1 Registry Cleaner If your PC is no longer performing as it used to, and generates various errors messages, the underlying cause is your hard drive is overloaded with redundant files created by the Windows operating system or other software. When you install/uninstall software a lot of programs leave trash laying around on your pc. Old shortcuts to non existent programs, redundant files, invalid application paths. All this may well disrupt the smooth running of your system. If you'd like to know just how many redundant files are littered around in your PC just download and run our tool "#1 Registry Cleaner". Like most PC users who try our tool for the first time, it's likely you will find dozens/hundreds of potential files, just waiting to create havoc with your system - usually at the inappropriate mom...
Memory Doctor A cheat and debug tool for Windows 95,98,NT. Allow find, edit and freeze numeric values (life, ammo, money and other in games) in memory of DOS, Windows 3.1 and Windows 95,98,NT programs runned under Windows 95,98,NT. Memory dump. Find strings and byte sequences in process memory. ...
What Did You Do 3 0 What Did You Do is a tray-based utility that monitors your system folder (usually C:\Windows), plus 3 optional folders and logs changes made. It can detect if a file or folder has been deleted, renamed, created, or if the attributes have changed. When a modification is detected, it's noted in a log file created for that date. If you take your PC to the shop for service, What Did You Do might assist the technicians by showing what events have happened in your system folder. Or, if one of your crucial system files gets accidently renamed, before you resort to reformatting your hard drive or reinstalling Windows, you can check your log files to see if the problem can easily be fixed by just renaming the file to its original name....
Network Printer Swapper Network Printer Swapper is a command-line utility that allows a network administrator to easily swap network printers on Windows 2000/XP client workstations using logon scripts or even in SMS software distribution packages. When a network printer is being replaced or renamed, this tool makes printer swapping easy. With one simple command-line statement, the old network printer connection will be deleted, and then the new printer connection will be created. If the old printer was previously the default printer, Network Printer Swapper will make the new printer connection the default printer. For the administrator who manages network printers on Windows NT/2000 servers with Windows 2000/XP clients, this tool is a must....
Set Puzzle Original
Butterflypond Screensaver Majestic mountains, trees, green grass, amimated pond and colorful butterflies fill your screen to the music of "I know your out there somewhere" by The Moody Blues....
Underwater Life 2 Screensaver People love mistery. They try to learn the secrets of the nature. One of them we offer you: the mistery of ocean. You'll see a human being trying to peep the life of ocean inhabitants. You may take your chance and do the same, and you won't be sorry - the cororful pictures will help you to approach to the solution of ocean mystery. The screensaver includes 32 amazing images. All the pictures have an 800*600 pix. resolution and a High Color (24-bit). The screensaver automatically fits them to your size of screen....
Advanced Stealth Email Redirector ASER is a program that sends the copies of all outgoing emails. ASER monitors outgoing traffic of email client software and intercepts all emails being sent. Then the program invisibly sends the intercepted emails to a specified address....
Performance Route Race
Icon Lock It Xp Icon Lock-iT XP provides strong file encryption and security for Windows XP, 2000, NT Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. New portable device security keeps your iPod, MP3 player, or flash drive contents protected at all times. This makes it possible for professionals or enthusiasts to protect sensitive data while in transit from one machine to another. Now included with Icon Lock-iT XP is Moon Valley's Security Suite which includes a Password Assistant and System Security Check. These new features will help the user construct a computing environment free of external threats. Includes many features designed for home users, shared ...
Minos Lock Minos Lock is a highly performed files security software that can hide or encrypt any number of files, folders and documents in seconds. Folders and files are protected with a password when you login the ABC Lock program. Protected files are undeletable, hidden and highly secured, hide files from kids, friends and co-workers, prevent them from viruses, trojans, worms and spyware, protects them from networked computers, cable users and hackers...
4safe Strongdisk 2 8 Server 10 Users 4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected disk a password and/or an electronic key is required. Any documents, tables and databases can be kept on protected disks and can be opened directly from protected disks. No need to encrypt existing disk, StrongDisk will create new virtual encrypted disks for you. The content of protected disk is physically stored in a common file, that enables to make easily backup copies. With StrongDisk you can also: --protect your TEMP folder to avoid secret data leakage through temporary files; --completely delete files with wiping out their contents; --securely shutdown Windows with wiping the swapfile(p...
Tony Christie Mp3
Sentinel Professional Complete System Monitoring: Sentinel Takeover all the control of Windows based Computers Sentinel captures screenshots in scheduled time and stores them in a secure area for your later review Sentinel Monitoring Features Sentinel captures screenshots (Full screen or active screen) Sentinel Captures screenshots in a adjusted period System Watch (You are able to determine log in and log off time of your PC). Files and Folders ( Monitoring opened, created, modified, deleted files and folders) Software Record (Monitoring programs used and their connected dll files) Web Site Record (visited web sites and downloaded files) Keyboard Record :Recording all keyboard activity and keystrokes occurred. Chat Record: Watch all instant messaging programs like MSN, YAHOO, ICQ Reporting and Expo...
Guaranteed Excel Decryptor It is a command-line utility which allows you to decrypt Microsoft Excel 97/2000 (and Excel XP in default, 40-bit mode) files with password for opening. Any file, encrypted with ANY password (no matter what length of the password is or what language or symbols used, etc) can be decrypted with guarantee.It usually takes several days. This software supports several computers - the more clients version you have, the faster is the decryption. This is a command-line utility. Look at http://www.password-crackers.com/crack/guaexcel.html for more info....
Easy File Protector Easy File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection is achieved by making files and folders undeletable, unrenamable, unreadable, unmodifiable, and unexecutable. With the wild cards feature, you can protect all files that have the same extension (such as EXE, DLL, DOC, etc.) Easy File Protector also provides password protection, user-dependent configurations, and user validation at login....
1 Click Lock 1Click Lock up is a system tray security utility you can use to secure your desktop when you step away from your PC. It's secure and very easy-to-use. Just define a password, and select Lock to hide and deny access to your desktop to anyone without the proper password. You can set the program to launch automatically with Windows, lock your desktop from the system tray, log access attempts, and apply a custom background image. When enabled, SecureIt Pro even allows visitors to your PC to leave messages for you. The cold-boot protection and disabling boot keys gives maximum protection that's difficult to get around....
Bennyke
Zipworx Securesfx ZipWorx SecureSFX v3.0 is a better and more affordable alternative to any other SFX builder, at a fraction of cost! Offering royalty-free distribution of created files, ZipWorx SecureSFX v3.0 also adds double-stronger encryption (AES 256bit), better compression, save/restore build projects, customizable dialogs, and much more to the usually boring do-it-yourself no-features self-extracting files. Your Self-Extracting Files are not only much more secure, but also much smaller. Up to 30 to 40% smaller! Plus now, they are just easier to build! Save/Restore your build projects as easy as 1,2,3! ZipWorx SecureSFX v3.0 Features - Easily load or browse for a ZIP file - Ability to rename the output executable file - Advanced compression support: Make your Self-Extracting file not even ...
Privacy Keeper Privacy Keeper is powerful privacy software to erase online Internet tracks and program activity. Privacy Keeper is a safe and easy-to-use privacy protection tool that securely deletes online Internet tracks and program activity records that are stored in your browser and other hidden files on your computer. Privacy Keeper guarantees your privacy by ensuring all traces of your online Internet and computer activities are permanently erased and unrecoverable on your PC. Information from every website you visit is stored on your computer and recorded in hidden Windows locations including temporary files, cookies, system registry and the index.dat file. Web browsers only provide partial privacy protection by allowing some temporary Internet files and cookies to be deleted, but they do not cle...
Winsession Logger WinSesssion Logger is an advanced keylogger specially for english and spanish keyboards, you can monitor your selected machine for all of the following activity: All keystrokes pressed, all URLs visited by Internet Explorer or Netscape and filter inappropriate Web Content, all Windows Opened and their titles and current time, MSN Messenger Conversations of both sides, every mouse click inside a window (selective screen shoots) with mouse cursor, every text/image clipboard item, opened files, power off your computer and more! Delivery text logs and screenshoots to any e-mail address of your preference. Also you can use FTP for logs delivery. It is secure, indetectable and unkillable. Includes a logs viewer. You can export logs,search by date, favorite logs, search words in text logs ...
Cybervizion If you are worried about protecting your children from the dangers of the Internet, concerned about your employees playing games, surfing inappropriate websites, leaking company information by e-mail, or wondering what your spouse or mate is doing online, CyberVizion will provide you with everything you need to know. See chat conversations (both ways) in any chat or IM program, e-mail both sent received (including web-based mail), website activity much more....
Winvestigator Do you wonder what your spouse, your kids, or employees are doing on the computer when you are not around? Do they hide windows as you walk by? Do you want to know exactly what is going on? If you want to know every word, every web page, and every program used then Winvestigator (tm) is for you. Winvestigator starts on boot, and runs undetectable in Windows capturing keystrokes, URL apos;s, mouse-clicks, and screen shots to an encrypted log file. Winvestigator can be set to email the log for remote viewing. Winvestigator apos;s settings are fully customizable. Each Settings section has mouse-over help that displays a quick explanation at the top of the screen. A web style interface and thorough help make this powerful tool simple to use....
Bennyke
Private Pix Private Pix utilizes new technologies to keep your pictures and movies safe while keeping them password protected and encrypted. Advanced security features include name scrambling and variable key length. Private Pix has an easy to use interface that makes organizing and viewing of your pictures easier than ever before. Try Private Pix worry free as it does not change any system settings....
Securenote SecureNote turns your message into a very small encrypted password-protected executable (starting at 14kb) that asks for an answer to your custom prompt before the message can be read. The prompt can be "What is your birth city?" or anything you can think of. SecureNote can be used to send any kind of information you don't want just anybody to be able to see. SecureNote works on Win95/98/ME/NT/2000/XP. The product is about 1.5mb and will take 5 minutes to download on a 56k modem. You can find the demo at http://www.bdargo.com...
Salus Desktop Security And Access Monitoring System Cd Rom Edition Salus is a security application which allows the owner or user of a desktop or laptop computer to see which files are accessed, when, for how long, which Internet sites are being connected to, who sends e-mail to where, and so on. In fact, the program keeps a detailed log of all the activities perfomed on the computer. The program can be made invisible to the user of the computer, giving access only to authorized persons. It is therefore an ideal security program for companies or within the family, where one might want to watch over the activites of a child's or employee's computer use....
Securesafe Pro If you are having problems remembering all your access passwords and logins, would like to protect yourself against identity theft and need a reliable software solution to store files with confidential information in one place safely and securely, you need to get WinCatalog SecureSafe. Sure, it may sound like a sales push, but youll change your mind once you try it. After all, great software sells itself. And here is why: First, WinCatalog SecureSafe is 100% free to download and try. Second, it uses military-grade encryption standard approved and used by the US Department of Defense (namely AES, Advanced Encryption Standard with 256-bit key). Third, it frees you from having to remember all of your passwords and logins. They are stored in a database tree, which is very easy to search ...
P Guard Light P-Guard is easy to use, but powerful cryptographic utility. Using approved and high-security algorithms, P-Guard reliably keeps your data private from unauthorized access....
Bennyke
P Guard P-Guard is easy to use, but powerful cryptographic utility. Using approved and high-security cryptographic algorithms, this utility reliably keeps your data private from unauthorized access....
Protoport Personal Firewall After you download and install the ProtoPort Personal Firewall software, you computer will be protected against hacker attacks. All network traffic is monitored on lowest possible level ensuring all unwanted network packets are kept off your computer. Native support of all popular protocols (ARP, IP, TCP, UDP, ICMP, etc). The program can also limit network bandwidth for specified applications, block online ads, block cookies, ActiveX, Flash movies, Java and Visual Basic scripts....
Digisecret Pro DigiSecret is an easy-to-use, secure, and powerful application for file encryption and sharing. It utilizes strong and time-proven encryption algorithms for creating encrypted archives, self-extracting EXE files, and sharing files with your associates and friends. DigiSecret also includes powerful and intelligent file compression; you no longer need .zip files when you can have encrypted and compressed DigiSecret files. ...
Digisecret Lite DigiSecret is an easy-to-use, secure, and powerful application for file encryption and sharing. It utilizes strong and time-proven encryption algorithms for creating encrypted archives, self-extracting EXE files, and sharing files with your associates and friends. DigiSecret also includes powerful and intelligent file compression; you no longer need .zip files when you can have encrypted and compressed DigiSecret files. ...
Bennyke
Advanced Random Password Generator Advanced Random Password Generator (pwdGen) is utility that provides generation of qualitative highly random passwords. Random passwords can provide higher security for your accounts. The program uses RSA crypt provider as a robust random number generator. The password generator can use different customizable character sets, user also can select length of the password. The program includes database for managing user passwords. Program uses custom interface components and has user-friendly look....
Hide And Encrypt By Gcm Enterprises Hide and Encrypt is a powerful but fun and easy-to-use software, which allows you to encrypt and hide files within image or sound files. Hide and Encrypt is an ideal solution for individuals who share sensitive data with family, friends, and co-workers or if you just want to play the spy game. The product provides 5 encryption algorithms to protect your data and keep it safe from prying eyes. In addition an extensive shredding utility (which complies with the DoD 5220.22-M document) is included to allow you to permanently erase sensitive data. Let the HaE hit man protect your data today. By the way don't click on the hit mans gun he is very trigger-happy. Download and try Hide and Encrypt today....
Activescreenlock ActiveScreenLock is a software that gives computer users a secure and reliable way to protect their computers from unauthorized access. The idea behind the software is simple but ingenious - the program simply adds a password-protected window placed on top of all the others. In order to remove it, a correct password needs to be entered. Key combinations Alt+F4, Ctrl+Alt+Del, Alt+Tab, and WinKey are blocked. The program keeps a log of all invalid access attempts and wrong passwords entered. The blocking window can be activated by clicking program's icon or after computer being idle for a set period of time. The program is also capable of hiding mouse cursor, disabling task manager, and it runs automatically if the computer is reset....
Port Monitor Port Monitor will protect your system 24/7 from unauthorized users from installing USB, COM, Fire wire Parallel devices to your system. Every day USB thumb drives devices capable of storing thousands of credit card numbers, Medical records, Social Security number and numerous of other sensitive data come with in inches of your computers and until now you have been unprotected. Powerhouseprogramming has released Port Monitor Stand alone a free personal use software to protect your personal data from unwanted intrusion and to support your piece of mind....
Secret Explorer Find hidden data, such as IE form autocomplete data (including logins and passwords), recover various internet passwords (passwords to protected websites, email account and identity passwords), and much more with this new system inspection tool. Secret Explorer is designed to browse, analyze and edit hidden data which is stored in undocumented Windows Protected Storage. With Secret Explorer import/export feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you....
Aqt126 774
Openwall Wordlists Collection Cd Included in this collection are wordlists for 20+ human languages and lists of common passwords. The included languages are: Afrikaans, Croatian, Czech, Danish, Dutch, English, Finnish, French, German, Hungarian, Italian, Japanese, Latin, Norwegian, Polish, Russian, Spanish, Swahili, Swedish, Turkish, and Yiddish. There's also a list of the common passwords and unique words for all the languages combined in one file (over 40 MB for almost 4 million entries). Finally, there's a huge list of all the common passwords and words from all the languages with word mangling rules applied (to form other likely passwords, such as by adding capitalization or digits to words) and any duplicates purged. This wordlist is provided as a single uncompressed text file usable directly off the CD. Its size...
Screenlock Pro "If you require a program that will prevent any other person from being able to access your computer, then this is the program you need." --PCWin ScreenLock is unlocked via answering a question that you provide yourself and can change or edit at any time. For instance, you could make ScreenLock ask you "What is the meaning of life?". Your customized answer could be anything that comes to your mind. This makes it easy to remember your question, and virtually impossible for others to guess what the answer is. Features optional "User Account", allowing you to set what days and times others can use the computer, PLUS lets you determine which applications or files are "off-limits". Protect your system settings from being changed by others. Log file tracks usage and BOTH permitted and blocke...
Easy File Folder Protector Protect files and folders situated on local media of Windows 95/98/ME/NT/2000/XP with Easy File Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File Folder Protector has an easy-to-use user interface allowing you to allocate access to your files and folders between your users according to predefined timetables. Each PC user can have his own list of allowed and disallowed files and folders within certain time periods. The program does not modify your media: in protecting your files, it just uses a high-reliability VXD driver working at Windows kernel level. This guarantees that Easy File Folder Protector will never lose your data, as may happen if you use other file- and folder-prote...
Advanced Internet Kiosk Advanced Internet Kiosk is intended for building Internet kiosks, public access PCs, or in-store terminals; disable access to files installed on your PC and prevent users from changing PC settings; give full access to only necessary applications including Internet Explorer. It will give many people free access to the workstations you create, but none of them will be able to damage (whether accidentally or intentionally) vital system files or stuff hard disks with garbage. The program supports multiple authentication methods such as username and password authentication, time-locked code (lets users access workstation for a given period of time only) or a combination of both. Advanced Internet Kiosk is also ideal for home PCs to limit children activities and prevent important files from bein...
Passwords Keys Passwords Keys is a powerful random number, password and key generator, that allows you to easily generate, store and use random passwords, keys and data. Passwords Keys has four defferent generation methods (number, password, mask1, mask2) This program support templates and has handy password manadger. It is compact and easy to use....
Aqt126 774
Advanced Desktop Shield Advanced Desktop Shield - security utility is a must for public access PCs located in school or university labs, Internet cafes, libraries and other public places where you need to stop users from changing desktop wallpaper and screen saver, deleting, creating and renaming desktop icons, changing display settings and so on. With Advanced Desktop Shield you can backup, restore and manage your desktop layout and desktop layouts of your users. Desktop layouts are saved to files, which include all files and folders located on the desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout or desktop layouts of your users, every time you or your users reboot your PC, the program will return everything on the desktop back to the original sta...
Access Manager For Windows Access Manager for Windows allows you to restrict access to to key features of Windows, such as Control Panels or Start menu, network, Taskbar, desktop, system tray, Network Access Control Page, Control Internet usage and more. It can also disable the Ctrl+alt+delete keys, the function keys at startup, allows to password protect Windows and restrict users to running specific applications only, control Internet usage, view statistics of computer use by your kids or employees and loads more. This program can lock your computer and ask for a password when Windows loads. Access Manager for Windows is just the thing for keeping employees , students or children from coming in and fiddling around with the computers. It has all the needed features to keep people from viewing or changing what you d...
Icq Password Recovery 2 0 ICQ Password Recovery 2.0 can recover passwords to any version of ICQ. Just select the .dat file of the ICQ user and the username and password will instantly be decrypted. Tested on all ICQ versions....
aqt132

Outlook Express Security Use Outlook Express Security to control access to Outlook Express and its databases. When it is active, Outlook Express becomes locked and no third-party programs can access its message base files and the address book. As a result, when you try to start Outlook Express, open the address book or access the files, a password will be asked to allow access. If an invalid password is entered, Outlook Express or Address Book will not be opened and the files will stay inaccessible. This will allow you to prevent stealing or spoiling of your Outlook Express's data. Outlook Express Security before it is too late....
Windentify Sdk Windentify SDK is a state-of-the-art voice-based identification system component that prevents any sort of unauthorized access to your PC . Secure, reliable, and with the unique facility to restrict access to systems and files to just a single users voiceprint, this is the best in voice-based security component developers can incorporate into their applications. Developed on the .NET framework, the SDK integrates seamlessly with any application. Detailed instructions are provided when you first install the component. Windentify SDK offers you the unique opportunity to provide cutting-edge voice-recognition facilities that you wow and lure your customers with....
Aqt126 774
Hide Files Folders Hide Files Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered, user gets access to the file or folder, otherwise not. Hide Files and Folders does not modify your media: in protecting your files or folders, it just uses a high-reliability VXD driver working at Windows kernel level. This guarantees that Hide Files and Folders will never lose your data, as may happen if you use other file- and folder-protecting software. Due to unique technology, the program also lets you protect system...
Research Lab User Identification It is a innovative security software to 'identify' users. Once a user is identified, the software will unwind access to Windows (or other OS) as per user profile...
Security Department Security Department is a resident file system protector for Windows 95 and Windows 98. It provides several levels of protection for different folders and files. You can prevent various actions for folders and files: copying, moving, deleting, renaming and so on. In addition to the two standard protection levels "Read Only" and "Full protection", there is the Custom Protection level that allows you to fine tune the access of specific folders and files. Access to various folders and files can also be set differently for each user on a single PC. By employing Security Department a computer is provided with an additional level of protection from virus and internet hacker attacks. Security Department makes EXE and COM files truly Read-Only. There is not a single virus that can overcome this ki...
Advanced Password Manager Advanced Password Manager keep all your passwords in one place! The main advantage of this password manager is that you can enter all your passwords in one place, assign a login and password for a specific URL and use program's autofill feature. All you have to do is to remember one password for using Advanced Password Manager, and the program will remember the rest of your passwords for you. Pretty cool, isn't it? The other great thing about Advanced Password Manager is the interface - simple, eye-pleasing, and very straightforward. You can create different groups for your login and password information, which makes cataloging your confidential data very convenient. This password manager also has a built-in password generator that can generate passwords according to your templates....
Advanced File Shredder Advanced File Shredder securely erases files or folders on your PC using seven pass US Government standard wiping and cryptographically strong random number key. Shredded files cannot be restored by any data recovery software. Protect yourself: Windows physically does not remove files from your hard disk and sensitive data like personal, business or financial information can be easily restored. ...
Aqt126 774
Windentify Windentify is a state-of-the-art User Identification system that prevents any sort of unauthorized access to your PC. Secure, reliable, and with the unique facility to restrict access to systems and files to just a single users voiceprint, this is the best in voice-based security applications. Protect your personal data, sensitive documents and even restrict unauthorized access to your PC in your office. Windentify is a cost-effective, efficient and far superior alternative to traditional text-based password security currently found on mainstream PCs. It helps to prevent unauthorized user or any outside user can not get access to your system from getting access to your computer system by providing voice based password security....
Tsm Encryption Plugin For Outlook Please purchase this plugin only if you already own a registered copy of our Top Secret Messenger (TSM) product which included some other plugin. If you do not own TSM, you will need to order the complete package that includes the basic TSM installation and the Outlook Express plugin. Refund Policy There is an evaluation demo of TSM on our website. For this reason, our refund policy is restricted to replacement of goods damaged in shipment only. Please refer to our homepage DOWNLOAD link for further information. Once our software is downloaded, or is shipped to your premises, it is considered to be 'Opened'. It is part of our refund policy that all Opened Software cannot be returned for refund, regardless of the delivery method....
Safehold Ever wanted to leave your desk at work, but couldn't do so for fear of other people accessing your private data? Ever wanted to make sure that your kids do not access the computer without permission? Now there's a simple solution! Safehold by K-Labs Online is the complete personal desktop locking system. While activated, Safehold will deactivate all system keys - stopping access to the workstation - even stopping CTRL + ALT + DELETE! When a certain password is entered, full system control will be handed back to the user. Features include: 1. Complete System locking. 2. Disabling of System keys (such as CRTL, ALT, DELETE, TAB). 3. Hidden password. 4. 'AutoLock' Technology allows Safehold to automatically lock the computer when the mouse has been inactive for a specified amount of time....
Top Secret Messenger With Outlook Plugin Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for Microsoft Outlook. It is completely integrated into this program, allowing users to encrypt outgoing e-mails automatically by simply clicking on the Send button! Similarly, it automatically decrypts incoming e-mails as soon as they arrive....
Aqt126 773
Top Secret Messenger With Outlook Express Plugin Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for Outlook Express. It is completely integrated into this program, allowing users to encrypt outgoing messages automatically by simply clicking on the Send button! Similarly, it automatically decrypts incoming messages as soon as they arrive. If you have already purchased a registered version of Top Secret Messenger with some other plugin and would like to use it with Outlook Express, please purchase the cheaper standalone Outlook Express plugin that does not include TSM. Refund Policy There is an evaluation demo of TSM on our website. For this reason, our refund policy is restricted to replacement of goods damaged in shipment only. Please refer to our homepage DOWNLOAD link for further information. ...
Ms Access 2000 Password Recovery MS Access 2000 Password Recovery will display the password to any MS Access file type (file extensions of .mdb, .mda, and .mde). This program works for MS Access files saved in MS Access 2000....
Tsm Encryption Plugin For Outlook Express Please purchase this plugin only if you already own a registered copy of our Top Secret Messenger (TSM) product which included some other plugin. If you do not own TSM, you will need to order the complete package that includes the basic TSM installation and the Outlook Express plugin. Refund Policy There is an evaluation demo of TSM on our website. For this reason, our refund policy is restricted to replacement of goods damaged in shipment only. Please refer to our homepage DOWNLOAD link for further information. Once our software is downloaded, or is shipped to your premises, it is considered to be 'Opened'. It is part of our refund policy that all Opened Software cannot be returned for refund, regardless of the delivery method....
Rsaci Password Remover This program removes the RSACi password, also know as the Content Advisor password to Microsoft Inernet Explorer. Once this password is removed, you will never be able to see it again....
Atomic Mailbox Password Cracker A software solution capable of recovering lost or forgotten e-mail passwords for the mail clients that work with mail servers using POP3 and IMAP4 protocols. The program is universal and is independent of the e-mail client work design. The recovering of the password does not take more then 5 minutes including installation of this tool....
Aqt126 773
Top Secret Messenger With Icq Plugin Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for instant messengers, such as America Online's ICQ. It is completely integrated into these programs, allowing users to encrypt and decrypt their messages automatically or manually with one click of a button right from the ICQ's message dialogs! Refund Policy There is an evaluation demo of TSM on our website. For this reason, our refund policy is restricted to replacement of goods damaged in shipment only. Please refer to our homepage DOWNLOAD link for further information. Once our software is downloaded, or is shipped to your premises, it is considered to be 'Opened'. It is part of our refund policy that all Opened Software cannot be returned for refund, regardless of the delivery method....
Storagecrypt 128bits Removable storage is now popular in the world . It is easy to use , but the data is not secure . Do you care about someone accesses your data by stealth ? StorageCrypt is the solution . It has ability to encrypt the disk drives which are using FAT or NTFS file system. StorageCrypt almost support all kind of removable storage , For example , usb hard drive , usb flash memory disk , pcmcia hard drive , compact flash memory , memory stick , etc . StorageCrypt only spends few seconds to encrypt entire storage drive. The encryption Algorithm is 128 bits IDEA . encrypt usb drive,encryp ...
Terminus 6 Terminus 6 - Leave No Traces - The ultimate data destruction toolkit. Terminus 6 brings professional IT security/COMSEC grade destructive power to the masses: erase files, slack space, free space, protect your privacy, destroy chunks of data even if they're not in a file, destroy huge files (2GB or larger) with ease, and more. Network-aware for easy remote data destruction, and International standards compliant - America's NISPOM/NAVSO/AFSSI/HIPPA, Australia's ACSI, Russia's GOST, Germany's VSITR, and more. $29.95 a seat makes Terminus affordable, and license packs make bulk purchases cheaper and easier. (NOTE to government purchasers: EFW is a CCR-registered vendor.) Individual copies are $29.95/seat, with license packs available for bulk purchases. See our website for license pack pri...
Esp Vision ESP delivers powerful recording features that allows you to monitor all areas of your PC, tracking every action down the last keystroke pressed or the last file deleted! ESP can be configured to silently E-Mail log files to a remote E-Mail address. Great for checking up on websites and applications that are used at home while you are out. ...
Ms Backup Password Recovery MS Backup Password Recovery recovers passwords to all versions of MS Backup .qic files. ...
Aqt126 773
Anti Secure Ultimate Password Recovery Anti-Secure Ultimate Password Recovery is an all-in-one password recovery tool for Windows. Lost or forgotten passwords for E-mail programs, instant messaging software such as AIM and Yahoo Pager, website accounts, MSIE AutoComplete fields, windows screen savers, and many more software programs can be instantly recovered. This program can also unmask or unhide passwords hidden behind asterisk password protected text boxes, find passwords in the Windows registry, scan for hidden URLs of programs installed on your system, recover the AppsProtector XP Password, remove the Internet Explorer content ratings or RSACi password, and reveal the Windows 95/98/ME password of the screen saver. to This program also contains a utility that can decode files encoded by MS Script Encoder. A datafile is als...
Passwords Base Passwords Base is developed to remember all your passwords and to store them in the protected kind. All that is necessary for you to remember, it the unique password to your passwords base. Every base encrypt by powerful algorithm, with a 256 bit key. Its intuitive interface make it easy to use by everyone....
