Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Navicat for Oracle suit with Oracle database servers from version 8i or above and supports most of the latest Oracle objects features, including Directory, Tablespace, Synonym, Materialized View, Trigger, Sequence, Type etc. By using the new feature of Navicat Cloud, developers can sync their connection settings and queries to the cloud. For that reason, they can get real-time queries and connections anytime and anywhere and make use of every minute of the day to enhance the working productivity. The major features of Navicat for Oracle are as following.Firstly, secure connection. Navicat allows developers to establish secure SSH sessions through SSH Tunneling, ensuring strong authentication and secure encryption between two hosts. The authentication method can use a password or a public/private key pair. Secondly, object designer. Developer can create, modify, and design database objects using professional object designers, available for all database objects such as Tables, Views, Functions/Procedures, Ind ...
  • Navicat for Oracle suit with Oracle database servers from version 8i or above and supports most of the latest Oracle objects features, including Directory, Tablespace, Synonym, Materialized View, Trigger, Sequence, Type etc. By using the new feature of Navicat Cloud, developers can sync their connection settings and queries to the cloud. For that reason, they can get real-time queries and connections anytime and anywhere and make use of every minute of the day to enhance the working productivity. The major features of Navicat for Oracle are as following.Firstly, secure connection. Navicat allows developers to establish secure SSH sessions through SSH Tunneling, ensuring strong authentication and secure encryption between two hosts. The authentication method can use a password or a public/private key pair. Secondly, object designer. Developer can create, modify, and design database objects using professional object designers, available for all database objects such as Tables, Views, Functions/Procedures, Ind ...
  • Navicat for Oracle suit with Oracle database servers from version 8i or above and supports most of the latest Oracle objects features, including Directory,Tablespace,Synonym, Materialized View,Trigger,Sequence,Type etc.By using the new feature of Navicat Cloud, developers can sync their connection settings and queries to the cloud.For that reason, they can get real-time queries and connections anytime and anywhere and make use of every minute of the day to enhance the working productivity.The major features of Navicat for Oracle are as following.Firstly,secure connection. Navicat allows developers to establish secure SSH sessions through SSH Tunneling,ensuring strong authentication and secure encryption between two hosts.The authentication method can use a password or a public or private key pair. Secondly, object designer. Developer can create, modify, and design database objects using professional object designers, available for all database objects such as Tables, Views, Functions or Procedures, Indexes, T ...
  • SFTP client (secure FTP) designed for automation of SFTP, FTP and related tasks. Run 1000+ tasks on a schedule. Goal is to create advanced SFTP and FTP tasks that can be scheduled automatically or run instantly. Supports a very flexible wildcard system to transfer multiple files at once. Supports subdirectory transfers. Includes powerful and flexible task scheduler. Email Notification of task failure.
  • Automize - Run 1000+ tasks a day. Automation software and task scheduler for Windows. Easy to use. No programming is required. Scripting features are available. Automate multiple FTP transfers, FTP daemon and monitor, web downloads through proxy or secured websites, check or send email, success based chaining of tasks, and other tasks like synchronize, copy, zip, print, delete. Remotely control schedulers. Linux,Mac.
  • A little old man is trying to save his innocent planet from being taken over by a villain named Gnumanikus, and to catch him in the process. Help him in this difficult endeavor. You have three characters to play as, each with unique abilities. Use them to overcome obstacles on the way to capturing Gnumanikus and rescuing a dying planet. To clear a level you must secure all three characters on the colored cones with the antidote. Throughout the ga
  • Remotely monitor your webcam, your desktop, or your microphone with this powerful all-in-one surveillance tool. Features include motion detection , sound detection, and secure website publication with access to live video, and all detected activity.
  • Kiosk software locks down your public computer or kiosk, helping you securely display your website or application. It prevents hacking and downtime by restricting access to the system, desktop, drives, folders and programs. The software blocks the system keys and replaces the system shell for maximum protection. Secure Browser removes standard browser menus, blocks downloads, limits browsing to specified URLs and blocks inappropriate content.
  • Secure IT File and Folder Encryption Software password protects all your files and folders. Built-in compression to save storage space. Integrated shredder allows permanent file deletion. Secure e-mail module and full command line support. Encrypt and Lock Folder, any data on any disk drive including removable drive such as USB, flash drive, memory stick, CD/DVD. Works on all 32-bit & 64-bit versions of Windows including Windows 7 & Windows 8.
  • SecureBlackbox for Java is a comprehensive class library that adds SFTP, FTPS, SSH, PGP, PDF, XML security, S/MIME, SSL/TLS, HTTPS, PKI, ZIP, EDI, Cloud, WebDAV, SAML, Office security support to your Java or Android application. SecureBlackbox primary goal is to provide technology for the wide range of applications, hiding the details of low-level protocols and algorithms, used by the parties during secure conversations.
  • The .NET SFTP Component is the ultimate in reliability and security. Use public or private keys with passphrases. RSA and DSA keys in OpenSSH or Putty format are supported. The .NET SFTP Library is the only SSH component available where you can unplug the network cable in the middle of a transfer, plug it back in, and it resumes right where it left off. Synchronize folder trees. All the features you would expect and so much more.
  • MobaSSH is a free SSH server for Windows, compatible with any ssh client (OpenSSH client, Putty, ...). MobaSSH comes with an easy to use installer and some useful GNU utilities for monitoring and managing a remote computer silently. It also allows you to transfer files securely with scp/sftp. MobaSSH is packaged in a small single executable that registers as a Windows service so that it can be monitored like other normal Windows services.
