Windows Server 2008. Once the Scan is completed, Protector Plus - Windows Vulnerability Scanner lists the vulnerabilities detected, their risk level and the download location of the patch. It also creates the log file named Protector_Plus_Windows_Vulnerability_Scan.htm in the folder from where Protector Plus - Windows Vulnerability Scanner was executed.
  • Silent Keylogger invisibly records every user activity performed on the computer in AES encrypted log files and sends to your e-mail address, FTP server or LAN path. It automatically records all typed keystrokes, emails, chats, website visited, password, used applications and captures screenshots. Silent Keylogger has password protection and hot-key combination for accessing the application. Supports preconfigured silent one-click install.
  • Use tactics in real time with a view from above. Features destructible objects, damage from explosions and realistic physics. After the dust settles from the Great War, there are still many in the planets of the galaxy where automated factories continue to produce battle droids with a single order, to destroy any target approaching the protected objects.
  • In this game you have to protect the territory of your artillery base from unidentified attackers. As you progress, the pressure will grow as new species of invaders come at you. However, Allied boats, weapons and improvement bonuses will help you. The main task is to hold out against all enemy attacks as long as possible.
  • Mini game about micro war against micromachines of malevolent aliens. In this game player must protect cell against attacks of microrobots. It's things, if penetrate to the body will try to grab, to controll of the body or kill. Body as a whole consists of a plurality of cells. Small cell, if it can repel a waves of attacks micromachines - it can win the war, by means of transfering the experience of fighting to other cells.
  • Part II; Protect Santy's house. You are the snowman, and your goal is to wipe out all opponents. Use the 1,2,3,4 and F buttons to build walls. Catch a special gift, then use the F and 4 keys for.... In Snowman Attack, you will encounter the same enemies, the Demon and the Werewolf, but they are even more dangerous than before. Every 100 points scored will increase the difficulty of the game. Show off your high scores online. Enjoy!
  • Copy any DVD to blank DVD or computer hard drive with ease. You can now backup and therefore protect all of your movies collection from scratches, theft and loss. It also can burn DVD from hard drive to blank DVD. The copied DVD is completely the same as the original DVD you bought. Your Free DVD Copy is a simple, great and free DVD cloner software. It has a pretty-looking interface, so you will be amazed.
  • There once was a fat, successful farmer. He grew corn every year, and nobody touched it until the ravens arrived to make daily raids. He fought them however he could, but to no avail. It went on like this for some time. Finally the angry fat farmer decided enough was enough, time to do some raven hunting! The game has 28 levels, 28 different plots of the field that you need to protect against different enemies using various weapons.
  • Kigo M4V Converter has been designed to convert iTunes M4V to unprotected MP4, AVI, 3GP, FLV, etc. It can convert any video on your iTunes libary. It can also convert the purchased M4V and rent M4V movies from iTunes Store , remove DRM from the iTunes, so the converted video files can be played on PSP, iPod, iPhone, iPad, Creative Zen,iRiver and so on without limitation. Batch conversion is supported by m4v converter.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Passkey Lite is a free and a simple two-in-one version of Passkey for DVD and Passkey for Blu-ray, and supports part of the functions they have. It can decrypt some protected DVD and Blu-ray, freely watch any DVD with no region limit. What adds punch to Passkey Lite is it can work with all the software that Passkey for DVD and Passkey for Blu-ray works with. You are enabled to use these apps to play/copy/rip the unprotected DVD/Blu-ray discs.
  • Passkey for DVD & Blu-ray, including Passkey for DVD and Passkey for Blu-ray, works on the fly to remove all known DVD/Blu-ray protections in seconds to let you freely watch any DVD/Blu-ray on your region specific DVD/Blu-ray player or with some player software, or let you use any other compatible apps to access the now unprotected content to play or edit, such as copy, burn, clone, etc.
  • Passkey for DVD is a great DVD decrypter, which can remove all the DVD protections in action and let you get rid of region code troubles to help you freely watch any DVD on your region specific player without any limit and without any wait. Beyond the "freely enjoy any DVD" feature, it can also work with numerous software to let you access the unprotected DVD content then copy, burn, clone, rip, convert them or do any editing you wish.
  • M4V Converter Plus for Win is an all-in-one M4V converter, which can convert any M4V files, such as purchased iTunes movies and iTunes movies rental. It can remove DRM protection and convert M4V movies to unprotected MP4, AVI, 3GP, 3G2, FLV, MPG etc. Thus you can enjoy videos on your portable devices like iPhone, iPod, PSP, HTC and Zune freely. It can also support batch conversion.
  • The Network Recycle Bin Tool allows you to recover deleted files. Once you have this tool in your system, it will automatically keep a track of all the network deleted files and you can easily recover them. Instead of removing the files, this tool sends them directly to its predefined recycle bin folder. Additionally it offers you the Protect Files tool which prevents deletion of network files for specified folders according the file mask.
  • SafeDNS protects you from inappropriate websites. It blocks access to infected sites, phishing resources, command centers of malware and botnets. With free parental control from SafeDNS you can block over 50 categories of websites - pornography, intrusive advertising, online gambling, vulgar-content websites. Using our service you can be sure about the safety of your family on the internet.
  • If you've always wanted to play an effortless game that will not cost a penny, and will be just for fun, then Defend Kitty is for you. You must protect the little kitty from a lot of evil monsters. To kill the monsters, click on them with the mouse. The game has 5 types of enemies: Green fish - The weakest opponent, moves in a straight line, dies after a single tap. Blue fish - The same pushover as the green fish, but attacks on a sine wave.
  • Passkey for Blu-ray is the most powerful decrypter. Any copy protections and region code are in no mean any barriers in front of it. With its fast reading process and strong decrypting ability, you can watch your protected Blu-ray on region specific BD player or player software in no time. If you are not content with just watching them, then you can use other compatible software to edit them, such as copy, clone, burning, etc.
  • Pick the locks of the 13 rooms in order to get out of the castle. You, of course, are able to move and even destroy the obstacles in your path. But this must be done quickly, before time runs out. Otherwise an evil spirit awakens that protects the locks and drags you to hell.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware