Public Key Encryption ...
Jk Encryption Library This ActiveX DLL for Visual Basic 6 contains 3 fast encryption routines and 3 internet encoding routines (Base64, quoted- printable and ROT13). There are also a checksum routine for files and a checksum routine for directorys) ...
Cresotech Pocketsafe CRESOTECH POCKETSAFE provides the comfortable management and secure storage of passwords, nicknames, credit card, bank account and document data as well as other confidential information. The records in database are stored encrypted and password-protected. The mobile world requires mobile solutions with data confidentiality protected: PocketSafe gives you this full protection. PocketSafe allows you to secure important data of 8 basic types: a specific template for each particular type makes data entry more convenient. The database file and each data entry within the database can be password-protected, thus providing more security. Strong DES encryption algorithm and double password protection make sure that your confidential information is for your eyes only! PocketSafe also allows...
Autodoc One Additiona
Microlocked MicroLocked is a small, easy to setup, security program that locks your computer while leaving the display visible. Once locked your system can not be accessed until the unlock password is entered. Your system screen saver can be used normally or set to activate when your machine locks. Desktop icons and taskbar can be optionally hidden while locked....
Websafe Trellian WebSafe provides a welcome solution for the protection of your valuable and hard work! We all know how it feels to invest countless hours of your time, effort and money into creating professional webpages for your web site, just to have some unscrupulous visitor save it to disk instantly with a few clicks and then modify it for their own purposes. Trellian WebSafe is a HTML encryptor, which will turn the HTML of your website into encrypted code (garble), so that it will be safe from light fingered intruders, uninvited information collectors and spiders. Trellian WebSafe also performs as a function disabler, unwanted tag stripper and HTML optimizer. With Trellian WebSafe HTML encryptor, you can instantly disable the right click function on your entire website, encrypt H...
Advanced Encryption Package Advanced Encryption Package. Typically you encrypt files because you don't want others to see them, but sometimes you want to send someone an encrypted file. Most if not all encryption programs allow you to do so--they vary, however, in terms of how difficult the process is. AEP's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without needing AEP or any other software. The program includes a file shredder that wipes the contents of your original files. It also integrates nicely with Windows Explorer, allowing you to use Explorer's context menus and avoid having another window clutter your screen. It also uses military grade encryption for protecting...
Encrypto 2000 Use Encrypto to encrypt E-Mails, Chat messages, text documents, or any text that needs to be secure. You can choose the encryption key for easy encrypting. Encrypto uses a easy to use interface and has direct emailing, and file saving and opening features. ...
Winfile Vault Site License WinFile Vault is a PC safe for your computer. It allows you to keep all of your important PC files safe within a manager which looks and acts just as a conventional vault would! This program is a MUST for any Windows PC user to ensure file security SITE LICENSE OF WINFILE VAULT: You are licensed to install this software on multiple machines in the same location. You will receive license certificate via US Mail. NETWORK EDITION SITE LICENSE: This software is Windows NT network functionable. You will receive site license via US Mail. ...
Aussie Supermodels In
Winfile Vault 1 Copy WinFile Vault is a PC safe for your computer. It allows you to keep all of your important PC files safe within a manager which looks and acts just as a conventional vault would! This program is a MUST for any Windows PC user to ensure file security SITE LICENSE OF WINFILE VAULT: You are licensed to install this software on multiple machines in the same location. You will receive license certificate via US Mail. NETWORK EDITION SITE LICENSE: This software is Windows NT network functionable. You will receive site license via US Mail. ...
Etype Mail Decoder Text decoder - WIN,KOI,ISO,ALT,MAC,Russkaja Latinica, 7bit encoding (like =C2=EE=F2, %C2%EE%F2, \c2\ee\f2), UTF7, UTF8, Unicode, Base64, BinHex 4.0, Uuencode / Uudecode. Hand-operated and automatic modes - in second case, the program can independently recover messages, which were encoded up to 4 times (inclusive). Russian and English interfaces ...
Interscope Blackbox 4 0 Interscope BlackBox offers advanced solutions for protecting your most critical asset: data. With support for strong cryptography, integration in major e-mail clients, modular architecture, self-extracting archive creation capability and smooth shell integration it ensures your security tools are always just the right click away. You should get BlackBox if you are: Worried about someone reading your files Transferring sensitive files over the Internet Sending and receiving confidential e-mail Ease of Use -----> Interscope BlackBox was designed to provide you with sophisticated, yet easy-to-use security tools that naturally extend your desktop and make it a safer place. The integration with Windows Explorer and the desktop, Outlook Express or Outlook 2000 means it is easy to lea...
Access Denied Xp Security program that request username and password on Windows load-up and lock your desktop by one mouse click. All unwanted people are getting away from your computer. It is stronger what Windows XP security. You can see and manage easily user privileges within colored list of users. Empty password users now can be fast detected to prevent unauthorized use of such accounts. Color logs allow you to take knowledge about usage of computer and detect intruder in appropriate time. Other feature is possibility to disable CTRL+ALT+DEL. ...
Access Denied This security program requests username and password or simple password upon boot-up and locks desktop by one mouse click. It can't be bypassed on Windows 95/98/ME. All unwanted people are kept out to your PC. Very flexible use: multi-user support(up to 450 users), password encryption, integration with your favorite screensaver, color's highlight log files with integrity test, setup of colored text for requesting passwords, possibility use Access Denied usernames as Windows logon names and other pleasant additions including hidden measures that can stop hackers/crackers. Screen Guard sub-system can save message events from anyone, even unauthorized persons but still protect desktop. Users can change their passwords only if during installation you enable this feature....
Aureleon
Keyring Morello KeyRing is the easy and secure way to manage all your passwords, PIN's and other account information. These days it is almost impossible to keep track of all the different passwords you use in your day to day life. It is easy to fall into bad habits - using easily guessable passwords, using the same password for different accounts, and never changing your password. Who can blame you, it would be difficult enough thinking up all those different passwords, never mind remembering them. Keyring is a simple program which stores all your passwords, together with other infomation such as username/account number and web page in a single securely encrypted file. For convenience, a single click will jump you to the account apos;s web page and copy your password or username to the cl...
No Peeking Professional Edition No Peeking! is a personal privacy utility which allows you to password-protect any file, rendering it meaningless to anyone without the password. It was carefully designed to be unobtrusive, easy to use, and completely secure, with a state-of-the-art 56-bit encryption engine (1024 bits with the Professional version)....
No Peeking Standard Edition No Peeking! is a personal privacy utility which allows you to password-protect any file, rendering it meaningless to anyone without the password. It was carefully designed to be unobtrusive, easy to use, and completely secure, with a state-of-the-art 56-bit encryption engine (1024 bits with the Professional version)....
Spypartner The Spy Professional SpyPartner - The Spy Professional - is your desktop security agent. Equipped with keylogger as well as screen shot recording technology, making it a complete spy partner, enabling you to track most activities on your PC, whether online activity, offline activity, your working activity, the amount of time you're using your computer, or even other activities that you might never imagine before. ...
Audioright Converter
Devicelock DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs or any other device, depending on the time of day and day of the week. DeviceLock enhances access control for Windows System Administrators and helps control removable disk usage. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. Network administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available....
Pc Privacy Guard PC Privacy Guard protects your privacy by cleaning your system of embarrassing, incriminating, or just plain space-hogging cookies, temp files, recent documents, typed URLs, and IE history. What makes PC Privacy Guard exceptional is that it gives you total contol over what is erased from your computer. You can choose to keep certain cookies as well as certain typed URLs. You can even populate the Recent Document menu with innocent files, and fill Media Player's history list with fake names. That means no one will know you've been trying to erase anything. PC Privacy Guard also is compatible with more than 150 plug-ins for cleaning every program imaginable. It does not contain spyware, adware, or third-party software. ...
A One Folder Encryption A-one Folder Encryption is a software for folder encryption. It let you easily protect data in your computer. When a folder encrypted with A-one Folder Encryption, It could not be accessed, copied, deleted, moved and renamed. With Folder Encryption, you could keep the special data secure , and you let others use your computer at will and without worry. Key Features: (1)Fastest and Simplest, with one-click Encryption and Decryption (2)When Folder Encrypted, folder not only can't be accessed, but can't be copied, deleted, and moved , renamed .... (3)Provide password setting for the software (4)This program does not apply in window 98 system, and does apply in NT,XP,2000,2003 system (5)For safety reason, Please not trying to en...
Access Mde Unlocker The Access MDE Unlocker allows you to make changes to locked Access MDE databases - e.g. changing a form or report design or adding functionality using macros. Access 2000 and above only. Please note: You cannot make changes to the VBA project using this tool, however the original VBA compiled code is not lost when making changes to forms/reports or macros. ...
1 Abc Net Password Organizer In these days, everyone has many different passwords, to login to a messenger or an e-mail account, security codes for online banking, PINs for his telephone and so on. 1-abc.net Password Organizer allows you to organize all your passwords and login data, you only have to remember your master password. Additionally, it offers many useful functions concerning modern and secure password management. Feature Overview: * Integrated random password generator - helps you if you do not have any idea how to create a new password * Copy function - to enter your passwords easily into the login fields * *.txt export function - prepare your secure data for printing, sending by e-mail or whatever you want. (Should of course be used with caution!) * Enter thousands of passwords if you want - your disk sp...
Asppicture Single Serv
Iovsoft Encoder MS Access 2000 MDE Password database for your websites with additional encoding/decoding tools. MDE format does not allows anybody to view encoding/decoding source code. Allows to save website names, logins and passwords. For more details please visit www.busysoftorder.com/encoder.htm...
System Privacy Shield Privacy Protect - System Privacy Shield is a computer tracks clean tool, this tool will protect your privacy by cleaning all tracks on your computer(including internet and system activities). Supports popular browsers - System Privacy Shield supports popular browser such as Internet Explorer, MSN Explorer, AOL Explorer, Firefox, Opera and more. You only need to click one button and all activities on your computer will be deleted. It's simple and easy. Security Your hard-disk free space - Do you know the delete action and empty recycle bin action does not really delete your files? Recover tool can recover the deleted file. System Privacy Shield will really delete your files from your computer, completely implements and exceeds the US Department of Defense DOD 5220.22-M and NSA cleari...
Peoplelock Commander PeopleLock Commander (PL C) is an integrated security software. It has three main contributions to PL C users. Firstly, PL C encrypts the USB memory stick so that the data installed in the memory stick is protected from unauthorized accesses. Secondly, PL C allows users to lock the operations of their PCs. What is more, an encrypted USB memory stick can be used as a key to unlock those operations. Thirdly, PL C includes a keyboard and mouse macro, a function to record and replay a sequence of keyboard and mouse inputs. You do not need to use any virtual drive for this software. This is a stealthy encryption software for USB data storages, such as USB memory sticks and USB hard disks. By encrypting USB data storages, PeopleLock Commander(PL C) protects your data. PL C also equips with mous...
Sentinel Professional Complete System Monitoring: Sentinel Takeover all the control of Windows based Computers Sentinel captures screenshots in scheduled time and stores them in a secure area for your later review Sentinel Monitoring Features Sentinel captures screenshots (Full screen or active screen) Sentinel Captures screenshots in a adjusted period System Watch (You are able to determine log in and log off time of your PC). Files and Folders ( Monitoring opened, created, modified, deleted files and folders) Software Record (Monitoring programs used and their connected dll files) Web Site Record (visited web sites and downloaded files) Keyboard Record :Recording all keyboard activity and keystrokes occurred. Chat Record: Watch all instant messaging programs like MSN, YAHOO, ICQ Reporting and Expo...
Inthepicture InThePicture encrypts files messages into redundant parts of Windows BMP imagefiles. Provide extra security for e-mail attachments with up to 100 user-defined keys. Supports 16-color, 256-color 24-bit BMP files, and the user interface supports drag drop. Fully compatible with Windows95, WindowsNT Windows98. ...
Art Puzzle
Access Password Recovery Genie Access Password Recovery Genie is a program to recover passwords for MS Access databases. -- All versions of MS Access are supported (including Access 2003) -- State of the art password recovery engine - all passwords are recovered instantly -- Recovers database passwords -- Recovers user-level security accounts and passwords -- Multilingual passwords are supported -- Full install/uninstall support ...
Password Archive 2005 Password Archive 2005 securely stores your passwords and all your personal confidential information. With a single password you can protect all your important data using industrial encryption standards. Store all passwords and your important data in one secure, protected place. You will never lose or forget anything again. Protect your data by creating strong passwords and stop worrying about forgetting them. A built-in password generator will help you. Store any type of information, including passwords, credit cards and accounts numbers, addresses, instructions, contact details, clothing sizes....
Diskscience DiskScience creates on-the-fly encrypted, virtual volumes that look and feel just like the disks with which you are already familiar. Encryption is highly optimized for maximum throughput and is often faster than device transfer rates. Encryption algorithms include: 256-bit AES, DES, Triple DES, and 256-bit GemStone. Creating new DiskScience volumes is easy. The New Volume Wizard guides the creation of empty volumes. The Cloning Wizard makes it simple to copy the contents of an existing floppy, CD, DVD (including movie DVD - outside the U.S.), or other disk, into a secure (or not) virtual volume. Cloned CDs/DVDs prove especially useful since they offer hard disk like performance and they can be used on computers that donÂ’t even have CD/DVD drives. With relatively low power consum...
Storagesafe StorageSafe provides high performance security for USB and IEEE1394 based storage with on-the-fly device encryption, guards against 180,000+ common passwords, and DoD Std. 5220.22-M compliant secure file and device erase. Devices are split into custom sized public and private areas. The public area is not encrypted. The private area is encrypted with the 256-bit Advanced Encryption Standard (AES). ItÂ’s easy to use. Simply enter the correct password once, and protected devices will have the familiar look and feel of unprotected storage. All program functions except (Install/Uninstall) work under Windows Guest/Limited User accounts. The single unit, direct download price is $24.99; multi-unit pricing and site licenses are available. To ensure your complpete satisfaction, we...
Secukeeper Are your files and folders safe? Do you keep your files and folders away from spyware? Are your sensitive data safe? SecuKEEPER Strongly lock your files and folders away from prying eyes. Today you do not go spending hundreds of dollars on encryption software. SecuKEEPER is an All-in-one file encryption software, Your best choice - can secure everything,offers four types of encryption protection for files at various security levels, can rapidly Lock files to prevent access without actually encrypting them, or Hide the locked files so they're not even visible,can Encrypt files and folders, optionally making them self-decrypting so they can be opened on a system that doesn't have SecuKEEPER installed.Private coffer feature creates encrypted virtual drives in which you can store especially s...
Art Of Sir Lawrence Al
Safe N Sec Safe'n'Sec - effective utility to protect a personal computer against unknown system vulnerabilities and threats. - Protection against new threats and vulnerabilities - Protection of your system from external attacks and unauthorized access - Identifying the sources of new threats - Detection and elimination of known threats - Maximum protection and minimum load Current protection solutions (antivirus software and personal firewalls) are extremely effective at combating known threats and vulnerabilities. Antivirus applications protect users only against known viruses. Personal firewalls help prevent intruders from gaining access to personal computers. These solutions are based on reactive technologies that perform actions only in response to malicious activities toward your data. ...
Ecyware Greenblue Inspector Ecyware GreenBlue Inspector is an integrated web analyzer environment that offers multiples ways to test your web applications. You can analyze on the run or record a session for deeper analysis coverage....
Hide Secret Files Hide Secret Files is a security product based on an unequalled data hiding method. As a result of many years research within our company, this product hides and safely protects from erasure your private information. Hide Secret Files is the ultimate tool allowing you to have exclusive secured access to sensitive information based on a password. No one except you, who know the password, will be able to access the secured data. Not even your own operating system will have permission to alter the information. The latest, and one of the most annoying secondary product of nowadays Internet evolution, the spy-ware activity, is absolutely inoffensive against the protection guaranteed by Hide Secret Files The hidden data won't be visible even for your own OS so the Safe Mode booting or movi...
Secrets Protector Pro 2005 A three-in-one privacy protector tool built for those who like their personal stuff handled carefully. This product gives you the features of a folder locker, a secure eraser and a privacy manager. The Hide Secret Files proud successor, enforced with strong encryption, secure file deletion technique and a smart built-in trace remover will help you to protect your secret data and online privacy better than ever. All confidential data will be hidden beyond the reach of ANY intruder and you will be the only one able to handle them. And what you want to delete will be DELETED. Your personal classified data and your online and offline activity traces will be wiped for good. Secrets Protector Pro 2005 is the ultimate security tool to protect your sensitive information on your personal comput...
Winencryptor WinEncryptor is the first encryption program in the world capable of defeating keylogging software without resorting to difficult to use, mouse based, 'virtual keypads'. WinEncryptor's KeyLogShield will render keylogging cracking of encrypted files obsolete. This represents a leap forward in modern encryption protection and is entirely unique in the world today. WinEncryptor features 10 encryption methods, including the current AES (Advanced Encryption Standard) approved for use by the U.S. National Institute of Standards and Technology (NIST) and the U.S. Computer Security Research Center (CSRC)....
Art Of Hokusai
Xl Delete XL Delete 1.1 is a powerful secure delete tool that will permanently delete any of your files using one of its five wipe methods or with a custom method that you create. Many people believe that emptying the recycle bin will delete a file forever. This is not true, when you delete a file and empty it from the recycle bin, the file is in fact still on your hard drive. The only thing that happens when you empty the recycle bin is that Windows marks the area where the file is on the hard drive as overwriteable so that it can reuse the space when necessary. This allows special data recovery software to be able to actually undelete the file and view all of its original contents. When you delete a file with XL Delete, the file data will actually be overwritten several times using specialized d...
Password Commander 2 5 Password Commander manages and generates passwords, sticks them to Web pages and Programs. It fills forms automatically with one click, lets you “drag” password and login and “drop” them exactly to the field, offers to put frequently used passwords in “bookmarks” that are accessible via System Tray or a Floating Panel, that is always on your desktop, if you wish. PC is compatible with biometric devices and will recognize you by your fingerprint. It is portable and run from USB-flash drive. Passwords and personal data are strongly encrypted with BlowFish. PC lets you export, import, print and back up passwords, save them to passcards and send to another computer. Over 4500 registered users called Password Commander useful, friendly and irreplaceable program. Just try it now ...
Abacre File Encryptor Encrypt any files or folders using 39 advanced encryption algorithms. Other features: Secure Password Generator; Text Pad to encrypt any text; Wipe Files command to permanently remove files your computer; command line parameters; Shell integration....
Hideit HideIt! is your personal data key. With its help, you can easily and reliably hide any files on your home or work PC from outsiders, and unauthorized users. Nobody except you can get access to your hidden folders and files. No one will ever know that you made some of your files invisible to others or even that there is some hidden data. The program itself does not require any installation and does not create any suspicious program files or other attributes that could attract attention and show that you are hiding your data. But how is it possible to hide data without any complicated actions and any professional computer skills or knowledge? The solution is as simple as HideIt! HideIt! creates guarded and invisible space on your hard drive. This space is a private "hiding place" where...
Arjoriemixut Black Mac
Nlcsystems NLCSystems - one of the most flexible and universal cryptosystems to protect your computer and information. It's flexibility makes it useful for corporate and personal protection at the same time - it uses unique non-linear cryptoalgorithm, which allows us to present this features: *Fast unbreakable premium cryptoalgorithm based on non-linear dynamics. *Support of any file formats. Full OLE features support. *NLC uses newest automatiztion methods for protection - working with protected files never was so secure and simple! *Context menus integration - instant access to any files and program options. *Customizable encryption options - you can manually select between advanced security and speed. *Excellent interface with detailed help. *Support of self-decryptable (SFD) files - you ...
Track Destroyer We all know the risks of exposing your identity and activities while on the computer these days. Worst case, your entire identity could be stolen. Perhaps your boss will uncover that you've been surfing the web when you really should've been working, or your spouse find traces of the adult sites you've been visiting... Sure, you could go rummaging through your entire system trying to manually clean out your files, but what if you miss something? What if you accidently delete a crucial file and lose important data? Don't take the risk. Let Track Destroyer carefully and percisely scan and incinerate incriminating data. Unlike some other privacy protection tools which only delete the files and thus can be easily recovered by some data recovery tool, our Track Destroyer completely remove...
Touchlocker TouchLocker1.03 is a manual input locking software. When you leave your work computer for some reason it will automatically hide your open windows and lock the mouse and keyboard to prevent others from modifying your working data.When you want to run some program for long time and don't want others to close or terminate it, you can use our software to lock the mouse and keyboard....
Sticky Password Sticky Password virtually sticks the passwords to programs and WEB pages. You access them quickly and safely. Intelligent feature will find it automatically so you don't have to remember account name to find appropriate password. The passwords are stored in the encrypted database and never appears on the screen. * Stores passwords for all your accounts in the strongly encrypted database * Allows to stick account information to any program window or WEB page and access it in a moment * Ease of use: one program icon and one menu! * Strong password generator * Automated backup passwords database: you can restore passwords at any day and time! * Export passwords to simple text file ...
Cryptex 600 Mb Encrypted Vault Protect vital information on your PC with a secure and hidden vault by Cryptex. Feel better knowing that ANY file you lock in the vault will be protected with strong encryption to ensure maximum protection against theft and peeping eyes....
Aqt126 610
Virtual Personality A professional telephone voice changer utility. High quality natural voice. Works with your PC speakers as well as over a telephone line or internet. Needs only a standard voice modem. Endless of different voices. Supports voice/ bidirectional conversation recording (or any phone on the same lin). 24 pitches and 8 band equalizer. You speak into the PC microphone and the new voice is heard on your computer speakers on the telephone at the other end of the line or through the internet. Ideal for private investigators and for businesses or individuals that wish to filter crank calls. Unlike hardware based products and support telephony, and software products that support only internet this innovative product, supports all media types - telephony, cellular and internet. No one will recognize ...
Virtual Personality A professional telephone - internet voice changer voice changer utility. High quality natural voice. Pitch and frequency independent controls. Works with your PC speakers as well as over a telephone line or with internet applications like yahoo chat. Works with the PC speakers as well as over a telephone line with a special telephone adapter. Doesn't need any modem for telephony. Voice file manipulations. Supports Windows 95/98/Me/NT/2000/Xp. You speak into the PC microphone and the new voice is heard on your computer speakers or on the telephone at the other end of the line. Ideal for private investigators and for businesses or individuals that wish to filter crank calls. Supports 24 individual voices recording. No one will recognize you , not even your own mother. You can cause your ...
S O S Automation Baby - Medical monitor and alarm system. Implemented in software on a home PC. Constantly monitor the surroundings and call you upon emergency, by means of the telephone and also sends you sms and email messages. Upon an alarm event it enables you to monitor through th telephone, the PC surrounding in real time, (sometimes also talking back to the monitored target), and broadcast live audio/video through the internet. It supports Windows 95/98/Me/2000/XP and demands a voice modem mode, microphone and speakers. Its installation is extremely simple and takes a few minuet. S.O.S.Automation serves also as a standard automatic answering machine. This enables S.O.S.Automation to share any telephone line with any other use. S.O.S.Automation supports also be directional communication. You can ca...
Dataguard ...
Visual Ip Trace Trace IP addresses and web sites. Use Visual IP Trace to trace and report hackers, see the geographical locations of websites and IP addresses on a world map, get detailed information about the registered owner of a web site or IP address....
Aqt126 436
Spotauditor SpotAuditor reveals passwords saved in Internet Explorer, recovers ICQ, Far ftp, Dial up, Outlook and MSN messenger passwords, IE Auto Complete Fields. It is a program for viewing and cleaning the secret data stored by Internet Explorer. SpotAuditor allows deletion of unwanted entries from the system protected storage. The program also explores Outlook Accounts, Visited URLs, Installed Programs and Start Run Programs on a local machine or remote computers. SpotAuditor allows to clear Internet Explorer history, delete cookies and temporary internet files. You can recover and restore any lost or forgotten password ever entered in Internet Explorer. If you forget your passwords or need to access some passwords or confidential information stored in your computer, SpotAuditor can really help yo...
Privatefirewall Privatefirewall 3.0 is a Personal Firewall and Intrusion Detection Application that eliminates unauthorized access to your PC, at home, the office, or on the road. Privatefirewall also constantly monitors the sensitive areas of a PC where intrusion can occur and reports on their status allowing users to take appropriate action. Privatefirewall is easy to install/use and provides reliable and high-performance protection right "out of the box". Privatefirewall's intuitive interfaces allow advanced users to easily adjust default settings to create custom configurations. Features include: Internet traffic (packet) filtering, port scanning, IP tracking, SecurePOP email protection, and a proprietary Application Control Engine, which monitors all applications that access the Internet to furth...
Mr G File Encryption The security of your file is very important.Mr.G File Encryption used the newest encode algorithm,supply you the safe encode and decode function.Now,you will not worry about your work being peeked and stolen.Mr.G File Encryption can encode any length and any type of file.The encode algorithm was impossible to be reverse. It was very stable and easy to use.There is a very convenient function that Mr.G File Encryption supply. You can generate a key.exe for you encoded file, put it in your flash disk. when you want to decode your file, just run the key.exe in your flash disk. So you don't have to remember the password, or input it.Just with the key in your flash disk,and the encoded file in harddisk,even without need of the main program, you can take your secret to antwhere with no worry.The ...
Wipeout Pro Wipe your browser history and optimize your drives automatically. WipeOut is a privacy-enhancement, system-cleanup, and tuning tool that suits novices and power users. Securely wipe free space, clear cookies, temporary Internet files, and file-access history from the registry and recent folder and a significant amount of unnecessary registry entries. Once the cleanup is complete WipeOut Pro will cause the system defragmenter to defragment your hard drive(s). WipeOut Pro will do all this automatically when you shutdown your computer and turn your computer off for you when it's done. Customization features include: adding additional directories you want to wipe, additional registry keys you want to clear, cookies you want to keep, wipe files in the recycle bin, clear the swap file, choose ...
Snooptrap Based on award-winning technology. Access your private data instantly. SnoopTrap is unlocked via answering a question that you provide yourself and can change or edit at any time. For instance, you could make SnoopTrap ask you "What is the meaning of life?". Your customized answer could be anything that comes to your mind. This makes it easy to remember your question, and virtually impossible for others to guess what the answer is....
Aqt126 413
Encrypt Decrypt Pdf Encrypt Decrypt PDF allows you to Encrypt and Decrypt protected Adobe Acrobat PDF files in batch mode. With this software, you may freely secure your PDF files from being printed, changed, copied, extracted, signed, filled, assembled and/or merged, and you also may remove the password of your PDF files, if you already know the owner or user password. All versions of Adobe Acrobat are supported. Features: Does NOT need Adobe Acrobat software; Encrypt decrypt PDF files in batch; Supports PDF 1.5; Supports Adobe Standard 40-bit encryption and Adobe Advanced 128-bit encryption; Password protect opening of the document; Prevent printing of the document; Prevent copying of text/graphics; Prevent changes to the document; Prevent changes to form fields a...
Elite Keylogger Elite Keylogger is the best selling surveillance software for monitoring and recording every detail of PC and Internet activity everywhere: in your home or in your office. Elite Keylogger includes several integrated stealth modules that record: chats, instant messages, emails, websites visited, absolutely all keystrokes, each and every program launched, all passwords and even Windows logon password, usernames and time they worked on your computer, desktop activity, clipboard and more. Elite Keylogger is your only complete privacy fortress that will protect your PC and inform you about every keystroke made! Elite Keylogger provides the equivalent of a digital surveillance history so that you can see exactly what your family members, neighbours, employees or other users are doing on the co...
Mcafee Virusscan 2005 Stop viruses and keep your PC safe with McAfee VirusScan! VirusScan is an easy-to-use antivirus solution that ensures your PC is protected from viruses, worms, Trojans, spyware, web dialers, and other malicious threats. VirusScan stops threats coming from email, instant messaging, shared files, and more....
Handy Keylogger Handy Keylogger - superior stealth keystroke recorder for PC surveillance! With Handy Keylogger you can: record key strokes, capture desktop activity, monitor internet usage, log chats and emails, monitoring applications and windows users work with, record instant messengers, capture passwords, send logs via e-mail, install keylogger on any Windows platform and more! Handy Keylogger will record all keystrokes typed secretly, completely undetectable to the user! The Keylogger will also capture international keyboards and major 2-byte encodings and character sets! Handy Keylogger will record all passwords typed on your keyboard and store the information into highly secure logs only you can view. Additionally, our Keylogger will capture passwords even if they are masked differently from "*" o...
Quick Keylogger Quick Keylogger - Perfect Invisible Family Keystroke Logger for PC surveillance! Software for PC surveillance has become extremely popular recently, additionally, it is really important for many users and PC owners. Quick Keylogger is a very powerful and easy to use solution for PC surveillance. Quick Keylogger is easy-to-use, very simple and small. Quick Keylogger is extremely compact, still being award-winning tool. With Quick Keylogger you can easily record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode and is completely undetectable spyware: you will not see it in processes list, registry, Add/Remove Programs utility, anywhere. Quick Keylogger includes what many consider to be the BEST key logger engine on th...
Applet Newsflash Compo
Spamfighter Pro If you are looking for a Outlook Outlook Express tool to remove spam from your inbox, look no further. SPAMfighter is the tool you are looking for. Simple, reliable and efficient. A lot of anti-spam products rely on filters and other rule based technologies, but spammers work every day to stay out of these filters. What works one day doesn't work the next. SPAMfighter works completely different. SPAMfighter is using the power of a very large community of people that instantly report if they receive a spam mail. When several people have reported the same spam mail, it's automatically filtered for the rest of the community. In this way very few people in the community will ever see the spam mail. On top of that a lot of spam is filtered before it ever hits the community, but how we do th...
Password Tracker Deluxe Password Tracker Deluxe allows you to safely and securely store and organize your passwords, usernames, and associated notes. Password Tracker Deluxe version 3.0 now has "Autoscan", the ability to continuously monitor your system to insert usernames and passwords automatically, without any user action! This latest release retains the simple and easy-to-use interface of previous versions, but has added powerful features like autoscan, auto program launch, and random password generation! An unlimited number of users can each store individually password-protected lists. The flexible notes field can store just about any type of information you need to keep secure, such as PIN numbers, credit card information, safe combinations, etc. In addition, Password Tracker Deluxe can be used to automatic...
Keylogger Express Keylogger Express is an easy to use utility to stealthily record every keystroke on your computer. It allows you to secretly monitor and record all keystroke activities (eg. email, online chat, password) of computer. The full version software runs invisibly and automatically start itself every time your computer is started....
Callerip CallerIP monitors activity on open ports on your system, which are often not protected by firewalls, and identifies backdoors that could allow harmful Trojans to steal your confidential information. Automated alerts instantly notify you of a backdoor threat. Worldwide WHOIS lookups show domain and network contact information for IP addresses, including abuse reporting information. Connections to your system are provided in real-time, including the connection time, remote and local IP address, country of origin, remote and local ports being accessed. For Windows XP systems, the process ID is also identified, which helps determine if it is a legitimate process or may be harmful. A simple click on an IP address shows you where the connection originates on a global map, along with domain an...
Appendtofiles
Keylogger Express Pro Keylogger Express 2.01 can record ANY and EVERY keystroke on your computer. Also, it has a built in uninstaller which can help you to uninstall the software as easy as click a button. Keylogger Express 2.01 is a good tool to make you know what happened to your computer when you are away. It runs invisibly and automatically when your computer is started....
Aye Parental Control Aye Parental Control helps parents restrict the time that children spend on computer and Internet. It is the utility for home PC that enables a parent regulate When and How-much of children's time that can be spent on the computer whether it be playing games or surfing the Internet. It also has the ability to block access to specified programs and websites. Features: Define at what time and for how much time your children are allowed to access the computer an internet. Offer two time options: Parents can define a specific time period or an accumulated time amount. Support all kinds of internet connections. Restrict children modifying system time. Forbid children to bypass/shutdown/delete the software. Block the specified programs and websites. Monitor the activities of Internet Exp...
Armor System5 This professional package is designed to give you some of the most powerful encryption tools on today's market. Armor System5 (ARS5) comes loaded with 40 most secure and popular encryption algorithms world has to offer. Protect your documents from unauthorized use, send email that only selected people can read, and compose your own encrypted documents. You can be ultimately in charge of the level of security you want. ...
Aptpassport In this data driven age there is an ever growing requirement for us to keep secure control of all the P.I.N.s (Personal Identifier Numbers) that we are presented with for accessing our personal accounts. These accounts may be from web sites that require a simple ID/Password, online Banks that require several additional Question/Answer combinations, to many other types of non-web related secured data. For example - Keys for software installation, mobile phone PUKs, - the list goes on and on! So whether we like it or not we have all these PINs that we have to keep secure, yet it is also important that they are quickly accessible and easily deployed. (One-click automated login for example.) AptPassport delivers on all fronts and is the cost effective solution that gives you peace of mind ...
File Destroyer With Full Resell Rights ust add files, select how many times the data should be wrote over and shredded before it is permanently deleted from your computer. Powerful and Very easy to use. SUPER BONUS: Order now and receive MASTER Resell Rights so you can sell Password Saver and keep 100% of the profits! ...
Amor Screen Capture
Security Task Manager Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. You can choose to terminate any process, delete it, or alternately quarantine it, which will disable it from running again without actually deleting it. If you buy Security Task Manager you get the software SpyProtector for free. SpyProtector contains tools to protect your computer from keylogger, spyware and trojans. SpyProtector deletes traces of your Internet and computer activity and prevents keyboard input monitoring. Furthermore SpyProtector warns you when the registry is changed....
Hidefolder 3 Hide Folder is a secure and user-friendly program for password-protecting users important files, folders and discs. It prevents unauthorized access to everyones sensitive information and programs. The software makes the protected folders completely invisible, inaccessible or accessible in the read-only mode. Protected folders and their contents are prevented from being renamed, modified, deleted, copied, moved, accessed or even seen on the system. Hide Folder 3.1 lets user specify some selected programs that are still allowed to access the protected areas (such as virus scanners, disk drive utilities, etc). ...
Disk Password Protection Disk Password Protection 4.0: a comprehensive suite of hard-drive protection/access restriction tools. Protect your disk/partitions with a password, ban all reading/writing activity, limit launch of specified files to authorized personnel only, etc. Disk Password Protection 4.0 offers users the option to choose what kind of protection they need. First is the Boot Protection. When chosen, any unauthorized person will not be able to boot a computer without entering the correct password. The program also offers Partition Protection. Any person can chose to have one or several partitions where all confidential information is stored. When protection is activated, the partition will be invisible to the operating system and the disk space taken up by sensitive data will appear as free disk spa...
Disk Password Protection Disk Password Protection 4.0: a comprehensive suite of hard-drive protection/access restriction tools. Protect your disk/partitions with a password, ban all reading/writing activity, limit launch of specified files to authorized personnel only, etc. Disk Password Protection 4.0 offers users the option to choose what kind of protection they need. First is the Boot Protection. When chosen, any unauthorized person will not be able to boot a computer without entering the correct password. The program also offers Partition Protection. Any person can chose to have one or several partitions where all confidential information is stored. When protection is activated, the partition will be invisible to the operating system and the disk space taken up by sensitive data will appear as free disk spa...
The Pc Detective Pro The PC Detective Pro is a power full spy utility that monitors your PC or multiple PCs over a Lan logging all activity including websites visited, applications run, all keystrokes, chat conversations, Instant messages and regular screen captures all in complete stealth, so users will not be aware of it presence, enabling you to keep track on what your kids, spouse, employees etc are up to on your PCs. It is designed to be used either on a standalone machine or over a LAN where all activity is logged for viewing at a later date and can also be viewed over a network in real time. It also includes a popup blocker, website blocker application blocker and has the ability to run applications remotely over a Lan and to send instant messages to a user over a network. All logging can be emailed a...
Amazing Mp3 Player Pro
Sentry Professional Sentry locks down your computer to keep it secure when you aren't around. Many options are provided - you can customize the appearance of your screen, have your favorite screen savers run from within Sentry, and even take messages from people who may drop by. Sentry can be activated instantly. It can be launched after your system is idle for a specified period of time, by clicking on an icon in the system tray, or by typing in a set hotkey....
The Pc Detective Pro 2 10 Users The PC Detective Pro is a power full spy utility that monitors your PC or multiple PCs over a Lan logging all activity including websites visited, applications run, all keystrokes, chat conversations, Instant messages and regular screen captures all in complete stealth, so users will not be aware of it presence, enabling you to keep track on what your kids, spouse, employees etc are up to on your PCs. It is designed to be used either on a standalone machine or over a LAN where all activity is logged for viewing at a later date and can also be viewed over a network in real time. It also includes a popup blocker, website blocker application blocker and has the ability to run applications remotely over a Lan and to send instant messages to a user over a network. All logging can be emailed a...
Hide Folders Pro Hide Folders is an access control utility that allows you to hide your sensitive folders out from users and applications. You need only to select folder(s) you wish to hide from prying eyes and click a button to hide these folders. ...
Advanced File Encryptor Advanced File Encryptor uses the AES 256-bit encryption algorithm to encrypt your files. It installs onto the context menus in Windows making it easily accessible for all files and folders. In addition to encrypting and decrypting files, Advanced File Encryptor can also make self-extracting encrypted files. This feature would be helpful if you need to e-mail an encrypted file to a friend or colleague who does not have Advanced File Encryptor. Also, Advanced File Encryptor contains a secure delete feature which insures deleted files are really deleted. Files that are 'wiped' are not recoverable. With Advanced File Encryptor your private files remain private and your deleted files will in fact be deleted....
Hide Folders Xp 2 Select unlimited number of folders and files of your choice to hide and protect by a password. In one mouse click your selected folders became invisible: it is impossible to find hidden folders, access any file in them and remove them (even when removing upper-level folders). You may leave your computer unattended without worrying if someone will access your private data. Then just run the program and enter your password - your hidden folders will become visible instantly....
Alphaedit
Access Boss Attempting to understand how the inside magic of Windows administering works may be a challenging task even for an experienced administrator. Needless to say, smaller companies that cannot afford hiring a dedicated tech guy to manage administrative rights on corporate network PCs are becoming victims to this circumstance. Introducing Access Boss, the unique easy-to-use tool that enables person in charge of access rights restriction in corporate environment make his job without having to be a computer genius! All you have to do is install Access Boss on machine under Administrator account, run the program and choose which users access time should be restricted. To do so you simply mark the required hour(s) of any day of the week as either allow or deny. It is all that simple! Once you appl...
Watchman Watchman is now the tool of choice for protecting your system in a reliable way. With a simple interface, Watchman delivers file protection, application usage logging, and access control management. Simple and productive: - Stops unwanted applications - Protects system settings - Protects documents from tampering - Monitors application usage - Sends security alerts by e-mail Install and forget about it! Watchman runs silently in the background, keeping your system safe from unauthorized eyes at all times. Make sure your system is always protected with Watchman, a powerful and easy-to-use security tool for Windows....
Lock My Pc Lock My PC allows you to lock your computer with a password while you leave it for a time. It shows a lock screen, disables Windows hotkeys and mouse. You can use a hotkey or the system tray to lock your PC. To unlock the computer you must enter correct password only. The program can log invalid entry attempts and has option to keep your PC locked even if power failure occurs or someone switch it off and on....