1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
|
If you use programs from the MS Office software package, then an unpleasant situation may occur when you forget or lose passwords to you MS Office documents. In most cases, the quickest way of acce...
|
|
|
4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected dis...
|
|
|
Setting Database Userlevel security for Access Databases have always been safe ways of securingsensitive data. But chances are that in many a times, the owner who set thepassword forgot it or is no...
|
|
|
Hide Files is security program to hide any number of files or folders.You have any files or programs that you don't want to share with other or they contain financial and tax information, passwords...
|
|
|
Do you wonder what your spouse, your kids, or employees are doing on the computer when you are not around? Do they hide windows as you walk by? Do you want to know exactly what is going on? If you ...
|
|
|
This program is intended to recover lost passwords for RAR/WinRAR archives of versions 2.XX. The program recovers by the method of exhaustive search all possible combinations of characters (
|
|
|
NTbrute is a hacking utility for scanning for and breaking into Windows NT/2000 boxes remotely. Checks the machine's configuration and Account Security Policy anonymously and depending on the data,...
|
|
|
A program for recovering lost or forgotten passwords for RAR/WinRAR archives. Supports the customizable
|
|
|
Select up to 64 folders of your choice to hide and protect by a password. In one mouseclick your selected folders became invisible: it is impossible to find hidden folders,access any file in them ...
|
|
|
Privacy Guardian protects your privacy by eliminating your Internet and offline computer usage traces, such as history lists, address bar drop downs, cache, accessed document lists and other tracks...
|
|
|
You could fill up this order form if wish to upgrade PC Activity Monitor™ (PC Acme™ ) to other product - PC Activity Monitor Pro™ (PC Acme Pro™ ) DISCLAIMER AND CONFIDENT...
|
|
|
This nifty software allows users to decrypt passwords hidden under asterisks"*" characters. Most programs fail to uncover passwords on XP or NT systems,Behind asterisks works on any Windows systems...
|
|
|
PPS-CD is a powerful utility to allow you to manage the security of your CD-ROM files. By allowing you to set both a password and an expiration date, PPS-CD is the perfect software for business se...
|
|
|
CryptEnCrypt is a powerful software application designed for electronic data protection.The files on your hard disk have no protection from unauthorized access. That means anyone who has access to ...
|
|
|
The Hewlett-Packard Pavilion X, Z series Security Chip allows for resetting of Hewlett-Packard Pavilion X, Z series BIOS passwords. The package includes instructions. This package does not includ...
|
|
|
Encrypt your perl source code , cgi source code & perl modules with ease using online web based form simple copy and paste the script and encrypt !
|
|
|
BuZzy Bar est une application complete regroupant des outils performants securisant votre station de travail ainsi que vos echanges d’informations sur Internet.BuZzy Bar comporte 6 mo...
|
|
|
This special software allows you to decrypt and display password stored behind the asterisks. It is the first tool of its kind that works automatically on Web pages, Windows 9x/NT and Windows 2000/...
|
|
|
Easy to use file encryption to keep that important information out of the wrong hands.
|
|
|
http://www.softheap.com/fr.htmlProtect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current use...
|
|
|
Byte Blast is an advanced suite of security tools designed to protect all files , programs and data.Some of the tools available in Byte Blast are offered in no other encryption/security package.Byt...
|
|
|
The spy of the keyboard, allows to intercept all pressing of keys on the keyboard. It is the best choice what to watch what to know that did on your computer.
|
|
|
Setting Database Passwords & User level security for Access Databases have always been safe ways of securing sensitive data. But chances are that in many a times, the owner who set the password for...
|
|
|
Recover passwords to Microsoft Excel files: password to open, password to modify, workbook protection password, sheet protection passwords. Most passwords are recovered instantly;
|
|
|
Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on forinstant messengers, such as America Online's ICQ.It is completely integratedinto these programs, allowing users to en...
|
|