1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
|
How do you know what your staff (or family members) are doing on your PC? Are they working on your account or playing games? pcGhost software can tell you exactly who is doing what on which PC at a...
|
|
|
Encrypt and Hide: Files and Folders, My Documents, Favorites, Desktop, Internet History, Control Panel, Data/Time setting. Supports 8 encryption algorithms. Hide Folder start up is password protect...
|
|
|
Encrypt and Hide: Files, Files by Mask, Folders, Disks, My Documents, Favorites, Desktop, Internet History, Control Panel, and Data/Time setting. Supports 8 encryption algorithms. Hide Folder start...
|
|
|
COBA РС™ for Microsoft. Windows. 95/ 98/ ME/ NT/ 2000/ XP is an ultimately invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal ...
|
|
|
Invisible Files 2000 Pro™ (IF2000Pro™) is the program for Windows 95/98 that allows to hide any file or folder on the local hard drives of personal computers. The files are not physic...
|
|
|
The IBM ThinkPad 760C, 760CD Security Chip w/Password Recovery Service allows for resetting of IBM ThinkPad 760C, 760CD BIOS passwords. The package includes instructions. This package includes th...
|
|
|
LogACL is a security audit tool for Windows NT administrators. It enables administrators to manage adefined part of one or more disks, or a whole unit, then extract or modify allinformation about e...
|
|
|
We all know that there are special utilities with the help of which practically any person can restore a file, deleted by standard means of Windows. Windows simply remotes a record about existence ...
|
|
|
AlertMobile Pro™ is a special software for computer security incidents responce. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and ha...
|
|
|
You could fill up this order form if wish to upgrade PC Activity Monitor™ (PC Acme™ ) to other product - PC Activity Monitor Pro™ (PC Acme Pro™ ) DISCLAIMER AND CONFIDENT...
|
|
|
AceSpy monitors PCs by taking screenshots, keeping key logs, including chats, e-mails, web sites visited, searches performed, and more. AceSpy is completely hidden to the PC user, and you can have ...
|
|
|
Icon Lock-iT Pro includes many new features designed specifically for small offices, home networks and anyone else who regularly works with sensitive data. New locking features make sure your files...
|
|
|
Wincrypt enables users to encrypt (lock) and decrypt (unlock) any type of file, folder or email attachment so that it becomes unreadable to anyone without the password.
|
|
|
Are you selling, discarding or donating hard disk? Paragon Disk Wiper allows safe recycling of hard disks. Disk Wiper erases data on your hard disk - so you can feel certain that all ...
|
|
|
The Accent Excel Password Recovery program will help you recover lost or forgotten passwords to open MS Excel documents. The current version supports documents of the MS Excel 97/2000 versions; it ...
|
|
|
Features : *Restrict access to Desktop and Start menu items. *Restrict access of Network and Share Resources. *Restrict access to Control Panel Items. *Restrict access to selected drives . *All...
|
|
|
Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for Microsoft Outlook. It is completely integrated into this program, allowing users to encrypt outgoing e-mails auto...
|
|
|
RESTrick Control Panel is a powerful tool that can help you tune your Windows system. With the help of the RESTrick Control panel you can quickly tune your Windows system to your exact needs. REST...
|
|
|
Morello KeyRing is the easy and secure way to manage all your passwords, PIN's and other account information.
|
|
|
The IBM ThinkPad 365X, 365XD Security Chip w/Password Recovery Service allows for resetting of IBM ThinkPad 365X, 365XD BIOS passwords. The package includes instructions. This package includes th...
|
|
|
Find hidden data, such as IE form autocomplete data (including logins and passwords), recover various internet passwords (passwords to protected websites, email account and identity passwords), and...
|
|
|
XORcrypt is utility for reliably encrypting/decrypting of email and any files with the help of a LONG key file and bitwise operation "exclusive OR"(XOR).Neither complex algorithms nor closed code....
|
|
|
The DELL Latitude CPi, CPi-A Security Chip w/Password Recovery Service allows for resetting of DELL Latitude CPi, CPi-A BIOS passwords. The package includes instructions. This package includes th...
|
|
|
Flagship software application Anti-keylogger™ for Microsoft Windows 95/98/ME/NT/2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection ...
|
|
|
Computer usage monitor and analyzer. Boss Everyware Logger hiddenly runs on the background, watches what's happening and writes it into a log file or sends the logs by e-mail. Report Manager allows...
|
|