Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Passwords Base will keep all your passwords in a secure database, so you only have to remember one single master password. The database is encrypted using the best and most secure encryption algorithms. A clickless and intuitive interface makes it easy to manage your passwords.
  • Rank Tracker is an unrivaled SEO tool that uses 17 different keyword research methods to suggest a bewildering choice of keywords, monitors your site rankings in 300+ international as well as regional search engines, and allows you to easily compare your rankings to those of your competitors at any time. With easy to read, customizable rankings reports and adjustable workspace filters, Rank Tracker is the tool you were looking for!
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • The ZOLA Remote Software Uninstall is a product that can create a software uninstall packages based on a search criteria match from your specific keywords. The program will search the entire file and registry system to collect matched search results into a package that can be used to uninstall/remove softwares remotely from your network hosts in a silent operation and without any end user interaction.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Free Clipboard History Manager. The Ace Clipboard floats on top of your current work. Whenever you cut or copy, the clip appears in Ace. To paste back a clip, all you have to do is click on the one you want. The clips window only shows the first few words of each clip but when you move the mouse pointer over the window, a preview window appears showing the first several lines of a text clip or a thumbnail of a graphic clip.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • SpyPal Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • A to Z Clipboard is a free utility which allows you to copy up to 25 times before pasting. (Unlike the Windows clipboard which only allows you to copy once.) The small clipboard window floats above your work and you can see the first few words of each clip to remind you what they are. When you put the mouse over a clip, you see more of it in an optional pop up preview window.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, microphone, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a spy camera. Automatically sends logs to your email.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Notepad for safe storage of records. Store passwords from websites or notes without worrying about their safety. The program uses the most popular and powerful encryption algorithm AES. Securepad is lightweight and can be run from a flash drive. The program works with text files.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • PhotoMaster can manage your photos and organize them at one place by creating virtual albums. Tag photos with custom keywords to identify them easily. Smart photo importer of this software lets you import images from anywhere including photos and videos from digital camera and also supports Raw images. you can create photo calendars, collages, photo mixes and a lot more. Make slide-shows with photos and share your files easily through email.
  • English Words Teacher - is an app for beginners to learn and practice English words. It uses a British speaker.
  • AnyMP4 MTS Converter can help you convert high-definition MTS, M2TS, and TS to any video formats like MP4, AVI, WMV, FLV, MOV, M4V, MKV, and more. In addition, it can improve converting speed faster. Apart from that, it provides you some powerful editing functions such as trimming the video length, cropping the video frame, adding watermark to the video and adjusting Video Brightness, Contrast, Saturation, Hue and Volume. Meanwhile, you can merge several video together, and rename its name. After updating, it is compatible with windows 10. Key functions: 1. Convert MTS /M2TS/TS to almost all video formats AnyMP4 MTS Converter allows you to convert high-definition MTS, M2TS and TS to any video formats like MP4, AVI, WMV, FLV, MOV, M4V, MKV, and more. Hence, you can enjoy your loved video on your iPhoneSE, iPhone 6s/6s Plus, iPhone 6/6 Plus, iPad pro, iPad mini 4, Samsung Galaxy Note 5, Nexus one, Apple TV, Galaxy Tab and other portable devices. 2. Owning multiple editing functions This MTS Video ...
  • This bulk domain checker will find the expiration date, registration date, availability and status codes for any domain names you can think of. You can use Google search engine to find domain names using keywords. This bulk domain bame checker will extract the top level domains from the search pages. By using the misspelled domains function you will be able to create dozens of new variations of one single domain name by the click of a mouse.
  • Power Spy (Supports x64/x86) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches, microphone and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.
  • Aml Pages is tree-structured notes manager. It contains all your notes, information, web pages, passwords, URL-address in the form of a tree, so you can quickly find what you need. The Aml Pages can easily save web pages from the Internet and provides a sticky for quick notes. Manage megatons of your notes with ease at work and at home. Supports plain text, rich text and web pages, tables and figures, attachments, and many plug-ins.
  • Aml Pages is notes manager for Windows. It contains all your notes, information, web pages, passwords, URL-address in the form of a tree, so you can quickly find what you need. The Aml Pages can easily save web pages (or fragments) from the Internet and provides a sticky for quick notes. Manage megatons of your notes with ease at work and at home. Supports plain text, rich text and web pages, tables and figures, attachments and plugins.
  • Aml Pages is tree-structured notes manager. It contains all your notes, information, web pages, passwords, URL-address in the form of a tree, so you can quickly find what you need. The Aml Pages can easily save web pages from the Internet and provides a sticky for quick notes. Manage megatons of your notes with ease at work and at home. Supports plain text, rich text and web pages, tables and figures, attachments, and many plug-ins.
  • Would you like to do more with your SEO software? Try WebSite Auditor a double-value on-page SEO tool that not only helps you get 100% search engine-friendly website structure, but ALSO fine-tune your content for your target keywords. Get in-software SEO suggestions based on the tactics used by your top-ranking competitors. Why pay more if you get the same value for less? Try WebSite Auditor for Free today, click Download.
  • Custom Sword is a free utility that allows you to create many different and beautiful virtual swords. Fine tune each element of the sword to make it unique.
  • Bitcoin Find & Recover is a crypto currency recovery tool that helps the user restore access to their funds. Supports desktop and mobile wallets. Automatizes searching for wallets on the disk, both deleted and existing and guides the user in the recovery process. Allows the user to create a password list from whatever fragments he or she remembers, to try to regain access with a lost password. The recovered passwords are saved encrypted.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware