Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Power Spy (Supports x64/x86) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches, microphone and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.
  • Batch & Print Enterprise is for batch printing documents from a retainable list which can be automatically printed in document sequence of your choice, All associated shell printable documents are supported, e.g. PDF, MS Word, HTML, Text Files, Image formats, Excel Spreadsheets, PowerPoint Presentations and many more. The Enterprise version features multi core, multi-threaded processing and multi-threaded printing for printing large scale.
  • Gain full access to information stored in FileVault 2 containers, iOS, Apple iCloud, Windows Phone and BlackBerry 10 devices! Download device backups and synced data from Apple iCloud, Microsoft OneDrive and BlackBerry 10 servers. Use Apple ID and password or extract binary authentication tokens from computers, hard drives and disk images to download iCloud data without a password. Decrypt iOS backups with GPU-accelerated password recovery.
  • Cloud secure allows you to password protect cloud folders on your PC. It works with Google Drive, One Drive, Dropbox and Box. It keeps your cloud files and folders synced, backed up and password-protected. Cloud secure is a comprehensive solution for users who don't want others tampering with their important files and folders saved in their cloud accounts.
  • The VBScript editor and debugger that lets you add VBScript macros to your C++, C#, VB.Net or Delphi application. Features include Syntax coloring, Built-in debugger, Auto-capitalize and Auto-completion features (list object members, display parameters info, complete words), Dynamic help (If you press F1, help is provided for the word under the cursor), Code snippets, Object browser. Visit embedded.vbsedit.com
  • Elcomsoft Phone Viewer is a fast, lightweight forensic viewer for quickly accessing information extracted from mobile backups. Supporting a variety of platforms and data formats, the tool can display information extracted from local and cloud iOS, Windows Phone and BlackBerry 10 backups. Password-protected iTunes backups can be automatically decrypted and analyzed without using third-party tools.
  • Outlook, Live Mail, Outlook Express Bayesian spam filter. Allow or block email addresses, IP's, words/phrases you choose. Block spam by country and language. Bounce spam back to spammers. Report spammers. Auto delete spam. Forward only good emails to your phone. Send challenge emails to unfamiliar emailers. Stats. Convert the toolbar into English, Spanish, French, Italian, German, Russian. Customizable.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Do you think that "betrayal"is just a big word? Do you think if you're the best, you will always stay on top? Do you really think if you know the secrets and you alone, then you will be left alone? If only.. I took part in the raid to seize nukes ... and was betrayed. Now I'm somewhere in the catacombs, lost in the desert with next to no visibility. But ... perhaps, you can get out of this jam? - A mysterious shooter with puzzle elements and ...
  • End of the world, or a new beginning? In the middle of the 21st century, a series of catastrophic events led to the death of civilization. It all started with a natural anomaly. The sky over the entire was enveloped by fiery red clouds that burst into flames. And then it was black. The sunlight faded, unable to break through the thick haze that followed. "The eternal night" enveloped the world.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Super Keylogger is a professional yet very easy to use invisible keylogger for big and small companies, network administrators, concerned parents and PC owners. Super Keylogger includes several integrated recording modules that monitor: chat convos, e-mails, Internet history, keystrokes recorder, passwords! For more details: www.superkeylogger.com
  • Audit and recovery of PostgreSQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Do you like fruit salads? So does the hero of this game, and so today you will whip one up. But the method of cutting it is somewhat different from what we are used to. Instead of a knife, the hero of this game uses a sharp sword, and instead of cutting on a board, throws fruit in the air. Your task is to help him cut up all the fruit into small pieces. But please, be careful and beware of bombs which can break the sword. Good luck!
  • Audit and recovery of MySQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Batch & Print Pro is for batching documents as retainable lists which can be automatically printed in document sequence of your choice, All associated shell printable documents are supported, e.g. PDF, MS Word, HTML, Text Files, Image formats, Excel Spreadsheets, PowerPoint Presentations and many more. Batch & Print Pro software monitors the spool queue of your chosen printer for seamless sequence printing to your desired choice.
  • Audit and recovery of Oracle Database passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.
  • The most important thing to deal with an old iPhone is to erase the signs of use. You should just delete your contacts, text messages, password or other secret information from iPhone. While those erased data can be recovered by certain tools. However, if the data are deleted by FoneEraser, they will never be back again. The only thing FoneEraser can do and will do is to clear the signs of use in your device. With this powerful software, you can remove all data from your iPhone or iPad completely and choose the erasing level as you like. Plus, you can remove contacts or passcode from your iPhone and iPad at the same time, which will save you much time. Key Features 1. Erase all kinds of data on the iOS device Not one left. Aiseesoft FoneEraser is responsible to clear your device and erase any data on it. No matter what they are, text (Text messages, Notes, Reminder, etc.), media (Music, Videos, pictures, etc.), or trails (Call history, Passcode, Apps, iCloud, etc.), it will wipe them out completely. ...
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • Use your war machine to kill zombies. Chariot is the right word to describe your car that is able to protect you from zombies and other monsters. Fight your way through the zombie apocalypse. Dodge obstacles and other objects on the road to avoid slowing down. Buy new cars and weapons to boost your fighting power.
  • Free Clipboard History Manager. The Ace Clipboard floats on top of your current work. Whenever you cut or copy, the clip appears in Ace. To paste back a clip, all you have to do is click on the one you want. The clips window only shows the first few words of each clip but when you move the mouse pointer over the window, a preview window appears showing the first several lines of a text clip or a thumbnail of a graphic clip.
  • Wordkiller is an unusual combo of a keyboard trainer with an arcade game, in which entertainment stimulates the user to learn type faster and with more accuracy. The player must defend from enemies coming from three lines by killing them with blades. To start the blade, you must type the words that are shown separately for each of the projectiles and it is ready to use. It is worth noting that the game has 10 missions with different playing tasks

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware