











Quick Search
|
Newsletter
|
|

|
|
|

Applications:

Business:

Entertainment:

Games:

General:


| Did you know that your computer collects information about where you go on the internet, details on forms you fill up and so on? This information represents danger to you if it is discovered by somebody. To protect yourself, use Evidence Destructor. |


|

| It customizes the Internet Explorer Web browser, lets you apply access restrictions to web browser, restrict access to certain tabs and features of Internet Options, disable certain menu items and buttons and prevent others from editing your Favorite |


|

| Destroy all hidden in Windows needless activity information that may potentially contain evidence and endanger you needlessly, and also remove temporary files left by Windows making it cleaner and running faster. |


|

| Limited Time Offer (10.99$)
Features:
Auto generate your news ticker, without writing a single line of code.
Vertical news ticker applet.
Read from text file the applet data. ( New )
Customizable fonts, color, alignment.
Configurable Back image position.
Easy to use. |


|

| 1st Desktop Guard lets you prevent your desktop icons from getting rearranged, stop users from changing desktop wallpaper and screen saver, secure your public access computers, save, restore, manage and lock desktop layouts. |


|

| Load, performance and functional testing for websites and web applications. JBlitz gives you continuous heavy loading and automated response validation. Fully featured with logging, graphs, stats, scheduling, HTTP debugger etc. Full Java API. |


|

| ElegantJ Table Collection of JAVABEANS are a powerful collection of beans that enables developers to seamlessly display data in tables. The set includes both AWT as well as JFC table bean. The data provider included with the ElegantJ - Data Table Set can accept data by using JDBC connections, XML or text using HTTP stream or FTP. The beans also provide flexible look and feel along with functionality to Add, Edit, Search and sort data. The tables provides events on delete, insert and update of records. |


|

| Controls access to files and folders situated on local media of Windows win98/ME/NT/2000/XP/vista at Windows kernel level, allocates access to files and folders between users according to predefined schedules, and protects system files and folders. |


|

| Abexo Registry Cleaner reduces the query time by detecting and removing invalid data from registry followed by a defragmentation. The resulting registry database will have little to no errors. |


|

| Based on packet analysis technology, Colasoft MSN Monitor focuses on MSN applications and instant message management. Besides capturing message contents, it also summarizes local MSN accounts and provides the statistics of account status, logins, message counts, contacts, message-related traffic that exceed traditional MSN message content "monitors" & "sniffers". The conversation matrix brings you a real-time insight into the MSN communications in your network.
Main Features:
- Accurate MSN analysis results based on CSPAE (Colasoft Packet Analysis Engine)
- Monitoring multiple network adapters
- 7x24 continuous monitoring
- Auto-save messages in real time
- Real time online status monitoring, e.g. online, busy, away, hidden...
- Seamless connection between real time messages monitoring and history messages browsing
- Statistics of local MSN accounts, remote MSN contacts and messages
- Supports messages between multiple participants
- Unique conversation matrix view
- Customizable display name of accounts and contacts
- Supports MSN default emoticons in display name and message
- Supports message font and colors display |


|

| Colasoft Capsa is an expert packet sniffer and protocol analyzer designed for packet decoding and network diagnosis; it monitors the network traffic transmitted over a local host and a local network, with the ability of real time packet capture and accurate data analysis, Colasoft Capsa makes your network operations completely transparent before you, letting you isolate and troubleshoot network problems quickly and efficiently. The flexible and intuitive user interface lets either IT professionals or novice users skillfully handle it in a few moments. |


|

| Vectorizer for CAD/CAM/GIS professionals, designers and illustrators. Converts, digitizes and refines architect, mechan, tech drawing, maps, math graphs, graphics for books and journals. A Raster to Vector SDK, ActiveX and Com Component is available. |


|

| Protect your PC from abusive use of removable media and enforce whether your users are allowed to use removable media or access your local drives. 1st Disk Drive Protector lets you hide, lock and prevent usage of local, network, Floppy and USB drives |


|

| Abexo Memory Defragmenter, also called RAM defragmenter, RAM/memory booster, RAM/memory optimizer, etc. is a software to free up wasted RAM and report the free memory.Also prevents Windows crashes. |


|

| Does defragmenting your hard disk take too long? Did you know that running programs can neither be defragmented nor be moved? Did you know that besides disk defragmentation, a disk optimization would tremendously speed up computer performance? |


|

| Complete Registry Cleaner is a utility to make your computer run faster and smoother. By time Windows registry gathers a lot of invalid entries that cause system complications and slow down your computer significantly. |


|

| Does defragmenting your hard disk take too long? Did you know that running programs can neither be defragmented nor be moved? Did you know that besides disk defragmentation, a disk optimization would tremendously speed up computer performance? |


|

| The PHTML Encoder allows encoding PHP scripts before distributing them. The script code is encrypted before saving. The PHTML Encoder includes console and GUI versions of converter. It is possible to combine protected/unprotected scripts in one site. |


|

| Use PCMesh Hide Files and Folders to make your sensitive files and folders invisible. Even Windows will not know about the existence of your hidden files and folders. |


|

| Use PCMesh <a href="http://www.pcmesh.com/data-recovery-wipe.htm" title="data recovery wipe">Data Recovery and Wipe</a> to recover lost files after a disk format or deletion. Also as a security measure you should wipe the delete data beyond recovery. |


|
|
|
|