Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Advertising
Display: short descriptions | full descriptions
  • Verify thousands of email addresses with a single line of code. The .NET Email Validation Library checks syntax, performs MxRecord lookups, and validates mailboxes. Validate asynchronously over multiple processors. The library detects curse words, checks domain typos, checks top level domains and detects fake email patterns. Also detects grey listing and blocking by anti-spam software. Download a free trial today.
  • ApPHP DataValidator is a simple lightweight tool useful for primary general data checks. It handles numbers, strings, emails, URLs. A range of parameters is provided for a wide variety of different verifications. All parameters are used optionally and could be switched on and off for every specific value. The DataValidator component accepts an array or an object as data container.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Computer Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • System Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to a specified email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Barcodes are machine-readable symbols that represent data that allows businesses worldwide to track and inventory products.Programmers ensure that barcodes are error-free before they are stamped or printed on products. By checking your barcodes, you'll avoid printing errors, saving time and money. A Barcodes is simply gadget for barcodes checking.
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Perfect Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Whenever you face any data loss situation from Mac volumes then do not get panic instead download and install SFWare Partition Recovery Mac software in your Mac system. This recovery tool has the ability to recover data from deleted, lost or formatted data. It is developed with high technology algorithm which will easily restore data without any modification. No matter how severe is your data loss situation, this tool has the ability to sort all issues associated with data stored in Mac volumes. This tool has many inbuilt features that makes very unique tool as compared to others. It can recover data that was emptied from trash without any difficulties. Data can also be found from missing or deleted volumes. This tool has the ability to identify around 300 types of files and recovers it on the basis of its unique signature. It has the capability to recover files from hard drives, memory cards, USB drives and many more. You can also add or edit new signature of files that are not listed. Why SFWare Partitio ...
  • Invisible Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • If you are finding it difficult to check the time in the taskbar, you can use a sidebar gadget such as Talking Clock. The Talking Clock is a unique Windows sidebar gadget that does as it says. It has the ability to tell you what time it is in a loud and clear voice. When you have installed it, it will display a digital clock on the side as well as the date for convenience.
  • The MD5 message-digest algorithm is a widely used cryptography hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptography applications, and is also commonly used to verify data integrity.SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal
  • SFWare Deleted File Recovery Mac software is a hassle free recovery tool that can easily and swiftly get back all deleted files. This software is specially designed to solve problems related to Mac Operating system. It can effortlessly restore deleted or lost files within 3-4 easy steps. It can easily restore files that emptied from Trash. This utility is designed in such a way that it can locate and retrieve deleted files from missing volumes of Mac OS. Apart from this it can also get back files from formatted volumes within few minutes. It is very easy to use so that user of all levels can execute it without any hurdles. SFWare Deleted File Recovery Mac utility works on read only mode thus it recovers file without any damage to actual content and that to with its original name. It supports recovery of files from HFS+, HFSX, FAT16 and FAT32 volumes/partitions. This recovery tool has the ability to rescue files on basis of its unique signature. It can recover deleted and lost files from internal and external ...
  • Have you got any doubts or concerns about productivity of your employees? Do you need to check on productivity of certain people in your company? Are you looking for a way of exposing exports of confidential data and information from your web?
  • Secure Hunter Error Code is a small windows GUI tool that can convert error numbers into a readable text message. The current version can convert error code numbers from the following software. 1. Window Error Code. 2. HTTP/HTML Error Code. 3. Event Log Error Code. 4. Linux(errno) Error Code. 5. Win Sock Error Code. 6. Secure Log Error Code. 7. Oracle Database Error Code. 8. MySQL Database Error Code. 9. MSSQL Database Error Code. 10. DB2 Database Error Code. Please Note: The error massage text may be change between software versions. How To Use: 1. Start SecureHunterErrorCode.exe 2. If you get a User Account Control (UAC) allow it to run - Press on Yes. 3. Enter the Error Code number you want to check/convert to string. 4. Select the error type (windows, HTML, MSSQL etc). 5. Press the Get button to see the error code message translation. 6. If needed you can copy the error message from the Error Message box.
  • All-In-One Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Download free MSG to MBOX Converter software and convert database from MS Outlook MSG file format. Free version is available for exporting or migrating 10 emails from MSG format to MBOX file extension. With the help of this tool you can easily check features and functions of MG to MBOX converter software and migrate emails.
  • Aobo Keylogger for Mac Standard, the invisible keylogger for Mac OS X with multiple-user support, has the ability to monitor all the activities on the targeted Mac, including keystrokes typed, IM chatting conversations entered, comments posted on social media, websites visited and so on. Aobo Keylogger for Mac Standard secretly sends log reports to your Email box in interval for remote log viewing. Timely uploading logs to FTP space are also available in Aobo Keylogger for Mac Standard. Below are the features of Aobo Keylogger for Mac Standard: Stealth monitoring- All the monitoring behaviors are undergo silently and secretly IM message monitoring - All the chat conversations on Skype/MSN/AIM/Adium/iChat are recorded Social networking monitoring - It logs all the posts and comments composed on the Mac and sent to social networks like Facebook/Twitter Websites monitoring - Aobo Keylogger for Mac keeps track of every URL of websites visited in Safari, Firefox and Chrome Screenshots capturing - It ...
  • From Akick PC Optimizer: To stop your PC from experiencing regular crashes, freeze, and blue death screen, you need to free up your system's hard drive. Akick Optimizer is what you need for this process that allows your PC more flexibility in performing and carrying out all complicated tasks with ease. What Akick does remove all unwanted files that may be taking space on your computer's hard drive. These are mostly for useless files that you may never need at all. It also helps to organize and to rid your PC of all unnecessary files causing your PC to run too slower than a normal. All these include invalid window registry entries, shortcuts, internet stored history items, your download history, temporary files, recycle bin files and more. Smart scan report-After a whole PC check, the automatic scan software shows you each and every critical issue found and grouped into particular categories. Using the depth analysis, it also generates a quick report for all detected issues that may be some p ...
  • ApPHP Hotel Site is a powerful hotel management and on-line reservation site script. This script is the fully functional PHP solution to manage small to medium size of hotels, holiday flats or guesthouse. Visitors of Hotel site will be able to search rooms availability with an online booking reservation system. They also could view rooms inventory, check availability, and book reservations in a real-time.
  • Fast & Easy measure distances and areas on the ground on earth. Map Measurement uses lines and shapes to check one or several distances and estimate sizes of different features on Earth. With Map Measurement, you can measure the length on the ground with a line or path, you can also measure areas using polygons. You can measure several different measurements on one map.
  • Checkmate your rivals by wisely placing your pieces throughout the chessboard to siege your opponent's king. Meanwhile, don't forget to be on your guard for your own positions. Play SkillGamesBoard Chess online with friends!
  • Recoveryfix provides one solution for all OST corruption issues ? Recoveryfix for OST to PST software. It?s programmed specifically to deal with all kinds of OST corruption issues effectively. It recovers emails, drafts, contacts and other mailbox items from corrupt OST files and makes them accessible in MS Outlook by converting them to PST format. The smartly programmed tool is capable of recovering severely corrupted, highly encrypted and password-protected OST files. Interestingly, it can recover multiple OST files simultaneously without making any data loss. The advanced tool operates in dual recovery mode ? Standard mode and Advanced mode. The first mode deals with minor OST corruptions and delivers very quick results. However, Advanced mode takes its time and deals effectively with severely corrupt OST files. The OST recovery software displays recovered OST files for preview so that you can check their content for accuracy purpose. Apart from PST, the tool provides option to convert recovered OST fi ...
Advertising

Page 6 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware