001 Video Converter, convert any video to iPod, iPad, PSP, iPhone, Zune, Xbox360, The best video audio converters for MP4, Flv(Flash), Avi, Divx, Xvid, H.264, Mkv, Mpg (Mpeg-1,2), Wmv, Rm, Rmvb, Mov, Vob, 3GP, OGG, ASF, WMA, WAV, MP3, AC3, AAC, etc.
Asoftech Photo Recovery is an easy to use data recovery software available to restore your photos, music and videos from local PC and removable devices. No matter multimedia files have been deleted accidently, or memory card has been formatted.
Evidence Exterminator cleans all PC usage history information. Clean up your cookies, history, temporaryinternet files, browser's cache, recycle bin, recent documents, and also remove all the temporary files left by your system.
EZ SMSTracker monitors and records your children's or employees' SMS and MMS texts on a smartphone. All incoming and outgoing texts will be recorded. Keep your kids from cyber bullying, drug abuse, sexting, alcohol abuse and online predators.
FayeTRACKER is a replacement application for the netstat feature in Windows. It offers the same functionality as the netstat command, but has many more features and it makes it much easier to see how applications are connected to the Internet.
Spylocked removal tool comes from the house of SpywareSignatures.com dedicated to protecting people from all sorts of malware including Spylocked. Spylocked removal tool is absolutely free and does not show any ad.
Using the latest technology and methods to removespyware from your computer - even the most stubborn spyware. And you're even doing it riskfree because if necessary, we'll have our specialists examine and disinfect your system.
hide.me VPN released an update for its Windows app introducing some new features like IP leak Protection, DNS leak Protection, Fallback Protocol Support, Kill Switch, Auto-Connect, IPv6 protection and a lot more.
Restrict access to selected websites from your computer. Passwordprotect them. Just select a password and a list of websites to protect. When a protected website is about to be visited computeruser will be presented with a password prompt.
Internet Secure Tunneling can forward otherwise insecure TCP traffic through encryptedSSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure.