Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: P :: protect
Display: short descriptions | full descriptions
  • VBA compiler converts VBA code of Microsoft Excel workbooks and Excel add-ins into binary code (native Windows DLL file). After compilation your VBA code cannot be copied or recovered and has the highest level of protection from piracy. A compiled workbook or Excel add-in file left with the original file extension and behaves the same way as original file.
  • Skater .NET Obfuscator is an obfuscation tool for .NET code protection. Prohibits reverse engineering;Obfuscated application usually is not recompilable;Processes any .NET application, executable or assembly;Encrypts string constants;Compatible with any .NET framework (1.0 through 4.6);Control flow obfuscation stops decompilers and deobfuscators;Scrambles class names, method names, field names etc.
  • Keyboard Tracer is an easy-to-use tool to record keyboard and monitor keystrokes on your own computer. It tracks activities of other people using your keyboard without your permission. Full version of Keyboard Tracer can be launched in invisible mode automatically after Windows starts up which makes the keystrockes monitoring hidden from foreign eyes. Special option allows to protect the KeyboardTracer window to be shown to the current user without entering the password, so even if the user accedentially found the program, he will newer launch it or change the settings. Keyboard Tracer will record everything typed on the keyboard. Keyboard Tracer not only captures standard alphanumeric keystrokes, but also captures "hidden" characters and keystroke combinations, such as the Shift and Ctrl key, as well as "true" keystrokes which may other-wise appear differently on screen (such as an * when a password is typed). Not only the keyboard events, but also the textual Clipboard input can be regi ...
  • Way to change ePUB to PDF format is an easy process with the help of ePUB to PDF Converter. This software has the ability to converting ePUB to PDF without effecting the texture and graphics of the ebook document. They just remove the DRM protection from the ePUB documents. The software also supports the batch ePUB files conversion into PDF format. An additional feature of this software, it will give you the authority to set the security before converting ePUB to PDF file. The password setting on the PDF file is optional, means that it is totally depending on your choice whether you want to set the password or not. The ePUB to PDF Converter software is available at personal, business and enterprise license. The personal license of this software is available at $49 only.
  • Your mission is to protect your tank and the base from the enemy tanks by destroying all enemy tanks. Player starts the game with 3 lives. If the base or the player's tank is destroyed, the game ends and the player returns to the main menu. The number and diversity of enemy tanks increases based on difficulty level. If (easy) is chosen, enemy tanks move more randomly. When the players hit each other's tank, movement is temporarily frozen.
  • Description: An ancient evil was encased in a golden sarcophagus, and many generations of ninjas were protecting him from the monsters trying to plunge the world into darkness. Now the monsters are returning to finish the job. Will the ninjas continue the work of their ancestors and prevent the destruction of the world? That is up to you!
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Disobedient children are busy playing in the street, during wintertime. Cold, sickness and ... oh, the horror! They became annoying, snot-nosed ZOMBIES! Show your skills as a snowball fighter. Crush the little turds! Protect your Christmas gifts! Be one with the snowman.
  • Hordes of evil skeletons are raised, the reason for this - great impending evil! Ancient cave filled them to the brim. You son of an ancient emperor, founder of the empire! Magic touched you, dying a thousand years ago in the great battle, you have been raised, and only you can protect the people and not let the skeletons out of the ground!
  • In the near future, following an environmental disaster on the planet, there is a new ice age. It's the end of the world as we knew it. From the ruins of once powerful civilizations, a Corporation was founded to protect what is left of humanity. You, as a soldier of the Corporation, will carry out various missions, traveling through the ruins of the destroyed city while fighting to survive in the new, harsh world.
  • Become a formidable berserker and protect the city from an invasion of zombies. Only a few, only the best of the best can survive. Choose from a large number of weapons from the katana to the bow, and each weapon has its own characteristics. But remember the main weapon of Berserker is RAGE! Use your fury wisely and tear the enemy to shreds.
  • Protecting Water Seal was broken. You soldier named Keith, will go on a dangerous adventure to find out who broke the defense. You are waiting for nice graphics and excellent music.
  • Bloodbath is a team shooter with a view from above, in which two teams fight. Immediately after the start of the game you will find yourself on the battlefield. There are 3 points on the map: yours, enemy's and neutral. Your goal is to protect your base and grab someone else's. You can also grab a neutral position to strengthen your position.
  • FoneLab for Android is the best data recovery app for Android. With this file recovery software, you can recover deleted text messages, photos, contacts, call history, videos, music and other lost document files from your Android phones, tablets and SD cards with just a few clicks. When you lost your Android data due to wrong deletion, rooting, restoring to factory setting and other accidental conditions (such as dropping you Android into water), you can find your lost and deleted Android data back with the help of this product. In addition, you can back up and transfer your important messages, photos and files on your computer. Key Features: 1. Recover deleted text messages on Android phone As the best Android SMS recovery, it is easy to achieve the text message recovery function. You can export the retrieved text messages in either HTML or EXCEL formats to your PC. 2. Retrieve deleted Android photos This powerful Android photo recovery software can recover your deleted photos from your Android ph ...
  • Cloud secure allows you to password protect cloud folders on your PC. It works with Google Drive, One Drive, Dropbox and Box. It keeps your cloud files and folders synced, backed up and password-protected. Cloud secure is a comprehensive solution for users who don't want others tampering with their important files and folders saved in their cloud accounts.
  • USB Secure can password protect any portable media including USB drives, External drives and even memory cards. It supports plug and play and automatic execution. No administrator rights or install is required on the other computer. You can take your USB drive anywhere without a fear of data leak or theft in case of a stolen or lost USB drive. USB Secure is a great program for people keeping private data on portable devices when travelling.
  • Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera, completely implements and exceeds the US Department of Defense and NSA clearing and sanitizing standard, once erased with it, your file data is gone forever and can not be recovered.
  • Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history and past computer activities. It supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera, completely implements and exceeds the US Department of Defense and NSA clearing and sanitizing standard, once erased with it, your file data is gone forever and can not be recovered.
  • A criminal clan pits Santa Claus against the Elk. Now, in the woods, there new orders - to fight the mafia with Moose and his faithful friend, Rabbit. Save your beloved and protect the honor of the forests together with our heroes. Kill them all and stay alive!
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • Pick the locks of the 13 rooms in order to get out of the castle. You, of course, are able to move and even destroy the obstacles in your path. But this must be done quickly, before time runs out. Otherwise an evil spirit awakens that protects the locks and drags you to hell.
  • Falco Fire - The year is 2105. Climatic disasters and energy shortages lead to widespread panic and chaos. A new energy field is discovered in Siberia which may very well be the last one on Earth. Civil war breaks out in Russia and the US invades, taking advantage of the disarray to seize the energy field. Tank battles are raging everywhere. Your hero is in the center of all this mess, trying to protect his native land and loved ones.
  • Imagine yourself as a driver of a "skins" huge, humanoid armored vehicle. Save the city from an out-of-control protection system and destroy all the turrets in the neighborhood. To achieve the goal, you are given several types of weapons, but you must use your ammo wisely because the amount is limited.
  • Kiosk software locks down your public computer or kiosk, helping you securely display your website or application. It prevents hacking and downtime by restricting access to the system, desktop, drives, folders and programs. The software blocks the system keys and replaces the system shell for maximum protection. Secure Browser removes standard browser menus, blocks downloads, limits browsing to specified URLs and blocks inappropriate content.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware