Easy File Protector Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, unmodifiable, and unexecutable. With the wild cards feature, you can protect all files that have the same extension (such as EXE, DLL, DOC, etc.) Easy File Protector also provides password protection, user-dependent configurations, and user validation at login....
1 Click Lock 1Click Lock up is a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from the system tray, log access attempts, and apply a custom background image. When enabled, SecureIt Pro even allows visitors to your PC to leave messages for you. The cold-boot protection and disabling boot keys gives maximum protection that's difficult to get around....
Zipworx Securesfx ZipWorx SecureSFX v3.0 is a better and more affordable alternative to any other SFX builder, at a fraction of cost! Offering royalty-free distribution of created files, ZipWorx SecureSFX v3.0 also adds double-stronger encryption (AES 256bit), better compression, save/restore build projects, customizable dialogs, and much more to the usually boring do-it-yourself no-features self-extracting files. Your Self-Extracting Files are not only much more secure, but also much smaller. Up to 30 to 40% smaller! Plus now, they are just easier to build! Save/Restore your build projects as easy as 1,2,3! ZipWorx SecureSFX v3.0 Features - Easily load or browse for a ZIP file - Ability to rename the output executable file - Advanced compression support: Make your Self-Extracting file not even ...
Grabber
Privacy Keeper Privacy Keeper is powerful privacy software to erase online Internet tracks and program activity. Privacy Keeper is a safe and easy-to-use privacy protection tool that securely deletes online Internet tracks and program activity records that are stored in your browser and other hidden files on your computer. Privacy Keeper guarantees your privacy by ensuring all traces of your online Internet and computer activities are permanently erased and unrecoverable on your PC. Information from every website you visit is stored on your computer and recorded in hidden Windows locations including temporary files, cookies, system registry and the index.dat file. Web browsers only provide partial privacy protection by allowing some temporary Internet files and cookies to be deleted, but they do not cle...
Winsession Logger WinSesssion Logger is an advanced keylogger specially for english and spanish keyboards, you can monitor your selected machine for all of the following activity: All keystrokes pressed, all URLs visited by Internet Explorer or Netscape and filter inappropriate Web Content, all Windows Opened and their titles and current time, MSN Messenger Conversations of both sides, every mouse click inside a window (selective screen shoots) with mouse cursor, every text/image clipboard item, opened files, power off your computer and more! Delivery text logs and screenshoots to any e-mail address of your preference. Also you can use FTP for logs delivery. It is secure, indetectable and unkillable. Includes a logs viewer. You can export logs,search by date, favorite logs, search words in text logs ...
Cybervizion If you are worried about protecting your children from the dangers of the Internet, concerned about your employees playing games, surfing inappropriate websites, leaking company information by e-mail, or wondering what your spouse or mate is doing online, CyberVizion will provide you with everything you need to know. See chat conversations (both ways) in any chat or IM program, e-mail both sent received (including web-based mail), website activity much more....
Winvestigator Do you wonder what your spouse, your kids, or employees are doing on the computer when you are not around? Do they hide windows as you walk by? Do you want to know exactly what is going on? If you want to know every word, every web page, and every program used then Winvestigator (tm) is for you. Winvestigator starts on boot, and runs undetectable in Windows capturing keystrokes, URL apos;s, mouse-clicks, and screen shots to an encrypted log file. Winvestigator can be set to email the log for remote viewing. Winvestigator apos;s settings are fully customizable. Each Settings section has mouse-over help that displays a quick explanation at the top of the screen. A web style interface and thorough help make this powerful tool simple to use....
Private Pix Private Pix utilizes new technologies to keep your pictures and movies safe while keeping them password protected and encrypted. Advanced security features include name scrambling and variable key length. Private Pix has an easy to use interface that makes organizing and viewing of your pictures easier than ever before. Try Private Pix worry free as it does not change any system settings....
Ghost Control
Securenote SecureNote turns your message into a very small encrypted password-protected executable (starting at 14kb) that asks for an answer to your custom prompt before the message can be read. The prompt can be "What is your birth city?" or anything you can think of. SecureNote can be used to send any kind of information you don't want just anybody to be able to see. SecureNote works on Win95/98/ME/NT/2000/XP. The product is about 1.5mb and will take 5 minutes to download on a 56k modem. You can find the demo at http://www.bdargo.com...
Salus Desktop Security And Access Monitoring System Cd Rom Edition Salus is a security application which allows the owner or user of a desktop or laptop computer to see which files are accessed, when, for how long, which Internet sites are being connected to, who sends e-mail to where, and so on. In fact, the program keeps a detailed log of all the activities perfomed on the computer. The program can be made invisible to the user of the computer, giving access only to authorized persons. It is therefore an ideal security program for companies or within the family, where one might want to watch over the activites of a child's or employee's computer use....
Securesafe Pro If you are having problems remembering all your access passwords and logins, would like to protect yourself against identity theft and need a reliable software solution to store files with confidential information in one place safely and securely, you need to get WinCatalog SecureSafe. Sure, it may sound like a sales push, but youll change your mind once you try it. After all, great software sells itself. And here is why: First, WinCatalog SecureSafe is 100% free to download and try. Second, it uses military-grade encryption standard approved and used by the US Department of Defense (namely AES, Advanced Encryption Standard with 256-bit key). Third, it frees you from having to remember all of your passwords and logins. They are stored in a database tree, which is very easy to search ...
P Guard Light P-Guard is easy to use, but powerful cryptographic utility. Using approved and high-security algorithms, P-Guard reliably keeps your data private from unauthorized access....
P Guard P-Guard is easy to use, but powerful cryptographic utility. Using approved and high-security cryptographic algorithms, this utility reliably keeps your data private from unauthorized access....
Getsmile
Protoport Personal Firewall After you download and install the ProtoPort Personal Firewall software, you computer will be protected against hacker attacks. All network traffic is monitored on lowest possible level ensuring all unwanted network packets are kept off your computer. Native support of all popular protocols (ARP, IP, TCP, UDP, ICMP, etc). The program can also limit network bandwidth for specified applications, block online ads, block cookies, ActiveX, Flash movies, Java and Visual Basic scripts....
Digisecret Pro DigiSecret is an easy-to-use, secure, and powerful application for file encryption and sharing. It utilizes strong and time-proven encryption algorithms for creating encrypted archives, self-extracting EXE files, and sharing files with your associates and friends. DigiSecret also includes powerful and intelligent file compression; you no longer need .zip files when you can have encrypted and compressed DigiSecret files. ...
Digisecret Lite DigiSecret is an easy-to-use, secure, and powerful application for file encryption and sharing. It utilizes strong and time-proven encryption algorithms for creating encrypted archives, self-extracting EXE files, and sharing files with your associates and friends. DigiSecret also includes powerful and intelligent file compression; you no longer need .zip files when you can have encrypted and compressed DigiSecret files. ...
Advanced Random Password Generator Advanced Random Password Generator (pwdGen) is utility that provides generation of qualitative highly random passwords. Random passwords can provide higher security for your accounts. The program uses RSA crypt provider as a robust random number generator. The password generator can use different customizable character sets, user also can select length of the password. The program includes database for managing user passwords. Program uses custom interface components and has user-friendly look....
Gallery Designer
Hide And Encrypt By Gcm Enterprises Hide and Encrypt is a powerful but fun and easy-to-use software, which allows you to encrypt and hide files within image or sound files. Hide and Encrypt is an ideal solution for individuals who share sensitive data with family, friends, and co-workers or if you just want to play the spy game. The product provides 5 encryption algorithms to protect your data and keep it safe from prying eyes. In addition an extensive shredding utility (which complies with the DoD 5220.22-M document) is included to allow you to permanently erase sensitive data. Let the HaE hit man protect your data today. By the way don't click on the hit mans gun he is very trigger-happy. Download and try Hide and Encrypt today....
Activescreenlock ActiveScreenLock is a software that gives computer users a secure and reliable way to protect their computers from unauthorized access. The idea behind the software is simple but ingenious - the program simply adds a password-protected window placed on top of all the others. In order to remove it, a correct password needs to be entered. Key combinations Alt+F4, Ctrl+Alt+Del, Alt+Tab, and WinKey are blocked. The program keeps a log of all invalid access attempts and wrong passwords entered. The blocking window can be activated by clicking program's icon or after computer being idle for a set period of time. The program is also capable of hiding mouse cursor, disabling task manager, and it runs automatically if the computer is reset....
Port Monitor Port Monitor will protect your system 24/7 from unauthorized users from installing USB, COM, Fire wire Parallel devices to your system. Every day USB thumb drives devices capable of storing thousands of credit card numbers, Medical records, Social Security number and numerous of other sensitive data come with in inches of your computers and until now you have been unprotected. Powerhouseprogramming has released Port Monitor Stand alone a free personal use software to protect your personal data from unwanted intrusion and to support your piece of mind....
Secret Explorer Find hidden data, such as IE form autocomplete data (including logins and passwords), recover various internet passwords (passwords to protected websites, email account and identity passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you....
Openwall Wordlists Collection Cd Included in this collection are wordlists for 20+ human languages and lists of common passwords. The included languages are: Afrikaans, Croatian, Czech, Danish, Dutch, English, Finnish, French, German, Hungarian, Italian, Japanese, Latin, Norwegian, Polish, Russian, Spanish, Swahili, Swedish, Turkish, and Yiddish. There's also a list of the common passwords and unique words for all the languages combined in one file (over 40 MB for almost 4 million entries). Finally, there's a huge list of all the common passwords and words from all the languages with word mangling rules applied (to form other likely passwords, such as by adding capitalization or digits to words) and any duplicates purged. This wordlist is provided as a single uncompressed text file usable directly off the CD. Its size...
Fs2004 China Macau Sce
Screenlock Pro "If you require a program that will prevent any other person from being able to access your computer, then this is the program you need." --PCWin ScreenLock is unlocked via answering a question that you provide yourself and can change or edit at any time. For instance, you could make ScreenLock ask you "What is the meaning of life?". Your customized answer could be anything that comes to your mind. This makes it easy to remember your question, and virtually impossible for others to guess what the answer is. Features optional "User Account", allowing you to set what days and times others can use the computer, PLUS lets you determine which applications or files are "off-limits". Protect your system settings from being changed by others. Log file tracks usage and BOTH permitted and blocke...
Easy File Folder Protector Protect files and folders situated on local media of Windows 95/98/ME/NT/2000/XP with Easy File Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File Folder Protector has an easy-to-use user interface allowing you to allocate access to your files and folders between your users according to predefined timetables. Each PC user can have his own list of allowed and disallowed files and folders within certain time periods. The program does not modify your media: in protecting your files, it just uses a high-reliability VXD driver working at Windows kernel level. This guarantees that Easy File Folder Protector will never lose your data, as may happen if you use other file- and folder-prote...
Advanced Internet Kiosk Advanced Internet Kiosk is intended for building Internet kiosks, public access PCs, or in-store terminals; disable access to files installed on your PC and prevent users from changing PC settings; give full access to only necessary applications including Internet Explorer. It will give many people free access to the workstations you create, but none of them will be able to damage (whether accidentally or intentionally) vital system files or stuff hard disks with garbage. The program supports multiple authentication methods such as username and password authentication, time-locked code (lets users access workstation for a given period of time only) or a combination of both. Advanced Internet Kiosk is also ideal for home PCs to limit children activities and prevent important files from bein...
Passwords Keys Passwords Keys is a powerful random number, password and key generator, that allows you to easily generate, store and use random passwords, keys and data. Passwords Keys has four defferent generation methods (number, password, mask1, mask2) This program support templates and has handy password manadger. It is compact and easy to use....
Advanced Desktop Shield Advanced Desktop Shield - security utility is a must for public access PCs located in school or university labs, Internet cafes, libraries and other public places where you need to stop users from changing desktop wallpaper and screen saver, deleting, creating and renaming desktop icons, changing display settings and so on. With Advanced Desktop Shield you can backup, restore and manage your desktop layout and desktop layouts of your users. Desktop layouts are saved to files, which include all files and folders located on the desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout or desktop layouts of your users, every time you or your users reboot your PC, the program will return everything on the desktop back to the original sta...
From Space To Earth
Access Manager For Windows Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer use by your kids or employees and loads more. This program can lock your computer and ask for a password when Windows loads. Access Manager for Windows is just the thing for keeping employees , students or children from coming in and fiddling around with the computers. It has all the needed features to keep people from viewing or changing what you d...
Icq Password Recovery 2 0 ICQ Password Recovery 2.0 can recover passwords to any version of ICQ. Just select the .dat file of the ICQ user and the username and password will instantly be decrypted. Tested on all ICQ versions....
Outlook Express Security Use Outlook Express Security to control access to Outlook Express and its databases. When it is active, Outlook Express becomes locked and no third-party programs can access its message base files and the address book. As a result, when you try to start Outlook Express, open the address book or access the files, a password will be asked to allow access. If an invalid password is entered, Outlook Express or Address Book will not be opened and the files will stay inaccessible. This will allow you to prevent stealing or spoiling of your Outlook Express's data. Outlook Express Security before it is too late....
Windentify Sdk Windentify SDK is a state-of-the-art voice-based identification system component that prevents any sort of unauthorized access to your PC . Secure, reliable, and with the unique facility to restrict access to systems and files to just a single users voiceprint, this is the best in voice-based security component developers can incorporate into their applications. Developed on the .NET framework, the SDK integrates seamlessly with any application. Detailed instructions are provided when you first install the component. Windentify SDK offers you the unique opportunity to provide cutting-edge voice-recognition facilities that you wow and lure your customers with....
Hide Files Folders Hide Files Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access to the file or folder, otherwise not. Hide Files and Folders does not modify your media: in protecting your files or folders, it just uses a high-reliability VXD driver working at Windows kernel level. This guarantees that Hide Files and Folders will never lose your data, as may happen if you use other file- and folder-protecting software. Due to unique technology, the program also lets you protect system...
Friend Of Jesus
Research Lab User Identification It is a innovative security software to 'identify' users. Once a user is identified, the software will unwind access to Windows (or other OS) as per user profile...
Security Department Security Department is a resident file system protector for Windows 95 and Windows 98. It provides several levels of protection for different folders and files. You can prevent various actions for folders and files: copying, moving, deleting, renaming and so on. In addition to the two standard protection levels "Read Only" and "Full protection", there is the Custom Protection level that allows you to fine tune the access of specific folders and files. Access to various folders and files can also be set differently for each user on a single PC. By employing Security Department a computer is provided with an additional level of protection from virus and internet hacker attacks. Security Department makes EXE and COM files truly Read-Only. There is not a single virus that can overcome this ki...
Advanced Password Manager Advanced Password Manager keep all your passwords in one place! The main advantage of this password manager is that you can enter all your passwords in one place, assign a login and password for a specific URL and use program's autofill feature. All you have to do is to remember one password for using Advanced Password Manager, and the program will remember the rest of your passwords for you. Pretty cool, isn't it? The other great thing about Advanced Password Manager is the interface - simple, eye-pleasing, and very straightforward. You can create different groups for your login and password information, which makes cataloging your confidential data very convenient. This password manager also has a built-in password generator that can generate passwords according to your templates....
Advanced File Shredder Advanced File Shredder securely erases files or folders on your PC using seven pass US Government standard wiping and cryptographically strong random number key. Shredded files cannot be restored by any data recovery software. Protect yourself: Windows physically does not remove files from your hard disk and sensitive data like personal, business or financial information can be easily restored. ...
Windentify Windentify is a state-of-the-art User Identification system that prevents any sort of unauthorized access to your PC. Secure, reliable, and with the unique facility to restrict access to systems and files to just a single users voiceprint, this is the best in voice-based security applications. Protect your personal data, sensitive documents and even restrict unauthorized access to your PC in your office. Windentify is a cost-effective, efficient and far superior alternative to traditional text-based password security currently found on mainstream PCs. It helps to prevent unauthorized user or any outside user can not get access to your system from getting access to your computer system by providing voice based password security....
Fpsgm Basic
Tsm Encryption Plugin For Outlook Please purchase this plugin only if you already own a registered copy of our Top Secret Messenger (TSM) product which included some other plugin. If you do not own TSM, you will need to order the complete package that includes the basic TSM installation and the Outlook Express plugin. Refund Policy There is an evaluation demo of TSM on our website. For this reason, our refund policy is restricted to replacement of goods damaged in shipment only. Please refer to our homepage DOWNLOAD link for further information. Once our software is downloaded, or is shipped to your premises, it is considered to be 'Opened'. It is part of our refund policy that all Opened Software cannot be returned for refund, regardless of the delivery method....
Safehold Ever wanted to leave your desk at work, but couldn't do so for fear of other people accessing your private data? Ever wanted to make sure that your kids do not access the computer without permission? Now there's a simple solution! Safehold by K-Labs Online is the complete personal desktop locking system. While activated, Safehold will deactivate all system keys - stopping access to the workstation - even stopping CTRL + ALT + DELETE! When a certain password is entered, full system control will be handed back to the user. Features include: 1. Complete System locking. 2. Disabling of System keys (such as CRTL, ALT, DELETE, TAB). 3. Hidden password. 4. 'AutoLock' Technology allows Safehold to automatically lock the computer when the mouse has been inactive for a specified amount of time....
Top Secret Messenger With Outlook Plugin Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for Microsoft Outlook. It is completely integrated into this program, allowing users to encrypt outgoing e-mails automatically by simply clicking on the Send button! Similarly, it automatically decrypts incoming e-mails as soon as they arrive....
Top Secret Messenger With Outlook Express Plugin Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for Outlook Express. It is completely integrated into this program, allowing users to encrypt outgoing messages automatically by simply clicking on the Send button! Similarly, it automatically decrypts incoming messages as soon as they arrive. If you have already purchased a registered version of Top Secret Messenger with some other plugin and would like to use it with Outlook Express, please purchase the cheaper standalone Outlook Express plugin that does not include TSM. Refund Policy There is an evaluation demo of TSM on our website. For this reason, our refund policy is restricted to replacement of goods damaged in shipment only. Please refer to our homepage DOWNLOAD link for further information. ...
Foldermatch
aqt133

Ms Access 2000 Password Recovery MS Access 2000 Password Recovery will display the password to any MS Access file type (file extensions of .mdb, .mda, and .mde). This program works for MS Access files saved in MS Access 2000....
Tsm Encryption Plugin For Outlook Express Please purchase this plugin only if you already own a registered copy of our Top Secret Messenger (TSM) product which included some other plugin. If you do not own TSM, you will need to order the complete package that includes the basic TSM installation and the Outlook Express plugin. Refund Policy There is an evaluation demo of TSM on our website. For this reason, our refund policy is restricted to replacement of goods damaged in shipment only. Please refer to our homepage DOWNLOAD link for further information. Once our software is downloaded, or is shipped to your premises, it is considered to be 'Opened'. It is part of our refund policy that all Opened Software cannot be returned for refund, regardless of the delivery method....
Rsaci Password Remover This program removes the RSACi password, also know as the Content Advisor password to Microsoft Inernet Explorer. Once this password is removed, you will never be able to see it again....
Atomic Mailbox Password Cracker A software solution capable of recovering lost or forgotten e-mail passwords for the mail clients that work with mail servers using POP3 and IMAP4 protocols. The program is universal and is independent of the e-mail client work design. The recovering of the password does not take more then 5 minutes including installation of this tool....
Top Secret Messenger With Icq Plugin Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for instant messengers, such as America Online's ICQ. It is completely integrated into these programs, allowing users to encrypt and decrypt their messages automatically or manually with one click of a button right from the ICQ's message dialogs! Refund Policy There is an evaluation demo of TSM on our website. For this reason, our refund policy is restricted to replacement of goods damaged in shipment only. Please refer to our homepage DOWNLOAD link for further information. Once our software is downloaded, or is shipped to your premises, it is considered to be 'Opened'. It is part of our refund policy that all Opened Software cannot be returned for refund, regardless of the delivery method....
Flashpaste Pro
Storagecrypt 128bits Removable storage is now popular in the world . It is easy to use , but the data is not secure . Do you care about someone accesses your data by stealth ? StorageCrypt is the solution . It has ability to encrypt the disk drives which are using FAT or NTFS file system. StorageCrypt almost support all kind of removable storage , For example , usb hard drive , usb flash memory disk , pcmcia hard drive , compact flash memory , memory stick , etc . StorageCrypt only spends few seconds to encrypt entire storage drive. The encryption Algorithm is 128 bits IDEA . encrypt usb drive,encryp ...
Terminus 6 Terminus 6 - Leave No Traces - The ultimate data destruction toolkit. Terminus 6 brings professional IT security/COMSEC grade destructive power to the masses: erase files, slack space, free space, protect your privacy, destroy chunks of data even if they're not in a file, destroy huge files (2GB or larger) with ease, and more. Network-aware for easy remote data destruction, and International standards compliant - America's NISPOM/NAVSO/AFSSI/HIPPA, Australia's ACSI, Russia's GOST, Germany's VSITR, and more. $29.95 a seat makes Terminus affordable, and license packs make bulk purchases cheaper and easier. (NOTE to government purchasers: EFW is a CCR-registered vendor.) Individual copies are $29.95/seat, with license packs available for bulk purchases. See our website for license pack pri...
Esp Vision ESP delivers powerful recording features that allows you to monitor all areas of your PC, tracking every action down the last keystroke pressed or the last file deleted! ESP can be configured to silently E-Mail log files to a remote E-Mail address. Great for checking up on websites and applications that are used at home while you are out. ...
Ms Backup Password Recovery MS Backup Password Recovery recovers passwords to all versions of MS Backup .qic files. ...
Anti Secure Ultimate Password Recovery Anti-Secure Ultimate Password Recovery is an all-in-one password recovery tool for Windows. Lost or forgotten passwords for E-mail programs, instant messaging software such as AIM and Yahoo Pager, website accounts, MSIE AutoComplete fields, windows screen savers, and many more software programs can be instantly recovered. This program can also unmask or unhide passwords hidden behind asterisk password protected text boxes, find passwords in the Windows registry, scan for hidden URLs of programs installed on your system, recover the AppsProtector XP Password, remove the Internet Explorer content ratings or RSACi password, and reveal the Windows 95/98/ME password of the screen saver. to This program also contains a utility that can decode files encoded by MS Script Encoder. A datafile is als...
Ferrari F50 3d Model
Passwords Base Passwords Base is developed to remember all your passwords and to store them in the protected kind. All that is necessary for you to remember, it the unique password to your passwords base. Every base encrypt by powerful algorithm, with a 256 bit key. Its intuitive interface make it easy to use by everyone....
Folder Security Guard Folder Security Guard allow You safe protect folders and data inside folders on your drives. You can hide folders completely making it invisible and inaccessible for people using your computer. Folder Security Guard allow You restrict access to the folders that contain your sensitive data over local or shared computers. After folder protection via Folder Security Guard, folder contents cannot be read, copied or modified. To access the locked folders, you should supply unlock via explorer content menu, or select protected folder in folders tree. If You set password protection, you should type correct password for unprotection. ...
Folder Password Guard FPG can lock the specified folder, user who want to open the folder must input the admin password. FPG can hide specified folder too. User must provide admin password to unhide it. An example of FPG wide application is that you can lock or hide the personal folders by FPG when this computer is shared to other persons. Any body who used your computer can't browse your locked folder unless you give them your password. The password is encrypt by SHA1 signature algorithm, which can't been cracked. FPG supports Windows 2K/XP/2003 now. ...
Csss Use your computer as a home or office security system! Remote listening of location from any telephone!...
Taceo Essential Taceo is an email and document security software solution for small businesses, providing an easy-to-use content protection and rights management solution. Taceo is a fraction of the cost of most enterprise solutions, enabling small business owners and individuals to securely distribute sensitive email messages and documents while protecting the privacy, integrity and authenticity of their intellectual property. Taceo's toolbar integration within Microsoft Outlook makes securing email and attachments using powerful encryption as easy as a click of a button. Taceo also provides a right click access Wizard that applies rights management protections to files, preventing forwarding, printing and screen capture, and guides the user through assigning email recipients with ease. Users...
Family Forest Descenda
Real Registry Protector Real Registry Protector(RRP) is a utility designed to protect windows registry for writing, deleting or adding key and values. The RRP can protect the registry key you specified, and you can specify the treatment(PERMIT, REJECT, ASK ME). The RRP was Developed base on the system driver layer, so the RRP's protection can't be round. You can use RRP to protect important registry key. It's very important for stopping trojan/worm to write registry. Almost trojan/worm parasitize the operating system via writing registry(Such as the "Run" key or file associate key).RRP can reject these operation or report to you, then you can decide how to do it(For Expert). Besides, RRP can stop spite HTML file change your Internet Explorer(IE) setting(exp: homepage) via Internet Explorer(IE). There ...
Anti Keylogger Elite An powerful keylogger detect utility which can identify unknown keylogger. ...
Folder Password Expert Folder Password Expert is a software tool that lets you restrict access to the folders that contain your sensitive data. When folders are password protected and locked, their contents cannot be read, copied, modified or deleted. To access a locked folder, you must supply the correct password. The password for the locked folders is not stored in the Windows registry or somewhere else on your computer. Unlike other utilities, Folder Password Expert will not allow to access the locked folders in Windows Safe mode, DOS, or other operating systems....
Accesspw This utility will instantly display the password set on a Microsoft Access .mdb Database file (Office 97, 2000, XP) thus allowing you to open, edit, copy, and view the full contents, even if you have no idea what the original password was. ...
Password Auditor Developed especially to aid conformance with UK Miinistry OF Defence security requirements, this advanced software allows you to perform regular penetration testing against your networks, revealing weaknesses and recovering passwords. The software allows you to penetration test a network, and then quickly and simply produce a locked PDF report on the findings. You can also fix potential weaknesses, and produce a locked PDF report on these....
Explorerplus
Retrievepdf V3 0 RetrivePDF allows you to retrive content from an Adobe Acrobat PDF file if you have forgotten the password. It will allow you to open PDF files where you have set the user password, as well as re-enable the options to copy, print, edit, and save the file where either password has been set....
Secura Archiver Secura Archiver is professional archiving software for use in personal or commercial environments that demand 128 bit data encryption to meet and exceed today's security standards. Using Blowfish encryption with a 128 bit key Secura Archiver achieves the same level of security that banks use for their online services and is even suitable for military operations. The integrated Key Manager stores security keys with your descriptions which allows you to quickly and conveniently choose the right security key for your archives....
Advanced Keylogger Advanced KEYLOGGER is an invisible surveillance tool that records every keystroke to encrypted user-friendly easy-to-understand logs. Logs can also be automatically sent to any number of specified e-mails. Advanced Keylogger also monitors the internet activity by logging all web-pages the user visits. Advanced KEYLOGGER keeps track of everything happening on the screen invisibly screenshotting what is on, also being capable of monitoring text and graphics copied and cut to the clipboard. Whenever whereever whatever is typed - it cannot be hidden from Advanced KEYLOGGER! ...
Atomic Zip Password Cracker Password recovery program for ZIP and WinZIP archives. The program is designed to reveal the forgotten passwords for ZIP archives. It has friendly user interface and many options that help to speed up the password recovering. ...
Explorerplus
Atomic Asterisk Cracker A program to recover the passwords under asterisks in Windows XP and older versions...
Alparysoft Videolock For Webcam Your computer can recognize you! New image recognition security system for your computer. Alparysoft VideoLock for Webcam is a new surveillance security system based on the webcam aided facial image identification technology adapted for PC use. The product is designed to protect your computer and space around from unauthorized access and inform computer owner about the events happening at the workplace or home during his/her absence. ...
Cd Access Control Professional CD Access Control Professional, controls which compact disks can be run on a local computer, this is done by setting a rule determing the times that the disk can be used and whether it is allowed or ejected from the system. ...
Stealth Recorder Pro The Stealth Recorder Pro is a new type of computer software that enables you to record a variety of sounds and transfer them automatically through internet without being notified by original location or source. This program supports various sound formats including MP3, WMA, and Wave. Since it can transfer what is recorded to an Internet email or FTP site in the background automatically and stealthily, you can easily send or receive the contents of a conference or a transcript of lectures promptly. Say, you have two computers in separate locations such as one at your office and the other at home; you can listen to voices or sounds near one computer at the other remote location privately. You can also control activities of Stealth Recorder Pro at a remote location through a web browser on ...
Hslab Logger Business The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media. Using this software to become possible to receive the information about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file name or keyword) or to CD/DVD/Zip and other removable media. This is very useful for the rigid control over use of computer systems in business and for the parental control over children's actions. The program is NOT keylogger and does not write any keystrokes! This is a principle positi...
Expand Your Vocabulary
Hslab Logger Personal The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media. Using this software to become possible to receive the information about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file name or keyword) or to CD/DVD/Zip and other removable media. This is very useful for the rigid control over use of computer systems in business and for the parental control over children's actions. The program is NOT keylogger and does not write any keystrokes! This is a principle positi...
Password Protect Password Protect is a software program to protect your documents against unwanted access. It will not let other users view, copy, or modify your sensitive data. What differs Password Protect from other utilities? You can password protect folders located on external and USB drives. Folders remain protected in DOS, Windows safe mode and other operating systems. Password Protect provides strong protection for your sensitive data, as it does not store your passwords on your hard drive or in the Windows registry where malicious users can easily find them. Password Protect is easy to use as it comes with a step-by-step wizard to select and password protect your folders. Password Protect supports Windows Explorer, so you can right click a folder to protect it and double-click a folder to unprotec...
Cryptplugin CryptPlugin is a plugin for Eudora Mail Clients Version 3.x, 4.x and 5.x . CryptPlugin will encrypt a given message using RSA RC2 block cipher or RC4 stream cipher. First you choose a password and a encryption algorithm, and CryptPlugin will automatically encrypt and encode the selected message. After this, the message can only decrypted and read by a recipient who has already CryptPlugin installed and knows the encryption key. CryptPlugin is an easy and fast way to add powerful encryption/decryption capabilities to Eudora mail....
Info Tech Professional Random Password Generator Easy to use Random Password Generator, it is driven by a prime modulus multiplicative linear congruential pseudorandom number generator. This particular mathematical approach, combined with a novel method of determining a different seed each time passwords are generated, guarantees the user the greatest possible randomness with the longest possible non-repeating string. The Info Tech Professional Random Password Generator allows the security conscious system administrator the choice of generating random passwords of any length and in any combination of three character types: letters (upper and lower case), numbers, and/or special characters. The Info Tech Professional Random Password Generator is extraordinarily fast and occupies only 200 Kb of disk space uncompressed. The Info Tech P...
Icccrets Password Recovery System ICCcrets scans your PC for cached passwords, and decodes password fields containing asterics. ...
Expand Your Vocabulary
Crime Catcher Crime Catcher is software for your webcam that allows your computer to act as a security system. The software will monitor for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Hide Crime Catcher completely from view! Email notifications with attachments FTP images to an FTP server Webpage mode - image uploaded every x seconds Remotely login to your webcam and see live images in realtime. Mask out areas which could cause false alarms; Reports can be produced on captured images in HTML. Test for movement to allow you tune the settings to ensure movement detection is sensitive enough / too sensitive. Overlay a caption / date and time onto the image. Easily combine captured images into a movie! Have a dog bark or ano...
Accent Office Password Recovery You don't need to be a hacker in order to recover a lost password from an Office document. Accent OFFICE Password Recovery supports a wide range of Office document formats and includes a handy Wizard that helps you to choose proper password recovery algorithms. Recover lost passwords quickly and easily!...
Facecode FaceCode - Face Recognition PC access control software FaceCode gives you complete access control to your PC like no other product before. Specially designed to prevent children, family members, co-workers and other workstation users from gaining access to your computer, FaceCode is the only product that can ensure the real identity of the user. Using a simple web-camera and without the need to type in username or password FaceCode is the perfect user friendly access control software to your PC. Using state of the art face recognition technologies, FaceCode recognises existing PC users and logs them onto their own user area, while prevents unauthorized users from logging to your computer without your presence, even if they know your user name and password. Combine with artifici...
Password Manager Password Manager is a very useful utility to manage your passwords. Remember one password, Left the Others to Password Manager. Through Password Manager, what you have to remember is only one password. All the datas are stored encrypted in your own computer. It come with some useful utility such as 'secure file remover', 'password generator', 'password guard', etc....
Intouch Lock Award-winning, versatile and comprehensive security solution for home users and system administrators alike to restrict access to the PC and sensitive information on it. This password-protected security utility allows you to block access to files, folders, disks, applications, Web, Control Panel modules, IE parameters, Desktop, Start menu and much more. Multi-user and multi-profile support. Built-in scheduler. Event logging. Stealth-mode support....
Encrypt Pdf
Advanced File Shredder Advanced File Shredder securely erases files or folders on your PC using seven pass US Government standard wiping and cryptographically strong random number key. Shredded files cannot be restored by any data recovery software. Protect yourself: Windows physically does not remove files from your hard disk and sensitive data like personal, business or financial information can be easily restored. Info: Order Type - "Site License" allows unlimited number of installations within your company...
Cryptdecrypt CryptDecrypt is a powerful software applications designed for electronic data protection. CryptDecrypt utilizes well known algorithms for data encryption including AES (Advanced Encryption Standard) that is an approved industrial security encryption algorithm in the USA. It has easy-to-use interface, is integrated with Windows Explorer, supports drag-and-drop operations, features multiple encryption algorithms to choose from and even provides data erasing capability....
Encode It Encode It is a easy to use file security system using the new SCC 524,288 Bit encryption method - very secure and a single system wide password. In addition, it employs 21 layers of protection to ensure your data is secure. Includes Decode It - a very small decoding utility that you can take anywhere and decode any number of files encoded by your copy of Encode It, because each application will generate an unique keycode upon installation. Also includes full support for decoding one or more files directly from within Windows Explorer, plus all the goodies including Copy, Move, Delete, Rename, Printing, Viewing, Exporting, Drag Drop, and many more functions that make Encode It the number one choice among professionals. Download Encode It now and start using it today! ...