New additions

Vov Watermark Video

The freedom and flexibility the Internet provides you with come with a downside, namely the fact that your creations are constantly at risk. This is because, if measures are not taken, they can be claimed by people who actually have...


Paper Wallet Generator

Create and print paper wallets for the safe long-term storage of your Bitcoin, Litecoin, Bitcoin Reference line and Reference line coin. If you store your coins on a paper wallet the coins cannot be stolen from your computer. You can...


Vov Picture Downloader

Picture downloader to find and download millions of pictures from the web easily. Vov Picture Downloader features a simple interface comprising two separate tabs, one for searching for images using a search engine, and the other for performing a search...


VCF to CSV Converter

VCF files store information regarding your contacts, enclosing more vCards (short for Virtual Business Cards), each on a separate row. Such files are used to export and import contacts from and to Microsoft Outlook. In case you want to build...


Data Backup PC for Windows

Data Backup PC for Windows gives users the ability to easily create customizable, scheduled backup sets that help keep their important files safe. Data Backup PC allows you to choose from a number of predefined backup sets to get started...


Data Rescue 5 for Windows

Data Rescue PC for Windows is a data recovery software designed to make it easy to find your lost or deleted files. Data Rescue PC is designed to scan any type of media which appears as a disk device. This...


Data Rescue 5 Professional for Windows

Data Rescue Professional is cross-compatible, giving professional users access to both the Windows and Mac software under a single license. This gives professionals the advantage of being able to recover from most devices in their business environment regardless of operating...


Break the Prison on PC

You have been framed for a crime and have been sentenced to death you know what this means! Thats right, A PRISON BREAK! First, you need to think up of a brilliant plan to clear your name. Thankfully, you are...


Dungeons and Monsters

3d action-RPG game. You have to fight against spiders, warriors, dragons, ghouls and other monsters to collect all magic scrolls on every location. When all magic scrolls are found the portal to another location will be opened and you will...


Pharmacy Manager

The software has an easy to use Interface. It can be used at any retail counter for Medical items. Pharmacy Database can be Backed up whenever desired. Software can provide the list of medicines which have expired, so that they...


Patient Manager

Patient Manager is a handy program for Doctors & Physicians who want to maintain records of their Patients digitally. The software allows Doctors to store personal, medical history of the patient. Symptoms, Allergy, disease history is maintained. Medicine prescription are...


IGEO MS OUTLOOK PASSWORD RECOVERY

This software has been specifically designed to provide users with a utility that can locate their PST file password for them, essentially decrypting their file by accessing the user's personal folder. The passwords are protected by Outlook using complex encryption...


Import Folder Structure for Outlook

This free utility imports the Outlook folder structure from XML files that can contain the whole complex hierarchy with information about folder types and permissions. This file can be created with Export Outlook Folder Structure utility and edited in any...


Export Folder Structure for Outlook

This free utility exports the Outlook folder structure to an XML file retaining the folder types (mail, calendar, contacts, tasks, etc.) and customized user permissions. You can import this file into another folder, new mailbox or Exchange Public Folder by...


Tenorshare iPhone Backup Unlocker

iPhone Backup Unlocker can help you recover lost password to unlock iPhone, iPad, iPod touch backup instantly.Tenorshare iPhone Backup Unlocker provides 3 types of attacks, namely Brute-force Attack, Brute-force with Mask Attack and Dictionary Attack. Select the most appropriate one...