Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • All-in-one analysis, unprotection and data recovery for MS Access 2000-2016 (.mdb, .mdw, .mde, .mda, .accdb, .accde, .accda). With Access Forensics you can recover database password, user-level security records (to recreate lost mdw), edit database properties and access rights, remove VBA protection and more. It shows database structure, objects properties, VBA source code, Table content, etc. Recovers deleted tables, records (rows) and columns.
  • In this game you have wield a sharp sword with fast strokes to cut juicy orange pulp pumpkins! Of course, the magical pumpkins are not so easy to dice up. They are Halloween pumpkins after all. Someone who is invisible is juggling pumpkins on your monitor. Be attentive and show everyone what you can do!
  • Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, individual drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.
  • Protector Plus 2015 (32-Bit) for Windows Desktop supports Windows 7, Windows XP, Vista, 2000, Me and 98, 95 platforms. This product provides 100% protection against viruses, trojans, worms, backdoors, spyware, adware, exploits, password stealers, hack tools, rootkits and other malware. Protector Plus 2015 (32-Bit) is packed with many useful features like email scanning, InstaUpdate, Submit Sample, Heuristic scanning, memory scanning, de-activation of viruses in memory, quarantine, user defined scan tasks, compressed files scanning and many more. The email scan feature scans all the emails received before they enter the Inbox and ensures that all the emails and attachments are virus free. On detecting an infected email the virus will be removed. The real-time scan feature will scan all the files accessed and automatically removes any virus found. The InstaUpdate feature of Protector Plus 2015 (32-Bit) will automatically download the virus database updates from the developer's web site free of cost. Su ...
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • SpyPal secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Image downloader and web picture finder in one product. Automatically download all images, music, videos from any website and view them in the built-in image viewer. Or search the web for pictures using keywords in different search modes: only thumbnails, only full-size images, both of them. Plus built-in database with thousands of websites addresses sorted by category.
  • Aml Pages is tree-structured notes manager. It contains all your notes, information, web pages, passwords, URL-address in the form of a tree, so you can quickly find what you need. The Aml Pages can easily save web pages from the Internet and provides a sticky for quick notes. Manage megatons of your notes with ease at work and at home. Supports plain text, rich text and web pages, tables and figures, attachments, and many plug-ins.
  • Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer u
  • 1Click & Lock up is a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from the system tray, log access attempts, and apply a custom background image. When enabled, Secu
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email or ftp. Starts monitoring with system startup. Runs silently and invisibly.
  • Aml Pages is tree-structured notes manager. It contains all your notes, information, web pages, passwords, URL-address in the form of a tree, so you can quickly find what you need. The Aml Pages can easily save web pages from the Internet and provides a sticky for quick notes. Manage megatons of your notes with ease at work and at home. Supports plain text, rich text and web pages, tables and figures, attachments, and many plug-ins.
  • USB Secure can password protect any portable media including USB drives, External drives and even memory cards. It supports plug and play and automatic execution. No administrator rights or install is required on the other computer. You can take your USB drive anywhere without a fear of data leak or theft in case of a stolen or lost USB drive. USB Secure is a great program for people keeping private data on portable devices when travelling.
  • Aml Pages is tree-structured notes manager. It contains all your notes, information, web pages, passwords, URL-address in the form of a tree, so you can quickly find what you need. The Aml Pages can easily save web pages from the Internet and provides a sticky for quick notes. Manage megatons of your notes with ease at work and at home. Supports plain text, rich text and web pages, tables and figures, attachments, and many plug-ins.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Boy in the Forest is an interesting platformer about a boy who got lost in the woods and is now trying to find his way home. The forest is full of monsters, including poisonous slugs and ghosts. Fortunately, our hero finds a sword that will help him defeat all monsters and go home. In the end he will encounter the boss. Will the boy beat him and go home? Play the game and find out!
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Pro-PDF PDF Merger Splitter software is a PDF editing tool that can merge multiple PDF files or split one PDF into multiple. You can add PDF files or add complete folder containing PDF files to the software and process them as per the requirements. It supports password protected files, you can provide a password for multiple files or add password to each file. The default page range can be set in preferences as well as can be set for each file. The interface of the software is very easy to use. It is divided into three steps. The first stap is for adding the file into the application, now the second step is for the page range selection for example you want to use all pages of file or just a selected range like 1-4,6,11-15. The third step is to select the destination file or folder location for the output files. Now you just click on Merge or Split button and the files will be stored in the output location. There is a preference option in the software to store the default preference. Here you can specify ...
  • Organize thousands of Web Sites by Categories, Priorities, Search Words, and Users in a Secure Database. Collect Web Sites while browsing the internet, while simultaneously using any number of Browser Windows. Add the results of an internet search or the accessible links on a web page to the organizer database. You can view all your collected web sites by category, priority, web site name, and any of three search key words. Select a web site on the table and automatically go to that web site. You can create any number of Web Site Lists, and quickly browse the internet using your list with the click of your mouse. You can send and receive messages with web site list attachments or Zip File attachments by email. Internet Explorer Favorites can be selectively imported to the Net Viewer database showing the list of Internet Explorer Favorites. Any Web Site Page address can be exported back to Internet Explorer Favorites. You can save Web Sites with passwords in a separate table and associate with another Web Site ...
  • Organize thousands of Web Sites by Categories, Priorities, Search Words, and Users in a Secure Database. Collect Web Sites while browsing the internet, while simultaneously using any number of Browser Windows. Add the results of an internet search or the accessible links on a web page to the organizer database. You can view all your collected web sites by category, priority, web site name, and any of three search key words. Select a web site on the table and automatically go to that web site. You can create any number of Web Site Lists, and quickly browse the internet using your list with the click of your mouse. You can send and receive messages with web site list attachments or Zip File attachments by email. Internet Explorer Favorites can be selectively imported to the Net Viewer database showing the list of Internet Explorer Favorites. Any Web Site Page address can be exported back to Internet Explorer Favorites. You can save Web Sites with passwords in a separate table and associate with another Web Site ...
  • File Viewer is an multi purpose Disk/File Management Program with functions for finding, viewing, printing, emailing, and organizing Pictures, Images, Text, Documents, Database, and Spread Sheet Files. Multimedia Files, including MP3, AVI, MPG, MP4, FLV, MOV, WMF, WMA, MID, RMI, and WAV, are easily located, played and Organized using File Viewer. Separate Play Lists are available for Music and Video Files. Picture editing as Flip, Rotate, Resize, Crop, Brightness, Color, and Hue. Apply editing to entire picture or region of picture. Organize Files over a local area network in database by type and search word with descriptions and comments for each File. Find and Unzip Zip files. Package files in Zip file to send by E-Mail over the internet. Great File Utilites include copy, delete, rename, move. Files can be managed individually or many files selected for batch disk management. Batch Copy Files to RW CD Rom, Zip, or another computer on the network. View and Print Database files by index. View Pictures and mul ...
  • File Viewer is an multi purpose Disk/File Management Program with functions for finding, viewing, printing, emailing, and organizing Pictures, Images, Text, Documents, Database, and Spread Sheet Files. Multimedia Files, including MP3, AVI, MPG, MP4, FLV, MOV, WMF, WMA, MID, RMI, and WAV, are easily located, played and Organized using File Viewer. Separate Play Lists are available for Music and Video Files. Picture editing as Flip, Rotate, Resize, Crop, Brightness, Color, and Hue. Apply editing to entire picture or region of picture. Organize Files over a local area network in database by type and search word with descriptions and comments for each File. Find and Unzip Zip files. Package files in Zip file to send by E-Mail over the internet. Great File Utilites include copy, delete, rename, move. Files can be managed individually or many files selected for batch disk management. View and Print Database files by index. View Pictures and multimedia files on the internet. Organize your entire disk by catagories s ...
  • Remote Logger is a professional remotely deployable keylogger, the best solution for monitoring your whole network. Remote Logger runs silently at the lowest level of Windows to prevent the monitored users from removing the software. Remote Logger intercepts all user names and passwords, in complete stealth mode! Remote Logger records all computer activities including keystrokes, internet history, chat convos etc. See more: www.remotelogger.com

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware