Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Seamonte is a logical puzzle, in which You take the role of aimer at pirate ship. our goal is to rotate compass and match numbers and game bonuses into pairs. Side objects will move from one lane to other. ou must hurry, since while you play, a fierce battle will is ongoing between your and enemy ships. esitating will send you to sea depths, which means no fame at all. ore and more solutions, bonuses, secrets and events, accompanied by an.
  • Outlook, Live Mail, Outlook Express Bayesian spam filter. Allow or block email addresses, IP's, words/phrases you choose. Block spam by country and language. Bounce spam back to spammers. Report spammers. Auto delete spam. Forward only good emails to your phone. Send challenge emails to unfamiliar emailers. Stats. Convert the toolbar into English, Spanish, French, Italian, German, Russian. Customizable.
  • Power Spy (Supports x64/x86) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches, microphone and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • 2002, British intelligence receives information about the contract between the terrorists and the official authorities of Afghanistan, but they deny the presence of terrorists, calling it a military exercise. Because of this, convened a secret Council of the UN, during which it was decided to send a British agent James Tennant for espionage and sabotage the plans of terrorists on the base, which is located a couple of kilometers from the port tow
  • Record your entire screen or part of it directly to AVI or WMV, monitor your webcam or desktop remotely, broadcast your screen or webcam live over the internet, capture screenshots in JPG, record audio from any source into WAV, WMA or MP3, capture video from your tv tuner card, web browsers or media players DRM free, share your media files on your own personal web site, send media files by e-mail, or upload them via FTP.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Summary: Jung is a witch who loves gems and other RARKs but knows that only the best RARKs can get reach parallel dimensions. To travel through time and space you need very strong and complex magic, and parallel worlds themselves are fraught with many dangers. Therefore, in order to travel the worlds, Jung sends his animal-helper Kuro. The very same witch was watching him through his scope and helps him, stopping the time or rebuilding facilities
  • Power Spy for Home secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Abettor-Clipboard can copy and store up to 500 different clips, text or graphic. It has a superb encryption system with which you can sign in to all your web sites as well as send and recieve encrypted emails while only having to remember one master password. You can also allocate hot keys or macros to clips and paste them directly from your keyboard.
  • Conceal your online identity with the click of a button. Surf anonymously, encrypt your Internet traffic, hide your IP while surfing the Internet, using forums, sending E-mails, instant messaging, playing games, and more. Compatible with all applications. Hiding your IP address is as simple as clicking the "Hide My IP" button, which automatically configures your web browser or other application to use a proxy server from our proxy network.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Outlook Passwords Recovery and account settings backup is now free with Outlook Password Recovery module offered by our company. Simple download the tool and run the report called Accounts and Passwords. It is absollutely free option which can be used without limits. Backup Outlook passwords and account settings, save them to Excel, move your Outlook accounts to another computer, recover your lost Outlook passwords with this free Outlook Password Decryptor. But not only this, the software provides other usefull options and repors which can be evaluated. The tool allows to export Outlook emails, contacts and other records to separate files on your file system and preserve the Outlook folders structure. Email forensic option provides the wide access to the Outlook message tags and properties so nothing can be hidden from your eyes. But not only this, with the same outlooktransfer.com tool you may extract email addresses for your mail sending database.
  • RoboMail is a comprehensive mass mail software, which has a built-in e-mail server to send out e-mail without using ISP's server. You can prepare personalized e-mail easily. You can send newsletter, product release, and promotion to customers easily and stands out from tons of junk mails. Enjoy email marketing with RoboMail and explore business opportunities.
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • The Network Recycle Bin Tool allows you to recover deleted files. Once you have this tool in your system, it will automatically keep a track of all the network deleted files and you can easily recover them. Instead of removing the files, this tool sends them directly to its predefined recycle bin folder. Additionally it offers you the Protect Files tool which prevents deletion of network files for specified folders according the file mask.
  • Print from DOS, Unix, Linux to Windows printers: USB, GDI, PDF, e-mail, network, fax, virtual, IP. Capture PRN: , LPT1: .. LPT9: ports and redirect the print jobs, even to a printer phisically connected to the captured port. It also allows preview printing, include logos and background img, send the jobs via fax/e-mail, use specialist fonts (like barcodes), colorize the text, export in PDF, archive copies, same job to multiple printers and more.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • The Network Shared Recycle Bin allows you to backup and recover deleted. Once you have this tool in your system, it will automatically keep a track of all the network deleted files and you can easily recover them. Instead of removing the files, this tool sends them directly to its predefined recycle bin folder. Additionally it offers you the Protect Files tool which prevents deletion of network files for specified folders according the file mask.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • Now convert MSG files of MDaemon mail server with attachments through MDaemon to PDF Converter. This conversion tool easily converts accurate MSG files details of MDaemon into PST file format like - to, cc, bcc, subject, sending receiving date, time, content, links, formatting, attachments etc. Don't think more about it just download demo edition of the software and know about its working steps.
  • Computer Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware