1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
AntiSpy eliminates the traces of your work on computer. it includes the features:Internet Explorer(IE)- Clear Location Bar History- Clear Cookies- Delete History- Delete Temporary Internet FilesNet...
|
|
If you have many accounts of username/passwords, you always lost password, this tool will help you a lot, A hot key will activate it when needed.
|
|
LogACL is a security audit tool for Windows NT administrators. It enables administrators to manage adefined part of one or more disks, or a whole unit, then extract or modify allinformation about e...
|
|
"If you require a program that will prevent any other person from being able to access your computer, then this is the program you need." --PCWinScreenLock is unlocked via answering a question that...
|
|
Email Spy is email monitoring software and surveillance tool designed for consumers and businesses. If you positively need to know EXACTLY what your children, spouse or employees are sending by ema...
|
|
Passwords by Mask is a application designed to generate passwords of any character content.This application is smallest, easiest and realfast programcould be used for network administrators,interne...
|
|
Maintain a list of forbidden windows to secure the system.Keep your system safe from unauthorized eyes.
|
|
This ActiveX DLL for Visual Basic 6 contains 3 fast encryptionroutines and 3 internet encoding routines (Base64, quoted-printable and ROT13). There are also a checksum routinefor files and a checks...
|
|
Encrypt and Hide: Files and Folders, My Documents, Favorites, Desktop, Internet History, Control Panel, Data/Time setting. Supports 8 encryption algorithms. Hide Folder start up is password protect...
|
|
Based on award-winning technology. Access your private data instantly.SnoopTrap is unlocked via answering a question that you provide yourself and can change or edit at any time. For instance, you ...
|
|
Ever want to monitor your home PC from work? Want to monitor PC's across your corporate network from your web-browser? Do you want the ability to remote control, administrate, and monitor remote co...
|
|
ShadowOnlineSecurityScaner new internet online security scanner
|
|
SpyAgent is a powerful monitoring and surveillance tool that is useful on all Windows platforms. SpyAgent allows you to monitor and record all system keystrokes, websites visited, windows viewed, a...
|
|
DOchrana is a utility which will hide the Cancel button from login dialog in Windows systems. If a user does not have account (profile) on your computer, DOchrana will not allow him/her to log-in. ...
|
|
Encrypt your perl source code , cgi source code & perl modules with ease using online web based form simple copy and paste the script and encrypt !
|
|
Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for Microsoft Outlook. It is completely integrated into this program, allowing users to encrypt outgoing e-mails auto...
|
|
Recover passwords to web sites saved in Microsoft Internet Explorer (in local password list), as well as AutoComplete strings (form fields). Can also reset Content Advisor Passwords. IE versions fr...
|
|
Advanced KEYLOGGER is a powerful invisible surveillance tool that records every keystroke to encrypted user-friendly easy-to-understand logs. Record all keystrokes typed, chat conversations, emails...
|
|
Do you wonder what your spouse, your kids, or employees are doing on the computer when you are not around? Do they hide windows as you walk by? Do you want to know exactly what is going on? If you ...
|
|
Wipe your disk by using low-level functions.
|
|
Ever want to monitor your home PC from work? Want to monitor PC's across your corporate network from your web-browser? Do you want the ability to remote control, administrate, and monitor remote co...
|
|
Easy to use file encryption to keep that important information out of the wrong hands.
|
|
A program to recovering lost or forgotten passwords to ACE/WinACE archives. Supports the customizable
|
|
XPSpy is your solution for recording all the keystrokes of all users on your computer. Now you have the power to record e-mails, Web sites, documents, chats, instant messages, usernames, passwords....
|
|
Do you want to know what is going on in your computer while you are not using it? Do you want to know which sites visit your subordinate? Are you curious with whom your girlfriend in correspondence...
|
|