1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
|
Secure Password Manager is a desktop utility that spares you the trouble of filling in your logins, passwords, and other personal data manually. You can automatically fill in password in ANY applic...
|
|
|
AceSpy monitors PCs by taking screenshots, keeping key logs, including chats, e-mails, web sites visited, searches performed, and more. AceSpy is completely hidden to the PC user, and you can have ...
|
|
|
Any@Web is a powerful software specifically designed to sniffer, capture, monitor and record Internet activities in the network. It records any web pages viewed, files downloaded and emails sent an...
|
|
|
Lock My PC allows you to lock your computer with a password while you leave it for a time. It shows a lock screen, disables Windows hotkeys and mouse. You can use a hotkey or the system tray to loc...
|
|
|
You could fill up this order form if wish to upgrade PC Activity Monitor™ (PC Acme™ ) to other product - PC Activity Monitor Net™ (PC Acme Net™ ) DISCLAIMER AND CONFIDENT...
|
|
|
How do you know what your staff (or family members) are doing on your PC? Are they working on your account or playing games? pcGhost software can tell you exactly who is doing what on which PC at a...
|
|
|
Adhaero Desk is a transparent desktop access control security program that allows you to configure your desktop so that you can protect your personal files as well as preventing other users from ma...
|
|
|
The complete solution for the background control and logging the users activity.This software allows to record actions of the user (users) of a computer on start the applications, opening documents...
|
|
|
Password Protection Pro delivers automatic, on-the-fly encryption that protects files and folders using well-known and trusted Cryptographic algorithms with the versatility to protect all PC based ...
|
|
|
MacPhoneHome is the pre-eminent computer tracking and theft recovery software in the world. Unlike other tracking agents, MacPhoneHome allows the user to do their own monitoring at a significant re...
|
|
|
XORcrypt is utility for reliably encrypting/decrypting of email and any files with the help of a LONG key file and bitwise operation "exclusive OR"(XOR).Neither complex algorithms nor closed code....
|
|
|
Informer logs computer activity including all keys pressed, music, picture and video files played, web sites visited, DUN connections, applications run, deleted files, many special shell events lik...
|
|
|
Access Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Access XP/2002/2000/97 password-protected databases. All passwords are recovered instantly regardless o...
|
|
|
Icon Lock-iT Pro includes many new features designed specifically for small offices, home networks and anyone else who regularly works with sensitive data. New locking features make sure your files...
|
|
|
The Stealth Recorder Pro is a new type of computer software that enables you to record a variety of sounds and transfer them automatically through internet without being notified by original locati...
|
|
|
|
|
|
Spytech Software proudly presents Spytech ControlFreak. ControlFreak is a very easy to use security administration solution. ControlFreak allows you to quickly set security access rights to your Wi...
|
|
|
OnlyMe automatically locks your PalmOS device whenever the device is turned off.OnlyMe is fast, easy, and secure.If you misplace your device, OnlyMe ensures that no one reads yourinformation.Since ...
|
|
|
4Safe StrongDisk enables to keep secret data on protected disk in for Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected...
|
|
|
http://www.softheap.com/fr.htmlProtect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current use...
|
|
|
EldoS KeyLord lets you arrange confidential information (passwords, account numbers, software registration keys etc.) in a tree, search through it, print it and store it in secure encrypted file (i...
|
|
|
The IBM ThinkPad 755C, 755CS Security Chip w/Password Recovery Service allows for resetting of IBM ThinkPad 755C, 755CS BIOS passwords. The package includes instructions. This package includes th...
|
|
|
Impossible to recover, Military Strength File Shredder!7 passes of impossible to break rotating 16k random key overwrites Your files CANNOT be reconstructed, not even partially, not by software or ...
|
|
|
Passwords by Mask is a application designed to generate passwords of any character content.This application is smallest, easiest and realfast programcould be used for network administrators,interne...
|
|
|
Utilize the latest in encryption technology to protect your sensitive data. Privacy tools include file/folder encryption, e-mail encryption, file/folder shredder, file/folder Backup with auto encry...
|
|