Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Flashpaste is an essential for a large range of computer users. Bringing any number of text templates that you need to you, you can easily paste pieces of code or text that you regularly use and need fast access to. You can also use macros in your text templates and categorize them easily for immediate and optimal access. Flashpaste will not only save time with speed typing, but it will also lower the risks of typing errors.
  • Being a proud user of SuiteCRM you can now manage your WordPress customers better by integrating SuiteCRM and WordPress platforms and connecting your WP users with your SuiteCRM system. This SuiteCRM Customers Portal Pro plugin will help your customers to use several SuiteCRM modules in their WP interface, which you can define from your admin front. This plugin can integrate Accounts, Contacts, Leads, Opportunities, Calls, Meetings, Notes, Cases, Documents, Tasks of SuiteCRM modules to your WP customer interface for their use. Customer Accessibility to modules can be restricted any time as per the need. Set Edit View, List View & Detail View Layout for each Module. Updated data gets reflected in SuiteCRM Dashboard Set WordPress Login Credentials for users. Calendar View for Meetings, Tasks, Calls etc.
  • SpyPal Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • The ZOLA Connection Troubleshooter is an advanced troubleshooting tool, that can help you to troubleshoot a remote connection to a host in your network. The troubleshooter tool also comes with a built-in remote connection fixer module that can fix/enable various Windows settings required to enable a remote access for operating systems running Windows XP, Windows VISTA, Windows 7, Windows 8, and all Windows Servers platforms.
  • Ran did not have the time to go to the new world, he has found a new problem: Dense were able to gain access to the world of "Utopia", in which only got Ran, and built there permafrost. The wound now need to defeat all thick, and not stopping at nothing to break Crystal Winter, and return usual weather.
  • 4Videosoft AVC Converter is a powerful and easy-to-use AVC H.264 Converter which can easily convert video to AVC/H.264 video with lightning speed and lossless video quality. It makes you access to convert all videos to AVC/H.264 video files, like MPG, MPEG, VOB, MP4, TS, RM, WMV, ASF, MKV, AVI, 3GP, 3G2, FLV, SWF, MPV, MOD, TOD, HD videos and more.4Videosoft AVC Converter acts as audio converter or audio extractor to create your own music as well. With 4Videosoft AVC Converter, you can get incredible video files, owing to its unmatchable video editing features. It allows you to trim, crop, merge and watermark your video according to your requirements. It is also available to enhance your video quality by adjusting video "Effect" (Brightness, Contrast, Saturation, Deinterlacing) and more. It adopt NVIDIA® CUDA™ and AMD APP GPU Processing acceleration technology to accelerate the video converting speed, and it provides much more user-friendly interface. Key Functions: 1. Pe ...
  • Move the WASD or arrow keys. To access the inventory press Q. When you open the inventory the top two buttons are visible. Click craft, to open the system creation. To find the thing go to her, and enter the letter E. But the subject cannot always get close so then you must work from a distance. Items should be spread in the window of creation in a certain order. There are many different types of Shawarma: 4 Conventional , 1 fennel, 1 icy, and 1
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Metadefender Client is the most thorough way to scan, protect and control data on a client before and after connecting to a (secure) network. Metadefender Client scans endpoints with multiple antimalware engines to check endpoints for viruses, key loggers and other malware without requiring any installation on the endpoint.
  • Inventory and discover all computers using NEWT Professional network inventory. Get essential hardware and software information without ever having to visit a remote machine. We use advanced audit methods to retrieve the data you need into an easy-to-read spreadsheet-like view. Export all data to an MS Access database to generate detailed queries.
  • With CallbackFilter component your Windows and .NET application can keep track of file and directory operations and control them in real-time. The application is notified about access to the disk right when the requests for operation come. You can track and decline access to the files and directories, hide files, restrict certain operations and even modify (encrypt, copy-on-write etc.) file contents on the fly. You can also create virtual files.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Game "Ping Pong" represents a three-dimensional simulator of one-nominal sports game. Besides usual and pair game, there are 12 bonus games based on game in table tennis. Bonus games open for victories over section "Passage" and are accessible in the menu of "Expert" and in network game.
  • "Skynet: Rampage" is a tactical stealth action game set in a post-apocalyptic future. To survive in this new world is not so easy, because you have to battle robots and other creatures of Skynet. Robots have advanced artificial intelligence that takes into account real sights and sounds. They can think on the fly as we can, only faster. You, in turn, will be able to use a variety of futuristic weapons and accessories, such as a laser rifle, the
  • mo-ps is a simple but powerful project planning tool for easy creating and maintaining of project schedules. The main features are: Fast project calculation reflecting all changes immediately. Unlimited powerful undo / redo. VBA interface with full access to the project database. Shared access for team development. Unicode support. Html publishing of plans.
  • Easemon is an all-in-one employee monitoring solution for Mac OS X that monitors keyboard entries, Internet usage, application usage, desktop activities by screenshots, IM conversations, emails sent and more. Employers will get notifications or alerts on inappropriate computer activities. The logged data can be remotely managed in a cloud server. Easemon monitors all key presses on the Mac keyboard, showing users when/where the keystrokes are typed, in which application the keystrokes are typed, composed emails and chat logs typed with keystroke logging, both sides of the IM chat conversations in Skype, AIM, Adium and iMessage, etc. This employee monitoring software for OS X is able to track all websites visited. Even though the web history is deleted or the websites are visited in Private browsing mode or Incognito mode, Easemon will record ALL visited websites in details. And it also tracks the application usages on Mac like what applications are used and how long each application has been used. ...
  • Big Air War - Air Attack - is next-generation air combat shooter with stunning graphics alongside great audio, effects and awesome gameplay. Beautiful levels with immersive missions to complete. Multiple extreme boss battles. Accessible to beginners, as well as hardcore shooter addicts. Shoot em-up action with plenty of sky adventures and adrenaline. The game is aimed at all gamblers, from novices to hardcore action gamers. Gamblers can try thei
  • NolaPro is a free web-based Accounting Suite. Installs quickly on your own PC for secure access via the web. AP/AR/GL all standard with optional Payroll, Inventory and Order Tracking modules. Customizations allow the software to fit your business operations or industry niche. International features such as multi-currency, VAT/GST and built-in language translator all supported.
  • Bitcoin Find & Recover is a crypto currency recovery tool that helps the user restore access to their funds. Supports desktop and mobile wallets. Automatizes searching for wallets on the disk, both deleted and existing and guides the user in the recovery process. Allows the user to create a password list from whatever fragments he or she remembers, to try to regain access with a lost password. The recovered passwords are saved encrypted.
  • DAC for MySQL (also known as MySQLDAC) is the most powerful component suite for Delphi/C++Builder/MySQL. This component suite allows you to create Delphi/C++Builder applications with direct access to MySQL DB without BDE and ODBC. BLOB fields are supported. MySQLDAC was developed for easy migration of existing projects from BDE/ODBC scheme to the native one. A MySQL library is not required.
  • Security Task Manager is a computer utility designed to offer full access to Windows processes. Security Task Manager's main focus is on your computer's currently running processes, and offers a great deal of information on them: process name, CPU usage, memory usage, file name and location, security rating and more. Protector will catch any mouse movement monitoring software, and will alert you if the Windows Registry has been tampered with.
  • Proactive anti-malware program to clean and protect your PC from all internet threats: viruses, spyware, trojans, bots, adware and worms. It uses a triple-layer prevention engine: Surf Protection, Real-time File Guard and Behavior Blocker. This triple-layer blocks access to fraudulent and dangerous websites , scans for malware in real-time and catches zero-day threats for the ultimate protection.
  • Wondershare PDFelement is a simple PDF tool. Every available function, like Merge and Split PDF files or Convert PDF to Word is all right there in the toolbar, no hidden sub-menus or elaborate names, just an effective precision toolbox that lets you treat any PDF as your own creative property. Reuse, revamp and remake PDFs with the best value on the PDF Editor market today. 1. Create PDF files from almost any document. Wondershare PDFelement is a powerful PDF Creator as well. It saves every document which can be opened on your computer as a PDF file. 2. Edit text completely. Wondershare PDFelement lets you add text anywhere in the document and freely adjust font style, size, color and alignment. 3. Convert PDF to Word/Excel/PowerPoint/HTML/EPUB/RTF and more. Easily and quickly convert PDF to editable Microsoft Office documents and EPUB eBooks. 4. Advanced Annotation. With an array of conversation bubbles, shapes and highlighters, Wondershare PDFelement brings attention to important or unwanted text. You can a ...

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2016 IT Shareware