1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
|
Interscope BlackBox offers advanced solutions for protecting your most critical asset: data. With support for strong cryptography, integration in major e-mail clients, modular architecture, self-ex...
|
|
|
This simple to use program allows you to completely erase the contents ofsensitive files that you select. Windows file deletion is not secure - when you delete files, all data from them is still av...
|
|
|
The PrivacyKeyboard™ for Microsoft. Windows. NT/2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging pr...
|
|
|
This section will be added after setup is complete.
|
|
|
"If you require a program that will prevent any other person from being able to access your computer, then this is the program you need." --PCWinScreenLock is unlocked via answering a question that...
|
|
|
RegBlock protects your computer against the installation spy software software BEFORE the damage can be done. With the single click of a button RegBlock users can select from a wide variety of soft...
|
|
|
iSpyNOW 3.0 is the first remote install Computer Monitoring product offered anywhere! iSpyNOW offers users the ability to remotely install the application from any location and view the logs from a...
|
|
|
Lock My PC allows you to lock your computer with a password while you leave it for a time. It shows a lock screen, disables Windows hotkeys and mouse. You can use a hotkey or the system tray to loc...
|
|
|
Advanced Encryption Package 2003 Professional. Typically you encrypt files because you don't want others to see them, but sometimes you want to send someone an encrypted file. Most if not all encry...
|
|
|
eSTOP! was developed as a security product with the intent to view and (e)mergency STOP problem TCP connections. It displays in real-time any TCP connection in or out of your computer. Web connecti...
|
|
|
The StealthNetWall(TM) firewall is a true IP Packet filter. It will prevent PINGS and Trace Routes to your computer. It is simple to install, and there is no complicated configuration needed to pro...
|
|
|
The AWRDPR program will help you recover lost or forgotten passwords to open MS Word documents. The current version supports documents of the MS Word 6/7/8/9 versions; it supports three types of al...
|
|
|
SpyAgent is a powerful monitoring and surveillance tool that is useful on all Windows platforms. SpyAgent allows you to monitor and record all system keystrokes, websites visited, windows viewed, a...
|
|
|
Watchful Eye is a powerful utility to keep logs of how your computer is being used when you are unable to be physically present. Watchful Eye can record web pages visited, log all system keystrokes...
|
|
|
PlexCrypt protects documents and folders via PKI-based encryption using secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, ...
|
|
|
Lock down your system like never before. Exercize total control over your computer with the following security options: Explorer Control, File Lock, Folder Lock, System Lock, Internet Lock, Shortcu...
|
|
|
Please purchase this plugin only if you already own a registered copy of our Top Secret Messenger (TSM) product which included some other plugin. If you do not own TSM, you will need to order the ...
|
|
|
BuryBury lets you manage your personal files and keep them out of sight of others. 'Others'would be spouses, kids, bosses etc. All files are securely encrypted, renamed and buried on your hard driv...
|
|
|
LockGear Enterprise is a powerful and easy-to-use software utility that allows password protection of your system from unauthorized access when you are off your workplace. You can lock computer off...
|
|
|
Desktop Scout is a feature-packed solution, providing administrators with the ability to record comprehensive surveillance logs and impose effective access restrictions on any Windows PC.By operati...
|
|
|
Data Locker makes any program(files) you choose inaccessable to anyone else except those with your password. These password protected files can't be viewed, modified, or run. In essence they are l...
|
|
|
A professinal program for encrypting, decrypting, and wiping files and folders of any type. GUIDESX uses 448 bit Blowfish and 128 bit DESX key to encrypt your sensitive data. GUIDESX has ability to...
|
|
|
Dark Files can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read...
|
|
|
The secure solution for storing all your passwords.
|
|
|
PAL PC Tracker is a computer tracking and theft recovery software system. PC Tracker allows the user to do their own monitoring and works with both Laptops and Desktop computers.Every time you boot...
|
|