The Best 39198 Productivity Alternatives

  • RogueKiller icon

    RogueKiller

    RogueKiller is an anti-malware program written in C++ and able to detect and remove generic malwares and some advanced threats such as rootkits, rogues, worms, …

  • Gargoyle icon

    Gargoyle

    Gargoyle is a free firmware upgrade for your wireless router, based on OpenWRT but with an enhanced interface (not LUCI) focused on ease of use.

  • TorGuard icon

    TorGuard

    With all the security issues created by hackers, net censorship, identity theft, and ISPs’ monitoring activities, your online privacy has never been more threatened or important.

  • ZenVPN icon

    ZenVPN

    Uncensored And Secure Internet Access. Bypass website blocks and protect your connection from wiretapping using ZenVPN fast and affordable VPN service.

  • Cisco AnyConnect icon

    Cisco AnyConnect

    Make the VPN experience simpler and more secure with the enhanced remote access technology of Cisco AnyConnect Secure Mobility Client.

  • Hands Off! icon

    Hands Off!

    Hands Off! is an application to monitor and control the access of applications to your network and disks.

  • HTTP Ripper icon

    HTTP Ripper

    HTTP Ripper is a tool to rip content out of the web.

  • Glype icon

    Glype

    Glype proxy script is a free-to-use, web-based proxy script written in PHP. Similar to a typical proxy server, a web-proxy script downloads requested web pages and files and forwards them back to the user.

  • UFS Explorer Professional Recovery icon

    UFS Explorer Professional Recovery

    UFS Explorer Professional Recovery provides a professional approach to data recovery. Advanced multi-tool interface makes the software suit even complicated data recovery tasks, being perfect for data recovery specialists.

  • Universal Password Manager icon

    Universal Password Manager

    Universal Password Manager allows you to store all your usernames and passwords in one highly secure encrypted database. Its strengths are its simplicity, portability and security (uses 128bit AES encryption).

  • Kon-Boot icon

    Kon-Boot

    Kon-Boot is an application which will silently bypass the authentication process of Windows based operating systems. Without overwriting your old password! In other words you can login to your Windows profile without knowing your password.

  • Avast! Mobile Security icon

    Avast! Mobile Security

    Banking, shopping, email. What can’t we do on our phones? Protect everything you do, with the most trusted security in the world.

  • Codinn SSH Tunnel icon

    Codinn SSH Tunnel

    SSH Tunnel is the best way to manage your SSH tunnels, with OS X Keychain integration.

  • Net Profiles icon

    Net Profiles

    With Net Profiles, mobile computing becomes a whole lot easier. It eliminates the need to manually reconfigure your network settings when you move your desktop/laptop computer to another location.

  • Proxycap icon

    Proxycap

    ProxyCap enables you to redirect your computer's network connections through proxy servers. You can tell ProxyCap which applications will connect to the Internet through a proxy and under what circumstances.

  • PhoneRescue icon

    PhoneRescue

    An ultimate data recovery program designed for retrieving your lost iOS & Android data.

  • Lakka icon

    Lakka

    Lakka is the official Linux distribution of RetroArch and the libretro ecosystem. Each game system is implemented as a libretro core, while the frontend RetroArch takes care of inputs and display.

  • Castle Game Engine icon

    Castle Game Engine

    An open-source 3D/2D game engine for ObjectPascal. We support of lot of 3D and 2D formats (VRML / X3D, Collada, Wavefront OBJ, MD3, Spine...), we're portable to a lot of platforms (Linux, Windows, Mac OS X, Android, iOS...

  • MonoGame icon

    MonoGame

    One framework for creating powerful cross-platform games. The spiritual successor to XNA with 1000's of titles shipped across desktop, mobile, and console platforms. MonoGame is a fully managed .