Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: T :: temporary
Display: short descriptions | full descriptions
  • Duplifinder is a powerful all-in-one file management tool to find and remove all kind of duplicate files from your folders, hard disk, removable drive or network drives. Deletes duplicate email, contacts, notes, tasks from Microsoft Outlook folders. Compare, synchronize, move or delete your files or folders, also provides the ability to delete all junk files from your computer. The features detail below: 1. Find and remove duplicate files with Duplifinder Duplifinder can help you to find and remove any duplicate file with the same name or same content. Predefined filter masks are provided to quickly and easily search for and find duplicate files. With Duplifinder you can: Remove duplicate files Remove duplicate pictures Remove duplicate music Remove duplicate video 2. Remove Outlook duplicates with Duplifnder Duplifinder Outlook Scan utility that analyzes and removes duplicate Outlook entries. With Duplifinder you can: Remove Outlook duplicate emails Remove Outlook duplicate contacts Remo ...
  • Virtual Access Point (Virtual AP) - Share your Internet through Wireless. Virtual AP is an easy-to-use software that turns any LAN-connected PC into a Wi-Fi wireless access point. So anyone nearby can surf the Internet through your sharing. This is an ideal solution for setting up a temporary AP in a hotel room, meeting room, at home or the like.
  • cleanqbot.exe will detect and remove W32/CleanQbot Trojan completely, from your system. Download the cleanqbot.exe and save it in a temporary directory. Double click on cleanqbot.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/CleanQbot Trojan from your computer.
  • Member Track makes it easy for you to register, badge and track your members. Register members and capture their photo. Fingerprint and signature scanning are also options. Design and print plastic membership cards or issue temporary paper passes using the included industry-leading ID Flow badge design software. Check in and record entrance using networked check in stations or handheld scanners. See the member's record for verification.
  • cleanfakeinstaller.exe will detect and remove W32/CleanFakeInstaller Trojan completely, from your system. Download the cleanfakeinstaller.exe and save it in a temporary directory. Double click on cleanfakeinstaller.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/CleanFakeInstaller Trojan from your computer.
  • Make use of Kernel File Shredder and delete files or folders from computer?s hard disc permanently. The best aspect about this tool is it comprises of multiple shredding algorithm to make files shredding impeccable. What makes it more special is its remarkable feature of data shredding algorithm. This algorithm has been embedded in this software that allows the user to select and shred files and folders depending on the data sensitivity. Apart from this, the product helps you to automatically shred the temporary system files, content of the Recycle Bin, and free disk space along with allowing you to shred them manually whenever you want. Another great aspect about Kernel File Shredder tool is it facilitates you specify password for secure software access so that no one can use it for destroying purpose. Moreover, you don?t even require spending pointless time in getting familiar with or installing such computer program into your personal computer. It doesn?t matter, whatever is the format of file that you wan ...
  • EaseSoft Linear Barcode ASP.NET Web ServerControls use its internal HttpHandler to transfer barcode images directly to the client without any temporary files.It is the most efficient method to generate the barcodes dynamically.it supports symbologies including Code 39, Extended Code 39, Code 128, UCC/EAN-128,Industrial 2 of 5 Planet, Interleaved 2 of 5,Codabar, UPC A,UPC E, EAN 13, EAN 8,BOOKLAND,MSI, Code 11, Code 93.
  • FileLab Windows Cleaner is a free program that allows users to scan different registry entries. Remove temporary Internet files, corrupted applications and trash files in the recycle bin. Trace and delete infected files, run at the system startup, rootkits and other types of malware. See the detailed information of the scanner results and choose what problems should be fixed and what files or registry entries will be excluded from cleanup.
  • cleanircbot.exe will detect and remove W32/CleanIRCBot Trojan completely, from your system. Download the cleanircbot.exe and save it in a temporary directory. Double click on cleancycbot.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/CleanIRCBot Trojan from your computer.
  • cleancycbot.exe will detect and remove W32/CleanCycbot Trojan completely, from your system. Download the cleanyobdam.exe and save it in a temporary directory. Double click on cleancycbot.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/CleanCycbot Trojan from your computer.
  • cleanyobdam.exe will detect and remove W32/CleanYobdam Trojan completely, from your system. Download the cleanyobdam.exe and save it in a temporary directory. Double click on cleanyobdam.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/CleanYobdam Trojan from your computer.
  • cleanruskill.exe will detect and remove W32/CleanRuskill Trojan completely, from your system. Download the cleanruskill.exe and save it in a temporary directory. Double click on cleanruskill.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/CleanRuskill Trojan from your computer.
  • cleanvkont.exe will detect and remove W32/CleanVKont Trojan completely, from your system. Download the cleanvkont.exe and save it in a temporary directory. Double click on cleanvkont.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/CleanVKont Trojan from your computer.
  • VLC media player is a multimedia player supporting most audio and video formats (H.264, Ogg, DivX, MKV, TS, MPEG-2, mp3, MPEG-4, aac, ...) from files, physical media (DVDs, VCD, Audio-CD), TV capture cards and many network streaming protocols. # Free and Open Source cross-platform media player # Supports a large number of multimedia formats, without the need for additional codecs # Features a complete streaming server, with extended features (video on demand, on the fly transcoding, ...) It can also convert media files, transcode and act as a streaming server over unicast or multicast and IPv4 or IPv6. It doesn't need any external codec, program or codec pack to work. There was a time when video files all conformed to some basic requirements and could be played without protest using any media software. As technologies change and licensing becomes more restrictive and specific, simply playing a video file has now become a challenge and thanks to the plethora of obscure proprietary formats n ...
  • cleanspyeyes.exe will detect and remove W32/CleanSpyEyes Trojan completely, from your system. Download the cleanspyeyes.exe and save it in a temporary directory. Double click on cleanspyeyes.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/CleanSpyEyes Trojan from your computer.
  • SharePoint Password Reset Let users reset their password right on a web part without intervention from SharePoint administrator A simple web part that lets users reset their password right on their SharePoint page without having to ask the administrator or IT for assistance. New password will be sent online or through email delivery. Simple and accessible Reset password right on the web page; no more disturbing the IT or administrator for help. Customized Security Questions Users may set their own security questions to reset their password Two ways to password reset delivery Choose between answering security questions and sending the password reset link via email. Ensured security Change password is mandatory to make sure security is not compromised. Unlock and change themselves password without calling IT for support Reset password for AD users and local users Forms Based Authentication enables reset password for user who is managed in a SQL server database. Users could set their own security ...
  • Disposable Temporary E-Mail Address PHP Script. Disposable E-mail (Temporary E-mail) allows you to create a website that provides the users with disposable e-mail addresses which expire after a certain time. The user can read and reply to e-mails that are sent to the temporary e-mail address within the given time frame. With a click on a button the user generates a new e-mail address.
  • Temp eMail PHP Script - Disposable E-mail (Temporary E-mail) allows you to create a website that provides the users with disposable e-mail addresses which expire after a certain time. The user can read and reply to e-mails that are sent to the temporary e-mail address within the given time frame. With a click on a button the user generates a new e-mail address. That address will be stored in the database along with its creation time.
  • ZDelete Internet Eraser software helps to protect your privacy by preventing undesirable people to access private deleted data against your will. Internet Eraser ZDelete erases selected files, drives, folders, Internet Cache, Internet History, Internet Cookies, temporary files, etc. without any possibility of data recovery. Free 30-days evaluation version is fully functional and gives privacy protection.
  • cleanbanz.exe will detect and remove W32/CleanBanz Trojan completely, from your system. Download the cleanbanz.exe and save it in a temporary directory. Double click on cleanbanz.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/CleanBanz Trojan from your computer.
  • cleanog.exe will detect and remove W32/CleanOG Trojan completely, from your system. Download the cleanog.exe and save it in a temporary directory. Double click on cleanog.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/CleanOG Trojan from your computer.
  • SharePoint View Boost is product to enhance user experiences on list view. Currently it can collapse and expand columns in a standard SharePoint view. When a standard view contains too many columns, there will be a horizontal scrollbar on the browser and you should drag it to see more SharePoint columns. It is inconvenient when you want to see all concerning columns with no dragging and no new SharePoint view creating for temporary view. The above problem can be solved by SharePoint View Boost. With SharePoint View Boost, you can just click a menu item in the Actions menu and there will be ?collapse/expand? button on the top of every column in the view header. By click the ?collapse/expand? button, you can collapse or expand the column.
  • cleanautoit.exe will detect and remove W32/CleanAutoIT Trojan completely, from your system. Download the cleanautoit.exe and save it in a temporary directory. Double click on cleanautoit.exe to execute it. Follow the user-friendly instructions to detect and remove the W32/CleanAutoIT Trojan from your computer.
  • Temp File Cleanup is a handy program to quickly remove temporary files from your PC.
  • 1. Easy Backup Wizard, even for none experienced users, to set up and create backup tasks in just 3 steps! 2. Create Full, Incremental or Differential Backup tasks 3. Create Exact Data Copy Backups 4. Data Monitoring. Watch in real time changes that might happen the your data till the next backup takes place. Every new or modified data are displayed to ServerBackup's Monitor Data screen 5. Data Monitoring can be exported to file, so you can keep a full historic of data changes 6. Run Multi-backup tasks to network computers, hard disks, usd flash drives, laptops, mapped network drives or FTP Servers 7. Backup data from a network computer to another network computer 8. Backup files that are being used using Shadow Copy 9. Data Compression to SBF, ZIP, RAR, GZ files or Exact Copy of your data 10.Full Backup History of your backed up data 11.Restore from SBF, ZIP, RAR, GZ files to network computers, hard disks, usb flash drives, mapped network drives or FTP Servers 12.Restore of Exact Data Co ...

Page 5 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware