Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • The Network Shared Recycle Bin allows you to backup and recover deleted. Once you have this tool in your system, it will automatically keep a track of all the network deleted files and you can easily recover them. Instead of removing the files, this tool sends them directly to its predefined recycle bin folder. Additionally it offers you the Protect Files tool which prevents deletion of network files for specified folders according the file mask.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Abettor-Clipboard can copy and store up to 500 different clips, text or graphic. It has a superb encryption system with which you can sign in to all your web sites as well as send and recieve encrypted emails while only having to remember one master password. You can also allocate hot keys or macros to clips and paste them directly from your keyboard.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Forgotten Clocktower is a quite unique example of an arcade game. First of all there's extremely fascinating gameplay combining elements of Tetris and Doodle Jump. On your first try you won't last long, but over time you'll get the hang of it...and then you'll be hooked! In addition, there is a unique art style created by a talented artist specifically for this game. And there's also charming music, with waves of melody to soothe you by sending
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Hellish Heaven..God's life seems simple: Create something, sit back and watch as it develops slowly, occasionally sending angels to whip things back into shape. But what if your creation is out of control and decides that it is time to fundamentally change the way things have been done since the beginning of time? Just shrug, armed with hammers, to attract scores of supernatural beings and begin to defend their homeland. What else do gods need?
  • Multiple Phone Bulk SMS Sender- 4 Phone Support is a software to send SMS to thousands of Mobile Numbers from PC by connecting upto 4 GSM mobile phones . You can send multiple SMS at once through your connected Mobile Phones (GSM Mobile Phones). It is unique tool to do SMS marketing using mobile phones. The messages can be sent to directly using an Excel sheet and Custom messages can be sent to each recipient. Also a log can be generated.
  • Power Spy (Supports x64/x86) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches, microphone and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.
  • Real PC Spy software is a smart PC surveillance software that lets you know exactly what people do on a PC. It secretly records all PC and internet activity, including typed keystrokes (keylogger), chats & IMs, emails, websites visited, microphone, Facebook use, games played, online shopping and searches, video talk, videos watched, documents opened, clipboard text and more. It sends logs to your email or ftp like every 30 minutes.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Skype Spy Monitor Pro secretly records Skype incoming and outgoing IMs, calls and video chats. It logs all Windows users on a PC. It runs completely invisibly so that Skype users won't know its existence. It sends logs to an email or ftp like every 60 minutes. It is a great tool for monitoring your kids, spouse, employees, competitors and friends on Skype while you are away. You are able to know exactly what they are talking about online.
  • This is a useful Bulk Mailer tool adapt at sending Bulk email to a large number of email ids at high speed to Inbox. The tool allows the user to import email IDs from a text or excel file. Most important features of this Bulk mailing software are personalized email option. Using this feature user can send personalized emails with unique content to a large number of recipients in one single click. The tool is compatible with all windows versions.
  • Seamonte is a logical puzzle, in which You take the role of aimer at pirate ship. our goal is to rotate compass and match numbers and game bonuses into pairs. Side objects will move from one lane to other. ou must hurry, since while you play, a fierce battle will is ongoing between your and enemy ships. esitating will send you to sea depths, which means no fame at all. ore and more solutions, bonuses, secrets and events, accompanied by an.
  • 2002, British intelligence receives information about the contract between the terrorists and the official authorities of Afghanistan, but they deny the presence of terrorists, calling it a military exercise. Because of this, convened a secret Council of the UN, during which it was decided to send a British agent James Tennant for espionage and sabotage the plans of terrorists on the base, which is located a couple of kilometers from the port tow
  • Summary: Jung is a witch who loves gems and other RARKs but knows that only the best RARKs can get reach parallel dimensions. To travel through time and space you need very strong and complex magic, and parallel worlds themselves are fraught with many dangers. Therefore, in order to travel the worlds, Jung sends his animal-helper Kuro. The very same witch was watching him through his scope and helps him, stopping the time or rebuilding facilities
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, microphone, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a spy camera. Automatically sends logs to your email.
  • Skype Spy Monitor secretly record Skype's incoming and outgoing chat messages. It runs completely invisibly so that Skype users won't know its existence. Skype Spy Monitor send log reports to your email or ftp periodically. You can also check logs directly on the monitored PC. It is a small but powerful program that consumes very little system resource. Perfect for monitoring employees, children or spouse, and even investigating crimes.
  • SyncMate syncs data on Mac with Android and iOS devices, Windows services (Outlook, Office 365 Business and Office 365 Home accounts), other Macs, Google, Dropbox and iCloud accounts, any mounted storage devices, MTP devices. SyncMate is offered in Free and Expert editions. Free SyncMate lets you sync Contacts and Calendar between Mac and supported devices/ accounts. Free edition allows reading messages from Android and iOS right on Mac. Expert Edition will sync images, videos, music, Safari Bookmarks, ToDo/Reminders and separate folders between Mac and supported devices/accounts. Note that sync options may differ for each supported device or account. SyncMate Expert offers AutoSync option, which lets you set various parameters of automatic sync for any of supported device. Keep your personal data safe with SyncMate Expert single-click Backup solution. You can sync Folders between Mac and mounted storage devices and other Macs in real time, i.e. once you have changed any data on your Mac ...
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • SpyPal Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • The Network Recycle Bin Tool allows you to recover deleted files. Once you have this tool in your system, it will automatically keep a track of all the network deleted files and you can easily recover them. Instead of removing the files, this tool sends them directly to its predefined recycle bin folder. Additionally it offers you the Protect Files tool which prevents deletion of network files for specified folders according the file mask.
  • Sendkey is a direct replacement for Visual Basic's Sendkeys which works under the Vista and Win 7 operating systems. To use it, all you have to do is add the module to your project then replace "Sendkeys" with "Sendkey" in your code. Sendkey interprets all Sendkeys parameters without modification.
  • Zarafa is the European open source collaborative software that provides email storage on server side. People generally use this in order to send or receive mails and storage of important data such as contacts, notes and calendar entries. However, frequent use of this program makes it prone to corruption. When corruption occurs, you fail to send or receive email through it. Thus to recover the inaccessible emails from the corrupt, damage zarafa da

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware