Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • QPack Free Software Testing Tools for Test Management by Orcanos. Includes Requirements Management and traceability, Test Plan, Test Execution, Defect Tracking - Get Free edition now. A Complete and structured Application Lifecycle Management solution, from requirements definition, through design and specs, Test Plan and Test Execution, Defect Tracking, strong Traceability and reporting tools.
  • Keyboard tracking software is password protected application useful to monitor PC secret activities during your absence. Employee monitoring program helps company managers to investigate the whole non-productive working of office staffs on company PCs during business hours. Keyboard surveillance tool traces all online and offline computer activities like chat records, sent and received mails, URL address of visited websites, username, passwords, accessed applications in password protected hidden log files. Family monitoring software is helpful for the parents to prevent their children from misusing the internet and monitor entire computer activities of spouses and kids. Keylogger program covertly runs in stealth mode and is hidden from searching areas such as control panel, task manager, add remove item, start menu. Keystroke spy software easily bypasses any antivirus software so no one is able to detect software working. Keystroke tracking utility captures all pressed keyboard characters including digits, fu ...
  • Keylogger is the best surveillance software in the market which easily traces external user?s activity on your computer into authenticated log file. Keyboard surveillance tool is a secret keystrokes recording utility that capture all keyboard activities of computer users like login, password, emails, forms, visited website, chat records, typed text of various documents (word, excel, notepad etc) into secret log files. Computer monitoring software automatically sends report to the specified email in defined time interval which allows viewing logs from distant location to get detailed report of all user activities without touching monitored PC. Keyboard surveillance utility runs in desktop background in completely hidden mode and not appears in start menu, add-remove programs, task manager and control panel. Keyboard logging software saves each typed keystrokes, characters, digits and special combination keys with alt shift ctrl and tab in a password protected log file. Keystroke logger can be used at offices, ...
  • Ashampoo HDD Control 2 monitors, maintains and defragments hard drives. The software supports not only all common IDE and serial ATA hard drives, but also provides improved support for external USB hard drives and solid state drives (SSDs). The extended user interface gives an overview of the status of your hard drives’ health, performance and temperature. It also offers lots of technical information on supported features and their current status. Furthermore the software supports the S.M.A.R.T self-test to check for electric and mechanic problems of hard drives as well as adjustment of the noise level and the power management (if supported by the hard drive). With just a few clicks the software finds unused files and Internet traces, which can then be deleted. For the deletion of files and folders different erasing methods are available. Among the common methods Ashampoo HDD Control 2 uses the so-called “proactive” defragmentation. Furthermore it’s possible to restore accidentally deleted files and fol ...
  • Advanced keylogger spy application allows you to find out what other users do on your computer when you are not present or far away. Professional keylogger software useful to save all typed keystrokes, voice chat conversations, sending emails, internet or browsing activities, visited website URL details and windows captions in hidden password protected log files. Software automatically sends this log file at your specified mail address so that you can regularly monitor what other user do on computer in your absence. Best PC monitoring program equipped with the advanced features and functionality to record exactly what your kid does online, which sites he/she visits and protect them from getting into trouble. Remote keylogger software facilitates to know what your employees are doing during their working hours in your absence. You can claim them and find out the time wasted on web surfing or instant messaging. Software runs in hidden mode and does not appear in Add/Remove programs, Start Menu, installation dir ...
  • Do you know that your computer stores all history traces? Your PC stores all your history tracks - web sites you visited, what you searched in the Internet, information you enter on websites, files and documents you recently opened etc. But some history tracks can't be cleaned without clean history software as they are stored in different system areas, not always visible by standard means and can't be removed manually. Don't want to compromise your privacy? Clean history with one click! Browser History Cleaner is a freeware history cleaner software that protects your Internet privacy by cleaning up all the tracks of your Internet and computer activities. It supports Internet Explorer, MSN Explorer, Maxthon (MyIE2), Mozilla, Mozilla Firefox, Netscape and Opera web browsers. Key features: - Cleans Browser History - deletes information about web sites you visited, address bar history and recently downloaded files list in Internet Explorer, Mozilla, Mozilla Firefox, Nets ...
  • Enhance your computers performance with Windsty SystemCleaner. This system-boosting solution prevents many common problems, keeping your computer healthy and running in peak condition. And, if something ever goes wrong, its there to help you diagnose, repair, and recover. Here is a list of tools included in suite: * Registry Cleaner Registry Cleaner removes obsolete or unwanted items that build up in the registry over time in order to improve the stability and performance of your computer. * Registry Defragmenter This application physically defragments the Windows registry file to give it the proper linear structure. After a single run of Registry Defragmenter, the computer speed increases up to 100% and the computer itself stops freezing and crashing. * Junk Files Cleaner Junk Files Cleaner scans and removes almost all junk files from system to provide more free space on hard drive and allow applications to run faster and more efficiently. * Duplicate Files Finder Imagine that you are trying ...
  • Keylogger surveillance software allow to monitoring all the activities of computer key board strokes in your absence. Key logger invisibly stores all the user activities which will perform on the computer. Software monitors all the typed text, chat conversations, username ID, Passwords and other keystroke activities performed on computer system or laptop including guest user. From using key logger application you will very easily trace all the information which will enter by the person in yours absence. Easily inspect the children and employee to stop the misuse of computer. Key logger surveillance is very smart it will not appear on the desktop, add/remove program, control panel. Key logger software has the option to install the software in hidden mode. Key logger surveillance application automatically records all typed emails conversations, chat records, website visited, password and documents lists. Key Logger tool automatically prepares logs of all keystrokes in such a systematic way so that easily check ...
  • Crypto Obfuscator For .Net provides advanced code protection, obfuscation, optimization and automatic exception reporting for your .Net and Mono assemblies. Crypto Obfuscator combines powerful obfuscation, encryption and optimization techniques to provide the very best protection to your .Net code against reverse-engineering. Automatic Exception Reporting makes it extremely easy to catch any unhandled exceptions and for your users to easily report these exceptions to you with a single click of a button. The exception reports include all pertinent information including full stack trace info along with the values of all method arguments and local variables, system information and optional developer defined custom data like log files, screenshots, etc. All exception reports can then be automatically download from the exception reporting service and viewed within Crypto Obfuscator. Crypto Obfuscator’s metadata reduction, assembly & resource compression and dependency embedding functionality simplifies and ...
  • A comprehensive set of utilities, WinXP TuneUpSuite helps you avoid system crashes, keep your PC running smoothly, and fix it when it doesn't. Think of WinXP TuneUpSuite as a Swiss Army knife: you won't need all of the tools in it every day, but when you do need them you'll be very glad to have them. Here is a list of tools included in suite: * Registry Cleaner Registry errors often cause instability and slow computer performance. This award-winning registry cleaner will clean, repair and optimize the Windows registry to speed up your computer and eliminate frequent crashes. * Registry Defragmenter Registry Defragmenter is an utility to defragment Windows registry. It optimizes registry by removing gaps, fragments and wasted space in Windows registry files. A smaller registry has several advantages including a faster system start and an overall increase in system performance. * Junk Files Cleaner Junk Files Cleaner performs deep analysis of your system, identifies junk fi ...
  • Christmas faqs, recipes and email to santa. kriss kringle.com santa claus origins, history and legend.. design personalized ornaments for Christmas , weddings or events online. free shipping and live help. here is a collection of Christmas songs. simply click on the title of the song and a new window should open for you playing the song. enjoy! b. this Christmas trace back the history and origin of Christmas carols. know the legends behind those
  • ViewonLog is a real-time logging tool for .NET and C++ developers. It can be used to trace logs while developing, debugging, testing and monitoring the software. It logs messages (Text, Dump data, Screenshot), system resources(CPU, memory, disk, network ¡¦), process resources(CPU, memory, IO, handle ...) and screen activity. ViewonLog also supports various searching condition and fast searching speed about the collected log data.
  • ViewonLog is a real-time logging tool for .NET and C++ developers. It can be used to trace logs while developing, debugging, testing and monitoring the software. It logs messages (Text, Dump data, Screenshot), system resources(CPU, memory, disk, network ¡¦), process resources(CPU, memory, IO, handle ...) and screen activity. ViewonLog also supports various searching condition and fast searching speed about the collected log data.
  • Keylogger software is the best computer-monitoring tool that easily records external user?s activities on the computer system in your absence. Invisible keylogger software works as background process and remains hidden from desktop items, Add/Remove program list and even hides its installation folder path. Using key logger utility, you will be able to establish full control over your computer system. Remote spy keylogger software is the best PC monitoring tool that automatically records all typed emails conversations, chat records, website visited, password and documents lists. Spy Software is password protected software; external users can not change or modify its configuration settings. Spy software allows remote computer monitoring and keystroke recording in real time. If your favorite text editor crashed suddenly you will be able to restore information you typed from the keylogger without any problems with the help of remote keylogger software. Software feature: * Undetectable keylogger program traces l ...
  • Microsoft Windows uses FAT (File Allocation Table) or NTFS (New Technology File System) for disk partitioning. It is very advantageous as it can be used to format high capacity computer disks and also to create one or more NTFS partitions on the same computer drive. But files and folders on the computer may be lost due to several reasons such as reinstallation of Windows, damaged FAT or NTFS partition, unexpected system shutdown of system and others. Kernel for Windows Data Recovery is ideal computer file recovery tool designed to deal with various corruption issues of Windows partitions. Kernel for Window Data Recovery, the most reliable computer file recovery tool, is provided with three scan modes - Quick scan, Extensive Scan and File Trace. Quick scan mode should be chosen to recover Windows data due to MBR corruption and bad sectors. With extensive scan, you shall be able to restore files and folders of a permanently deleted Windows partitions. File trace should be chosen when the other recovery modes ...
  • Keylogger is an efficient and economical tool that not only traces your keyboard activities in your absence but also saves all the record in encrypted log files and provides an option to send them to user specified email address. Shareware tracking tool traces each and every typed activity on your PC including chat conversations, composed mails, visited Web URLs, User logins, Passwords, Word files, etc. Software also saves login date and time for every new login session created. Keystroke recording tool has a special feature password protection that restricts unauthorized users to delete or modify content or software setting of your PC. Invisible Keylogger wizard is powerful tool that works in background and remains hidden from the user in startup menu, add/ remove programs, desktop or program files. Software provides facility to set hotkey and run command to access the Keylogger applications. Hidden tracing utility store records of keystroke activities in .html or .txt file format. Keylogger works on all maj ...
  • WinTweakz PrivacyGuard guarantees your privacy by ensuring all traces of your online Internet and computer activities are permanently erased and unrecoverable on your PC. You can safely clean your activity traces on your PC.
  • Keyboard spy software is cost effective and reliable application that continuously records all keystrokes on your computer keyboard in your absence. Keylogging application can be easily used by both professional and non professional users. Professional keystroke recorder program is compatible with all Windows operating system like Windows NT, 2000, Vista etc. Remote spy keylogger utility is helpful for company owner to capture employee?s online activities on computer. Keylogger software is an advanced PC surveillance utility for recording all user?s performed activities on computer system. Advance PC monitoring tool is an undetectable utility secretly records all sent and received mails on your PC when you are away. Keystroke recorder traces all keyboard typed special character like shift, tab, F1, ctrl and alt etc and generates detail report of recorded data for future reference. Keylogging utility is completely invisible to external users and secretly captures all keyboard activities on your computer. Keybo ...
  • Professional PC monitoring utility records password, email, chat conversation, document which are typed using keyboard of computer system. Stealth Keylogger software traces all information of visited websites, URLs, and keystrokes. Windows Vista Keylogger tool automatically records screen shots or desktop information when any person uses system in your absence. Advance Keylogger tool works in hidden mode and not tracked by any antivirus software. Keystroke recorder software can restore recent or previously accidently lost login id, passwords or other data. Stealth Keylogger utility has password protected feature that protects unauthorized user to change or modify software configuration or settings. Keyboard monitor software is case sensitive while recording key pressed by keyboard. Advance Keylogger tool helps parents to watch activities of his children net surfing or other activities performed on computer system. Keystroke recorder utility does not require any other technical support for use. Windows Vista K ...
  • You view and clear the Windows MRU Lists. You delete the traces in windows system.
  • Convert to bmp, jpg, tif, png, gif, pcx, jp2, ico, jpc, pgx, pnm, ras, tga, wbmp image format. It include over 50 image effects, 3DGrid Effect, Contrast Effect, Brightness Effect, Adjust RGB Effect, Auto Color Enhance Effect, Auto Color Level Effect, Auto Contrast Effect, Blinds Effect, Blur Average Effect, Blur Gauss Effect, Blur Radial Effect, Blur Zoom Effect,Color Balance Effect, Color Level Effect, Color Tone Effect, Cylinder Effect, Edges Detect Effect, Emboss Effect, FillGrid Effect, Fill Pattern Effect, Flip Effect, Fractal Trace Effect, Gamma Effect,Grayscale Effect etc. You can using these effects on C#, VB6, Asp.Net. Convert specific page of TIFF or PDF file to bmp, jpg, tif, png, gif, pcx, jp2, ico, jpc, pgx, pnm, ras, tga, wbmp image format. Support input PDF,bmp, jpg, tif, png, gif, pcx, jp2, ico, jpc, pgx, pnm, ras, tga, wbmp image format. Resize image to bmp, jpg, tif, png, gif, pcx, jp2, ico, jpc, pgx, pnm, ras, tga, wbmp image format and keep aspect ratio. Support custom value of J ...
  • How to recover your important images, music, audio, video data files from accidentally formatted memory cards! Using memory stick pro duo data undelete tool you can efficiently get back your all erased data in few easy steps. Secure digital card files rescue utility effectively retrieve data from virus infected, logically corrupted and inaccessible MMC, compact flash, sD, xD cards etc. Powerful memory stick file recovery tool unformat formatted PC cards and restore various jpg, gif, mp3, jpeg, bmp, avi etc format files. Multimedia memory card data recovery tool recovers entire data also when Drive Not Formatted or Drive Not Detected error message is displayed. Secure digital media file restoration application uses advanced technology and algorithm for scanning storage drive and effectively restore traces of lost data accurately. Pro duo memory stick file salvage software is non destructive and read only application, does not affect other saved files and folders during restoration process. Memory stick pro duo ...
  • PC activity monitoring software records unauthorized users activities on your Laptop, desktop and personal computer in your absence. Keystrokes capture tool records all user activity with exact date, time, name and location of application in the hidden encrypted log file. Advanced keylogger monitors internet activity by tracking all visited web-pages. Computer monitoring utility runs in hidden mode and traces the entire keystrokes, browsed web pages, Windows clip board content, captures screenshots, email details, username, password and many such activities at regular time interval. Keystroke activity recording software runs in stealth mode and does not show in any windows application like start-up menu, desktop, add-remove program, control panel etc. PC surveillance software easily supports all Windows operating system including Windows 98, 2000, 2003 server, XP, ME, NT and Vista. Advanced keylogger program has interactive graphical user interface and does not require any technical skill to operate the softw ...
  • HidEM is a safe, fast and easy Security Solution Software that can protect your private data - in just seconds. Simply drag and drop files, folders, pictures, videos, drives, and even programs to the HidEM DropZone, then click "Lock" and have peace of mind that only you, have total access. HidEM will help you safeguard those data from unwanted access by both hiding and locking. Also HidEM protects data from viruses, trojans, worms and spywares because once protected, it can not be opened, modified, deleted, moved nor copied. Also you can delete all traces such as internet history, cookies, recent documents, etc. in your computer with just one click.
  • HidEM is a safe, fast and easy Security Solution Software that can protect your private data - in just seconds. Simply drag and drop files, folders, pictures, videos, drives, and even programs to the HidEM DropZone, then click "Lock" and have peace of mind that only you, have total access. HidEM will help you safeguard those data from unwanted access by both hiding and locking. Also HidEM protects data from viruses, trojans, worms and spywares because once protected, it can not be opened, modified, deleted, moved nor copied. Also you can delete all traces such as internet history, cookies, recent documents, etc. in your computer with just one click.

Page 10 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware