Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • You view and clear the Windows MRU Lists. You delete the traces in windows system.
  • Convert to bmp, jpg, tif, png, gif, pcx, jp2, ico, jpc, pgx, pnm, ras, tga, wbmp image format. It include over 50 image effects, 3DGrid Effect, Contrast Effect, Brightness Effect, Adjust RGB Effect, Auto Color Enhance Effect, Auto Color Level Effect, Auto Contrast Effect, Blinds Effect, Blur Average Effect, Blur Gauss Effect, Blur Radial Effect, Blur Zoom Effect,Color Balance Effect, Color Level Effect, Color Tone Effect, Cylinder Effect, Edges Detect Effect, Emboss Effect, FillGrid Effect, Fill Pattern Effect, Flip Effect, Fractal Trace Effect, Gamma Effect,Grayscale Effect etc. You can using these effects on C#, VB6, Asp.Net. Convert specific page of TIFF or PDF file to bmp, jpg, tif, png, gif, pcx, jp2, ico, jpc, pgx, pnm, ras, tga, wbmp image format. Support input PDF,bmp, jpg, tif, png, gif, pcx, jp2, ico, jpc, pgx, pnm, ras, tga, wbmp image format. Resize image to bmp, jpg, tif, png, gif, pcx, jp2, ico, jpc, pgx, pnm, ras, tga, wbmp image format and keep aspect ratio. Support custom value of J ...
  • How to recover your important images, music, audio, video data files from accidentally formatted memory cards! Using memory stick pro duo data undelete tool you can efficiently get back your all erased data in few easy steps. Secure digital card files rescue utility effectively retrieve data from virus infected, logically corrupted and inaccessible MMC, compact flash, sD, xD cards etc. Powerful memory stick file recovery tool unformat formatted PC cards and restore various jpg, gif, mp3, jpeg, bmp, avi etc format files. Multimedia memory card data recovery tool recovers entire data also when Drive Not Formatted or Drive Not Detected error message is displayed. Secure digital media file restoration application uses advanced technology and algorithm for scanning storage drive and effectively restore traces of lost data accurately. Pro duo memory stick file salvage software is non destructive and read only application, does not affect other saved files and folders during restoration process. Memory stick pro duo ...
  • PC activity monitoring software records unauthorized users activities on your Laptop, desktop and personal computer in your absence. Keystrokes capture tool records all user activity with exact date, time, name and location of application in the hidden encrypted log file. Advanced keylogger monitors internet activity by tracking all visited web-pages. Computer monitoring utility runs in hidden mode and traces the entire keystrokes, browsed web pages, Windows clip board content, captures screenshots, email details, username, password and many such activities at regular time interval. Keystroke activity recording software runs in stealth mode and does not show in any windows application like start-up menu, desktop, add-remove program, control panel etc. PC surveillance software easily supports all Windows operating system including Windows 98, 2000, 2003 server, XP, ME, NT and Vista. Advanced keylogger program has interactive graphical user interface and does not require any technical skill to operate the softw ...
  • HidEM is a safe, fast and easy Security Solution Software that can protect your private data - in just seconds. Simply drag and drop files, folders, pictures, videos, drives, and even programs to the HidEM DropZone, then click "Lock" and have peace of mind that only you, have total access. HidEM will help you safeguard those data from unwanted access by both hiding and locking. Also HidEM protects data from viruses, trojans, worms and spywares because once protected, it can not be opened, modified, deleted, moved nor copied. Also you can delete all traces such as internet history, cookies, recent documents, etc. in your computer with just one click.
  • HidEM is a safe, fast and easy Security Solution Software that can protect your private data - in just seconds. Simply drag and drop files, folders, pictures, videos, drives, and even programs to the HidEM DropZone, then click "Lock" and have peace of mind that only you, have total access. HidEM will help you safeguard those data from unwanted access by both hiding and locking. Also HidEM protects data from viruses, trojans, worms and spywares because once protected, it can not be opened, modified, deleted, moved nor copied. Also you can delete all traces such as internet history, cookies, recent documents, etc. in your computer with just one click.
  • Windows keylogger monitoring software covertly captures and records all typed URLs, visited websites, username, chat conversation, passwords and all performed activities on your personal computer or laptop when you are gone away. Keystroke recorder utility is capable to run in hidden mode after this no one track its location on your hard drive. Keylogger recording program silently records every keystroke of keyboard along with data and time to their performing. Keystroke monitor application used at home as well as offices to monitor the online/offline activities of children, spouse, employee, and office employees on the time interval. Keystroke recorder software is available in two different modes standard and hidden mode. Professional keylogger monitoring utility generates the reports of recorded data in text and html formats and invisibly sent log files to you inbox. Keystrokes surveillance software runs background and records all typed keys from keyboard such as system keys, functional keys, alpha numeric ...
  • Keyboard monitor software allows you to stealthily observe any user's computer activities. Keylogger is an invisible surveillance utility that records every key press activities to encrypted user friendly easy to understand logs. Windows keylogger utility can also capture active window text, username, passwords, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN and AIM. PC keylogger tool automatically track application status, drive location, session time and date, application caption with each keystroke and save it in log file. Software can capture screenshots of all accessed activities can also secretly send reports to your e-mail address. Smart keylogger traces the pressed keys action and monitor your employee's activities in real time, save all or certain keystrokes on their PCs. Keylogger recorder is not visible in desktop, add-remove programs, start menu and control panel and cannot be detected by using any spyware or antivirus. Utility supports for recording ...
  • IP Hider software is a privacy protection tool that hides your IP address preventing your surfing habits and your internet activity form being tracked by websites or Internet Service Providers. IP address hider is blocking invasive codes that may harm or use inadvertently information on your computer, and provides a good online privacy protection by cleaning all online traces
  • The easiest and safest way of removing unwanted information permanently beyond any risk of recovery is to use ZeoShredder by ZeoBIT Software Corporation. This program is very simple to use, it has a friendly and easy to understand interface. ZeoShredder is an ultimate tool to remove unwanted private and confidential data without having to worry it can be recovered.
  • Uninstall Winner is a powerful and fast alternative to slow and unfriendly "Windows Add or Remove Programs" applet. With its advanced and effective algorithm, Uninstall Winner provides an easy and comprehensive solution for uninstalling unwanted applications, whether they are obstinate ones that can not be removed by "Windows Add or Remove Programs" or the uninstall files have been corrupted.
  • INSTANTLY get a copy of ALL incoming and outgoing SMS. The SMS Monitor application will be silently running in the background and will forward all incoming and outgoing SMS traffic to you without a trace! All forwarded SMS are sent without logs of any kind.
  • Wipe Expert is an award winning privacy protection tool that helps remove all traces of online and offline activity. Did you know that a consequence of internet browsing is the recording of many confidential data on your computer: visited pages, credit card info, passwords? Anyone with access to your computer may use these data against you. We use secure algorithms: U.S. DOD 5220.22-M, Peter Gutmann, VSITR, NAVSO to protect your privacy!
  • With Bodrag Utilities 2009 your system will run faster, without errors and more secure. It replaces dozens of less powerful utilities, offering all the need tools for your PC in a single package. Bodrag Utilities 2009 combines 23 powerful tools that eliminate errors and optimize your computer. By using the One Click Optimization feature of our product you can solve many of your PC problems fast and easy. Bodrag Utilities also offers the possibility to schedule tasks to help your computer clean. System Optimizer will analyze your system configuration and will give you recommendations on which setting to change in order to increase your computer performance, stability and security. With Disk Cleaner you can clean junk files and recover hard disk space. Registry Cleaner will optimize registry, removing invalid entries. Also with Registry Defragmenter you will be able to defragment the registry and reduce its size. Now is very easy to backup and restore registry with Registry Backup. Memory Optimizer will inc ...
  • Remote keystroke recorder is fully invisible and can not be seen in add remove program, start menu, program files or task manager and except you no one can access or uninstall it. Advance key logger tool helps you to watch on your child, spouse and employees online activities those are performed on your computer system in your absence. PC activity tracker software captures screenshots of all accessed activities, which can help its users to sort out several computer errors. Computer surveillance tool trace internet activities including visited website, voice chat conversation, temp files and cookies with option to save recorded data in excel file format. Invisible key logger program provide interactive and graphical user interface. Advance keylogger software is functional with all windows operating system such as Windows 98, 2000, 2003, XP and Vista. Parental keyboard monitoring software provides fast installation and work in stealth mode. Advance key logger application record system activities including start ...
  • Internet/System Privacy Guard Free Versionis a safe and easy way to clean activity and history traces and securely delete online Internet tracks stored in your browser and in hidden files. It uses an advanced eraser to ensure all traces of your Internet and computer activities are permanently deleted.
  • With Bodrag Utilities 2009 your system will run faster, without errors and more secure. It replaces dozens of less powerful utilities, offering all the need tools for your PC in a single package. Bodrag Utilities 2009 combines 23 powerful tools that eliminate errors and optimize your computer. By using the One Click Optimization feature of our product you can solve many of your PC problems fast and easy. Bodrag Utilities also offers the possibility to schedule tasks to help your computer clean. System Optimizer will analyze your system configuration and will give you recommendations on which setting to change in order to increase your computer performance, stability and security. With Disk Cleaner you can clean junk files and recover hard disk space. Registry Cleaner will optimize registry, removing invalid entries. Also with Registry Defragmenter you will be able to defragment the registry and reduce its size. Now is very easy to backup and restore registry with Registry Backup. Memory Optimizer will inc ...
