1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
Find hidden data, such as IE form autocomplete data (including logins and passwords), recover various internet passwords (passwords to protected websites, email account and identity passwords), and...
|
|
LogACL is a security audit tool for Windows NT administrators. It enables administrators to manage adefined part of one or more disks, or a whole unit, then extract or modify allinformation about e...
|
|
An advanced encryption utility which integrates into the Windows Explorer and allows you to encrypt files, email messages, create self-extracting .exe files, work with .zip files. Program has 17 en...
|
|
SpyAgent is a powerful monitoring and surveillance tool that is useful on all Windows platforms. SpyAgent allows you to monitor and record all system keystrokes, websites visited, windows viewed, a...
|
|
This is a Business user licence(s) for Lockout Desktop Security
|
|
Lock Folder XP is a unique computer safeguard tool that has been praised by corporate security experts and IT industry pundits. It provides multilevel defense system to ensure that your data is alw...
|
|
DUN Shield
|
|
Maintain a list of forbidden windows to secure the system.Keep your system safe from unauthorized eyes.
|
|
Adds strong encryption and privacy to MSN Messenger.
|
|
The spy of the keyboard, allows to intercept all pressing of keys on the keyboard. It is the best choice what to watch what to know that did on your computer.
|
|
Armor2net personal firewall can stop hackers and data thieves and protect your PC from Internet-borne threats (worms, Trojan horses and spywares). This PC firewall software provides much more Inter...
|
|
Outpost Firewall is the most feature-packed Personal Firewall for Windows in the world. It gives peace of mind from any threats by Cookies, Ads, E-mail viruses, Backdoors, Spyware, Crackers, Adware...
|
|
Morello KeyRing is the easy and secure way to manage all your passwords, PIN's and other account information.
|
|
IE Blaster is a Simple and easy to use Internet Explorer Cookie and History cleaner.
|
|
This program can be used to recover the lost password for popular applications. Password for the files/documents created in the multiple applications are supported.The program is compatible with al...
|
|
4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected dis...
|
|
SPECIAL OFFER for academic institutions, schools and non-profit organizations ONLY (multilicense discount about 80-90%).In order to get these licenses, please send us some document (by Fax - (508) ...
|
|
Utilize the latest in encryption technology to protect your sensitive data. Privacy tools include file/folder encryption, e-mail encryption, file/folder shredder, file/folder Backup with auto encry...
|
|
The complete solution for the background control and logging the users activity.This software allows to record actions of the user (users) of a computer on start the applications, opening documents...
|
|
Salus is a security application which allows the owner or user of a desktop or laptop computer to see which files are accessed, when, for how long, which Internet sites are being connected to, who ...
|
|
The "2-User Pack" allows you to install and use the software on 2 computers such as your office computer and home computer.Very often, we tend to use the same password for different web site regist...
|
|
Enigma II - Professional Version is the most advanced personal encryption software available. It allows you to store up to 50 accounts in your computer. You can safely store computer passwords, c...
|
|
FastWiper is a powerful wiping utility
|
|
Setting Database Userlevel security for Access Databases have always been safe ways of securingsensitive data. But chances are that in many a times, the owner who set thepassword forgot it or is no...
|
|
CyberSpy, the spy software solution for powerful PC monitoring and surveillance needs. Records all emails typed and viewed, chat conversations, websites, keystrokes, passwords typed, and even deskt...
|
|