10 Results for



Kingo Android Root

Root your android device.

3.5 stars Editors' rating on Dec 15, 2013
3.5 stars Users' rating out of 52 reviews
download now
1,779,179 total downloads
23,083 last week

Tiny Thoughts on Trustworthiness

Tiny Thoughts on TrustworthinessRita experiences the negative feelings of steeling and recognizes the importance of honesty and gaining the trust...


Ammyy Admin

Control remote desktop of unattended computers, restart them, log-in/ out, or change users.

2.5 stars Users' rating out of 21 reviews
download now
110,679 total downloads
1 last week

Clean Uninstaller

Unistall programs, which present some difficulty for removing.

3 stars Editors' rating on Feb 27, 2009
2.5 stars Users' rating out of 10 reviews
download now
77,084 total downloads
25 last week

Fastest P2P

Share and download files via P2P network.

3 stars Editors' rating on Nov 10, 2009
3.5 stars Users' rating out of 6 reviews
download now
36,935 total downloads
26 last week

Trustworthy Professional Tax

Tax Software, Trustworthy Tax Pro, Income Tax Software, Income Tax, Tax Preparer

download now
2 total downloads
1 last week

Super Root Android

Get root access for your Android device.

5 stars Users' rating out of 2 reviews
download now
23,247 total downloads
594 last week

Vista Toolbar Icons

Enhance your interface with Vista Toolbar Stock Icons to make it look up-to-date.

3 stars Editors' rating on Nov 2, 2009
5 stars Users' rating out of 1 reviews
download now
22,504 total downloads
1 last week

Guiffy eXpert

Compare and merge files and folders.

5 stars Editors' rating on Nov 8, 2008
4 stars Users' rating out of 14 reviews
download now
22,156 total downloads
1 last week

Singapore news. Latest news from the most trustworthy sources.

Install the app and stay informed about the latest Singapore news! App for iPhone and iPad.


Carly Fiorina leaps to second place in Republican race

Technically Incorrect: A new CNN/ORC poll shows that the former HP CEO is now seen as a strong challenger for the Republican nomination.

By September 20, 2015


How Net neutrality helped kill the Comcast-Time Warner Cable merger

Comcast's $45.2 billion merger with Time Warner Cable is officially dead, and the companies may have the fiery Net neutrality debate that raged this past year to blame.

By April 26, 2015


​Want fancy Firefox features? Secure your website

In a bid to make the Web a safer place, Mozilla's security team proposes making encrypted connections necessary for using new Web technologies. Google's Chrome team has a similar idea.

By April 14, 2015


Uber homes in on safety initiatives amid concerns

After a series of allegations of Uber drivers committing rape and other crimes against passengers, the ride-hailing company expands on its safety measures.

By March 25, 2015


Indiegogo tries out 'crowdfunding insurance' for failed projects

Indiegogo is rolling out a test of a new service that will refund your money if a project fails to deliver within a certain time frame.

By December 3, 2014


Bill Gates heaps praise on Apple Pay

In a Bloomberg interview, Microsoft co-founder says once Apple gets involved in a new technology -- in this case, mobile payments -- it has more chance of gaining critical mass.

By October 3, 2014


Poll: Facebook not as trustworthy as Amazon, Google?

Do you trust Facebook with your personal details? A new poll suggests that only one third of internet users are comfortable with how Facebook uses their information to serve targeted ads.

By July 22, 2012


Twitter nabs top honors in security, privacy audit

Group that includes Symantec, VeriSign, and Microsoft tags Twitter tops among 800 websites for user protection, security.

By June 11, 2014


Is that photo legit? Izitru offers an answer

Photographers can upload original images to earn this service's authenticity rating. What the service can't do, though, is verify the latest viral photo your friend shared on Facebook.

By May 5, 2014


Phone scammer or trustworthy solicitor? Software calls it

Japanese researchers aim to protect potential victims of phone scams by identifying "overtrust" in their voices when they interact with the bad guys.

By March 20, 2012