Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Audit file access and change in Windows in Real-Time.Monitor the file activities on file system level, capture file open, create, overwrite, read, write, query file information, set file information, query security information, set security information, file rename, file delete, directory browsing and file close I/O requests.You can create the file access log, you will know who, when, what files were accessed.
  • Hotel booking software with graphical reservation schedule, suitable for guesthouses, holiday homes, inns, motels and other logding establishments; Software allows managing of rentable units, guest management, creating offers/confirmations/invoices, planning of seasonal prices, managing additional services/packages/arrangements; incl. cashbook, statistics, cleaning lists, check in/out lists, and optional online booking system.
  • The focal point of the system administration is the efficient management of user accounts and their corresponding properties. The data resides on directory servers and is accessed through the Lightweight Directory Access Protocol (LDAP). Userbooster Light is a universal LDAP client providing system administrators with all they need for managing directory data.
  • Spy Patrol is a user-friendly spy software that runs hidden in the background. Spy Patrol records in stealth mode all th keystrokes typed, passwords, websites visited, chats etc. and takes screen shots of the active windows. Spy Patrol records all the user passwords (including the system logon password!). Spy Patrol captures the emails sent and received, and the messenger conversations are recorded as well! See more at www.spy-patrol.com
  • Interface Architect is a Cloud-based Microsoft Windows application + web UI for documenting and sharing invited users for the integration of systems within an organisation, by guiding users in the entry or automated-import of system interface details (eg API signatures for RPC, flat-file definitions for ETL, XML and JSON definitions for middleware, relational DB object signatures) , and cataloging the mapping rules that exist between them.
  • SFWare Deleted File Recovery Mac software is a hassle free recovery tool that can easily and swiftly get back all deleted files. This software is specially designed to solve problems related to Mac Operating system. It can effortlessly restore deleted or lost files within 3-4 easy steps. It can easily restore files that emptied from Trash. This utility is designed in such a way that it can locate and retrieve deleted files from missing volumes of Mac OS. Apart from this it can also get back files from formatted volumes within few minutes. It is very easy to use so that user of all levels can execute it without any hurdles. SFWare Deleted File Recovery Mac utility works on read only mode thus it recovers file without any damage to actual content and that to with its original name. It supports recovery of files from HFS+, HFSX, FAT16 and FAT32 volumes/partitions. This recovery tool has the ability to rescue files on basis of its unique signature. It can recover deleted and lost files from internal and external ...
  • Click4Time is an award winning eScheduling and online appointment booking software with a free account for single service providers and up to 10 bookings per month. 30 day free trial for paid accounts. Share your available bookings with social networks, accept full or partial payments, wait list, agent commission system, referral network builder, seasonal hours, very search engine friendly to help increase business. APP for iOS and Android.
  • Solid File System is a single - file virtual file system that uses one file on the media (such as hard drive, CD-ROM, database or file resource) for storing the data. It can be used to preserve integrity of application data, store metadata or keep revisions of the information streams. Solid File System supports journalling, multiple streams per file, unlimited storage file size, file and storage metadata, encryption, compression, symbolic links.
  • The Gantt Chart is extremely easy-in-use project plan system. This system allows you to specify complex tasks sequences - a task or multiple tasks can be required to be completed before other tasks can be started. You can edit task dependencies, create new task connectors and re-schedule individual tasks. You pay for the program only the first time and get all new versions of this program for FREE and for a lifetime!
  • Chess vs Friends free will help to improve your chess skills and become a better tournament or casual player! An incredible level of detail and realistic chess figurines add to the gameplay experience. With a sophisticated hint system that shows several possible moves to help you learn, Chess vs Friends is an enjoyable experience for any chess player.
  • Secure Hunter Error Code is a small windows GUI tool that can convert error numbers into a readable text message. The current version can convert error code numbers from the following software. 1. Window Error Code. 2. HTTP/HTML Error Code. 3. Event Log Error Code. 4. Linux(errno) Error Code. 5. Win Sock Error Code. 6. Secure Log Error Code. 7. Oracle Database Error Code. 8. MySQL Database Error Code. 9. MSSQL Database Error Code. 10. DB2 Database Error Code. Please Note: The error massage text may be change between software versions. How To Use: 1. Start SecureHunterErrorCode.exe 2. If you get a User Account Control (UAC) allow it to run - Press on Yes. 3. Enter the Error Code number you want to check/convert to string. 4. Select the error type (windows, HTML, MSSQL etc). 5. Press the Get button to see the error code message translation. 6. If needed you can copy the error message from the Error Message box.
  • IbidInfo OST to PST Converter is a trustworthy and effective program to migrate OST file to proportionate personal storage (PST) format. The product securely converts all mail objects of OST record and saves them in latest PST document, alongside offering alternative to save as PDF, RTF, EML, & MSG and HTML formats according to necessity. Using IbidInfo OST recovery tool user can restore mail messages with attachments, calendar, task, appointment, notes, and journal; additionally restore the designing of HTML and RTF emails incorporated into OST document. The fundamental interface of the product has the choices to choose the OST document from a known area or discover it from the operating system. Later than to selecting the offline storage (OST) file, it changes over the record to produce the relating PST file. After the change, you can watch the preview of recoverable things in the product interface. The elegant "Find" alternative aides in finding a specific email out of the bundl ...
  • Able Launch Bar is a window similar to the Quick Launch bar. This is Application Desktop Toolbar with built-in Windows Explorer. Able Launch Bar offers a system of shortcuts far more superior than Quick Launch. Arranged into folders, they are just the same as folders in the Explorer window. Able Launch Bar support for Drag & Drop helps quickly fill the folders with shortcuts from your desktop or start menu.
  • Install Saturn 3D Space Survey screensaver and make virtual spacecraft from your workplace. Observe the beautiful Saturn features along with spectacular ring system directly on your desktop. Enjoy the animated space scenes and relaxing sounds. Feel the peace and might of the Universe.
  • DreamCalc is the Ultimate Free Scientific Graphing Calculator for Windows. This slick math application is so realistic -- giving you an intuitive and almost tactile experience -- you'll never reach for your hand-held calculator again! Select from Reverse Polish Notation or two styles of algebraic input, and with the optional ability to run in your system tray -- DreamCalc will always be there whenever you reach for a calculator.
  • Comprehensive anti-virus security solution for your Windows PC. Real time protection. Installation and operation in an infected system and exceptional resistance to viruses. Efficient detection and neutralization of all types of threats. Fast multi-thread scanning powered by multi-core systems. Protection from latest malicious programs designed to bypass detection by traditional signature-based scan and heuristic analysis.
  • This is a highly functional and easy to Scientific Calculator. It incorporates many science tools including a triangle calculator, vector calculator, shape calculator, kinematic calculator, half-life calculator, gas laws calculator, statistical calculator, event timer, measurement converter and a molar mass calculator. Data reference systems include SI units, symbols, maths laws, periodic table, organic compounds, ions, chemical reactions and man
  • The program assists hotels, apartments, b&b accommodations, guest-houses or holiday homes in managing and maintaining reservations. Hotels and travel agents can achieve maximum time efficiency and best costs in processing reservations. The system is fully scalable and designed to provide extensive flexibility and varied choices. You pay for the program only the first time and get all new versions of this program for FREE and for a lifetime!
  • Launch Jupiter Observation 3D Screensaver and transfer yourself to the orbit of this exciting planet. Discover the might and beauty of the biggest planetary object in our Solar System. Decorate your screen with amazing animated space scenes complete with relaxing music track.
  • With With Solid File System OS edition your application can create a virtual disk, accessible for all or chosen processes. This disk can be made visible to the user, as a regular disk. The virtual disk (storage) is formatted using SolFS file system, and can be located in a file, in resource, memory block, database record or wherever you like. SolFS provides encryption and compression functions for your application data.
  • Install our free clipboard history manager and you will never lose data once copied. This clipboard tool which runs on Windows startup, will record everything placed on the windows clipboard into the database. At any moment, you can view the clipboard history, copy the item back into the PC memory or paste it into an application. All you have to do is press the "Ctrl+D" key combination or click the program icon in the system tray. It's cool.
  • Whether you want to automate anything from maintenance routines to email alerts to file synchronization or remote file transfers, Advanced Task Scheduler Professional provides everything that you need. You can schedule tasks by time or system events or both. It even provides a built-in script interpreter for automating Python or Perl scripts. It offers a far higher degree of functionality than the built-in Windows Task Scheduler.
  • LuJoSoft DeskLockII is an easy in use and compact tool for quick computer locking when you leave it unattended. It shows a lock screen, disables any user from accessing your pc. You can lock your PC by double clicking on DesktLockII.exe. To unlock the computer you must enter correct password only. Unlike another similar computer lock software LuJoSoft DeskLockII won't be affect Ctrl+Alt+Del or a system reset.
  • Medical Calendar is a doctor-oriented scheduler with a handy navigation system. It's highly flexible, allows changing time intervals, creating numerous profiles and viewing multiple schedules at a time.You can also password protect information,create backups and export the schedule to iCal, Outlook, XML, HTML, XLS, TXT formats. Additionally Medical Calendar comes with the feature-rich Print Designer for printing your schedule in a convenient way.
  • Spytector is the ultimate invisible and undetectable keylogger (keystroke logger) that completely meets your PC monitoring and surveillance requirements. Spytector keylogger is running in total stealth, undetectable even for advanced users, perfect for monitoring the way your PC is used. Spytector is tracking all the activities of PC users (visited websites, all the keystrokes, both sides of chat conversations, opened windows etc.) and delivers the logs to you via Email or/and FTP. In the delivered logs are also included the local stored passwords (for FireFox, Opera, Google Chrome, Internet Explorer, Safari, Outlook, Google Talk, Windows Live Messenger etc.) and URL history (visited websites). Spytector is completely invisible on the user's desktop and cannot be seen in the task manager, it's injected into system processes on the startup and the logs are hiddenly sent through the default browser or email client (to bypass the firewalls). The keylogger is using advanced hooking and steal ...

Page 10 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware