Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Encryption software designed for automation. Automatically encrypt and decrypt files and folders. Encryption methods include password based, secret key, OpenPGP password, OpenPGP public and private key, Email notification of task status. Includes private,public and OpenPGP key generator and a Key Store to manage keys. Common tasks include encrypt, decrypt, copy, zip, unzip, synchronize and file monitors. Run 1000+ tasks/day.
  • SFTP client (secure FTP) designed for automation of SFTP, FTP and related tasks. Run 1000+ tasks on a schedule. Goal is to create advanced SFTP and FTP tasks that can be scheduled automatically or run instantly. Supports a very flexible wildcard system to transfer multiple files at once. Supports subdirectory transfers. Includes powerful and flexible task scheduler. Email Notification of task failure.
  • Automize - Run 1000+ tasks a day. Automation software and task scheduler for Windows. Easy to use. No programming is required. Scripting features are available. Automate multiple FTP transfers, FTP daemon and monitor, web downloads through proxy or secured websites, check or send email, success based chaining of tasks, and other tasks like synchronize, copy, zip, print, delete. Remotely control schedulers. Linux,Mac.
  • PhotoLab Calendar is a must-have schedule management tool for anyone who has a photo or video business. It supports infinite number of resources (digital services, film services) and has a well-organized navigation system. It's perfect to plan working hours, keep track of scheduled appointments and orders. It'll store the information about clients, such as their address, telephone, email and comments.
  • Power Spy for Home secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Verify thousands of email addresses with a single line of code. The .NET Email Validation Library checks syntax, performs MxRecord lookups, and validates mailboxes. Validate asynchronously over multiple processors. The library detects curse words, checks domain typos, checks top level domains and detects fake email patterns. Also detects grey listing and blocking by anti-spam software. Download a free trial today.
  • EML Converter is a 9-in-1 conversion tool that supports to convert EML files to PST, EMLX, MBOX, MSG, PDF, RTF, HTML, MBX etc. An easy to use tool, EML Converter provides simple GUI, which even a layman can effortlessly use and convert EML email data to Outlook PST, Thunderbird (MBOX), EMLX, MSG and all other file formats.
  • Auto Mail Sender Standard Edition (AMSSE) is a powerful and easy-to-use eMail sender & scheduler, you can use it to send eMails automatically at anytime and any frequency as you expect. You can set various sending schedules, such as yearly, monthly (by day number, day name or last day), weekly, daily and any other schedules you can think of. AMSSE provides all the traditional eMail elements/functions and some distinctive elements/functions.
  • ApPHP DataValidator is a simple lightweight tool useful for primary general data checks. It handles numbers, strings, emails, URLs. A range of parameters is provided for a wide variety of different verifications. All parameters are used optionally and could be switched on and off for every specific value. The DataValidator component accepts an array or an object as data container.
  • Keylogger Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • ShareWatcher will monitor your local and remote computer Windows File Shares showing who and when they were accessed, notify you of new files added or deleted by whom via email, sounds, custom commands or Windows events and optionally move your new files by adding a QuickMove Action to any monitored folder. ShareWatcher also supports FTP folder monitoring for new files.
  • Computer Monitoring Spy secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Windows Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Free Software for creating invoices. Simply use our already preformatted documents and add only the invoice recipient and invoice items. With this program you can easily create not only invoices, but also any other necessary documents, for example: offers, order confirmations, orders, letters, bills of delivery, reminders. You can save all documents and invoices in pdf-format, print and send them via email directly from the program.
  • System Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to a specified email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • PC Spy Monitor secretly monitors Facebook, chats, emails, keystrokes, passwords and sends reports to your email or ftp. It logs Skype, Yahoo Messenger and other IMs. It also takes photo shots of online video talk like a surveillance camera. PC Spy Monitor runs so stealthily that the monitored user won't even know it. You can use hotkey to unhide it and change settings. It is a must have tool for you to reveal the truth.
  • PC Spy Software logs all Facebook, PC & internet activity and emails log reports to you. PC Spy Software logs all keystrokes, chats & IMs, emails, websites visited, applications, usernames, passwords, documents opened, online searches, microphone sound and more. It takes screenshots like a spy cam. PC Spy Software runs invisibly and PC users won't know its existence. Great for monitoring employees, children, spouse and investigating crimes.
  • Digital Publishing Software - IHDP Page Flip Software Solution. Take PDF file and turn it into an online flip book fully customizable with embedded audio/video, hyperlinks, and your own company logo for emailing and your website. Be in full control of your creative process. Save on printing costs and be environmentally friendly. Capture statistics and reach a wider audience. This is the next step in online publishing.
  • Invisible Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Perfect Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Android recovery software designed for Android mobile phone and tablet, pad and SD card in Android devices, 7-Data Android Recovery effectively recovers photos, pictures, video, audio, documents, emails and other files from various Android devices. Most importantly, 7-Data Android Recovery allows you to perform a do-it-yourself Android recovery without risking giving your privacy away.
  • Offline folder files (OST) are highly useful for MS Outlook users. They allow users to access emails and other mailbox items during unavailability of internet. But, vulnerability towards corruption is a major drawback of OST files. Corrupt OST files can interrupt entire Outlook email communication. To recover them and to convert in PST file format, use a professional software like Recoveryfix for OST to PST Converter. It?s an advanced software programmed for resolving all OST corruption problems. The software operates in dual data recovery mode ? Standard mode and Advanced mode. Standard Mode ? is programmed to perform accurate recovery of corrupt OST files in a very short span of time. It ensures desired results in minimum time. Advanced Mode ? If Standard mode fails to provide desired results, users can try using Advanced mode. It?s little slower than the Standard mode but ensures accurate and complete recovery. After successful recovery of OST files, the tool provides detailed preview of all reco ...
  • DBX is the extension of outlook express recovery that will facilitate to direct data. DBX file will store numerous data of emails, mailbox etc. If user will get corrupt their DBX file and necessitate to recover it with PST and other formats, so in this condition our software can helps you. With this utility all consumers can restore their DBX file data into PST, EML, MSG, MBOX, HTML and RTF. Utility gives you hasty recovery DBX file and migration of DBX file to PST lacking any wait. Get this application that can safely migrate DBX file as MSG data right away. It has great aptitude to repair DBX file data and extract as manifold formats of PST, MBOX, MSG etc. Advance features of DBX Converter Tool * Express scanning of DBX file data * Recover unreadable, corrupt and damage DBX file * Safe process to recover DBX file and restore into PST format easily. * Neatly rename DBX data as TXT format with fast process * Software has simple and trouble-free GUI (Graphical User Interface) * Software supply multiple ...
  • Windows Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Outlook Passwords Recovery and account settings backup is now free with Outlook Password Recovery module offered by our company. Simple download the tool and run the report called Accounts and Passwords. It is absollutely free option which can be used without limits. Backup Outlook passwords and account settings, save them to Excel, move your Outlook accounts to another computer, recover your lost Outlook passwords with this free Outlook Password Decryptor. But not only this, the software provides other usefull options and repors which can be evaluated. The tool allows to export Outlook emails, contacts and other records to separate files on your file system and preserve the Outlook folders structure. Email forensic option provides the wide access to the Outlook message tags and properties so nothing can be hidden from your eyes. But not only this, with the same outlooktransfer.com tool you may extract email addresses for your mail sending database.

Page 10 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware