Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Advertising
Display: short descriptions | full descriptions
  • Automatically blocks IP addresses with hacking attempts on your windows server services (rdp, FTP, SQL-Server) using the Windows firewall. The software runs as a Windows background service and monitors RDP, FTP und SQL-Server events for failed logins. If a configurable number of failed login events is detected from the same IP address BotFence dynamically lists that IP address im the Windows firewall as blocked.
  • Audio sample detector for retransmit broadcasters. Allows to detect sample presence in incoming audio signal and send command to start your playlist. Detects Wave samples and DTMF codes. Works with RADIO Player Pro and can be used as a separate module for third party software.
  • The .NET Logging Library is a fast, simple to use logging framework for .NET 2.0 or higher. The .NET Logging Library automatically detects your project type an enables default logging targets. You can change the configuration on the fly with runtime properties or by modifying an external configuration file. Other features include multiple logging targets, custom logging target, and automatic table setup for database targets.
  • Verify thousands of email addresses with a single line of code. The .NET Email Validation Library checks syntax, performs MxRecord lookups, and validates mailboxes. Validate asynchronously over multiple processors. The library detects curse words, checks domain typos, checks top level domains and detects fake email patterns. Also detects grey listing and blocking by anti-spam software. Download a free trial today.
  • Comodo Cloud antivirus is a free antivirus security solution for Windows that uses a powerful combination of real-time threat monitoring, auto-sandboxing and behavior analysis to immediately protect your computer from all known and unknown malware. Whether you are an IT novice or an experienced user, Comodo Cloud Antivirus makes it easy to implement the highest strength protection.
  • PDF to Excel Converter can quickly and accurately convert native PDF files to Microsoft Excel Spreadsheet (.xlsx), CSV and TXT. Do you still spend lots of time retyping or extracting data from PDF files? With PDF to Excel Converter, not any more! It is designed for converting PDF back to the original Excel file so you can perform calculator, formula or organize the data easier. * Smart ways to convert PDF to Excel In order to convert all types of PDF file accurately, there are two ways for table recognition and conversion. (1) Base on table borders (2) Base on data structure * Auto table detection For most of the table data with full or partial border lines, PDF to Excel Converter can detect table automatically, so all you need to do is add PDF file, click Convert button, and select the output folder to store the output excel file. * Let you mark table manually If auto detection is not correct, you can still mark table areas by yourself. Just simply drag an area in the built-in PDF Reade ...
  • CandleScanner is a technical analysis software package created for investors interested in Japanese candle patterns. What makes this application exceptional is that it has been specifically designed for the detection of Japanese candle patterns. It is suitable for both seasoned traders and complete beginners.
  • Free Porn Blocker - a reliable program to protect children from pornographic content on the Internet. Free Porn Blocker - a very simple and intuitive software with no superfluous functions. The one and only feature that makes the Free Porn Blocker is to scan internet traffic in order to detect and protect against pornography content. Once the Free Porn Blocker detects that the user intends to visit a porn site, the program blocks the browser tab.
  • Spytector is the ultimate invisible and undetectable keylogger (keystroke logger) that completely meets your PC monitoring and surveillance requirements. Spytector keylogger is running in total stealth, undetectable even for advanced users, perfect for monitoring the way your PC is used. Spytector is tracking all the activities of PC users (visited websites, all the keystrokes, both sides of chat conversations, opened windows etc.) and delivers the logs to you via Email or/and FTP. In the delivered logs are also included the local stored passwords (for FireFox, Opera, Google Chrome, Internet Explorer, Safari, Outlook, Google Talk, Windows Live Messenger etc.) and URL history (visited websites). Spytector is completely invisible on the user's desktop and cannot be seen in the task manager, it's injected into system processes on the startup and the logs are hiddenly sent through the default browser or email client (to bypass the firewalls). The keylogger is using advanced hooking and steal ...
  • Advanced Port Scanner is een snelle, gratis poortscanner waarmee u snel open poorten (TCP en UDP) op netwerkcomputers vindt en versies van programmas achterhaalt op de gedetecteerde poorten. Het programma biedt eenvoudige toegang tot netwerkbronnen, zoals gedeelde mappen, HTTP, HTTPS, FTP, RDP en Radmin. U kunt op afstand computers activeren en afsluiten. Ook kunt u snelle opdrachten uitvoeren (ping, tracert, telnet en SSH) op een bepaalde pc.
  • Malware Removal Tool is one of the most authentic, powerful and adapted with easy to use features that protects PC from any threats. it has been designed with latest and comprehensive techniques that makes it possible to detect any threats that often remains deep seated and hidden with the background. Thus it makes it easier for even newbies in scanning their PC using Malware Removal Software. it gives complete protection against all threats including adware, malware as well as spyware. Some of its best features like System Guard, Advanced Scan, Custom Scan suits need of the hour. Free scanner of the software can be used for scanning the PC and detecting threats. However, you need to purchase trhe licensed version of the software to remove detected threats permanently from PC. Kindly visit: http://uninstalladwareinfection.com/
  • Able Spyware Scan and Destroy provides real-time anti-spyware protection against spyware, viruses, keyloggers, spyware cookies, adware, Trojan horses, spybots, browser hijackers, and phishing attacks. It actively monitor and protect the PC from uninvited software attacks.Able Spyware Scan and Destroy can detect and remove a multitude of spyware files and viruses from your computer. It prevents viruses from being installed in the first place.
  • Turn your PC into a video surveillance system that monitors your home/office from a remote location. Detect motion and trigger alerts like sounding an alarm, recording audio and video, taking photos, broadcasting video, and sending email notifications. Configure WebCam Monitor in minutes using any USB camera. Video broadcasts can be viewed from any PC. The scheduler turns monitoring on and off to fit your schedule.
  • From Akick PC Optimizer: To stop your PC from experiencing regular crashes, freeze, and blue death screen, you need to free up your system's hard drive. Akick Optimizer is what you need for this process that allows your PC more flexibility in performing and carrying out all complicated tasks with ease. What Akick does remove all unwanted files that may be taking space on your computer's hard drive. These are mostly for useless files that you may never need at all. It also helps to organize and to rid your PC of all unnecessary files causing your PC to run too slower than a normal. All these include invalid window registry entries, shortcuts, internet stored history items, your download history, temporary files, recycle bin files and more. Smart scan report-After a whole PC check, the automatic scan software shows you each and every critical issue found and grouped into particular categories. Using the depth analysis, it also generates a quick report for all detected issues that may be some p ...
  • dbForge Index Manager for SQL Server is an SSMS add-in for analyzing the status of SQL indexes and fixing issues with index fragmentation. The tool allows you to quickly collect index fragmentation statistics and detect databases that require maintenance. You can instantly rebuild and reorganize SQL indexes in visual mode or generate SQL script for the future use.
  • ByteFence Anti-malware's cutting edge software detects and removes Trojans, Worms, Spyware, Crapware and other high risk malware. ByteFence is the ultimate protection against crapware and bundleware that sneak in potentially unwanted programs and ads.
  • This lightweight and free network scanner has got a lot of powerful features. Scan network for hosts, detect their IP and MAC addresses. The program scans very fast thanks to multiple threads. The built-in tools include: - wake-on-LAN - remote PC power off and restart - retrieving SNMP information from managed switches - getting remote information from domain PCs (including Event Log and registry) This app is great for LAN administrators.
  • From AKick Antivirus Total Security: Cybercrime has to skyrocket. Every day millions of PC users suffer due to hijacking and fraudulent online habits such as shopping and banking. Even your works may not complete without using the internet with surefire protection. However, online criminals easily swindle money from bank account; even they often misusing your credit card, finally they may crash down of your brand new system without any warnings. Introducing Akick antivirus total security for complete protection against viruses. Features: Comprehensive device control: Set write/read/execute easy access to external devices. Prevents malicious autorun: While using computer even lot of malicious features secretly comes in your computer, installed without your little information or permission, it is capable of blocking all of them effectively. Vulnerability Scanner: It detects and quickly informs the computer user for vulnerable applications that can be exploited to infect their PC. Email Security: This software w ...
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • The extra utilities that come with the One System Care are worth the trouble as they will ensure that your PC has been well cleaned out and decluttered to make it work as good as new. These additional utilities aid in getting access to files and folders that are not easily accessible by everyone. However, once the software has scanned your computer, it can detect the issues and will offer to clean them out. All you have to do is approve it.
  • Comodo Internet Security is the awarding winning and completely free security solution for Windows that uses a powerful combination of antivirus, firewall, auto-sandbox, host intrusion prevention and website filtering to immediately protect your computer from all known and unknown malware. Whether you are an IT novice or an advanced user, Comodo Internet Security makes it easy to lock-out malware and implement the highest strength protection.
  • CrococryptMirror is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly.
  • Once the Zhelatin worm installs itself onto your computer, it sends spam e-mails through your e-mail account to all of your contacts. Additionally, the Zhelatin worm slows your computer, reduces your available system memory and may change your system settings. Conseuqnetly, if you notice Antivirus 8 on your computer, you should remove it immediately. This program is distributed by Internet criminals who use various Trojans and other devious methods to spread their rogue programs. When installed on your computer, Antivirus 8 will block execution of legitimate Windows programs, making its removal problematic. This bogus program encourages you to believe that it is the only program able to save your PC from spyware and malware purportedly attacking your machine. In fact, your computer is unlikely to have any infection and the security threats that Antivirus 8 'detects' are completely fake. This program's purpose is to sell you a license to remove the non-existent security issues fro ...
  • Auslogics Driver Updater is an advanced tool that detects all outdated or missing drivers on a PC running Windows, gives a detailed report showing installed driver release dates and suggested updates. All drivers are updated automatically after you click just one button. You can be sure that installed updates will be the right match for your device type and model and will help get your hardware and devices working at their best.
Advertising

Page 5 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2019 IT Shareware