1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
|
A program for recovering lost or forgotten passwords for ARJ/WinArjarchives. Supports the customizable
|
|
|
Hide Folders is an access control utility that allows you to hide your sensitive folders out from users and applications. You need only to select folder(s) you wish to hide from prying eyes and cli...
|
|
|
StrongCrypt is a pureJava encryption software which offersa choice of a number of'industry standard'encryption ...
|
|
|
Password Architect helps you generate secure passwords that very difficult to guess or to crack. Whether you're a home user or a network administrator, you'll find that Password Architect is the to...
|
|
|
A versatile desktop security tool for home users and computer administrators alike.Combining a selected array of options, many different levels of security can be set with the same ease they can b...
|
|
|
Find hidden data, such as IE form autocomplete data (including logins and passwords), recover various internet passwords (passwords to protected websites, email account and identity passwords), and...
|
|
|
Invisible Files 2000 Pro™ (IF2000Pro™) is the program for Windows 95/98 that allows to hide any file or folder on the local hard drives of personal computers. The files are not physic...
|
|
|
Personal Passworder keeps more than just passwords! This award-winning password manager will keep your passwords, serial numbers, credit card numbers, phone entries and other information safely and...
|
|
|
STARR PRO is the popular all-round monitoring solution. It allows companies and individuals to track the use / abuse of PCseasily and invisibly. It logs keystrokes, user names, passwords, path name...
|
|
|
SpyAgent is a powerful monitoring and surveillance tool that is useful on all Windows platforms. SpyAgent allows you to monitor and record all system keystrokes, websites visited, windows viewed, a...
|
|
|
4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected dis...
|
|
|
COBA РС™ for Microsoft. Windows. 95/ 98/ ME/ NT/ 2000/ XP is an ultimately invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal ...
|
|
|
iSpyNOW 3.0 is the first remote install Computer Monitoring product offered anywhere! iSpyNOW offers users the ability to remotely install the application from any location and view the logs from a...
|
|
|
Resorts QWK mail packets so that Scribe 4.0 can use them correctly. Some BBSes produce a type of packet that is ordered in a way that is incompatible with Scribe 4.0. QWK-Sort takes the packet an...
|
|
|
A program to recover lost or forgotten passwords (including multilingual ones) to protected Microsoft Money databases. The passwords are recovered instantly; all versions of MS Money up to Money 20...
|
|
|
NetVizor is a powerful, award-winning, monitoring and supervising solution for the corporate or personal network. NetVizor allows the administrator to monitor their entire network from one CENTRAL ...
|
|
|
Encrypt and Hide: Files and Folders, My Documents, Favorites, Desktop, Internet History, Control Panel, Data/Time setting. Supports 8 encryption algorithms. Hide Folder start up is password protect...
|
|
|
A program to decrypt protected Adobe Acrobat PDF files, which have
|
|
|
You could fill up this order form if wish to update our product PC Acme Pro v5.0 to other PC Activity Monitor Net Pro v5.0
|
|
|
Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for MSN Instant Messenger. It is completely integrated into this program, allowing users to encrypt outgoing messages a...
|
|
|
You could fiil up this order form if you wish to update our old products :- Stealth Keyboard Interceptor (SKIn98) v2.0, v5.0; - Stealth Keyboard Interceptor (SKInPro) v4.0, v5.0; - Stealth Keyboar...
|
|
|
Any document type can be protected using Adhaero Transit. The documents are compressed and encrypted before conversion to an executable format. This creates a Self Extracting Encrypted Document or ...
|
|
|
AceSpy monitors PCs by taking screenshots, keeping key logs, including chats, e-mails, web sites visited, searches performed, and more. AceSpy is completely hidden to the PC user, and you can have ...
|
|
|
Informer logs computer activity including all keys pressed, music, picture and video files played, web sites visited, DUN connections, applications run, deleted files, many special shell events lik...
|
|
|
The Dell Latitude CS, CSx series Security Chip w/Password Recovery Service allows for resetting of Dell Latitude CS, CSx series BIOS passwords. The package includes instructions. This package inc...
|
|