1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
AntiSpy is designed to clear the history of your activities on a PC.
|
|
Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for Microsoft Outlook. It is completely integrated into this program, allowing users to encrypt outgoing e-mails auto...
|
|
A program to recover lost or forgotten passwords (including multilingual ones) to protected Microsoft Project files. The passwords are recovered instantly; all versions of MS Project are supported....
|
|
Morello KeyRing is the easy and secure way to manage all your passwords, PIN's and other account information.
|
|
The Dell Latitude CS, CSx series Security Chip w/Password Recovery Service allows for resetting of Dell Latitude CS, CSx series BIOS passwords. The package includes instructions. This package inc...
|
|
The Ultimate ZIP Cracker uses several powerful algorithms to restore lost ZIP, ARJ, MS-Word and MS-Excel passwords. UZC is amazingly fast, capable of testing more than 4,500,000 ZIP passwords/sec o...
|
|
A program to recover (decrypt) files encrypted on NTFS (EFS) partitions created in Windows 2000. Files are being decrypted even in a case when the system is not bootable and so you cannot log on, a...
|
|
Email Spy is email monitoring software and surveillance tool designed for consumers and businesses. If you positively need to know EXACTLY what your children, spouse or employees are sending by ema...
|
|
Any@Web is a powerful software specifically designed to sniffer, capture, monitor and record Internet activities in the network. It records any web pages viewed, files downloaded and emails sent an...
|
|
XP-Protector is security tool for Windows XP and Windows 2000.It provides easy and comprehensive access to many security features of these systems, so that home users without experience with admini...
|
|
If you lose or forget the password for MS Money, don't despair - use Accent Money Password Recovery to recover the password faster than you will remember or find the password otherwise. The Accent ...
|
|
Advanced wordlist is a huge set of words in a text file - one word per line. Now it contains nearly 3 millions commonly used words of most world languages. Who can use it: system supervisors to ch...
|
|
Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for MSN Instant Messenger. It is completely integrated into this program, allowing users to encrypt outgoing messages a...
|
|
Family Key Logger - this is the best choice, if you want to know what others are doing on your own computer while you are not at home (or office). Install Family Keylogger, set options "Start in hi...
|
|
Wipe your disk by using low-level functions
|
|
You could fiil up this order form if you wish to update our old products :- Stealth Keyboard Interceptor (SKIn98) v2.0, v5.0; - Stealth Keyboard Interceptor (SKInPro) v4.0, v5.0; - Stealth Keyboar...
|
|
Polar Encrypt is an intuitive windows encryption tool that allows you to encrypt & decryptyour data (folders, files and text) using the unbreakable new US standard 256-bit AES (Rijndael) algorithm....
|
|
Setting Database Userlevel security for Access Databases have always been safe ways of securingsensitive data. But chances are that in many a times, the owner who set thepassword forgot it or is no...
|
|
Recover passwords to Microsoft Excel files: password to open, password to modify, workbook protection password, sheet protection passwords. Most passwords are recovered instantly;
|
|
Recover passwords to web sites saved in Microsoft Internet Explorer (in local password list), as well as AutoComplete strings (form fields). Can also reset Content Advisor Passwords. IE versions fr...
|
|
MacDetective is a smaller, powerful keystroke logging application for the Macintosh! MacDetective is one of the only working applications available for the Macintosh that allows you to record discr...
|
|
A program to recovering lost or forgotten passwords to ACE/WinACE archives. Supports the customizable
|
|
Data Locker makes any program(files) you choose inaccessable to anyone else except those with your password. These password protected files can't be viewed, modified, or run. In essence they are l...
|
|
Do you wonder what your spouse, your kids, or employees are doing on the computer when you are not around? Do they hide windows as you walk by? Do you want to know exactly what is going on? If you ...
|
|
Password Protection Pro delivers automatic, on-the-fly encryption that protects files and folders using well-known and trusted Cryptographic algorithms with the versatility to protect all PC based ...
|
|