Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • The MD5 message-digest algorithm is a widely used cryptography hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptography applications, and is also commonly used to verify data integrity.SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal
  • SFWare Deleted File Recovery Mac software is a hassle free recovery tool that can easily and swiftly get back all deleted files. This software is specially designed to solve problems related to Mac Operating system. It can effortlessly restore deleted or lost files within 3-4 easy steps. It can easily restore files that emptied from Trash. This utility is designed in such a way that it can locate and retrieve deleted files from missing volumes of Mac OS. Apart from this it can also get back files from formatted volumes within few minutes. It is very easy to use so that user of all levels can execute it without any hurdles. SFWare Deleted File Recovery Mac utility works on read only mode thus it recovers file without any damage to actual content and that to with its original name. It supports recovery of files from HFS+, HFSX, FAT16 and FAT32 volumes/partitions. This recovery tool has the ability to rescue files on basis of its unique signature. It can recover deleted and lost files from internal and external ...
  • Have you got any doubts or concerns about productivity of your employees? Do you need to check on productivity of certain people in your company? Are you looking for a way of exposing exports of confidential data and information from your web?
  • Secure Hunter Error Code is a small windows GUI tool that can convert error numbers into a readable text message. The current version can convert error code numbers from the following software. 1. Window Error Code. 2. HTTP/HTML Error Code. 3. Event Log Error Code. 4. Linux(errno) Error Code. 5. Win Sock Error Code. 6. Secure Log Error Code. 7. Oracle Database Error Code. 8. MySQL Database Error Code. 9. MSSQL Database Error Code. 10. DB2 Database Error Code. Please Note: The error massage text may be change between software versions. How To Use: 1. Start SecureHunterErrorCode.exe 2. If you get a User Account Control (UAC) allow it to run - Press on Yes. 3. Enter the Error Code number you want to check/convert to string. 4. Select the error type (windows, HTML, MSSQL etc). 5. Press the Get button to see the error code message translation. 6. If needed you can copy the error message from the Error Message box.
  • All-In-One Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Download free MSG to MBOX Converter software and convert database from MS Outlook MSG file format. Free version is available for exporting or migrating 10 emails from MSG format to MBOX file extension. With the help of this tool you can easily check features and functions of MG to MBOX converter software and migrate emails.
  • Aobo Keylogger for Mac Standard, the invisible keylogger for Mac OS X with multiple-user support, has the ability to monitor all the activities on the targeted Mac, including keystrokes typed, IM chatting conversations entered, comments posted on social media, websites visited and so on. Aobo Keylogger for Mac Standard secretly sends log reports to your Email box in interval for remote log viewing. Timely uploading logs to FTP space are also available in Aobo Keylogger for Mac Standard. Below are the features of Aobo Keylogger for Mac Standard: Stealth monitoring- All the monitoring behaviors are undergo silently and secretly IM message monitoring - All the chat conversations on Skype/MSN/AIM/Adium/iChat are recorded Social networking monitoring - It logs all the posts and comments composed on the Mac and sent to social networks like Facebook/Twitter Websites monitoring - Aobo Keylogger for Mac keeps track of every URL of websites visited in Safari, Firefox and Chrome Screenshots capturing - It ...
  • From Akick PC Optimizer: To stop your PC from experiencing regular crashes, freeze, and blue death screen, you need to free up your system's hard drive. Akick Optimizer is what you need for this process that allows your PC more flexibility in performing and carrying out all complicated tasks with ease. What Akick does remove all unwanted files that may be taking space on your computer's hard drive. These are mostly for useless files that you may never need at all. It also helps to organize and to rid your PC of all unnecessary files causing your PC to run too slower than a normal. All these include invalid window registry entries, shortcuts, internet stored history items, your download history, temporary files, recycle bin files and more. Smart scan report-After a whole PC check, the automatic scan software shows you each and every critical issue found and grouped into particular categories. Using the depth analysis, it also generates a quick report for all detected issues that may be some p ...
  • ApPHP Hotel Site is a powerful hotel management and on-line reservation site script. This script is the fully functional PHP solution to manage small to medium size of hotels, holiday flats or guesthouse. Visitors of Hotel site will be able to search rooms availability with an online booking reservation system. They also could view rooms inventory, check availability, and book reservations in a real-time.
  • Fast & Easy measure distances and areas on the ground on earth. Map Measurement uses lines and shapes to check one or several distances and estimate sizes of different features on Earth. With Map Measurement, you can measure the length on the ground with a line or path, you can also measure areas using polygons. You can measure several different measurements on one map.
  • Checkmate your rivals by wisely placing your pieces throughout the chessboard to siege your opponent's king. Meanwhile, don't forget to be on your guard for your own positions. Play SkillGamesBoard Chess online with friends!
  • Recoveryfix provides one solution for all OST corruption issues ? Recoveryfix for OST to PST software. It?s programmed specifically to deal with all kinds of OST corruption issues effectively. It recovers emails, drafts, contacts and other mailbox items from corrupt OST files and makes them accessible in MS Outlook by converting them to PST format. The smartly programmed tool is capable of recovering severely corrupted, highly encrypted and password-protected OST files. Interestingly, it can recover multiple OST files simultaneously without making any data loss. The advanced tool operates in dual recovery mode ? Standard mode and Advanced mode. The first mode deals with minor OST corruptions and delivers very quick results. However, Advanced mode takes its time and deals effectively with severely corrupt OST files. The OST recovery software displays recovered OST files for preview so that you can check their content for accuracy purpose. Apart from PST, the tool provides option to convert recovered OST fi ...
  • From AKick Antivirus Total Security: Cybercrime has to skyrocket. Every day millions of PC users suffer due to hijacking and fraudulent online habits such as shopping and banking. Even your works may not complete without using the internet with surefire protection. However, online criminals easily swindle money from bank account; even they often misusing your credit card, finally they may crash down of your brand new system without any warnings. Introducing Akick antivirus total security for complete protection against viruses. Features: Comprehensive device control: Set write/read/execute easy access to external devices. Prevents malicious autorun: While using computer even lot of malicious features secretly comes in your computer, installed without your little information or permission, it is capable of blocking all of them effectively. Vulnerability Scanner: It detects and quickly informs the computer user for vulnerable applications that can be exploited to infect their PC. Email Security: This software w ...
  • Arclab Website Link Analyzer is a software website crawler to analyze and optimize your website. It spiders your whole website checking for broken links, duplicate content, missing tags and other SEO issues.
  • Duplicate file finder and remover. Duplicate Checker is a powerful tool for finding duplicate images, photos, mp3 and any other file types. Using this utility you can organize files on your hard disk. Main features: 1) search files with the same name, same size, same content (based on CRC32 algorithm); 2) image preview and thumbnails bar, mp3 bar; 3) many operations on list of found files: delete, move, copy; 4) export to CSV file
  • PST Password removal software developed for removing and resetting MS Outlook PST Passwords. Free version is available for checking features, UI and functions. Through using this advanced Outlook Password removal for PST software you can remove and reset MS Outlook PST passwords instantly.
  • CHAX: Check by Phone / Fax software to accept check payments over the phone, fax, or e-mail. Enter your customers check information into the software, print the checks, and deposit for the most cost efficient funds transfer system. Receive payments from your customers instantly, without additional fees! Avoid credit card transactions, overnight delivery fees, or ACH transaction fees. Print on checks for deposit with no additional fees ever.
  • Checklists package contains the following templates to download: Business Management Checklists Project Management Checklists Employee Management Checklists Customer Management Checklists Company Activity Checklists Office Management Checklists Document Management Checklists Crisis Survival Checklists Self-management Checklists Education Checklists Household Checklists Family Checklists Holidays Checklists Event Checklists Disaster Checklist
  • Check out our new aspheric indie game Arkadia, where you need to keep the fly on the sphere collecting small bundles of energy. Along the way you'll confront many challenges, but you can always get away from the impact if you can figure out how. Test your reflexes, attention and patience!
  • These can significantly improve one's overall experience with the site, for example by adding different emoticons, or allowing video downloads from any messages posted. If users are not interested in such tasks, the plugins can be deactivated with a simple 'uncheck action'. Another novel feature is customize the display, by employing themes. they do allow users to surf content in a more stylish environment.
  • For Companies with own applications: Technical Dictionaries, Thesauruses and Verb Conjugations for English French, Spanish, German, Portuguese, Brazilian, Italian, Swedish and Dutch. Databases in Excel, MS- ACCESS or SQL format. Integrate it into your application, website, search engine. For Universities, translation agencies (create a basis for your own Translation Memories -TM) , companies with own applications, scientific departments
  • For Companies with own applications: Technical Dictionaries, Thesauruses and Verb Conjugations for English French, Spanish, German, Portuguese, Brazilian, Italian, Swedish and Dutch. Databases in Excel, MS- ACCESS or SQL format. Integrate it into your application, website, search engine. For Universities, translation agencies (create a basis for your own Translation Memories -TM) , companies with own applications, scientific departments
  • For Companies with own applications: Technical Dictionaries, Thesauruses and Verb Conjugations for English French, Spanish, German, Portuguese, Brazilian, Italian, Swedish and Dutch. Databases in Excel, MS- ACCESS or SQL format. Integrate it into your application, website, search engine. For Universities, translation agencies (create a basis for your own Translation Memories -TM) , companies with own applications, scientific departments
  • For Companies with own applications: Technical Dictionaries, Thesauruses and Verb Conjugations for English French, Spanish, German, Portuguese, Brazilian, Italian, Swedish and Dutch. Databases in Excel, MS- ACCESS or SQL format. Integrate it into your application, website, search engine. For Universities, translation agencies (create a basis for your own Translation Memories -TM) , companies with own applications, scientific departments
  • For Companies with own applications: Technical Dictionaries, Thesauruses and Verb Conjugations for English French, Spanish, German, Portuguese, Brazilian, Italian, Swedish and Dutch. Databases in Excel, MS- ACCESS or SQL format. Integrate it into your application, website, search engine. For Universities, translation agencies (create a basis for your own Translation Memories -TM) , companies with own applications, scientific departments

Page 6 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware