Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.
  • The most important thing to deal with an old iPhone is to erase the signs of use. You should just delete your contacts, text messages, password or other secret information from iPhone. While those erased data can be recovered by certain tools. However, if the data are deleted by FoneEraser, they will never be back again. The only thing FoneEraser can do and will do is to clear the signs of use in your device. With this powerful software, you can remove all data from your iPhone or iPad completely and choose the erasing level as you like. Plus, you can remove contacts or passcode from your iPhone and iPad at the same time, which will save you much time. Key Features 1. Erase all kinds of data on the iOS device Not one left. Aiseesoft FoneEraser is responsible to clear your device and erase any data on it. No matter what they are, text (Text messages, Notes, Reminder, etc.), media (Music, Videos, pictures, etc.), or trails (Call history, Passcode, Apps, iCloud, etc.), it will wipe them out completely. ...
  • However well people live, some always want to live better. Such people are willing to do anything, even to destroy other people for their own benefit. It is because of this, they created a secret "dark" lab where scientists are trying to create a virus that will transform all life into mutants. Unfortunately, they succeeded, and the dark times came. Only 20% of humanity could be saved thanks to she who invented "life." She saved them from infecti
  • 2002, British intelligence receives information about the contract between the terrorists and the official authorities of Afghanistan, but they deny the presence of terrorists, calling it a military exercise. Because of this, convened a secret Council of the UN, during which it was decided to send a British agent James Tennant for espionage and sabotage the plans of terrorists on the base, which is located a couple of kilometers from the port tow
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, microphone, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a spy camera. Automatically sends logs to your email.
  • At first glance you may see a classic game about a helicopter flying through a cave. But behind the trivial cover is a mystery for the mind, as well as opportunities for improving your machine. Buy upgrades, and discover new secrets of the cave. And try to find the answer to the main question which is how to lead the helicopter to victory, while rushing through the stone tunnels.
  • Skype Spy Monitor Pro secretly records Skype incoming and outgoing IMs, calls and video chats. It logs all Windows users on a PC. It runs completely invisibly so that Skype users won't know its existence. It sends logs to an email or ftp like every 60 minutes. It is a great tool for monitoring your kids, spouse, employees, competitors and friends on Skype while you are away. You are able to know exactly what they are talking about online.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • Facebook Spy Monitor is a Facebook related activity monitoring and parental control software. It secretly records PC users' Facebook private profile, emails, chats & IMs, photos, interests, contatcts and events by taking screen snapshots periodically. It also records popular Facebook instant messenging clients and Facebook related web sites and searches. See exactly what users were doing just like watching a surveillance video playback.
  • Power Spy (Supports x64/x86) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches, microphone and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • The Secure Spreadsheet is the first and only end-user program for encrypted secure computation: now two parties, empowered by the latest cryptography research, can keep their data private while at the same time doing secret calculations on each other's inputs. An Excel Add-in with a minimal learning curve: to securely compute, just colour some cells and press a button; you don't need to involve anyone else to carry out your secure computations.
  • Assume the role of a soldier from a top-secret unit. You have to destroy hundreds of enemies and save humanity. Along the way you encounter many different enemies and stunning effects that will keep you highly entertained.
  • Winter Assault is a first person shooter. This combination will create a lot of new experiences, especially because this time you have to fight not only for your own life but also perform a special mission. The storyline of this new shooter tells about a large company of mercenaries that has captured the enemy to find the secret device. Here you are invited to enter into a confrontation with more powerful enemies or perform a task like a ghost an
  • A new remake of the famous game "Stack Attack" in an updated format. Choose from three workers and clean up the warehouse to form chains of boxes and score points. Lots of new bonuses, secrets and pleasant controls will entertain you as you compete with other players and show who's boss!
  • SpyKing PC Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, web sites, user names, passwords, web cam images, apps, clipboard and more. It supports Skype, Yahoo Messenger and others. It also takes screenshots like a surveillance camera. You can receive reports remotely via email or ftp as often as you wish. Open these reports on another PC or on your cell phone browser.
  • Ostrich Runner is a race through eight different worlds with a lot of obstacles and lots of competition. Four secret hidden bonus levels and up to six power-ups per challenge should keep you happy and hook you too while you're trying to win a race. But beware! Don't run into too many closed doors or step into any buckets - and that lawn mower will make mincemeat of you! We will accept absolutely no responsibility for broken computer keyboards
  • A little boy named Robin went to the forest with his parents to pick mushrooms. But, not listening to his mother, he went too far and got lost. Wandering through the woods, the boy realizes that this forest is not so simple. It hides many secrets! Under cover of darkness, Robin finds a small hut in a forest. You together with the main character will plunge into the atmosphere of a fairy tale! Help Robin find his way back home and return to his pa
  • Search for objects from a list in a pile of debris, but you have very little time so use it wisely. You will need to be careful and quick at the same time. If the game seems easy, there are several levels of difficulty to challenge you.
  • Unusual shooter in which you need to defeat all enemies while collecting bonuses, and find the secret power-ups and weapons that will help you in passing!
  • SpyPal Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Description: In a secret complex at each level to collect all the super-stones and find a way out. In some cases, you need to find an electronic key to open the door-blockers. In the last level you need to get to host a secret complex and download all the information from it a secret project on the study of crystals.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware