1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
|
Hide Files is security program to hide any number of files or folders.You have any files or programs that you don't want to share with other or they contain financial and tax information, passwords...
|
|
|
HB Crypt Source DLL features 12 cryptographic algo's, compiled in C++. viz. Blowfish, Twofish, Rijndael, Skipjack, Serpent, Gost, RC4, TEA, DES, ARA, AES, RODTHA. This compact C++ DLL saves many ma...
|
|
|
NecroFile is a state-of-the-art disk protection utility; little beknownst to most of us, when we tell Windows to delete a file from the trash bin, it is not actually deleted at all. NecroFile elimi...
|
|
|
If you are worried about protecting your children from the dangers of the Internet, concerned about your employees playing games, surfing inappropriate websites, leaking company information by e-ma...
|
|
|
XPCSpy Pro is the most powerful surveillance and monitoring solution for home or office use. This easy-to-use spy software allows you to monitor and record all activities (include keystrokes, websi...
|
|
|
Every day at home or in office, you must remember a lot of password...the big problem is: where do you write these informations?!On a post-it attached on the monitor?FORGET IT!Use MPS Password Mana...
|
|
|
Encode It is a easy to use file security system using the new SCC 524,288 Bitencryption method - very secure and a single system wide password. In addition,it employs 21 layers of protection to ens...
|
|
|
This nifty software allows users to decrypt passwords hidden under asterisks"*" characters. Most programs fail to uncover passwords on XP or NT systems,Behind asterisks works on any Windows systems...
|
|
|
Using one of +Hide It;'s five data hiding techniques, you can hide data files inside image files. Most image files will not be noticably changed from the original (depending on the source and which...
|
|
|
With Desktop Orbiter, protecting your network is now a matter of a point-and-click procedure. Security features include a suit of powerful Desktop Restrictions, and Access Control procedures to avo...
|
|
|
Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on forinstant messengers, such as America Online's ICQ.It is completely integratedinto these programs, allowing users to en...
|
|
|
Beautiful Calculator is a handy replacement for the standard Windows calculator with many additional features. It has a skinnable interface and many beautiful skins! This calculator uses new skins ...
|
|
|
AlertMobile Pro™ is a special software for computer security incidents responce. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and ha...
|
|
|
Attempting to understand how the inside magic of Windows administering works may be a challenging task even for an experienced administrator. Needless to say, smaller companies that cannot afford h...
|
|
|
Holiday Special: To save 5%, Enter the code: DELT-R1E9-HOL at checkout.If you are tired looking for a single real wallet where you can keep your passwords, PINs, calling cards, contacts, confirmati...
|
|
|
SPY on what people do on your computer when your not around with a Keystroke Logger, Mouse Monitor, Programs Opened\Closed list, and a Screen Capture tool.SPY can run in Stealth mode to SPY secretl...
|
|
|
MS Backup Password Recovery recovers passwords to all versions of MS Backup .qic files.
|
|
|
Ashampoo Power Encrypt Deluxe makes powerful encryption technology accessible to everyone. Now you can protect the valuable data on your computer and send confidential information to others without...
|
|
|
The IBM ThinkPad 365X, 365XD Security Chip w/Password Recovery Service allows for resetting of IBM ThinkPad 365X, 365XD BIOS passwords. The package includes instructions. This package includes th...
|
|
|
Select up to 64 folders of your choice to hide and protect by a password. In one mouseclick your selected folders became invisible: it is impossible to find hidden folders,access any file in them ...
|
|
|
Magic File. it can add password to any files on your computer. When a file has be done with it, then if you open the file,it will ask you to write password,if the password you write is right, it wi...
|
|
|
Boss Everyware gives a clear picture of how a computer isbeing used. It secretly logsprogram names, window titles,visited URLs, user names, andkeystrokes. With its ReportManager, Boss Everyware als...
|
|
|
A program for recovering lost or forgotten passwords for ARJ/WinArjarchives. Supports the customizable
|
|
|
A versatile desktop security tool for home users and computer administrators alike.Combining a selected array of options, many different levels of security can be set with the same ease they can b...
|
|
|
1st Privacy Tool is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you ...
|
|