  • Secure Eraser uses the most renowned method of data disposal and overwrites sensitive information in such a sure way that it can never be retrieved - even with specialized software. Our multiple award-winning solutions for definitively destroying data also eliminate any cross-references that could leave traces of deleted files in the allocation table of your hard drive.
  • Publish your own secure website directly from your PC and remotely access your images, documents, videos, and music, or securely share them with your friends, family, and co-workers.
  • Break Access Security software to break access password, break mdb security so as to open & re-use secured access database MDB files. Take a look on easy MDB Key tool to break access security to unlock Access database & break mdb password security. Break access security from MS Access 95/97/2000/2002/2003 database. If your password has been lost or forgotten, get MDB Key to break access database password to open secured access database instantly.
  • Take a look on Microsoft Access Password Recovery tool to quickly recover microsoft access password. Microsoft Access Password Recovery tool recovers ms access password from password protected access database. Microsoft Access Password Recovery software help users to unlock, unprtect & unsecure mdb files of MS Access 2007/2003/2002/2000/97 database. Get MS Access Password Recovery to recover MS Access password & unlock Access database.
  • BizCrypto for SQL Server lets you secure the data in your MS SQL Server Integration Services scripts. The product includes SSH, SFTP, FTPS, OpenPGP, AS2, SMTP, POP3, S/MIME, PGP, PKI, PDF, XML, ZIP connections and tasks.
  • The MD5 message-digest algorithm is a widely used cryptography hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptography applications, and is also commonly used to verify data integrity.SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal
  • NetstatWrapper Tool Readme File NetstatWrapper Tool: NetstatWrapper is a small windows GUI tool that can be use to run netstat command using UI. With this small tool you can run some of the netstat command line tool and see the result in Notepad, or any other configure text viewer tool. This version Support the Following Commands: 1. an List all connection and ports as number 2. anb List all connection and ports as number with the involve exe 3. ano List all connection and ports as number with the process id 4. r Show Ethernet statistics and perprotocol statistics 5. es Show the current routing table How To Use: 1. Start NetstatWrapper.exe 2. If you get a User Account Control (UAC) allow it to run Press on Yes. 3. Select the netstat command you want to use. 4. Optional: You can select a text viewer that will show the output command data. 5. Press the Run button to execute the command. 6. A text file will be open with the command result.
  • SFWare Deleted File Recovery Mac software is a hassle free recovery tool that can easily and swiftly get back all deleted files. This software is specially designed to solve problems related to Mac Operating system. It can effortlessly restore deleted or lost files within 3-4 easy steps. It can easily restore files that emptied from Trash. This utility is designed in such a way that it can locate and retrieve deleted files from missing volumes of Mac OS. Apart from this it can also get back files from formatted volumes within few minutes. It is very easy to use so that user of all levels can execute it without any hurdles. SFWare Deleted File Recovery Mac utility works on read only mode thus it recovers file without any damage to actual content and that to with its original name. It supports recovery of files from HFS+, HFSX, FAT16 and FAT32 volumes/partitions. This recovery tool has the ability to rescue files on basis of its unique signature. It can recover deleted and lost files from internal and external ...
  • With KeyLord you can keep your passwords, credit card and bank account numbers, and other sensitive information in a tree-like structure, secured with passwords or X.509 certificates for increased protection. Powerful and flexible password generator, included in KeyLord, lets you create unique and cryptographically strong passwords, which are possible to remember.
  • Secure Hunter Error Code is a small windows GUI tool that can convert error numbers into a readable text message. The current version can convert error code numbers from the following software. 1. Window Error Code. 2. HTTP/HTML Error Code. 3. Event Log Error Code. 4. Linux(errno) Error Code. 5. Win Sock Error Code. 6. Secure Log Error Code. 7. Oracle Database Error Code. 8. MySQL Database Error Code. 9. MSSQL Database Error Code. 10. DB2 Database Error Code. Please Note: The error massage text may be change between software versions. How To Use: 1. Start SecureHunterErrorCode.exe 2. If you get a User Account Control (UAC) allow it to run - Press on Yes. 3. Enter the Error Code number you want to check/convert to string. 4. Select the error type (windows, HTML, MSSQL etc). 5. Press the Get button to see the error code message translation. 6. If needed you can copy the error message from the Error Message box.
  • IbidInfo OST to PST Converter is a trustworthy and effective program to migrate OST file to proportionate personal storage (PST) format. The product securely converts all mail objects of OST record and saves them in latest PST document, alongside offering alternative to save as PDF, RTF, EML, & MSG and HTML formats according to necessity. Using IbidInfo OST recovery tool user can restore mail messages with attachments, calendar, task, appointment, notes, and journal; additionally restore the designing of HTML and RTF emails incorporated into OST document. The fundamental interface of the product has the choices to choose the OST document from a known area or discover it from the operating system. Later than to selecting the offline storage (OST) file, it changes over the record to produce the relating PST file. After the change, you can watch the preview of recoverable things in the product interface. The elegant "Find" alternative aides in finding a specific email out of the bundl ...
  • BizCrypto for BizTalk lets you secure the data and internet communications in your BizTalk orchestrations. The product includes SFTP, SSH, FTPS, OpenPGP, SMTP, POP3, AS2, HTTPS, S3 adapters and S/MIME, PGP, PKI, PDF, XML, ZIP pipelines.
  • Cloudable enables freelancers, small businesses (such as media agencies) and webmasters to easily share their files online. Its been built to be extremely robust, secure and very fast! The file hosting script is available with a wide variety of features including a responsive file manager built using bootstrap framework, multi-file uploads, drag & drop upload, image viewing capabilities, stream videos, view documents, social sharing, an in-depth admin area and more.

Page 3 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware