Trend Micro Titanium Internet Security is protection for what you and your family do online every day—email, socialise, bank, browse, and shop. It features set-and-forget security that won’t pester you with annoying alerts and pop-ups. Trend Micro Titanium™ Internet Security is strong, easy-to-use protection for what you and your family do online every day.
Exchange BKF file can face corruption issues due to corrupt hard disk, virus attacks, hardware malfunction and other reasons. You can now easily recover all mailbox data of Exchange Server with Kernel for BKF Recovery. It quickly extracts EDB, Log and STM files from a corrupt BKF archive and restores on Exchange Server.
WMS Log Storage is Windows Media Services log file analyzing tool. Highly detailed and easily configurable HTML-based reports with tables and charts output to screen, ftp, file directories or email. Unlike other analyzers, WMS Log Storage has been designed especially for analyzing Windows Media Services log files and supports the entire set of Windows Media Services log file data and provides the best and most complete analysis of these files.
Best Spy Software is an extremely powerful keylogger which allows you to secretly record all PC activities, including emails sent and received, websites visited, every keystroke (including login/password of all kinds of programs and websites such as Facebook, Myspace and all webmails etc), file operations, both sides of online IM conversations such as Yahoo Messenger, ICQ, AOL, AIM, Skype, Google Talk.
Utility that allows a user to customize or replace pop-up menu in any application. When user makes a right-click , the Perfect Menu either extends standard context menu by adding new commands or completely replaces it by user's defined one.The Perfect Menu allows a user to have quick access to mostly used commands, files, applications and web sites, insert phrases or e-mail addresses, extend clipboard capability and more.
Spybot - Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behaviour to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies.
A program for instantly pasting into input fields in practically any program user-defined plain or formatted (RTF) text: standard phrases, greetings, generic replies, the current date and time, letter and document templates, e-mail and website addresses, usernames, passwords, selected text fragments and much more. Text can be pasted from a popup menu or by pressing a hot key.
Atrise Everyfind allows you to design a website search engine for web site, PC DVD disc, MP3/OGG music, office and PDF files. It can index most file formats and generate ultrafast, powerfull and compact search engine. Key features: wildcard and boolean queries; intelligent size-saving multilingual indexing algorithm; precision accurace; javascript-based client-side search.
R-Drive Image creates disk image files for backup or duplication purposes. Disk image file contains exact, byte-by-byte copy of a hard drive, partition or logical disk and can be created with various compression levels on the fly without stopping Windows OS. Drive image files can be stored in a variety of places, including various removable media and then restored to the original disks, on any other partitions or even on a hard drive's free space
ESET SysInspector is a free, state of the art diagnostic tool for Windows x 64bit systems. It is also an integral part of ESET Smart Security 4 and ESET NOD32 Antivirus 4. It peers into your operating system and captures details such as running processes, registry content, startup items and network connections. Once a snapshot of the system is made, ESET SysInspector applies heuristics to assign a risk level for each object logged.
PrintCounter is a professional log application designed for storing the print jobs, for printers connected to a local machine.The program will work directly with the Printer that is connected with a USB port, Local port or the Printer Port only. You can view the Print Job Report through URLs for each machine. The program works just like a Network Printer software bundled with the machine. You can use unlimited printer on computer client.
GOM Media Player The only media player you need - for FREE! Not only is GOM Media Player a completely FREE video player, with its built-in support for all the most popular video and Media Player formats, tons of advanced features, extreme customizability, and the Codec Finder service, GOM Media Player is sure to fulfill all of your playback needs. With millions of users in hundreds of countries, GOM Media Player is one of the world`s most popular video players. Whats New : Added "Touch Setting" feature for touch screen devices. Added "Search box" feature on playlist. (Ctrl+F) Supported "HTTPS URL" for youtube or net radio playback. (Ctrl+U) Added "Music Tap" on preferences related to play music files. Improved performance related to "speed of add & delete" of files on playlist. Other miscellaneous corrections, fixes, and changes
Iperius Backup is one of the best free backup software, also released in commercial editions for those who need advanced backup features for their companies. The freeware version of Iperius Backup allows you to backup to any mass storage device, such as NAS, external USB hard drives, RDX drives, and networked computers. It has comprehensive scheduling and e-mail sending functions. It supports zip compression with no size limit, incremental backup, network authentication and the execution of external scripts and programs.
Maryfi is a free and easy to use software router for Windows 7, 8 , and 8.1 computers. With Maryfi, users can wirelessly share any Internet connection such as: a cable modem, a cellular card, or even another Wi-Fi network. Other Wi-Fi enabled devices including laptops, smart phones, music players, and gaming systems can see and join your Maryfi hotspot just like any other Wi-Fi access point and are kept safe and secure by password-protected WPA2 Encryption.
