1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
|
STARR PRO is the popular all-round monitoring solution. It allows companies and individuals to track the use / abuse of PCseasily and invisibly. It logs keystrokes, user names, passwords, path name...
|
|
|
Password Protect is a software program to protect your documents against unwanted access. It will not let other users view, copy, or modify your sensitive data. What differs Password Protect from o...
|
|
|
If you think that merely formatting a drive is enough to actually delete data, you may be in for a big surprise. There are plenty of free tools that can be used by anyone and that can unformat the ...
|
|
|
Using one of +Hide It;'s five data hiding techniques, you can hide data files inside image files. Most image files will not be noticably changed from the original (depending on the source and which...
|
|
|
This program can be used to recover the lost password for popular applications. Password for the files/documents created in the multiple applications are supported.The program is compatible with al...
|
|
|
SpyBuddy is the ultimate solution for monitoring spouses, children, co-workers, or anyone else! SpyBuddy allows you to monitor all areas of your PC, tracking every action down the last keystroke pr...
|
|
|
ShadowOnlineSecurityScaner new internet online security scanner
|
|
|
GridLock is a security application designed to simplify, speed up and increase the security of your Palm device without using text based passwords. It uses a simple 5x5 grid of squares to represent...
|
|
|
Files encryption software that uses dual-keys, multi-stage algorithm
|
|
|
Data transmissions are vital and became a necessity nowadays. Whether you share your private messages with your close friends, or business / commercial secrets with your partners, you must protect ...
|
|
|
NTbrute is a hacking utility for scanning for and breaking into Windows NT/2000 boxes remotely. Checks the machine's configuration and Account Security Policy anonymously and depending on the data,...
|
|
|
The IBM ThinkPad 760XL, 760XD Security Chip w/Password Recovery Service allows for resetting of IBM ThinkPad 760XL, 760XD BIOS passwords. The package includes instructions. This package includes ...
|
|
|
Advanced Stealth Email Redirector (Advanced SER) is a program that sends the copies of all outgoing emails. Advanced SER monitors outgoing traffic of email client software and intercepts all sendin...
|
|
|
Crime Catcher turns your web camera into a video surveillance system.It uses advanced motion detection which lead to accurate / reliable results.It has many features including:Advanced yet Reliable...
|
|
|
WebEradicator is the award-winning security solution that securely eradicates your PC activity histories. WebEradicator has the ability to cover up your previous PC activity: such as emails sent an...
|
|
|
Express File Encrypter is an encryption utility which can encrypt your personal file into an encoded format (E File) to protect your personal data from unwanted viewers. It is very easy to use, onl...
|
|
|
LockGear Enterprise is a powerful and easy-to-use software utility that allows password protection of your system from unauthorized access when you are off your workplace. You can lock computer off...
|
|
|
Password Reminder is easy to install and easy to use. All you need to do to recover a password is just drag the magnifying glass from Password Reminder over the "****" field.It can reveal almost an...
|
|
|
MacDetective is a smaller, powerful keystroke logging application for the Macintosh! MacDetective is one of the only working applications available for the Macintosh that allows you to record discr...
|
|
|
Very often, we tend to use the same password for different web site registrations, network login etc. In addition, the password that we use is often not random in nature. For those of you who actua...
|
|
|
Beware! Your computer is tracking all your activities. Are you aware that anyone who can touch your computer can know the website you have visited, the web pages, images and videos you have ever se...
|
|
|
Ths program is used for encrypting files into single one. Program has ability to compress files during encrypting. It uses powerful encryption algorithm Blowfish448it. Ability to make self-extracti...
|
|
|
Interscope BlackBox offers advanced solutions for protecting your most critical asset: data. With support for strong cryptography, integration in major e-mail clients, modular architecture, self-ex...
|
|
|
Adhaero Desk is a transparent desktop access control security program that allows you to configure your desktop so that you can protect your personal files as well as preventing other users from ma...
|
|
|
A professinal program for encrypting, decrypting, and wiping files and folders of any type. GUIDESX uses 448 bit Blowfish and 128 bit DESX key to encrypt your sensitive data. GUIDESX has ability to...
|
|