1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
|
Files encryption software that uses dual-keys, multi-stage algorithm
|
|
|
nfiltrator is an easy to use, intuitive security scanner that can quickly audit your computer for vulnerabilities, exploits, and information enumerations. Infiltrator can reveal and catalog a pleth...
|
|
|
You could fill up this order form if wish to update our old products (as SKIn v2.0, v5.0; SKInPro v4.0, v5.0; SKInNT/2K; PC Acme v2.5; SKInAS v1.0; PC Acme Pro v4.0) to new PC Activity Monitor v5.1
|
|
|
BuryBury lets you manage your personal files and keep them out of sight of others. 'Others'would be spouses, kids, bosses etc. All files are securely encrypted, renamed and buried on your hard driv...
|
|
|
4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected dis...
|
|
|
Smallest and HIPAA-compliant FTP client. Ideal for fast and secure file transferring and sharing on the Internet. Include HTML page encryption.Features: No installation or setup needed. Security w...
|
|
|
Use Encrypto to encryptE-Mails, Chat messages, text documents, or any text that needs to be secure.You can choose the encryption key for easy encrypting. Encrypto uses a easyto use interface and ha...
|
|
|
JvCrypt is a powerful encryption and compression utility that allows you to encrypt your sensitive files with ease. With JvCrypt you can store your passwords in a secure password database and even ...
|
|
|
You could fiil up this order form if you wish to update our old products :- Stealth Keyboard Interceptor (SKIn98) v2.0, v5.0; - Stealth Keyboard Interceptor (SKInPro) v4.0, v5.0; - Stealth Keyboar...
|
|
|
A versatile desktop security tool for home users and computer administrators alike.Combining a selected array of options, many different levels of security can be set with the same ease they can b...
|
|
|
Sentry locks down your computer to keep it secure when you aren't around. Many options are provided - you can customize the appearance of your screen, have your favorite screen savers run from wit...
|
|
|
SleuthWatch 4.5 is the newest version from SonnarSoft. It's user friendly and now network compatible so you don't even have to leave you chair to see what someone else in the company has been doin...
|
|
|
MS Access 2000 Password Recovery will display the password to any MS Access file type (file extensions of .mdb, .mda, and .mde). This program works for MS Access files saved in MS Access 2000.
|
|
|
PC Activity Monitor Pro™ (PC Acme Pro™) for Microsoft Windows 95/98/ME/NT/2000/XP is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for personal PCs...
|
|
|
Universal Shield is a unique computer safeguard tool that has been praised by corporate security experts and IT industry pundits. It provides multilevel defence system to make sure your data is alw...
|
|
|
Today we all use tens or even hundreds of complex passwords to protect our access to private information. Passwords are given to us by network services, paging and cellular companies, software prod...
|
|
|
Invisible Files 2000 Pro™ (IF2000Pro™) is the program for Windows 95/98 that allows to hide any file or folder on the local hard drives of personal computers. The files are not physic...
|
|
|
The Leviathan PC Firewall is an application which will prevent hackers from accessing your computer, it will monitor and log activity on certain ports (which can be customized) and has other featur...
|
|
|
Multilingual Wordlists for more than 20 different languages to be used with password recovery utilities and dictionary-based attacks.English (~2,610,000 words)African (~128,000 words)Australian (~8...
|
|
|
Keyboard Logger is an ultra small and very powerful key logging utility
|
|
|
COBA РС™ for Microsoft. Windows. 95/ 98/ ME/ NT/ 2000/ XP is an ultimately invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal ...
|
|
|
The IBM ThinkPad 760C, 760CD Security Chip w/Password Recovery Service allows for resetting of IBM ThinkPad 760C, 760CD BIOS passwords. The package includes instructions. This package includes th...
|
|
|
Watchful Eye is a powerful utility to keep logs of how your computer is being used when you are unable to be physically present. Watchful Eye can record web pages visited, log all system keystrokes...
|
|
|
DigiSecret is an easy-to-use, secure, and powerful application for file encryption and sharing. It utilizes strong and time-proven encryption algorithms for creating encrypted archives, self-extrac...
|
|
|
Any@Web is a powerful software specifically designed to sniffer, capture, monitor and record Internet activities in the network. It records any web pages viewed, files downloaded and emails sent an...
|
|