1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
|
Icon Lock-iT XP includes many new features designed specifically for home users and shared computers. New locking features make sure your files stay put while strong encryption keeps your private i...
|
|
|
Personal Antispy can provide every computer with strong protection against most types of unauthorized activity monitoring software, both known and unknown. It effectively finds and removes keylogge...
|
|
|
This program removes the RSACi password, also know as the Content Advisor password to Microsoft Inernet Explorer. Once this password is removed, you will never be able to see it again.
|
|
|
SecureStore is a comprehensive cryptosystem that encrypts your files beforesaving them into an archive. This archive acts as a 'virtual fortress' toprevent unauthorized access to your data. Files i...
|
|
|
EZ Password Secure is a powerful yet small tool to help you manage all your usernames&passwords, as well as the URLs and descriptions, in an efficient way. You can store not only all your usernames...
|
|
|
A program to recover lost or forgotten passwords to protected Personal Storage Files (*.pst) used by Microsoft Outlook (all versions) to store emails and contacts. The passwords are recovered insta...
|
|
|
WinBlocked is a password protector utility that blocks acess to any machine without authorizated password ,the features are:Nobody will acess your machine without entering the correct password.Encr...
|
|
|
Advanced Password Manager keep all your passwords in one place! The main advantage of this password manager is that you can enter all your passwords in one place, assign a login and password for a ...
|
|
|
You could fill up this order form if wish to update our product PC Acme Pro v5.0 to other PC Activity Monitor Net Pro v5.0
|
|
|
Using one of +Hide It;'s five data hiding techniques, you can hide data files inside image files. Most image files will not be noticably changed from the original (depending on the source and which...
|
|
|
Ever wanted to spy on a computer you own but currently don't have direct access to? With IIPwr's KeySpy this is exactly what you are able to do!IIPwr is a professional surveillance software that gi...
|
|
|
Please purchase this plugin only if you already own a registered copy of our Top Secret Messenger (TSM) product which included some other plugin. If you do not own TSM, you will need to order the ...
|
|
|
Any@Web is a powerful software specifically designed to sniffer, capture, monitor and record Internet activities in the network. It records any web pages viewed, files downloaded and emails sent an...
|
|
|
Encrypt and Hide: Files and Folders, My Documents, Favorites, Desktop, Internet History, Control Panel, Data/Time setting. Supports 8 encryption algorithms. Hide Folder start up is password protect...
|
|
|
Keyboard Logger is an ultra small and very powerful key logging utility
|
|
|
The Ultimate ZIP Cracker uses several powerful algorithms to restore lost ZIP, ARJ, MS-Word and MS-Excel passwords. UZC is amazingly fast, capable of testing more than 4,500,000 ZIP passwords/sec o...
|
|
|
MicroLocked is a small, easy to setup, security program that locks your computer while leaving the display visible. Once locked your system can not be accessed until the unlock password is entered....
|
|
|
Maintain a list of forbidden windows to secure the system.Keep your system safe from unauthorized eyes.
|
|
|
Boss Everyware gives a clear picture of how a computer isbeing used. It secretly logsprogram names, window titles,visited URLs, user names, andkeystrokes. With its ReportManager, Boss Everyware als...
|
|
|
Do you want to know what your children, spouse or significant other type on your computer when you are away from it? The Keyboard Logger key logger records every keystroke made on your computer on ...
|
|
|
JvCrypt is a powerful encryption and compression utility that allows you to encrypt your sensitive files with ease. With JvCrypt you can store your passwords in a secure password database and even ...
|
|
|
Ths program is used for encrypting files into single one. Program has ability to compress files during encrypting. It uses powerful encryption algorithm Blowfish448it. Ability to make self-extracti...
|
|
|
CryptoFish is encryption utility that you can use to encrypt/decrypt files and folders to protect them from unauthorized use. CryptoFish uses a 448 bit Blowfish algorithm.It is very easy to use. It...
|
|
|
LogACL is a security audit tool for Windows NT administrators. It enables administrators to manage adefined part of one or more disks, or a whole unit, then extract or modify allinformation about e...
|
|
|
Kaspersky Anti-Hacker is the personal firewall, which provides full-scale protection for PC, running Windows, from all the attempts of non-authorized access to data, as well as from the hacker atta...
|
|