Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • The Native Crystal Reports PDF417 Barcode Generator is easily integrated into a report by copying, pasting and connecting the data source. Includes options to change the error correction mode, N dimension, truncation and number of columns.
  • CDR Analysis is Smart Mobile data Analysis Solutions for Call Records. Easy to trace calls record & reduce time consumption and provide results in short time by using CDR Analysis Software. You will analyze call records, and get various types of desired reports in few minutes. CDR Analysis Software used for investigation/forensic departments like police department, Special Crime investigation Departments etc.
  • Audit and recovery of PostgreSQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.
  • Add Data Matrix ECC-200 and GS1-DataMatrix 2D native barcode generation to Crystal Reports without any dependencies. Implementation is as easy as copying and pasting the barcode object into the report making it simple to redistribute reports. Data Matrix barcode generation is ECC-200, ANSI/AIM BC11 and ISO/IEC 16022 specification compliant.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Generate Code-128 and GS1-128 barcodes as a native formula in Crystal Reports, including Code-128 Auto with character sets A, B, C and GS1-128. Implementation is as easy as copy and paste of the embedded barcode object. The barcode is dynamically generated in the report without any dependencies and remains even if distributed.
  • The Crystal Reports Native Barcode Generator is a barcode script that is easily integrated into a report by copying, pasting and connecting the data source. Once installed, no other components or fonts need to be installed to create barcodes, even when it is distributed or accessed from a server. The demo version of this product contains a static barcode that may be used for evaluation purposes only.
  • Audit and recovery of MySQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.
  • ChequeSystem provides a complete cheque printing and management solution. You are no need to write any, just print and sign it. All issued cheques are kept in records. Account report and payee report provides complete cheque issued history on bank a/c and payee. You can download cheques templates from server or use design tools to arrange the cheque layout. ChequeSystem provides batch printing function and supports different types of printers.
  • Track your training records, requirements and compliance with Training Manager 2008. Print personnel transcripts and status reports. Assign training to an individual, group, or job role. Require retraining based on time, version, or one time only. Schedule and manage class sessions, attendance, cancellations, and no-shows. Training Manager 2008 is easy to use and you can get started quickly. Visit us at: http://www.kzsoftware.com.
  • Add native QR Code 2D barcode generation to Crystal Reports without any special fonts. Implementation is as easy as copying and pasting into the report. ISO/IEC 18004:2006 specification compliant. Once installed, no fonts need to be installed to create barcodes although it does require a companion UFL included with purchase; it is the complete barcode generator that stays in the report, even when it is distributed or accessed from a server.
  • Audit and recovery of Oracle Database passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.
  • Power Spy software secrectly logs Facebook use, keystrokes, website visits, emails, chats and IMs: Skype, Yahoo Messenger and more. Takes screen snapshots at every X seconds like a surveillance camera. Displays exact activities, like Facebook, PC games, online searches & shopping, file transfers and webmails. You can receive reports remotely via emails or ftp. Perfect for monitoring kids, spouse and employees.
  • Quicken does not want your QFX file and reports some strange error? Convert to QIF and import under Quicken easily! Bank, credit card and investment transactions are supported under all Quicken versions. QFX preview is included.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • P.T Return is a terrible horror game that will keep you on edge. Colorful moments will allow you to purchase a new shot of adrenaline. The game is powered by Safing Inc. and tells the of a psychiatric hospital, which conducted horrific experiments. You play as a young reporter trying to find the truth of what went on here. Do not let fear hinder your escape!
  • Web Log Explorer is an interactive, desktop-based log analyzer for Windows. This analyzer create "multilevel" and cross-linked reports. It allows you to dig as deep into your log files as you need to. Explore your site, proxy or other logs without any limits! Web Log Explorer supports more than 40 log file formats and can recognize log file formats automatically, extract compressed log files, process multiple log files.
  • Log Analytics Sense is a log analysis/reporting tool for many log including web, media, proxy and ftp logs. This analyzer provides the fastest an interactive, desktop-based log analysis, you can generate and upload to the server highly detailed, easily configurable usage reports in HTML format also you can export data from raw log files to your database, uses ODBC and other.
  • Power Spy (Supports x64/x86) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches, microphone and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.
  • WMS Log Analyzer visitor activity analysis application for your Microsoft Windows Media Services. Unlike other analyzers, WMS Log Analyzer has been designed especially for analyzing WMS log files and supports the entire set of WMS log file data and provides the best and most complete analysis of these files. This analyzer create "multilevel" and cross-linked reports. It allows you to dig as deep into your log files as you need to.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Web Log Explorer is an interactive free, desktop-based log analyzer for Windows. This analyzer create "multilevel" and cross-linked reports. It allows you to dig as deep into your log files as you need to. Explore your site, proxy or other logs without any limits! Web Log Explorer supports more than 30 log file formats and can recognize log file formats automatically, extract compressed log files, process multiple log files.
  • Proxy Log Explorer is the fastest and most powerful analysis application for monitoring the efficiency corporate Internet usage of your Proxy server. This application creates dynamic reports on-the-fly. Also, you can easily get virtually any subreport by just right-clicking the item you need and selecting the subreport you need. Needless to say, it can recognize log file formats automatically and extract compressed log files.
  • Track your training records, requirements and compliance with Training Manager 2016. Print personnel transcripts and status reports. Assign training to an individual, group, or job role. Require retraining based on time, version, or one time only. Schedule and manage class sessions, attendance, cancellations, and no-shows. Training Manager 2014 is easy to use and you can get started quickly. Visit us at: http://www.kzsoftware.com.
  • One of the leading values currently available in fleet management software. Designed to service large fleets, small fleets, and everything in between, our fleet management solution will track vehicle and driver statistics, maintenance records, fuel stats, and more. In-depth reporting gives you all the tools you need to make well informed decisions in a data driven world. We have a 5-star rating - let us show you why.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware