1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
|
A program to decrypt protected Adobe Acrobat PDF files, which have
|
|
|
The IBM ThinkPad 760XL, 760XD Security Chip w/Password Recovery Service allows for resetting of IBM ThinkPad 760XL, 760XD BIOS passwords. The package includes instructions. This package includes ...
|
|
|
KeyPass makes it convenient for you to store all your passwords in a single database. The passwords are encrypted using 448-bit blowfish. A single 'master password' is all you need to unlock the pa...
|
|
|
Any@Web is a powerful software specifically designed to sniffer, capture, monitor and record Internet activities in the network. It records any web pages viewed, files downloaded and emails sent an...
|
|
|
Sentry locks down your computer to keep it secure when you aren't around. Many options are provided - you can customize the appearance of your screen, have your favorite screen savers run from wit...
|
|
|
The IBM ThinkPad 760L, 760LD Security Chip w/Password Recovery Service allows for resetting of IBM ThinkPad 760L, 760LD BIOS passwords. The package includes instructions. This package includes th...
|
|
|
Splort is a password/pass-phrase "scrambler". It lets you enter a plain, easy to remember password or phrase wherever a password is necessary. Who wants to have to memorize or carry around somet...
|
|
|
These days computers are everywhere. Reliable and tireless machines replace human beings at dull routine tasks in almost every area. Each day we tend to rely more and more on electronics as storage...
|
|
|
Family Key Logger - this is the best choice, if you want to know what others are doing on your own computer while you are not at home (or office). Install Family Keylogger, set options "Start in hi...
|
|
|
Powerful Windows 9x/Me/NT/2000 security configuration and administration tool. TweakSEC can protect your system from incautious and malicious users as well as from anybody who could accidentally ma...
|
|
|
This is an Educational user licence(s) for Lockout Desktop Security
|
|
|
AceSpy monitors PCs by taking screenshots, keeping key logs, including chats, e-mails, web sites visited, searches performed, and more. AceSpy is completely hidden to the PC user, and you can have ...
|
|
|
The number one solution for you, if you want to know what others are doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, internet...
|
|
|
SpyAgent is a powerful monitoring and surveillance tool that is useful on all Windows platforms. SpyAgent allows you to monitor and record all system keystrokes, websites visited, windows viewed, a...
|
|
|
Advanced KEYLOGGER is an invisible surveillance tool that records every keystroke to encrypted user-friendly easy-to-understand logs. Logs can also be automatically sent to any number of specified ...
|
|
|
With QuickWiper you can wipe (delete totally) sensitive files from you hard disk. QuickWiper provides quick and secure file wiping. Unique QuickWiper's feature - securing folders (overwriting of te...
|
|
|
Webroot’s Privacy Protector provides everything you need to ensure your privacy on-line and off. Combining powerful, 128-bit encryption with a uniquely non-invasive design, Privacy Protector ...
|
|
|
RegBlock protects your computer against the installation spy software software BEFORE the damage can be done. With the single click of a button RegBlock users can select from a wide variety of soft...
|
|
|
PrivateInfo is utility that helps you protect your private information from other people. It makes your information (files/folders) invisible for operating system (even for DOS). You could it use t...
|
|
|
"If you require a program that will prevent any other person from being able to access your computer, then this is the program you need." --PCWinScreenLock is unlocked via answering a question that...
|
|
|
This simple to use program allows you to completely erase the contents ofsensitive files that you select. Windows file deletion is not secure - when you delete files, all data from them is still av...
|
|
|
Maintain a list of forbidden windows to secure the system.Keep your system safe from unauthorized eyes.
|
|
|
Decrypt protected Adobe Acrobat PDF files, which have
|
|
|
This nifty software allows users to decrypt passwords hidden under asterisks"*" characters. Most programs fail to uncover passwords on XP or NT systems,Behind asterisks works on any Windows systems...
|
|
|
P-Guard is easy to use, but powerful cryptographic utility.Using approved and high-security cryptographic algorithms, this utility reliably keeps your data private from unauthorized access.
|
|