Home
Register
Members
Add Program
New Listings
Editors Pick
Top Rated
News Letter
Search
Contact
Advertising
Privacy Policy
       Just In
1/21/2025
Professional Data Recover

9/28/2024
Generate Barcodes Tool

9/28/2024
Healthcare Business Barcode

9/28/2024
Professional Barcode Generator for Post Office

9/28/2024
Generate Inventory Barcode App

9/28/2024
Business Barcode Maker Application

9/28/2024
Generate Healthcare Barcode

9/28/2024
Manufacturing Industry Barcode Maker

9/28/2024
Generate Birthday Card

9/28/2024
Invitation Cards Designing Downloads

   
  All        Any      Web  Title +  Description 
 Shareware Listings 
Rating:   1  
   Total Hits - 65  |  Hits Today - 0View Ratings  |  Add Your Rating
 
 
 Perfect Privacy protects your privacy by eliminating your Internet and offline computer usage traces, such as history lists, address bar drop downs, cache, accessed document lists and other tracks that are stored to your computer as you use it. You can eliminate all traces or specify a selection. Cleanup can be done with a single click; it can be also executed automatically at specified intervals and on specified events. Stealth mode available.
 http://www.blumentals.net/Last Updated on 7/2/2008 6:15:00 PM
 DownloadVersion 1.0
Rating:   0  
   Total Hits - 2  |  Hits Today - 0View Ratings  |  Add Your Rating
 
 
 Permission Analyzer scans your network and combines NTFS permissions with user and group data from the Active Directory. All data that is stored locally can be retrieved to create overviews of permissions per group or user. You will be able to monitor permissions for entire user groups and receive notifications if undesired permissions are flagged within your network. Main features Scanning the network Configure the directories and LDAP Organizational Units to scan. All directory information and group memberships from LDAP are saved in a local database file. Run the scan whenever you like or schedule an automated scan. Permission Analyzer supports an external database, allowing multiple workstations to share the same information source. Running your overviews All information is saved on a database, allowing you to conduct targeted search queries in seconds, instead of scanning the whole network every time you want to apply a new filter. Add filters for specific members, all members of a group or LDAP OU, permissions or folders. Tracing permissions The main overview provides an aggregated summary of all permissions found and may contain the permissions of multiple users or groups. The Trace function is part of the overview and shows you the origin of permissions for a specific user or group and folder (via the group membership or parent folder they have been inherited). Use this view to zoom in on your search results. Creating reports and policies Save your filters as report and export them to HTML or CSV and e-mail. Use Permission Analyzer to run reports automatically using command-line parameters. Save your filters as policies and receive e-mail notifications if your policy report contains unwanted permissions.
 http://www.perdemia.comLast Updated on 8/16/2016 4:08:00 AM
 DownloadVersion 2.2.0
Rating:   0  
   Total Hits - 4  |  Hits Today - 0View Ratings  |  Add Your Rating
 
 
 Spyrix Personal Monitor is a powerful multifunctional program for full and detailed monitoring of user activity, including activity on social networks. The program is perfect for parental control and control of employees. Spyrix Personal Monitor allows detailed recording of all user activities. Spyrix Personal Monitor will help you solve the problem of monitoring your children without being caught. You will always know what you child was doing while using the PC. Spyrix Personal Monitor is a powerful protection tool from leakage of corporate secrets (DLP - data loss prevention). Nowadays on the market of data loss prevention (DLP) software there are lots of solutions that often cost thousands of dollars and in consequence of which are not available for small and medium companies. Spyrix Personal Monitor is a reasonably priced but quite effective product for solving problems of secret information leakage and employees activity control that allows small companies protecting themselves from unfair workers and problems with leakage of secret information.
 http://www.pcacme.com/Last Updated on 3/28/2017 10:18:00 AM
 DownloadVersion 10.5.0
Rating:   0  
   Total Hits - 2  |  Hits Today - 0View Ratings  |  Add Your Rating
 
 
 PhoneSpying: Mobile Spy Free - Spy Phone App. Include more 25+ features such as: GPS, SMS, Call Recording, WhatsApp, Silent Voice Recording. Include: GPS Tracker, SMS Tracker, Call Tracker. Undetectable and Silent. GPS tracker- you can track the location of the target with the help of GPS tracker feature. Every change in the location of the target will be informed to you via a notification. You can know where the suspect is in real time. SMS spy- you can read all the conversations of the target and can save them over your account immediately. All the hidden conversations are also available to you with the help of the AskSpy app. Spy call- if you need to spy on someone then having access to their calls can help you a lot. With the help of the spy call feature, you can listen to all the conversations of the suspect secretly. You will be notified soon as the suspect receives a call. Call recording- in case you miss to listen to a call, you can take the help of the call recording feature. This will record all the calls that the suspect makes over his phone. All the details of the calls will be known to you. Ambient voice recording- this feature lets you listen to all the surrounding voices of the targeted phone. You can listen to the conversations made be the suspect with others. Whatsapp spy- the AskSpy app gives you the chance to read all the WhatsApp messages of the target. You can also see the files shared and hidden conversations. Not only WhatsApp, but this app also lets you access the conversations of all the other messaging applications. Social chats monitoring- you can have access to all the social accounts that the suspect runs over his mobile phone and can read all the social chats carries over by the suspect.
 http://www.phonespying.comLast Updated on 4/20/2018 3:54:00 AM
 DownloadVersion 1.0
Rating:   3 Rating Average  
   Total Hits - 1500  |  Hits Today - 0View Ratings  |  Add Your Rating
 PMT 2.54 can save files into any other file(called Mother File).If you select a 24-bit-colored BITMAP image or JPEG image or Flash SWF file as a Mother File,then PMT can insert files into the Mother File,or append files to the Mother File.It won't make any difference to the quality of the Mother File. You can save your important files into a Mother File and set a password to protect them.Meanwhile, You can open or run the files in the Mother File freely and create directories in Mother File.Pls be noted the maximum size of a BMP file is 1600x1200x24bits ,so 2M bytes' room can be used by other files.
 http://www.zqsoft.comLast Updated on 7/2/2008 6:15:00 PM
 DownloadVersion 2.54
Rating:   0  
   Total Hits - 0  |  Hits Today - 0View Ratings  |  Add Your Rating
 
 
 Mobile phone forensic application examines general information of all Windows based Pocket PC and PDA mobile device. Pocket PC investigation tool shows IMEI, IMSI number and manufacturer name of any PDA mobile phone. Utility shows all read/unread text messages and phonebook details of Windows based Pocket PC. PDA surveillance application displays complete mobile information and generates detailed report in text or HTML format of all examined information. Pocket PC device forensic tool shows phonebook/contact numbers, task and appointment details of PDA mobile phone with correct date and time. PDA investigation tool is compatible with all latest versions of Windows operating system and provides support of graphical user interface (GUI) which assists technical as well as non technical users in operating the software. Application shows hardware configuration and OS registry details of Windows based Pocket PC. PDA investigation utility examines information like stored files, database records and other mobile phone information etc. Pocket PC device forensic tool supports various PDA mobile devices including orange myS-7 Smartphone and orange SPV C500 Smartphone etc.Features:*PDA surveillance utility extracts text files, database records and OS registry details of any Windows based mobile phone.*Pocket PC device forensic tool displays complete mobile information (IMEI, model number, manufacturer name) and generates detailed report in text or HTML format.*Mobile phone forensic software provides support of wizard style GUI interface and efficiently works under all major versions of Windows operating system like windows11, windows10, windows8, windows7 etc.
 https://www.pdd.mobiLast Updated on 4/13/2024 1:14:00 AM
 DownloadVersion 2.0.3.8
Rating:   1  
   Total Hits - 14  |  Hits Today - 0View Ratings  |  Add Your Rating
 
 
 PDA surveillance utility extracts information such as files, database and OS registry records of any Windows based mobile phone. Pocket PC device forensic tool displays model number, manufacturer name, IMEI number and ICC-ID of any PDA mobile or handheld device. PDA investigation application provides support to all major brands of PDA devices including HP iPAQ, Hitachi, Motorola and Benq etc. Pocket PC examination utility allows you to view all data (files, folders, images, songs, movies) stored on any Windows based mobile, PDA phone, or Pocket PC. Software examines all information like software/hardware configuration, OS registry records, phone and other general information etc. Pocket PC device forensic application enables user to view text messages, contact numbers and other data saved on any Windows based mobile phone. Application is compatible with all latest versions of Windows operating system such as XP, Vista etc and has an interactive graphical user interface (GUI) which assists technical as well as non technical users to work easily with the software. Pocket PC investigator supports all latest PDA devices including Pantech PH-S8000T smartphone, Samsung SCH-i600 and Sharp W-Zero3 PocketPC Phone etc. Features: * Pocket PC device forensic tool shows information including model number, manufacturer name, IMEI and IMSI number etc. * PDA surveillance utility allows user to display all information stored on Windows based mobile device or Pocket PC. * Pocket PC investigation software generates report of all extracted information in text or HTML format and saves at user specified location. * Pocket PC forensic application examines information like audio files, video clippings and other related data stored on PDA mobile device.
 http://www.pdd.mobiLast Updated on 2/27/2009 7:10:00 AM
 DownloadVersion 2.0.1.5
Rating:   1  
   Total Hits - 14  |  Hits Today - 0View Ratings  |  Add Your Rating
 Pocket PC surveillance software generates an effective forensic report on your PDA device that helps to know what OS type, memory, software and hardware is used in mobile phone. Program pull out IMSI number from Pocket PC phone and provides facility to generate report in html or text format for printing purpose. PDA surveillance tool is fully windows Vista compatible and through using help manual any normal user can easily operate this software.
 http://www.datadoctor.orgLast Updated on 10/23/2008 2:01:00 AM
 DownloadVersion 2.0.1.5
Rating:   1  
   Total Hits - 18  |  Hits Today - 0View Ratings  |  Add Your Rating
 
 
 Power PC Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power PC Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others'' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
 http://www.ematrixsoft.comLast Updated on 4/25/2011 12:32:00 PM
 DownloadVersion 10.10
Rating:   3 Rating Average  
   Total Hits - 41  |  Hits Today - 0View Ratings  |  Add Your Rating
 
 
 Power PC Keylogger spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check log reports by simply receiving emails or opening a web page. Power PC Keylogger is perfect for catching cheaters, monitoring employees, children or spouse, acquiring others'' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
 http://www.ematrixsoft.comLast Updated on 3/10/2010 10:20:00 AM
 DownloadVersion 9.0
Previous   - 40  41  42  43  44  45  46  47  48  49  +    Next 

Categories

778
Programs 74518
Current Users 187

Add to Favorite

Tell a friend about us Tell a Friend

Contact Us

Syndication


 

2/18/2025 8:57:47 PM
Powered by Reviewnow