Inthepicture InThePicture encrypts files messages into redundant parts of Windows BMP imagefiles. Provide extra security for e-mail attachments with up to 100 user-defined keys. Supports 16-color, 256-color 24-bit BMP files, and the user interface supports drag drop. Fully compatible with Windows95, WindowsNT Windows98. ...
Access Password Recovery Genie Access Password Recovery Genie is a program to recover passwords for MS Access databases. -- All versions of MS Access are supported (including Access 2003) -- State of the art password recovery engine - all passwords are recovered instantly -- Recovers database passwords -- Recovers user-level security accounts and passwords -- Multilingual passwords are supported -- Full install/uninstall support ...
Password Archive 2005 Password Archive 2005 securely stores your passwords and all your personal confidential information. With a single password you can protect all your important data using industrial encryption standards. Store all passwords and your important data in one secure, protected place. You will never lose or forget anything again. Protect your data by creating strong passwords and stop worrying about forgetting them. A built-in password generator will help you. Store any type of information, including passwords, credit cards and accounts numbers, addresses, instructions, contact details, clothing sizes....
Diskscience DiskScience creates on-the-fly encrypted, virtual volumes that look and feel just like the disks with which you are already familiar. Encryption is highly optimized for maximum throughput and is often faster than device transfer rates. Encryption algorithms include: 256-bit AES, DES, Triple DES, and 256-bit GemStone. Creating new DiskScience volumes is easy. The New Volume Wizard guides the creation of empty volumes. The Cloning Wizard makes it simple to copy the contents of an existing floppy, CD, DVD (including movie DVD - outside the U.S.), or other disk, into a secure (or not) virtual volume. Cloned CDs/DVDs prove especially useful since they offer hard disk like performance and they can be used on computers that donÂ’t even have CD/DVD drives. With relatively low power consum...
Joglog
Storagesafe StorageSafe provides high performance security for USB and IEEE1394 based storage with on-the-fly device encryption, guards against 180,000+ common passwords, and DoD Std. 5220.22-M compliant secure file and device erase. Devices are split into custom sized public and private areas. The public area is not encrypted. The private area is encrypted with the 256-bit Advanced Encryption Standard (AES). ItÂ’s easy to use. Simply enter the correct password once, and protected devices will have the familiar look and feel of unprotected storage. All program functions except (Install/Uninstall) work under Windows Guest/Limited User accounts. The single unit, direct download price is $24.99; multi-unit pricing and site licenses are available. To ensure your complpete satisfaction, we...
Secukeeper Are your files and folders safe? Do you keep your files and folders away from spyware? Are your sensitive data safe? SecuKEEPER Strongly lock your files and folders away from prying eyes. Today you do not go spending hundreds of dollars on encryption software. SecuKEEPER is an All-in-one file encryption software, Your best choice - can secure everything,offers four types of encryption protection for files at various security levels, can rapidly Lock files to prevent access without actually encrypting them, or Hide the locked files so they're not even visible,can Encrypt files and folders, optionally making them self-decrypting so they can be opened on a system that doesn't have SecuKEEPER installed.Private coffer feature creates encrypted virtual drives in which you can store especially s...
Safe N Sec Safe'n'Sec - effective utility to protect a personal computer against unknown system vulnerabilities and threats. - Protection against new threats and vulnerabilities - Protection of your system from external attacks and unauthorized access - Identifying the sources of new threats - Detection and elimination of known threats - Maximum protection and minimum load Current protection solutions (antivirus software and personal firewalls) are extremely effective at combating known threats and vulnerabilities. Antivirus applications protect users only against known viruses. Personal firewalls help prevent intruders from gaining access to personal computers. These solutions are based on reactive technologies that perform actions only in response to malicious activities toward your data. ...
Ecyware Greenblue Inspector Ecyware GreenBlue Inspector is an integrated web analyzer environment that offers multiples ways to test your web applications. You can analyze on the run or record a session for deeper analysis coverage....
Hide Secret Files Hide Secret Files is a security product based on an unequalled data hiding method. As a result of many years research within our company, this product hides and safely protects from erasure your private information. Hide Secret Files is the ultimate tool allowing you to have exclusive secured access to sensitive information based on a password. No one except you, who know the password, will be able to access the secured data. Not even your own operating system will have permission to alter the information. The latest, and one of the most annoying secondary product of nowadays Internet evolution, the spy-ware activity, is absolutely inoffensive against the protection guaranteed by Hide Secret Files The hidden data won't be visible even for your own OS so the Safe Mode booting or movi...
Jinglebox
Secrets Protector Pro 2005 A three-in-one privacy protector tool built for those who like their personal stuff handled carefully. This product gives you the features of a folder locker, a secure eraser and a privacy manager. The Hide Secret Files proud successor, enforced with strong encryption, secure file deletion technique and a smart built-in trace remover will help you to protect your secret data and online privacy better than ever. All confidential data will be hidden beyond the reach of ANY intruder and you will be the only one able to handle them. And what you want to delete will be DELETED. Your personal classified data and your online and offline activity traces will be wiped for good. Secrets Protector Pro 2005 is the ultimate security tool to protect your sensitive information on your personal comput...
Winencryptor WinEncryptor is the first encryption program in the world capable of defeating keylogging software without resorting to difficult to use, mouse based, 'virtual keypads'. WinEncryptor's KeyLogShield will render keylogging cracking of encrypted files obsolete. This represents a leap forward in modern encryption protection and is entirely unique in the world today. WinEncryptor features 10 encryption methods, including the current AES (Advanced Encryption Standard) approved for use by the U.S. National Institute of Standards and Technology (NIST) and the U.S. Computer Security Research Center (CSRC)....
Xl Delete XL Delete 1.1 is a powerful secure delete tool that will permanently delete any of your files using one of its five wipe methods or with a custom method that you create. Many people believe that emptying the recycle bin will delete a file forever. This is not true, when you delete a file and empty it from the recycle bin, the file is in fact still on your hard drive. The only thing that happens when you empty the recycle bin is that Windows marks the area where the file is on the hard drive as overwriteable so that it can reuse the space when necessary. This allows special data recovery software to be able to actually undelete the file and view all of its original contents. When you delete a file with XL Delete, the file data will actually be overwritten several times using specialized d...
Password Commander 2 5 Password Commander manages and generates passwords, sticks them to Web pages and Programs. It fills forms automatically with one click, lets you “drag” password and login and “drop” them exactly to the field, offers to put frequently used passwords in “bookmarks” that are accessible via System Tray or a Floating Panel, that is always on your desktop, if you wish. PC is compatible with biometric devices and will recognize you by your fingerprint. It is portable and run from USB-flash drive. Passwords and personal data are strongly encrypted with BlowFish. PC lets you export, import, print and back up passwords, save them to passcards and send to another computer. Over 4500 registered users called Password Commander useful, friendly and irreplaceable program. Just try it now ...
Abacre File Encryptor Encrypt any files or folders using 39 advanced encryption algorithms. Other features: Secure Password Generator; Text Pad to encrypt any text; Wipe Files command to permanently remove files your computer; command line parameters; Shell integration....
Invoice Giro Settlemen
Hideit HideIt! is your personal data key. With its help, you can easily and reliably hide any files on your home or work PC from outsiders, and unauthorized users. Nobody except you can get access to your hidden folders and files. No one will ever know that you made some of your files invisible to others or even that there is some hidden data. The program itself does not require any installation and does not create any suspicious program files or other attributes that could attract attention and show that you are hiding your data. But how is it possible to hide data without any complicated actions and any professional computer skills or knowledge? The solution is as simple as HideIt! HideIt! creates guarded and invisible space on your hard drive. This space is a private "hiding place" where...
Nlcsystems NLCSystems - one of the most flexible and universal cryptosystems to protect your computer and information. It's flexibility makes it useful for corporate and personal protection at the same time - it uses unique non-linear cryptoalgorithm, which allows us to present this features: *Fast unbreakable premium cryptoalgorithm based on non-linear dynamics. *Support of any file formats. Full OLE features support. *NLC uses newest automatiztion methods for protection - working with protected files never was so secure and simple! *Context menus integration - instant access to any files and program options. *Customizable encryption options - you can manually select between advanced security and speed. *Excellent interface with detailed help. *Support of self-decryptable (SFD) files - you ...
Track Destroyer We all know the risks of exposing your identity and activities while on the computer these days. Worst case, your entire identity could be stolen. Perhaps your boss will uncover that you've been surfing the web when you really should've been working, or your spouse find traces of the adult sites you've been visiting... Sure, you could go rummaging through your entire system trying to manually clean out your files, but what if you miss something? What if you accidently delete a crucial file and lose important data? Don't take the risk. Let Track Destroyer carefully and percisely scan and incinerate incriminating data. Unlike some other privacy protection tools which only delete the files and thus can be easily recovered by some data recovery tool, our Track Destroyer completely remove...
Touchlocker TouchLocker1.03 is a manual input locking software. When you leave your work computer for some reason it will automatically hide your open windows and lock the mouse and keyboard to prevent others from modifying your working data.When you want to run some program for long time and don't want others to close or terminate it, you can use our software to lock the mouse and keyboard....
Sticky Password Sticky Password virtually sticks the passwords to programs and WEB pages. You access them quickly and safely. Intelligent feature will find it automatically so you don't have to remember account name to find appropriate password. The passwords are stored in the encrypted database and never appears on the screen. * Stores passwords for all your accounts in the strongly encrypted database * Allows to stick account information to any program window or WEB page and access it in a moment * Ease of use: one program icon and one menu! * Strong password generator * Automated backup passwords database: you can restore passwords at any day and time! * Export passwords to simple text file ...
Internet Online Privac
Cryptex 600 Mb Encrypted Vault Protect vital information on your PC with a secure and hidden vault by Cryptex. Feel better knowing that ANY file you lock in the vault will be protected with strong encryption to ensure maximum protection against theft and peeping eyes....
Virtual Personality A professional telephone voice changer utility. High quality natural voice. Works with your PC speakers as well as over a telephone line or internet. Needs only a standard voice modem. Endless of different voices. Supports voice/ bidirectional conversation recording (or any phone on the same lin). 24 pitches and 8 band equalizer. You speak into the PC microphone and the new voice is heard on your computer speakers on the telephone at the other end of the line or through the internet. Ideal for private investigators and for businesses or individuals that wish to filter crank calls. Unlike hardware based products and support telephony, and software products that support only internet this innovative product, supports all media types - telephony, cellular and internet. No one will recognize ...
Virtual Personality A professional telephone - internet voice changer voice changer utility. High quality natural voice. Pitch and frequency independent controls. Works with your PC speakers as well as over a telephone line or with internet applications like yahoo chat. Works with the PC speakers as well as over a telephone line with a special telephone adapter. Doesn't need any modem for telephony. Voice file manipulations. Supports Windows 95/98/Me/NT/2000/Xp. You speak into the PC microphone and the new voice is heard on your computer speakers or on the telephone at the other end of the line. Ideal for private investigators and for businesses or individuals that wish to filter crank calls. Supports 24 individual voices recording. No one will recognize you , not even your own mother. You can cause your ...
S O S Automation Baby - Medical monitor and alarm system. Implemented in software on a home PC. Constantly monitor the surroundings and call you upon emergency, by means of the telephone and also sends you sms and email messages. Upon an alarm event it enables you to monitor through th telephone, the PC surrounding in real time, (sometimes also talking back to the monitored target), and broadcast live audio/video through the internet. It supports Windows 95/98/Me/2000/XP and demands a voice modem mode, microphone and speakers. Its installation is extremely simple and takes a few minuet. S.O.S.Automation serves also as a standard automatic answering machine. This enables S.O.S.Automation to share any telephone line with any other use. S.O.S.Automation supports also be directional communication. You can ca...
Dataguard ...
In Saved A
Visual Ip Trace Trace IP addresses and web sites. Use Visual IP Trace to trace and report hackers, see the geographical locations of websites and IP addresses on a world map, get detailed information about the registered owner of a web site or IP address....
Spotauditor SpotAuditor reveals passwords saved in Internet Explorer, recovers ICQ, Far ftp, Dial up, Outlook and MSN messenger passwords, IE Auto Complete Fields. It is a program for viewing and cleaning the secret data stored by Internet Explorer. SpotAuditor allows deletion of unwanted entries from the system protected storage. The program also explores Outlook Accounts, Visited URLs, Installed Programs and Start Run Programs on a local machine or remote computers. SpotAuditor allows to clear Internet Explorer history, delete cookies and temporary internet files. You can recover and restore any lost or forgotten password ever entered in Internet Explorer. If you forget your passwords or need to access some passwords or confidential information stored in your computer, SpotAuditor can really help yo...
Privatefirewall Privatefirewall 3.0 is a Personal Firewall and Intrusion Detection Application that eliminates unauthorized access to your PC, at home, the office, or on the road. Privatefirewall also constantly monitors the sensitive areas of a PC where intrusion can occur and reports on their status allowing users to take appropriate action. Privatefirewall is easy to install/use and provides reliable and high-performance protection right "out of the box". Privatefirewall's intuitive interfaces allow advanced users to easily adjust default settings to create custom configurations. Features include: Internet traffic (packet) filtering, port scanning, IP tracking, SecurePOP email protection, and a proprietary Application Control Engine, which monitors all applications that access the Internet to furth...
Mr G File Encryption The security of your file is very important.Mr.G File Encryption used the newest encode algorithm,supply you the safe encode and decode function.Now,you will not worry about your work being peeked and stolen.Mr.G File Encryption can encode any length and any type of file.The encode algorithm was impossible to be reverse. It was very stable and easy to use.There is a very convenient function that Mr.G File Encryption supply. You can generate a key.exe for you encoded file, put it in your flash disk. when you want to decode your file, just run the key.exe in your flash disk. So you don't have to remember the password, or input it.Just with the key in your flash disk,and the encoded file in harddisk,even without need of the main program, you can take your secret to antwhere with no worry.The ...
Infinite Flight Screen
Wipeout Pro Wipe your browser history and optimize your drives automatically. WipeOut is a privacy-enhancement, system-cleanup, and tuning tool that suits novices and power users. Securely wipe free space, clear cookies, temporary Internet files, and file-access history from the registry and recent folder and a significant amount of unnecessary registry entries. Once the cleanup is complete WipeOut Pro will cause the system defragmenter to defragment your hard drive(s). WipeOut Pro will do all this automatically when you shutdown your computer and turn your computer off for you when it's done. Customization features include: adding additional directories you want to wipe, additional registry keys you want to clear, cookies you want to keep, wipe files in the recycle bin, clear the swap file, choose ...
Snooptrap Based on award-winning technology. Access your private data instantly. SnoopTrap is unlocked via answering a question that you provide yourself and can change or edit at any time. For instance, you could make SnoopTrap ask you "What is the meaning of life?". Your customized answer could be anything that comes to your mind. This makes it easy to remember your question, and virtually impossible for others to guess what the answer is....
Encrypt Decrypt Pdf Encrypt Decrypt PDF allows you to Encrypt and Decrypt protected Adobe Acrobat PDF files in batch mode. With this software, you may freely secure your PDF files from being printed, changed, copied, extracted, signed, filled, assembled and/or merged, and you also may remove the password of your PDF files, if you already know the owner or user password. All versions of Adobe Acrobat are supported. Features: Does NOT need Adobe Acrobat software; Encrypt decrypt PDF files in batch; Supports PDF 1.5; Supports Adobe Standard 40-bit encryption and Adobe Advanced 128-bit encryption; Password protect opening of the document; Prevent printing of the document; Prevent copying of text/graphics; Prevent changes to the document; Prevent changes to form fields a...
Elite Keylogger Elite Keylogger is the best selling surveillance software for monitoring and recording every detail of PC and Internet activity everywhere: in your home or in your office. Elite Keylogger includes several integrated stealth modules that record: chats, instant messages, emails, websites visited, absolutely all keystrokes, each and every program launched, all passwords and even Windows logon password, usernames and time they worked on your computer, desktop activity, clipboard and more. Elite Keylogger is your only complete privacy fortress that will protect your PC and inform you about every keystroke made! Elite Keylogger provides the equivalent of a digital surveillance history so that you can see exactly what your family members, neighbours, employees or other users are doing on the co...
Mcafee Virusscan 2005 Stop viruses and keep your PC safe with McAfee VirusScan! VirusScan is an easy-to-use antivirus solution that ensures your PC is protected from viruses, worms, Trojans, spyware, web dialers, and other malicious threats. VirusScan stops threats coming from email, instant messaging, shared files, and more....
Index7
Handy Keylogger Handy Keylogger - superior stealth keystroke recorder for PC surveillance! With Handy Keylogger you can: record key strokes, capture desktop activity, monitor internet usage, log chats and emails, monitoring applications and windows users work with, record instant messengers, capture passwords, send logs via e-mail, install keylogger on any Windows platform and more! Handy Keylogger will record all keystrokes typed secretly, completely undetectable to the user! The Keylogger will also capture international keyboards and major 2-byte encodings and character sets! Handy Keylogger will record all passwords typed on your keyboard and store the information into highly secure logs only you can view. Additionally, our Keylogger will capture passwords even if they are masked differently from "*" o...
Quick Keylogger Quick Keylogger - Perfect Invisible Family Keystroke Logger for PC surveillance! Software for PC surveillance has become extremely popular recently, additionally, it is really important for many users and PC owners. Quick Keylogger is a very powerful and easy to use solution for PC surveillance. Quick Keylogger is easy-to-use, very simple and small. Quick Keylogger is extremely compact, still being award-winning tool. With Quick Keylogger you can easily record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode and is completely undetectable spyware: you will not see it in processes list, registry, Add/Remove Programs utility, anywhere. Quick Keylogger includes what many consider to be the BEST key logger engine on th...
Spamfighter Pro If you are looking for a Outlook Outlook Express tool to remove spam from your inbox, look no further. SPAMfighter is the tool you are looking for. Simple, reliable and efficient. A lot of anti-spam products rely on filters and other rule based technologies, but spammers work every day to stay out of these filters. What works one day doesn't work the next. SPAMfighter works completely different. SPAMfighter is using the power of a very large community of people that instantly report if they receive a spam mail. When several people have reported the same spam mail, it's automatically filtered for the rest of the community. In this way very few people in the community will ever see the spam mail. On top of that a lot of spam is filtered before it ever hits the community, but how we do th...
Password Tracker Deluxe Password Tracker Deluxe allows you to safely and securely store and organize your passwords, usernames, and associated notes. Password Tracker Deluxe version 3.0 now has "Autoscan", the ability to continuously monitor your system to insert usernames and passwords automatically, without any user action! This latest release retains the simple and easy-to-use interface of previous versions, but has added powerful features like autoscan, auto program launch, and random password generation! An unlimited number of users can each store individually password-protected lists. The flexible notes field can store just about any type of information you need to keep secure, such as PIN numbers, credit card information, safe combinations, etc. In addition, Password Tracker Deluxe can be used to automatic...
Keylogger Express Keylogger Express is an easy to use utility to stealthily record every keystroke on your computer. It allows you to secretly monitor and record all keystroke activities (eg. email, online chat, password) of computer. The full version software runs invisibly and automatically start itself every time your computer is started....
Index31
Callerip CallerIP monitors activity on open ports on your system, which are often not protected by firewalls, and identifies backdoors that could allow harmful Trojans to steal your confidential information. Automated alerts instantly notify you of a backdoor threat. Worldwide WHOIS lookups show domain and network contact information for IP addresses, including abuse reporting information. Connections to your system are provided in real-time, including the connection time, remote and local IP address, country of origin, remote and local ports being accessed. For Windows XP systems, the process ID is also identified, which helps determine if it is a legitimate process or may be harmful. A simple click on an IP address shows you where the connection originates on a global map, along with domain an...
Keylogger Express Pro Keylogger Express 2.01 can record ANY and EVERY keystroke on your computer. Also, it has a built in uninstaller which can help you to uninstall the software as easy as click a button. Keylogger Express 2.01 is a good tool to make you know what happened to your computer when you are away. It runs invisibly and automatically when your computer is started....
Aye Parental Control Aye Parental Control helps parents restrict the time that children spend on computer and Internet. It is the utility for home PC that enables a parent regulate When and How-much of children's time that can be spent on the computer whether it be playing games or surfing the Internet. It also has the ability to block access to specified programs and websites. Features: Define at what time and for how much time your children are allowed to access the computer an internet. Offer two time options: Parents can define a specific time period or an accumulated time amount. Support all kinds of internet connections. Restrict children modifying system time. Forbid children to bypass/shutdown/delete the software. Block the specified programs and websites. Monitor the activities of Internet Exp...
Armor System5 This professional package is designed to give you some of the most powerful encryption tools on today's market. Armor System5 (ARS5) comes loaded with 40 most secure and popular encryption algorithms world has to offer. Protect your documents from unauthorized use, send email that only selected people can read, and compose your own encrypted documents. You can be ultimately in charge of the level of security you want. ...
Aptpassport In this data driven age there is an ever growing requirement for us to keep secure control of all the P.I.N.s (Personal Identifier Numbers) that we are presented with for accessing our personal accounts. These accounts may be from web sites that require a simple ID/Password, online Banks that require several additional Question/Answer combinations, to many other types of non-web related secured data. For example - Keys for software installation, mobile phone PUKs, - the list goes on and on! So whether we like it or not we have all these PINs that we have to keep secure, yet it is also important that they are quickly accessible and easily deployed. (One-click automated login for example.) AptPassport delivers on all fronts and is the cost effective solution that gives you peace of mind ...
Index25
File Destroyer With Full Resell Rights ust add files, select how many times the data should be wrote over and shredded before it is permanently deleted from your computer. Powerful and Very easy to use. SUPER BONUS: Order now and receive MASTER Resell Rights so you can sell Password Saver and keep 100% of the profits! ...
Security Task Manager Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. You can choose to terminate any process, delete it, or alternately quarantine it, which will disable it from running again without actually deleting it. If you buy Security Task Manager you get the software SpyProtector for free. SpyProtector contains tools to protect your computer from keylogger, spyware and trojans. SpyProtector deletes traces of your Internet and computer activity and prevents keyboard input monitoring. Furthermore SpyProtector warns you when the registry is changed....
Hidefolder 3 Hide Folder is a secure and user-friendly program for password-protecting users important files, folders and discs. It prevents unauthorized access to everyones sensitive information and programs. The software makes the protected folders completely invisible, inaccessible or accessible in the read-only mode. Protected folders and their contents are prevented from being renamed, modified, deleted, copied, moved, accessed or even seen on the system. Hide Folder 3.1 lets user specify some selected programs that are still allowed to access the protected areas (such as virus scanners, disk drive utilities, etc). ...
Disk Password Protection Disk Password Protection 4.0: a comprehensive suite of hard-drive protection/access restriction tools. Protect your disk/partitions with a password, ban all reading/writing activity, limit launch of specified files to authorized personnel only, etc. Disk Password Protection 4.0 offers users the option to choose what kind of protection they need. First is the Boot Protection. When chosen, any unauthorized person will not be able to boot a computer without entering the correct password. The program also offers Partition Protection. Any person can chose to have one or several partitions where all confidential information is stored. When protection is activated, the partition will be invisible to the operating system and the disk space taken up by sensitive data will appear as free disk spa...
Disk Password Protection Disk Password Protection 4.0: a comprehensive suite of hard-drive protection/access restriction tools. Protect your disk/partitions with a password, ban all reading/writing activity, limit launch of specified files to authorized personnel only, etc. Disk Password Protection 4.0 offers users the option to choose what kind of protection they need. First is the Boot Protection. When chosen, any unauthorized person will not be able to boot a computer without entering the correct password. The program also offers Partition Protection. Any person can chose to have one or several partitions where all confidential information is stored. When protection is activated, the partition will be invisible to the operating system and the disk space taken up by sensitive data will appear as free disk spa...
Imtoo Ipod Movie Conve
The Pc Detective Pro The PC Detective Pro is a power full spy utility that monitors your PC or multiple PCs over a Lan logging all activity including websites visited, applications run, all keystrokes, chat conversations, Instant messages and regular screen captures all in complete stealth, so users will not be aware of it presence, enabling you to keep track on what your kids, spouse, employees etc are up to on your PCs. It is designed to be used either on a standalone machine or over a LAN where all activity is logged for viewing at a later date and can also be viewed over a network in real time. It also includes a popup blocker, website blocker application blocker and has the ability to run applications remotely over a Lan and to send instant messages to a user over a network. All logging can be emailed a...
Sentry Professional Sentry locks down your computer to keep it secure when you aren't around. Many options are provided - you can customize the appearance of your screen, have your favorite screen savers run from within Sentry, and even take messages from people who may drop by. Sentry can be activated instantly. It can be launched after your system is idle for a specified period of time, by clicking on an icon in the system tray, or by typing in a set hotkey....
The Pc Detective Pro 2 10 Users The PC Detective Pro is a power full spy utility that monitors your PC or multiple PCs over a Lan logging all activity including websites visited, applications run, all keystrokes, chat conversations, Instant messages and regular screen captures all in complete stealth, so users will not be aware of it presence, enabling you to keep track on what your kids, spouse, employees etc are up to on your PCs. It is designed to be used either on a standalone machine or over a LAN where all activity is logged for viewing at a later date and can also be viewed over a network in real time. It also includes a popup blocker, website blocker application blocker and has the ability to run applications remotely over a Lan and to send instant messages to a user over a network. All logging can be emailed a...
Hide Folders Pro Hide Folders is an access control utility that allows you to hide your sensitive folders out from users and applications. You need only to select folder(s) you wish to hide from prying eyes and click a button to hide these folders. ...
Icq Password Recovery
Advanced File Encryptor Advanced File Encryptor uses the AES 256-bit encryption algorithm to encrypt your files. It installs onto the context menus in Windows making it easily accessible for all files and folders. In addition to encrypting and decrypting files, Advanced File Encryptor can also make self-extracting encrypted files. This feature would be helpful if you need to e-mail an encrypted file to a friend or colleague who does not have Advanced File Encryptor. Also, Advanced File Encryptor contains a secure delete feature which insures deleted files are really deleted. Files that are 'wiped' are not recoverable. With Advanced File Encryptor your private files remain private and your deleted files will in fact be deleted....
Hide Folders Xp 2 Select unlimited number of folders and files of your choice to hide and protect by a password. In one mouse click your selected folders became invisible: it is impossible to find hidden folders, access any file in them and remove them (even when removing upper-level folders). You may leave your computer unattended without worrying if someone will access your private data. Then just run the program and enter your password - your hidden folders will become visible instantly....
Access Boss Attempting to understand how the inside magic of Windows administering works may be a challenging task even for an experienced administrator. Needless to say, smaller companies that cannot afford hiring a dedicated tech guy to manage administrative rights on corporate network PCs are becoming victims to this circumstance. Introducing Access Boss, the unique easy-to-use tool that enables person in charge of access rights restriction in corporate environment make his job without having to be a computer genius! All you have to do is install Access Boss on machine under Administrator account, run the program and choose which users access time should be restricted. To do so you simply mark the required hour(s) of any day of the week as either allow or deny. It is all that simple! Once you appl...
Watchman Watchman is now the tool of choice for protecting your system in a reliable way. With a simple interface, Watchman delivers file protection, application usage logging, and access control management. Simple and productive: - Stops unwanted applications - Protects system settings - Protects documents from tampering - Monitors application usage - Sends security alerts by e-mail Install and forget about it! Watchman runs silently in the background, keeping your system safe from unauthorized eyes at all times. Make sure your system is always protected with Watchman, a powerful and easy-to-use security tool for Windows....
Lock My Pc Lock My PC allows you to lock your computer with a password while you leave it for a time. It shows a lock screen, disables Windows hotkeys and mouse. You can use a hotkey or the system tray to lock your PC. To unlock the computer you must enter correct password only. The program can log invalid entry attempts and has option to keep your PC locked even if power failure occurs or someone switch it off and on....
Icon Seizer
Strong Encryption Package Strong Encryption Package is an add-on for Stealth Encryptor and Private Pix. Seven additional encryption types including AES-Advanced Encryption Standard (Rijndael), Mars, Blowfish 448 bits, 3DES, Twofish, Serpent, Skipjack....
The Pc Detective Se The PC Detective SE is a power full spy utility that monitors your PC logging all activity including websites visited, applications run, all keystrokes, chat conversations, Instant messages and regular screen captures all in complete stealth, so users will not be aware of it presence, enabling you to keep track on what your kids, spouse, employees etc are up to on your PCs. It is designed to be used on a standalone machine where all activity is logged for viewing at a later date or can be emailed at regular intervals for your viewing elsewhere. It also includes a popup blocker, website blocker application blocker....
I Cipher Ap Extremely fast and reliable image file encryptor/decryptor with build in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection against an unauthorized use or theft. Only person with a correct encryption code can decrypt images back to their intelligible form. ...
The Pc Detective For Unlimited Users The PC Detective is a power full spy utility that monitors your PC or multiple PCs over a Lan logging all activity including websites visited, applications run, all keystrokes, chat conversations, Instant messages and regular screen captures all in complete stealth, so users will not be aware of it presence, enabling you to keep track on what your kids, spouse, employees etc are up to on your PCs. It is designed to be used either on a standalone machine or over a LAN where all activity is logged for viewing at a later date and can also be viewed over a network in real time. It also includes a popup blocker, website blocker application blocker and has the ability to run applications remotely over a Lan and to send instant messages to a user over a network. All logging can be emailed at re...
Ie Blaster With Full Resell Rights This program will clean your Internet Explorer cookies and history, with the option of selecting which cookies to clean. Very easy to use and effective. Now Available With Master Resell Rights! Turnkey Website Just Like This One included! ...
Hyperlink Control
The Pc Detective Pro 1 User The PC Detective Pro is a power full spy utility that monitors your PC or multiple PCs over a Lan logging all activity including websites visited, applications run, all keystrokes, chat conversations, Instant messages and regular screen captures all in complete stealth, so users will not be aware of it presence, enabling you to keep track on what your kids, spouse, employees etc are up to on your PCs. It is designed to be used either on a standalone machine or over a LAN where all activity is logged for viewing at a later date and can also be viewed over a network in real time. It also includes a popup blocker, website blocker application blocker and has the ability to run applications remotely over a Lan and to send instant messages to a user over a network. All logging can be emailed a...
Pc Security Lock down your system like never before. Exercize total control over your computer with the following security options: Explorer Control, File Lock, Folder Lock, System Lock, Internet Lock, Shortcut/Program Lock, Restricted System, Window Lock, intruder Detection with Alarm, Flexible and complete password protection and Drag and Drop support. A very powerful and easy to use protection utility....
O O Diskrecovery V3 0 Professional data recovery made easy! O O DiskRecovery functionality begins where other programs leave off. This software combs every sector of a hard disk, memory card, or digital camera to find lost files. Even when files systems are formatted or destroyed, it is possible to reconstruct once deleted data. Over 300 file types can be recognized and restored, including Word documents, Excel workbooks, Access Databases, and virtually every sort of commonly used graphics, photo, movie, and music formats (JPEG, AVI, MPEG, MP3, WAV, BMP, TIFF, Corel Draw, Photoshop, Framemaker, Adobe Illustrator, and many more). Do not give up on lost data! O O DiskRecovery can still help even when things look hopeless. O O DiskRecovery takes advantage of professional data recovery algorithms Until now, ...
Private Encryptor Utilize the latest in encryption technology to protect your sensitive data. Privacy tools include file/folder encryption, e-mail encryption, file/folder shredder, file/folder Backup with auto encryption, My Passwords, Installable Encryption Modules, Compression, Context Menu support, Stealth Media Encryption super speed for large image multimedia and exe files, and Self Decrypting Executables. Registered version has DES, and Blowfish encryption, stronger encryption available as an add on. Features an extremely flexible and easy to use interface. Files/Folders can be Encrypted, Decrypted or Shredded right from the Windows Explorer when you right click. Since the Stealth Decryptor can be downloaded free from our website, the receiver of an encrypted email message does not have to buy the p...
Fast Outlook Express Password Recovery Fast Outlook Express Password Recovery is used to restore forgotten or lost email account passwords in Outlook Express. In every box there is full information containing your login, password, server names, etc. Passwords are recovered instantly, multilingual ones are supported. Works with all versions of Outlook Express. The best feature of Fast Outlook Express Password Recovery is that no installation is necessary. You can launch it from anywhere - a CD-ROM, a floppy disk, or a Flash drive....
Home Education Home In
Secure Ie And Private Ie Browse Safer, Faster, and More Securely Secure IE with security zones that deny privileges for all but the most trusted sites. Block Flash, block popups, automatically route all file downloads through your virus scanner. Save complete web pages (even HTTPS pages!) And much more......
Secure Ie Browser Security Make Internet Explorer safer, faster and more secure! Stop Hackers in Their Tracks! Browse Safer and Faster with Secure IE. Use Internet Zones to deny privileges for all but the most trusted sites. Block Flash, block popups, automatically route all file downloads through your virus scanner. Also, integrates IE's cookie blocking/management, privacy, and other security features. Browse dozens of web sites simultaneously and securely, use sticky notes and the highlighter to annotate web pages, and much more. Worried about online security? Secure IE can: - Prevent hackers from getting at your sensitive personal information (such as credit card info, email, passwords, etc) stored in hidden locations your PC. - Intercept malicious file downloads - Block Popups and Flash with a single click - I...
Mcafee Spamkiller 2005 Get the email you want and nothing else. McAfee SpamKiller quickly and easily helps you stop spam from polluting your inbox with advanced filtering technology. With fraudulent, inappropriate and offensive emails being delivered in vast quantities to adults, children and businesses every day, spam protection is an essential component of your PC's security strategy. Whether you want to eliminate spam as quickly and easily as possible, or crave the power to fight back, McAfee SpamKiller is for you. No other email filtering solution offers so many features, or is as easy to set up and use....
Mcafee Firewall 2005 Protect yourself while online with the advanced security of McAfee. Personal Firewall Plus. Easy-to-use, yet highly configurable, McAfee Personal Firewall Plus v5.0 secures your PCs connection to the Internet whether you connect via DSL, cable modem or dial-up. With intrusion prevention, color coded security alerts, customizable audible alerts, detailed logging, and an application scan for Internet enabled applications, McAfee Personal Firewall Plus gives you the power you need to control the communications into and out of your PC, ensuring that your online experience is as safe as it is enjoyable....
Mcafee Antispyware Essential protection for today's security-conscious Internet user, McAfee AntiSpyware quickly detects then safely eliminates malicious applications - e.g., key loggers, remote-control programs, browser hijackers - hiding on your system before they can rob your identity, snatch passwords or monitor browsing activity when you surf or shop. Erasing online roadblocks, McAfee AntiSpyware also foils adware programs that trigger annoying advertisements and sap system performance....
Hfsk Db Server
Abf Password Recovery ABF Password Recovery is a program to retrieve lost or forgotten passwords for many popular programs. Passwords can be recovered for current installation of Windows only. All passwords are recovered instantly. Program interface is customized, so the users can change it, according to their preferences. The current version supports following programs: Outlook Express - passwords to identities; mail, news, and LDAP accounts. MS Outlook - passwords to mail and LDAP accounts. The number of supported programs and features will be increased in future releases....
Deskman Standard Edition A versatile desktop security tool for home users. Combining a selected array of options, many different levels of security can be set with the same ease they can be disabled. A full-featured utility, useful to reach a considerable level of security in a snap!...
Shyfile 6144bit Email And File Encryption ShyFile encodes your text and packs it into an extra file that is to be attached to an outgoing email or uploaded to a website. The recipient thereof does not need to have ShyFile installed to be able to decode since any Java-Script enabled Internet browser will open it and prompt the user to enter the matching key phrase. Its user friendly interface is very intuitive - no need to study the manual. Easy-to-handle but most effective email security. ShyFile also encrypts binary files which require a free demo version of ShyFile to decode though. Simple 1on1 key entries are used, no Public and Private Keys. ShyFile exclusively makes use of its own independently developed TL6144D algorithm, offering a symmetric depth of encryption of up to 6,144 bits (that reaches or even tops military require...
Passrecall You will find PASSreCall to be the most intuitive and easy to use program that is available to manage your passwords. Each time you start PASSreCall you will be prompted for your Master Password that will verify your access to the remaining password records. If you have forgotten your Master Password, then you can request the program to present two Challenge Questions to verify your access....
Hfsk Db Server
Desktop Orbiter Administer and secure machines remotely. Desktop Orbiter provides administrators the richest possible set of features for remotely protecting and managing computers, all from centralized locations. The application of choice for creating secure environments in a fast and reliable way. Take control of multiple systems easily using the most comprehensive suite of tools for managing, monitoring, and protecting computers remotely. Desktop Orbiter is expressly designed to facilitate administration and protection of large numbers of workstations. It's simple yet powerful. Keep track of active connections and open ports used by applications and services. View detailed info of printed documents and used applications all over the network remotely. Perform tedious tasks remotely by pressing a mouse-...
Deskman Professional Edition A versatile desktop security tool for home users and computer administrators alike. Computer Administrators require an effective tool to stop users from messing up the desktop, or to apply special security measures on a system-wide, or per-user, basis. ...
Acronis Drive Cleanser 6 0 Acronis Drive Cleanser 6.0 guarantees the complete destruction of data on selected partitions and/or entire disks. With Acronis Drive Cleanser you can: — Delete all the sensitive data from an old or leased PC — Wipe the entire hard disk or individual partitions — Format the hard disk, divide it on partitions — Use 8 national data destruction standards — Review the results of hard disk wiping through built-in DiskViewer utility ...
Pcghost How do you know what your staff (or family members) are doing on your PC? Are they working on your account or playing games? pcGhost software can tell you exactly who is doing what on which PC at any time during day or night. pcGhost can record anything including keystokes and mouse button, even visited web sites(URL) on IE and NETSCAPE or other browsers. It also can works on schedule or according to the window title that you want. It can email the log file to your specific email address....
Hide Protect Any Drives Hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide Protect Drives". Stop unauthorized software installations and data leak by removable media....
Haunted House On The L
Pclog How do you know what your staff (or family members) are doing on your PC? Are they working on your account or playing games? pcLog software can tell you exactly who is doing what on which PC at any time during day or night. pcLog can record anything including keystokes and mouse button and user's screenshot, even visited web sites(URL) on IE and NETSCAPE or other browsers. It also can works on schedule or according to the window title that you want. It is very easy to control the pcLog through network or internet.It can email the log file to your specific email address.You can control the PC with pcLog to update and rename function remotely etc....
Guaranteed Excel Decryptor It is a command-line utility which allows you to decrypt Microsoft Excel 97/2000 (and Excel XP in default, 40-bit mode) files with password for opening. Any file, encrypted with ANY password (no matter what length of the password is or what language or symbols used, etc) can be decrypted with guarantee.It usually takes several days. This software supports several computers - the more clients version you have, the faster is the decryption. This is a command-line utility. Look at http://www.password-crackers.com/crack/guaexcel.html for more info....