Onlyme OnlyMe automatically locks your PalmOS device whenever the device is turned off. OnlyMe is fast, easy, and secure. If you misplace your device, OnlyMe ensures that no one reads your information. Since OnlyMe locks your device whenever the screen is turned off, you do nothing special to ensure the privacy of your information. OnlyMe is designed to let you turn on your device as easily as possible. Entering your password can be as easy as making one quick gesture with your stylus or finger. And your device returns to the state that it was last in. No need to switch applications! OnlyMe is more secure than the device's built-in operating system security facility! Now includes German language program version. Now PalmOS v5 compatible....
Paragon Disk Wiper Personal Are you selling, discarding or donating hard disk? Paragon Disk Wiper allows safe recycling of hard disks. It erases data on your hard disk - you can feel certain that all personal information is eliminated - including partitions, folders, directories, files, file tables, dynamic drive overlays and master boot record information; all viruses including master boot sector viruses. Easy, quick and safe Disk Wiper fits on one bootable diskette. You only need to boot the computer with it, specify erasing parameters and begin wiping. Graphical wizard interface will make this process ease. Paragon Disk Wiper can erase the data overwriting it in one pass, or in multiple passes. This ensures eliminating of data....
Paragon Encrypted Disk 3 X Protect private and sensitive data from potential unauthorized access. No matter what is your particular needs, protecting your data on computer, sharing one computer between several persons or secured transfer of data to friend, co-worker or boss, Encrypted Disk will help you to fulfill your tasks. Official product page: http://www.paragon-gmbh.com/index_ed.htm...
Virtualstream Library offers compression, encryption, and hashing by several algorithms; automates all routine operations; and tracks all errors with any data or files on disk and in memory. It is highly optimized for 32- and 64-bits and includes optimization for perfomance, speed, and memory usage....
Time Pace Distance
Secura Secura is a full-featured file manager similar to Windows Explorer. However, the biggest difference is that this program provides a completely secure environment for data and documents on your system. It's capable of encrypting files and locking folders, thus making them inaccessible to other users. Like Explorer, Secura supplies its very own shell context menu. As you browse your hard drive, simply right-click an item and select the appropriate protection option from the menu. The program gives you the option of preventing Explorer from displaying these items. Meanwhile, files and folders are stored inside tabs on the interface, which require passwords for entry....
Paragon Disk Wiper Professional Are you selling, discarding or donating hard disk? Paragon Disk Wiper allows safe recycling of hard disks. Disk Wiper erases data on your hard disk - so you can feel certain that all personal information is eliminated. It's easy, quick and safe. Professional version of Paragon Disk Wiper is intended for use by IT specialists in various companies. They could be technicians in computer repair services or computer leasing companies, IT technicians relocating computer hardware in large company etc. Paragon Disk Wiper features: New features: - WinXP support; - new NT/2k/XP fdisk; - refresh function; - set label function; - scripts under Windows; - New installation program (created with IS 6.31). Boot up and wipe Disk Wiper fits on one boot...
Leviathan Pc Firewall The Leviathan PC Firewall is an application which will prevent hackers from accessing your computer, it will monitor and log activity on certain ports (which can be customized) and has other features including Keep Alive to maintain your connection....
Xp Protector XP-Protector is security tool for Windows XP and Windows 2000. It provides easy and comprehensive access to many security features of these systems, so that home users without experience with administering computers can take advantage of their improved security features. ...
Cryptofish CryptoFish is encryption utility that you can use to encrypt/decrypt files and folders to protect them from unauthorized use. CryptoFish uses a 448 bit Blowfish algorithm. It is very easy to use. It will add "Encrypt with Cryptofish" command to the context menu that appears when you right-click a file in Windows Explorer. It also has built-in key manager and temporary "key memory". ...
Only To Have
Pocket Excel Password Recovery Pocket Excel Password Recovery is a program to recover lost or forgotten passwords for Pocket Excel files. All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Dochrana DOchrana is a utility which will hide the Cancel button from login dialog in Windows systems. If a user does not have account (profile) on your computer, DOchrana will not allow him/her to log-in. DOchrana also adds Exit button to the login dialog so that it's possible to shutdown the computer without logging-in....
System Monitor Detector System Monitor Detector is an application to help you determine if you are being monitored by any kind of system monitor or spyware program. SMD does this by presenting you with several tools that will help you detect these kinds of programs. SMD, unlike most other application of this sort, does not rely on lists to detect system monitors. Instead it works to help you detect them wich is a much more reliable method......
Windefender WinDefender is a tool that you can use to secure your confidential data and protect your files and folders on computers running Windows 95/98/ME. It provides real-time protection and security service with strong encryption. Once you encrypt your private folders then can use them just all others, non-encrypted ones - files will be decrypting 'on the fly'! For any required files and folders you can assign access right, i.e. make it read-only or hide, for example. WinDefender works well and provides lots of security options....
Burybury BuryBury lets you manage your personal files and keep them out of sight of others. 'Others' would be spouses, kids, bosses etc. All files are securely encrypted, renamed and buried on your hard drive. Prying eyes cannot determine the true nature of your files by titles, length or extension name. The familiar Windows Explorer interface is used (with password protection) so that it appears (to you only) that all your 'special' files are visible (even though they are really buried). A simple click can 'unbury' a file or a whole folder tree. All data is strongly encrypted using the TwoFish algorithm. BuryBury comes with a Tutorial and Help file and is for Win95/98 and WinNT/2K. Download from http://www.winsite.com/bin/Info?1000000034624 ...
Mp3 Only Audio
Real Passwords Ever tried to think of a good, yet easy to remember password? Ever tried one of those password generators that give you impossible to remember passwords such as D!bx%79Yh? Real Passwords generates passwords out of real words so that they are easy to remember. However, if you get an irresistible desire for those cryptic passwords, Real Passwords can do those as well. Real Passwords can generate thousands of passwords very quickly....
Access Workgroup Password Recovery Access Workgroup Password Recovery is a program to recover lost or forgotten passwords for MS Access workgroup files. All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Mouse Trap Mouse Trap is a powerful security tool for Windows 95, 98, NT, 2000, and XP. It traps your mouse in place until you enter your password, while disabling system keys like Alt-Tab and Ctrl-Alt-Del to prevent tampering. It can hide itself in the system tray until you need to use it; it can also be configured to trap the mouse on system startup or at a certain time of day. New for version 4.0: can be set to release the mouse at a certain time of the day, can automatically trap after your computer has been idle for X amount of minutes, settings and exit can be password protected, Privacy Screen (Blacks out the rest of the screen when trapped), and much more!...
Outpost Firewall Award-winning solution that provides a superior arsenal of defense against all types of Internet threats. Combines powerful real-time spyware protection with bi-directional firewall filtration so that your online safety is always at maximum. Easy-to-use program will keep your surfing history private and your critical data tightly secluded from outsiders. Program displays network connection status in real time and maintains full history log....
Games Arcade
Outpost Firewall 50 Business License Agnitum, a publisher of Windows security applications, distributes Outpost Personal Firewall Pro 2.0, a powerful, full-featured firewall for Windows that hides your computer from hackers, detects and blocks intrusions, and quarantines Internet worms and viruses that enter your computer. New features in version 2.0 include the program's ability to auto-configure the correct values for 95 percent of your computer's applications, system, and LAN settings; an intuitive graphical interface that makes it easy to fine-tune Outpost's settings; and Windows Start-Up processing that ensures that Outpost is running and protecting your system before any malicious program can be loaded. In addition, version 2.0 also offers enhanced firewall protection that has earned Outpost top honors in independen...
Jammer Jammer's powerful protection gives you peace of mind. Its unrivaled multi-barrier system blocks every step an intruder takes with sophisticated counter-measures that protect the Registry, monitor applications and inspect both incoming and outgoing connections by using its amended firewall. As a potent protection device, Jammer is like a cyber fortress defending you from attackers. Dangerous software such as Trojans, Backdoors, Ad-ware and Spy-ware can't get through Jammer's multiple walls. Its system monitor shows clearly and simply what processes are taking place at any moment and every connection made to and from your computer. It is designed so even novice users can easily control its powerful engines....
Outlook Express Password Recovery Outlook Express Password Recovery is a program to recover lost or forgotten passwords for e-mail accounts and Outlook Express Identities. All passwords are recovered instantly regardless of length. Multilingual passwords are supported. ...
Myob Password Recovery MYOB Password Recovery is a program to recover lost or forgotten passwords to the MYOB Accounting files (including MYOB 2005). All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Password Officer Deluxe Password Officer offers a professional solution for all your password issues: generating, entering, storing, securing, changing, organizing, transporting and accessing. Security coupled with convenience: the strongest possible encryption, secure database of your most valued secrets, automatic logon to applications, servers, information systems, terminals and web pages, quick search, smart-card support. Now you can be more productive and secure. -universal Single Sign-on solution -fully handles logon to web-pages -fills in the URL, forms, clicks to buttons -detects and fills in any program window -automatically runs programs -allows to define and run keyboard macros -one-click to your favorite password -quick search for right password -complex, yet easy to use stylish interface...
Easy Web Leech
Id Bank Passwords can be trouble especially on the Internet. You may have too many to remember and if you don't take care someone else will gain access to them! ID_Bank can help solve your problem. ID_Bank is a secure identity and password protection system from Rainbow Innovations. ID_Bank is able to hold your personal information relating to usernames, passwords, pins, login details etc; information you often forget or write on scraps of paper that anyone else can read. Your information is stored in a secure encrypted file, all you need to remember is one password to access it. ID_Bank includes the following features: Store your passwords and ID data in named files, you are not limited to one file that must contain all your data Your data is encrypted using the Rijndael 128 bit encryption ...
Act Password Recovery ACT! Password Recovery is a program to recover lost or forgotten passwords to the ACT! contact management databases (including ACT! 2005). All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Simply Accounting Password Recovery Simply Accounting Password Recovery is a program to recover lost or forgotten passwords to the Simply Accounting company files. All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Peachtree Password Recovery Peachtree Password Recovery is a program to recover lost or forgotten passwords to the Peachtree Accounting company files. All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Word Document Password Recovery Word Document Password Recovery is a program to recover lost or forgotten document protection and write reservation passwords to the Microsoft Word 2003/2002/2000/97 documents (*.doc) and templates (*.dot). All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Cdrom Of Lot
Project Password Recovery Project Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Project 2002/2000/98/95 password-protected documents (*.mpp) and templates (*.mpt). All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Outlook Password Recovery Outlook Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Outlook XP/2000/98/97 password-protected Personal Storage files (*.pst). All passwords are recovered instantly regardless of length....
Access Password Recovery Access Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Access XP/2002/2000/97 password-protected databases. All passwords are recovered instantly regardless of length. Multilingual passwords are supported. ...
Excel Password Recovery Excel Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Excel 2003/XP/2002/2000/97 documents protected with password for open. The program supports the "brute-force" attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program automatically saves password searching state and can resume an interrupted attack (after a stop, crash, etc.) ...
Word Password Recovery Word Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Word 2003-95 documents protected with password for open. The program supports the "brute-force" attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program automatically saves password searching state and can resume an interrupted attack (after a stop, crash, etc.)...
Bicycle Gear Calculator
Rar Password Recovery RAR Password Recovery is a powerful tool to recover lost (forgotten) passwords for a RAR/WinRAR (2.xx and 3.xx) archives. The program supports the "brute-force" attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program is able to resume the previous interrupted attack....
Filewipe Option to wipe unused disk space including previously deleted files. Prevent someone from undeleting files and recovering your private data. Multiple files or entire directories can be chosen at one time. Right-click delete feature can be used in Windows Explorer. Works with Windows 95/98/NT/ME/2000/XP. Option to clear your clipboard memory. ...
My Accounts View, print, or transfer your account balances. Keep track of your checking, savings, mortgage, credit card, and other accounts. Holds each transaction and the current balance at that time. Stores multiple account names, numbers, notes, plus automatically calculate balances from your adjustment entry. Sorts by account name. 2.0 includes two free utilities. You can transfer account data to/from your PC. The other utility allows you to view or print reports of your account balances. Also removed the intro/splash screen to speed up program use, added menus UNDO, CUT, COPY, PASTE. Now saves transactions for each account. ...
Procwatch Protect yourself from special spyware, memory hogs, and dangerous programs. Speed up your computer when stopping and/or removing unncessary programs. Warns and shows you the name of a programs as it loads, even if it's hidden from the Task Bar. You can add safe programs to a SafeList to suppress their warnings. A great supplement to firewall software. Also finds the type of spyware which doesn't use a network / internet connection unlike many spyware programs. Protects your privacy from programs which log keystrokes and captures screen snap-shots. Option to terminate suspicious running programs / processes. Easy to use at a competitive price. 1.1 fixed a program error in the unregistered version....
Coba COBA ??™ for Microsoft. Windows. 95/ 98/ ME/ NT/ 2000/ XP is an ultimately invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users' activity on the PC. All data collected by the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis. ???? ??™ is able to save log files in special database for further analysis and retrieving information by specifying a search condition. New powerful user-friendly log file analyzer is included. ...
Aqt126 722
4safe Strongdisk 2 8 Server Unlimited 4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected disk a password and/or an electronic key is required. Any documents, tables and databases can be kept on protected disks and can be opened directly from protected disks. No need to encrypt existing disk, StrongDisk will create new virtual encrypted disks for you. The content of protected disk is physically stored in a common file, that enables to make easily backup copies. With StrongDisk you can also: --protect your TEMP folder to avoid secret data leakage through temporary files; --completely delete files with wiping out their contents; --securely shutdown Windows with wiping the swapfile(p...
4safe Strongdisk 2 8 Server 70 Users 4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected disk a password and/or an electronic key is required. Any documents, tables and databases can be kept on protected disks and can be opened directly from protected disks. No need to encrypt existing disk, StrongDisk will create new virtual encrypted disks for you. The content of protected disk is physically stored in a common file, that enables to make easily backup copies. With StrongDisk you can also: --protect your TEMP folder to avoid secret data leakage through temporary files; --completely delete files with wiping out their contents; --securely shutdown Windows with wiping the swapfile(p...
4safe Strongdisk 2 8 Server 40 Users 4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected disk a password and/or an electronic key is required. Any documents, tables and databases can be kept on protected disks and can be opened directly from protected disks. No need to encrypt existing disk, StrongDisk will create new virtual encrypted disks for you. The content of protected disk is physically stored in a common file, that enables to make easily backup copies. With StrongDisk you can also: --protect your TEMP folder to avoid secret data leakage through temporary files; --completely delete files with wiping out their contents; --securely shutdown Windows with wiping the swapfile(p...
Xtyftp Smallest and HIPAA-compliant FTP client. Ideal for fast and secure file transferring and sharing on the Internet. Include HTML page encryption. Features: No installation or setup needed. Security with the embedded NIST standard AES encryption. Multi-thread file tranferring. Recursive folder transferring. Explorer-like user interface....
aqt133

Jttiwcpn
4safe Strongdisk 2 8 Server 20 Users 4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected disk a password and/or an electronic key is required. Any documents, tables and databases can be kept on protected disks and can be opened directly from protected disks. No need to encrypt existing disk, StrongDisk will create new virtual encrypted disks for you. The content of protected disk is physically stored in a common file, that enables to make easily backup copies and send them through internet. With StrongDisk you can also: protect your TEMP folder to avoid secret data leakage through temporary files; completely delete files with wiping out their contents; securely shutdown Windows with w...
Boss Everyware A comprehensive tool for monitoring computer usage....
Boss Everyware Site License Educational A comprehensive tool for monitoring computer usage....
Kgb Spy KGB Spy is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists to record keystrokes....
4safe Strongdisk 2 8 Server 10 Users 4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected disk a password and/or an electronic key is required. Any documents, tables and databases can be kept on protected disks and can be opened directly from protected disks. No need to encrypt existing disk, StrongDisk will create new virtual encrypted disks for you. The content of protected disk is physically stored in a common file, that enables to make easily backup copies. With StrongDisk you can also: --protect your TEMP folder to avoid secret data leakage through temporary files; --completely delete files with wiping out their contents; --securely shutdown Windows with wiping the swapfile(p...
Ultiple M
Xtycrypto xTyCrypto is a standard light-weighted COM component for ASP, VC++, VB, ASP.NET, etc. xTyCrypto is the HTTP layer implementation of SSL. Features: 1. RSA public key encryption, 2 Standard AES (Rjindael) symmetric key encryption. 3. Digital sigtature. 4. Include sample projects....
Da Password Recovery Pro When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. See the password behid the asterisks with this software....
4safe Strongdisk Pro 4Safe StrongDisk Pro enables to keep sensitive data on protected disk in Windows 95/98/ME and NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected disk a password and/or an external key is required. Any documents, tables and databases can be kept on protected disks and can be opened directly from protected disks. No need to encrypt existing disk, StrongDisk will create new virtual encrypted disks for you. The content of protected disk is physically stored in a common file, that enables to make easily backup copies. With StrongDisk you can also: --protect your TEMP folder to avoid secret data leakage through temporary files; --completely delete files with wiping out their contents; --securely shutdown Windows with wiping th...
Password Protected Lock Password Protected LockUp is an excellent system-tray utility you can use to restrict access to your PC. It's attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and provides a scrolling message that you can edit as you like. You can have the program power down your monitor after a selected period of 'lock-up' time and even set start/stop times for other users to limit their access to your PC. Optionally, it can show LockUp Screen or launch Windows Screen Saver. Also it has special Screen Saver. Besides, it has the network client validation feature for Windows logon. ...
Secure Clean Pc When you work on your computer surfing the Internet, paying your bills online, logging in with passwords, your PC records the information traces of all your actions. For example, the history of all web sites you visited, all the pictures you downloaded, all the pages and text you saw, are recorded by the system. So when you log in next time, you don't need to type the user names and passwords again. The information that you may consider as confidential is kept on your computer unprotected and may be recovered by people with some minimal computer knowledge. In general, this is done for ease of use, but the problem is you compromise with your security by using these features. Possibly, your collaborators or boss would like to access private information at your workplace, that may even affect...
Time Pace Distance
Boss Everyware Corporate License Educational A comprehensive tool for monitoring computer usage....
Advanced Security Level Advanced Security Level is the best computer security application for Windows-based computers. It gives you an excellent administrative support to control the user access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets including Display, Network, Passwords, Printers, System, Add/Remove Programs, etc. You can assign separate system profile folders for computer users providing each of them with own custom Desktop, Start Menu, Favorites, My Documents, etc. Optionally you can hide desktop icons, local and network drives; disable Start Menu items, DOS, boot keys, Registry editing, taskbar, task manager and network access; lock screen with password; and much more. You can apply password protection for Windows...
Statwin Pro StatWin is a comprehensive computer activity monitoring solution for individuals and businesses. It gives you valuable statistics. It lets you analyze how effectively you or your employees are using computers. The software counts aggregate operation time, average operation time per day and per run for a given computer or user. You can even view statistics for a certain period of time - day, week, month or year. StatWin collects information about applications launched, running time, close-down time, names of users. This statistics lets you find out which programs are used most often and learn if any inappropriate software (games, for example) is used in the office. Modem and Internet monitoring features are intended to track time spent browsing the Web. The report shows name of the use...
Password Reminder Password Reminder is easy to install and easy to use. All you need to do to recover a password is just drag the magnifying glass from Password Reminder over the "****" field.It can reveal almost any password in Windows--IE Password,Administrator Password in 2000/NT,Cache Password in 95/98/ME,etc.With this magic tool you can find out your forgotten passwords easily,such as hotmail password,msn pasword,etc.It can even recover Administrator password as long as you have Administrator or System privilege. Features: get the password of Administrator.But make sure you have Administrator or System privilege.Only for Win 2000/NT. reveal almost any password (including AutoComplete Passwords on forms) that is stored in IE, but masked like ****** . get award bios password. earse bio...
Aes Encryption Com Component xTyAESCrypter is a standard light-weighted COM component for ASP, VC++, VB, etc. xTyAESCrypter implements the NIST standard AES (Rjindael) symmetric key encryption algorithm. Features: Efficient interfaces for encrypting/decrypting data....
Only To Have
Blue Tango The Text Scrambler Protect the privacy of your email and workplace documents. Instant download. Encrypts/decrypts all or portions of text or rich text documents. Guards against "robots" reading your web-based mail. Only $16. Blue Tango is the fun and practical way to make your messages discrete. It keeps text, rich text and even portions of messages confidential. And that's important. Blue Tango encrypts plain text (like data in .txt files which have no formatting) and rich text (like data in .doc, .rtf, or HTML files which have formatting such as fonts and colors). You create the text and then scramble all or portions of it using a password of your choosing. Recipients can unscramble the encoded portions as long as they know your password. It is intended to be an easy-to-use, low-cost, secure alte...
File Securer Software File Securer is a powerful tool designed to protect your sensitive folders and personal files. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally. With exceptional easy of use, File Securer let you be enabled to hide your folders and files any where. The locking and unlocking object function are integrated with system pop menu. It's so easy, selecting object, clicking right button of the mouse, then clicking 'lock' or 'unlock', that's all. If someone want to access you locked object, the system will say "Sir, give me you password please!", and the tools will record all the error password and win-user, then report to you....
Super Folder Lock Software File Securer is a powerful tool designed to protect your sensitive folders and personal files. With exceptional easy of use, 1st File Hider let you be enabled to hide your folders and files any where. The locking and unlocking object function are integrated with system pop menu. It's so easy, selecting object, clicking right button of mouse, and clicking 'lock' or 'unlock', that's all....
Kgb Keylogger KGB Keylogger is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists to record keystrokes....
Wincrypt Wincrypt enables users to encrypt (lock) and decrypt (unlock) any type of file, folder or email attachment so that it becomes unreadable to anyone without the password. Hide files from people you share your computer with. Email confidential documents Protect your backups (that are stored on removable media). Protect documents over a network Protect your files from thieves Awarded 5 stars by Computer Active: Occasionally, we stumble upon software that just works - no fuss, no vertical learning curve, no ploughing through pages of jargonese. Wincrypt is one such program. If privacy and security are issues for you, this is as good as it gets. Kyle MacRae - Computer Active Magazine - January/February 2003...
Mp3 Only Audio
Effective Password Manager Effective password manager is the perfect tool for storing all your most sensitive and valuable information like passwords, logins, pin codes and access codes as well as credit card and account numbers, lock combinations etc. It creates a reliable and well protected database which you can conveniently search and get the right information in no time. You can also store backup copies on various types of media and easily restore the database in case of a hard drive failure. Just imagine! No more lost or forgotten passwords! Fast and reliable access to the necessary information! A truly effective way to manage your confidential information....
Active Keylogger Home Active Keylogger Home – This is the best choice for you if you think that others are using your computer when you are not home or away from your working place. After you install Active Keylogger Home on your computer, it will allow you to make program settings for tracking activities on your computer.If you enable "Run Active Keylogger Home in Stealth Mode" then the program will run by full stealth for others, no one will even think that Active Keylogger Home is running and logging any activities on the computer. By choosing hot keys that are comfortable for you, you can view log file when the program is running by stealth. Active Keylogger Home can also send the log file to your e-mail, thus enabling you to view it from other places and track any activities on your computer. If you want ...
Captain Mnemo Pro An average computer user has dozens or even hundreds of complex passwords to remember. Presenting Captain Mnemo, the totally innovative password management solution intended to ease your life greatly. This program allows you type whatever you want as a password once prompted and forget what you have typed. Once you need your password to re-login you do not have to memorize it. Simply open the Captain Mnemo window and voila? It's all there!...
Active Key Logger Active Key Logger is the most powerful stealth spy software offered anywhere! Active Key Logger runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Active Key Logger can also capture active window text, cliboard text and text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN AND AIM. All Desktop activity will be recorded through Active Key Logger's secret screen capturing utility! Have reports sent to your email address at anytime secretly! Active Key Logger is so stealth and hides so well not even a computer technician with years of experience could detect it running! The most powerful stealth program at the most affordable price! Purchase your copy today and feel safe and secure that if you ca...
Games Arcade
Privacy Safe And Protect Folder Privacy Safe and Protect Folder is a complete solution for your privacy. Password Protects your folders, Documents, Movies, Pictures, Favorites and so on. Makes it easy to Clean internet History, cache, cookies, Recover Space. The Add-in system supports all popular applications, such as Realplay, ACDSee, ICQ, AOL, MS Messenger. Most of all, it's nice-look, easy-use and stable. Try this cute utility, you'll love it....
Fdcrypto FDCrypto is a user-friendly desktop encryption application that utilizes the Blowfish2 algorithm. FDCrypto allows for the easy encryption, decryption and incineration of all your personal files. The quick encryption or decryption of all your files in a directory is just a few clicks away. FDCrypto provides useful features for both new and power users. FDCrypto does not password protect your files, but rather encrypts them with an encryption key of your choosing. No keys are stored, and thus no keys can be retrieved. FDCrypto is powerful and easy to use. Keep prying eyes from your personal files. ...
Password Anti Peeking This software is based on keystroke encryption technology which can help keep your password from being stolen by spywares and keyloggers. It is different from traditional anti-spyware tools. Because of its active protection technology, even the newest or unknown spywares, trojans or keyloggers cannot steal your password or other privacy information. If you already have anti-spyware programs on your computer, you can also use this software because it does not conflict with traditional anti-spyware tools. Under the protection of Password Anti-Peeking, you will feel extra safe when you input information on your computer. Regular Price: $34.95 - Now Only $19.95! - Limited Time Offer...
Innovatools What S On My Computer What's this program that I've just downloaded from the Internet? Is is a virus? Is it legitimate software? Where I can find more information about it, about the company that produced it? What are other people saying about it? Is it full of bugs? Where can I find an update? What about the programs that are now running on my computer or the ones that automatically start with my computer? I've just received some files by e-mail, how can I find more about their type or if they are a know virus or trojan? Does anybody know what this file on my computer is? Or this registry key? Or this deleted file I have in the Recycle Bin? For answers, try Innovatools What's On My Computer. It gives you information about any file, folder, program on your computer, allowing you the easily search the Internet, ...
Agent Password Agent Password is a program that logs all passwords entered. It can be used not only as password keeping software but as a password spy, too. The application requires very low system resources, runs invisibly in the background and is easy to use....
Easy Web Leech
Password Spectator Pro When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. See the password behid the asterisks with this software....
9 95 Password Manager For Pocket Pc Prevent identity theft with 9.95 PASSWORD MANAGER, the personal information organizer for Pocket PC handhelds that safely and securely stores your confidential data such as user names, passwords, credit cards, PIN codes, bank accounts, frequent flyer numbers, calling cards, and more. Your data is stored in a secure, encrypted format and can be retrieved by entering a single password....
9 95 Password Manager For Palm Os Prevent identity theft with 9.95 PASSWORD MANAGER, the personal information organizer for PALM OS handhelds that safely and securely STORES YOUR CONFIDENTIAL DATA such as user names, passwords, credit cards, PIN codes, bank accounts, frequent flyer numbers, calling cards, and more. Your data is stored in a SECURE, ENCRYPTED FORMAT and can be retrieved by entering a single password....
Alive File Encryption Alive File Encryption is a easy-to-use and strong file encryption program that encrypt your files and folders. Alive File Encryption is integrated with Windows Explorer, you can secure any files with a simple right click. Just right click the files or folders you would like to encrypt or decrypt, and select "Alive File Encryption" -> "Encrypt/Decrypt", and then enter a password to encrypt or decrypt them. You can also encrypt the file into an executable file (EXE-file), which can be decrypted without Alive File Encryption. Finally, The intuitive interface makes Alive File Encryption the perfect file encryption for both new and experienced users. It fully supports Command Line and Drag and Drop, and allows you to protect files in batches....
Mytopsecret MyTopSecret is designed to protect your secret files by encrypting and hiding them in other file that do not look suspect of encryption. MyTopSecret allows you to encrypt and hide secret into a common file such as picture file, audio file, program file, video file, It makes the secret file hidden and looks like only a common file.With MyTopSecret,you can protect your top secret,even put hidden data on homepage or email attachment and so on,share it with crypto!...
Cdrom Of Lot
Plexcrypt Secure Documents By Strong Encryption PlexCrypt protects documents and folders via PKI-based encryption using secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt allows users to digital sign documents and folders and use that signature to verify that original document has not been maliciously or accidently altered. PlexCrypt also allows users to archive a set of files and folders in the ZIP format and extract them later. In addition, it allows users to create and manage digital certificates and key-pairs for encryption and digital signatures. Top reasons to own this software PlexCrypt is an easy to use graphical based application for securing documents. ...
Ispy Killer If you lie awake at night fretting about personal privacy and your computer, consider this: The biggest threat may not be the government or the operator of the Web site you visited late last night, but your business partner, your boss, or even your spouse. Scans your PC to see if any spy software programs are installed on your system. Scans your entire PC Including Memory Windows Registry All Drives. Locates even the latest Spy Software, Keyloggers, and Adware Including: Spector iSpyNow Spy-Buddy Gator Xupiter many more ... iSpy-Killer features an always-on shield that prevents certain types of spyware or adware from being installed. Runs minimized in the background If someone tries to install cetain types of spyware or adware, iSpy-Killer will s...
Any Web 100 User Any@Web is a powerful software specifically designed to sniffer, capture, monitor and record Internet activities in the network. It records any web pages viewed, files downloaded and emails sent and received through any computers in the network. It captures HTTP-related and email-related packages on the LAN and decodes the packages into web pages, files and emails exactly as the original one. ...
My Spy Free Pc If you lie awake at night fretting about personal privacy and your computer, consider this: The biggest threat may not be the government or the operator of the Web site you visited late last night, but your business partner, your boss, or even your spouse. Scans your PC to see if any spy software programs are installed on your system. Scans your entire PC Including - Memory - Windows Registry - All Drives. Locates even the latest Spy Software, Keyloggers, and Adware Including: - Spector - iSpyNow - Spy-Buddy - Gator - Xupiter. - Many more... My Spy Free pc features an always-on shield that prevents certain types of spyware or adware from being installed. - Runs minimized in the background - If someone tries to install certain types of spyware or adware, My Spy Free PC will stop it. - Safel...
Family Key Logger Family Key Logger - this is the best choice, if you want to know what others are doing on your own computer while you are not at home (or office). Install Family Keylogger, set options "Start in hidden mode" and "Hide in task list", so that it makes itself invisible to anyone. After you return, you can just press keystroke to unhide. Family Keylogger - You have the right to Know!...
Bicycle Gear Calculator
Max Privacy Protector History Eraser Spy Killer Beware! Your computer is tracking all your activities. Are you aware that anyone who can touch your computer can know the website you have visited, the web pages, images and videos you have ever seen. They will also know which files you have just opened in Office and many other applications. All these tracks are stored in your hard disk. Just emptying the Recycle Bin and deleting the Internet cache in web browser will not protect you at all. Even your hard disk is formatted, others can know your past activities using some tools even several years later. Protect your privacy with Max Privacy Protector! With hundreds of thousands of copies of commercially available spy software, key logger titles in use worldwide, there's a good chance your computer may be bugged right now, or if it isn't,...
Desktop Spy Agent Desktop Spy Agent is an invisible and easy-to-use PC activity monitoring tool that captures screenshots of the active application window or the entire desktop at the predefined time intervals varying from 1 second to several hours and saves the recorded images to a specified directory on the hard drive. The images can later be viewed with the built-in image viewer or any external software (Desktop Spy Agent can save screenshots either as Windows bitmaps or in the industry standard JPEG format with custom compression level). This tiny and smart spy software can be used at home to control what the members of your family do on the PC when you are not watching. It is also a great employee monitoring and surveillance tool that can help you prevent the misuse of corporate resources and other, mo...