Popular in 3 days
0
Battery Optimizer
Battery Optimizer is a Windows application that allows you to monitor the battery status of your laptop. There are alerts that inform the user about low battery level. The program is also capable of
0
UVScreenCamera
UVScreenCamera is a Windows application for creating screenshots and recording screen video. You can specify an arbitrary capture area and additional settings. There is a built-in editor and a module
0
phpMyAdmin
phpMyAdmin is a Windows application for managing classic relational databases. The web interface is used for access, which allows you to perform all necessary operations. You can create tables,
0
dbForge Studio
dbForge Studio is a Windows application for MySQL database administration. All necessary tools for working with tables and queries to them are built in. You can change the structure, integrate new
0
EZ CD Audio Converter
EZ CD Audio Converter is a Windows application for audio conversion. At the conversion stage, you can select bitrate, format, use the tag editor and other features. It is possible to directly copy
0
Greenshot
Greenshot is a Windows application for creating screenshots. You can capture active windows, the whole screen or arbitrary areas. It supports hotkey control and integration with office programs for
0
Free Video to JPG Converter
Free Video to JPG Converter is a Windows application that allows you to storyboard a video clip. You can pre-select the frequency of fragment generation. The final result is a set of images. Batch
0
Bolide Movie Creator
Bolide Movie Creator is a video editing application. You can create unique and interesting slideshows based on a set of photos and add musical accompaniment. An impressive selection of effects and
0
Ashampoo 3D CAD Architecture
Ashampoo 3D CAD Architecture is a professional Windows application that is a complete system for designing various objects. You can independently create three-dimensional building objects, plans and
0
Shadow Defender
Shadow Defender is a Windows application for additional protection of the operating system. It is possible to deploy a special isolated container to run suspicious files. This allows you to safely