  • Privacy Winner is the most powerful privacy software to eradicate Internet traces and program activities; it is also the easiest way to erase your Internet history, Windows history, Search history and Chat history. Just one-click erase puts your pc privacy under control.
  • Extremely Fast and Comprehensive Topological PCB Autorouter. It routes PCBs with free-angle technology and make arc-like traces. The result is far superior to any shape-based auto-router or even time-consuming manual routing. Specctra DSN/SES interface is supported to exchange data with PCB CAD packages. 650 pin version is available for free.
  • IsItUp Network Monitor is a server monitor, website monitor, port, and email system monitor. It continuously monitors multiple IP devices, websites, servers & alerts you via email or pager; graphs. Website content check; runs as a service; maintains performance statistics for each device it monitors - up time, maximum response time, minimum response time, standard deviation & error log. IsItUp tracks the last successful and last Traceroute.
  • Keystroke monitoring software is profitable application to investigate keyboard related secret activities of external users when you are not in office or home. Keyboard tracking tool captures and stores all internet activities like outgoing and incoming e-mails, chat messages, URL address of unusual websites, username, password, accessed applications, files transferred in password protected encrypted log file. Family Keylogger program automatically sends all encrypted log files to specified email id of user at particular interval of time. PC monitoring tool runs in hidden mode and covertly registers everything happens on your computer like keystroke recording, chat logging and other internet related activities. Keyboard capturing utility traces all typed keyboard characters including digits, functional and special characters like Shift, Tab, Alt, Ctrl, Del. Keylogger program silently captures all keystroke sequence while working with MS word, multimedia applications, games and restores in encrypted log file. ...
  • Magic NetTrace is an easy-to-use versatile program that combines ping, WHOIS and traceroute functions into one friendly GUI utility. Using this tool you can identify the source of Internet connectivity problems, track down the source of junk mail, find out a geographic location of a web server or your ICQ buddy, troubleshoot e-mail problems and more. Multithreaded architecture makes the program extremely fast and tight integration with Internet Explorer enables users to perform traceroute and WHOIS lookup with a single mouse click. Other Magic NetTrace's features include easy network and domain WHOIS lookup for all hosts passed by your packets; ability to perform WHOIS query via web interface if the registrar who supports the particular domain hasn't a WHOIS server; printing the lookup results, copying them to the clipboard or saving as a file and support for multiple interface languages.
  • Coyote Tracing for .NET is a powerful solution that provides easy to use tracing, logging and live monitoring capabilities for distributed and non-distributed .NET applications. * Send and distribute Trace Messages using the royalty-free Coyote Core Framework. * Collect and route Trace Messages using Coyote Trace Server. * Monitor one or more .NET applications live at runtime using Coyote Trace Monitor. Coyote Tracing for .NET has the following main features: * Easy to use tracing components that automatically gather context information while sending Trace Messages - such as type name and method signature of the trace-emitting .NET type. * No impact on application design by using static methods only. * Ensures performance and does not block the application by using a multithreaded trace subsystem. * Configurable Trace Message publishing and filtering. * Publishing of Trace Messages to a remote or local trace server service. * Integrated live monitoring applica ...
  • Coyote Tracing for .NET is a powerful solution that provides easy to use tracing, logging and routing capabilities for distributed and non-distributed .NET applications. * Send and distribute Trace Messages using the royalty-free Coyote Core Framework. * Collect and route Trace Messages using the free Coyote Trace Server. The free Coyote Core Framework for .NET has the following main features: * Easy to use tracing components that automatically gather context information while sending Trace Messages - such as type name and method signature of the trace-emitting .NET type * No impact on application design by using static methods only * Ensures performance and does not block the application by using a multithreaded trace subsystem * Configurable Trace Message publishing and filtering * Publishing of Trace Messages to a remote or local trace server service * Customizable Trace Message Publishers * Connection point for live monitoring applications, such as our Coyote Trace Monitor Featu ...
  • Advanced data wiping tool is an unrecoverable data eliminator which completely erase data from storage media and provide safeguard to computer privacy. Data wiping tool completely destroyed the data record including name, date, and allocation. It ensures that the deletion is permanent and irreversible. Data wiper removes all traces of browsed internet files including temporary files, cookies and browsing history. Data shredder operates in destructive and non destructive mode. In destructive mode, wiper erase entire disk with all safe and unsafe data including all saved and unsaved application files such as power point slides, Microsoft excel, access, paint management console and word files or user can select specific disk sector. In non destructive mode, data wiping tool provides facility of tree structure formatting in which you can select data including internet browsing history, temporary files, cookies, e-mail, unused disk space and all traces of application files. Data sanitation tool is advanced securit ...

Page 10 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2014 IT Shareware