Categories
|
Audio & Multimedia
Audio Encoders/Decoders, Audio File Players, Audio File Recorders, CD Burners, CD Players, Multimedia Creation Tools, Music Composers, Other, Presentation Tools, Rippers & Converters, Speech, Video Tools Business
Accounting & Finance, Calculators & Converters, Databases & Tools, Helpdesk & Remote PC, Inventory & Barcoding, Investment Tools, Math & Scientific Tools, Office Suites & Tools, Other, PIMS & Calendars, Project Management, Vertical Market Apps Communications
Chat & Instant Messaging, Dial Up & Connection Tools, E-Mail Clients, E-Mail List Management, Fax Tools, Newsgroup Clients, Other Comms Tools, Other E-Mail Tools, Pager Tools, Telephony, Web/Video Cams Desktop
Clocks & Alarms, Cursors & Fonts, Icons, Other, Screen Savers: Art, Screen Savers: Cartoons, Screen Savers: Nature, Screen Savers: Other, Screen Savers: People, Screen Savers: Science, Screen Savers: Seasonal, Screen Savers: Vehicles, Themes & Wallpaper Development
Active X, Basic, VB, VB DotNet, C / C++ / C#, Compilers & Interpreters, Components & Libraries, Debugging, Delphi, Help Tools, Install & Setup, Management & Distribution, Other, Source Editors Education
Computer, Dictionaries, Geography, Kids, Languages, Mathematics, Other, Reference Tools, Science, Teaching & Training Tools Games & Entertainment
Action, Adventure & Roleplay, Arcade, Board, Card, Casino & Gambling, Kids, Online Gaming, Other, Puzzle & Word Games, Simulation, Sports, Strategy & War Games, Tools & Editors Graphic Apps
Animation Tools, CAD, Converters & Optimizers, Editors, Font Tools, Gallery & Cataloging Tools, Icon Tools, Other, Screen Capture, Viewers Home & Hobby
Astrology/Biorhythms/Mystic, Astronomy, Cataloging, Food & Drink, Genealogy, Health & Nutrition, Other, Personal Finance, Personal Interest, Recreation, Religion Network & Internet
Ad Blockers, Browser Tools, Browsers, Download Managers, File Sharing/Peer to Peer, FTP Clients, Network Monitoring, Other, Remote Computing, Search/Lookup Tools, Terminal & Telnet Clients, Timers & Time Synch, Trace & Ping Tools Security & Privacy
Access Control, Anti-Spam & Anti-Spy Tools, Anti-Virus Tools, Covert Surveillance, Encryption Tools, Other, Password Managers Servers
Firewall & Proxy Servers, FTP Servers, Mail Servers, News Servers, Other Server Applications, Telnet Servers, Web Servers System Utilities
Automation Tools, Backup & Restore, Benchmarking, Clipboard Tools, File & Disk Management, File Compression, Launchers & Task Managers, Other, Printer, Registry Tools, Shell Tools, System Maintenance, Text/Document Editors Web Development
ASP & PHP, E-Commerce, Flash Tools, HTML Tools, Java & JavaScript, Log Analysers, Other, Site Administration, Wizards & Components, XML/CSS Tools |
|
|
A1 Keylogger 3.22
A1 Keylogger spy software secretly logs all their chats & IMs, emails, Facebook use, keystrokes, video talk via web cam, YouTube videos watched, web pages opened, online searches and more. Sends logs to your email every 60 minutes.
|
|
A1Keylogger.com
|
2014-09-09
|
Download
|
|
|
Abacre File Encryptor 1.0
Encrypt any files or folders using 39 advanced encryption algorithms. Other features: Secure Password Generator; Text Pad to encrypt any text; Wipe Files command to permanently remove files your computer; command line parameters; Shell integration.
|
|
Abacre Limited
|
2005-02-15
|
Download
|
|
|
Abacre Antivirus 1.0
Abacre Antivirus is new generation of antivirus software. It reliably protects computers from internet viruses worms and Trojans, macro viruses and old executable viruses. It?s reliable, stable, fast, low CPU load, and it has reasonable price.
|
|
Abacre Software
|
2004-10-18
|
Download
|
|
|
ABC Monitor 3.0
ABC Monitor Keylogger Is Not Just For Watching Your Kids, But Can Be Used For Schools & Employers Too! ABC Monitor has been designed with ease of use in mind, even the most computer illiterate user will be up and running in minutes.
|
|
abczee.co.uk
|
2012-09-13
|
Download
|
|
|
CryptBox 2014e
CryptBox creates secure Safes, that can be used just like normal drives and which can be filled with your data. All content of those safes are encrypted. Safes can only be opened if you know the password.
|
|
Abelssoft
|
2015-03-05
|
Download
|
|
|
Private InfoKeeper 2.8
Private InfoKeeper provides an exceptional security for your data and a very convenient way to manage and use it. Security features: Uncracked AES 256bits encryption, Unpickable master password, Spyware immunity,Total web browser integration and more
|
|
Ablazesoft
|
2006-11-29
|
Download
|
|
|
cPWD 2.6
A powerful Information Security Management tool that will protect the local administrator account across the network. Target multiple Administrator accounts based on the Security Identifier Descriptor (SID). Dynamically generated passwords.
|
|
Absolute Dynamics
|
2005-02-01
|
Download
|
|
|
Report Computer Usage 2.2
Report Computer Usage - stealth computer and internet activity monitoring software. Great pc monitoring tool that allows to create pc usage reports and perform parental control with capability to block separate URLs and files.
|
|
ABTO Software
|
2012-09-06
|
Download
|
|
|
Secure Deleter 1.2
ABTO's Secure Deleter - reliable data secure erase utility for confidential data and files complete removal. Secure your data from unauthorized access and thefts.
|
|
ABTO Software
|
2012-07-27
|
Download
|
|
|
abylon CRYPTDRIVE 14.00.1
Protect your data against illegal access with the abylon CRYPTDRIVE. The encrypted drives can be open with password, chip card, removable media or X.509-certificate. Only with correct authentication the CRYPTDRIVE is displayed in the File Explorer.
|
|
abylonsoft - Dr. Thomas Klabunde
|
2015-06-01
|
Download
|
|
|
abylon KEYSAFE 14.00.1
The abylon KEYSAFE is an easy to use password manager. Open the KEYSAFE with password, chip card, memory stick or X.509 certificate. The software supports Drag&Drop, offer a random key generator and encrypt with Blowfish- or AES-algorithm.
|
|
abylonsoft - Dr. Thomas Klabunde
|
2015-06-02
|
Download
|
|
|
abylon LOGON 11.00.2
abylon LOGON protects your computer again illegal access in a comfortable kind. You need only to train a smart card, a USB stick or a CD with your login data. In future you need only this token as key for the logon authentication.
|
|
abylonsoft - Dr. Thomas Klabunde
|
2013-11-01
|
Download
|
|
|