17 Jan 2015
Let the java flow by connecting the pipes! Your task in this game is to rearrange the tiles so that they form a pipe which allows the coffee to flow and reach the nozzle. At the start of each level,...
17 Jan 2015
Let the java flow by connecting the pipes! Your task in this game is to rearrange the tiles so that they form a pipe which allows the coffee to flow and reach the nozzle. At the start of each level,...
17 Jan 2015
Hide ALL IP is the worlds best IP hide software, hide all your applications and games IP from snoopers & hackers, allows you to surf anonymously, prevent identity theft, and guard against hacker intrusions, all just need a click. Your...
17 Jan 2015
SFA ? is a high-tech combination of extremely secure data protection solution and real easy to use and manage system. Smart technology of SFA requires no installation, no drivers, no passwords, and uses allowed USB flash drives as access keys,...
17 Jan 2015
Leak Blocker prevents data leakage from corporate computers using removable devices. It can be used to achieve two main goals: restricting the use of external devices and activity monitoring (including file access actions). In addition Leak Blocker can allow only...
17 Jan 2015
The Alloclave memory profiler makes it easy to collect detailed information about your C++ Windows application's memory behavior. It displays the information in a visual way that makes your problem jump out at you. It is then easy to fix...
17 Jan 2015
Deleaker is a useful extension for Visual Studio 2005, 2008, 2010, 2012, 2013 that helps you to analyze programming errors, many of which are unique to Visual C++. Deleaker is a great tool for Visual C++ developers who occasionally have...
17 Jan 2015
One of the biggest 'improvements' that Mozilla claims is the Firefox memory usage, in particular, the vanquishing of memory leaks. If you thought it was too good to be true you were right. Firefox still uses a lot of memory...
17 Jan 2015
Tenorshare Android Data Recovery is easy yet professional Android file recovery software that can recover lost contactes, photos, text message, call history and video from Android phone and tablet. With fancy inerface, you can easily control it and accomplish the...
17 Jan 2015
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two...
17 Jan 2015
Avant Browser's user-friendly interface brings a new level of clarity and efficiency to your browsing experience, and frequent upgrades have steadily improved its reliability. Multi-Processing: Multi-Processing design offers you a crash-free, lock-up-free, memory-leak-free internet browsing experience and high reliability. When...
17 Jan 2015
A spectacular retro arcade blaster. Edge online: ... delivers a psychadelic experience that one would be remiss to not experience. Taking the simple concept of a single ship shooting various sized space objects from the sky, Spheres of Chaos delivers...
17 Jan 2015
Hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media.
17 Jan 2015
PC Spy Monitor secretly monitors Facebook, chats, emails, keystrokes, passwords and sends reports to your email or ftp. It logs Windows Live Messenger, Skype, Yahoo Messenger and other IMs. It also takes photo shots of online video talk like a...
17 Jan 2015
A complex data leak protection system, SecureTower is an essential for any business that extensively uses Internet communication channels in its daily working. The Internet is often the biggest source of any company's leaks and in order to preserve your...
17 Jan 2015
Help guard against information leak and intrusion of malware on your home or business computers using USB Security, a powerful solution which helps users to protect their PCs and organizations to protect their wider networks. With centralized deployment and management,...