Folder Security Guard Folder Security Guard allow You safe protect folders and data inside folders on your drives. You can hide folders completely making it invisible and inaccessible for people using your computer. Folder Security Guard allow You restrict access to the folders that contain your sensitive data over local or shared computers. After folder protection via Folder Security Guard, folder contents cannot be read, copied or modified. To access the locked folders, you should supply unlock via explorer content menu, or select protected folder in folders tree. If You set password protection, you should type correct password for unprotection. ...
Folder Password Guard FPG can lock the specified folder, user who want to open the folder must input the admin password. FPG can hide specified folder too. User must provide admin password to unhide it. An example of FPG wide application is that you can lock or hide the personal folders by FPG when this computer is shared to other persons. Any body who used your computer can't browse your locked folder unless you give them your password. The password is encrypt by SHA1 signature algorithm, which can't been cracked. FPG supports Windows 2K/XP/2003 now. ...
Csss Use your computer as a home or office security system! Remote listening of location from any telephone!...
Aqt126 773
Taceo Essential Taceo is an email and document security software solution for small businesses, providing an easy-to-use content protection and rights management solution. Taceo is a fraction of the cost of most enterprise solutions, enabling small business owners and individuals to securely distribute sensitive email messages and documents while protecting the privacy, integrity and authenticity of their intellectual property. Taceo's toolbar integration within Microsoft Outlook makes securing email and attachments using powerful encryption as easy as a click of a button. Taceo also provides a right click access Wizard that applies rights management protections to files, preventing forwarding, printing and screen capture, and guides the user through assigning email recipients with ease. Users...
Real Registry Protector Real Registry Protector(RRP) is a utility designed to protect windows registry for writing, deleting or adding key and values. The RRP can protect the registry key you specified, and you can specify the treatment(PERMIT, REJECT, ASK ME). The RRP was Developed base on the system driver layer, so the RRP's protection can't be round. You can use RRP to protect important registry key. It's very important for stopping trojan/worm to write registry. Almost trojan/worm parasitize the operating system via writing registry(Such as the "Run" key or file associate key).RRP can reject these operation or report to you, then you can decide how to do it(For Expert). Besides, RRP can stop spite HTML file change your Internet Explorer(IE) setting(exp: homepage) via Internet Explorer(IE). There ...
Anti Keylogger Elite An powerful keylogger detect utility which can identify unknown keylogger. ...
Folder Password Expert Folder Password Expert is a software tool that lets you restrict access to the folders that contain your sensitive data. When folders are password protected and locked, their contents cannot be read, copied, modified or deleted. To access a locked folder, you must supply the correct password. The password for the locked folders is not stored in the Windows registry or somewhere else on your computer. Unlike other utilities, Folder Password Expert will not allow to access the locked folders in Windows Safe mode, DOS, or other operating systems....
Accesspw This utility will instantly display the password set on a Microsoft Access .mdb Database file (Office 97, 2000, XP) thus allowing you to open, edit, copy, and view the full contents, even if you have no idea what the original password was. ...
Aqt126 772
Password Auditor Developed especially to aid conformance with UK Miinistry OF Defence security requirements, this advanced software allows you to perform regular penetration testing against your networks, revealing weaknesses and recovering passwords. The software allows you to penetration test a network, and then quickly and simply produce a locked PDF report on the findings. You can also fix potential weaknesses, and produce a locked PDF report on these....
Retrievepdf V3 0 RetrivePDF allows you to retrive content from an Adobe Acrobat PDF file if you have forgotten the password. It will allow you to open PDF files where you have set the user password, as well as re-enable the options to copy, print, edit, and save the file where either password has been set....
Secura Archiver Secura Archiver is professional archiving software for use in personal or commercial environments that demand 128 bit data encryption to meet and exceed today's security standards. Using Blowfish encryption with a 128 bit key Secura Archiver achieves the same level of security that banks use for their online services and is even suitable for military operations. The integrated Key Manager stores security keys with your descriptions which allows you to quickly and conveniently choose the right security key for your archives....
Advanced Keylogger Advanced KEYLOGGER is an invisible surveillance tool that records every keystroke to encrypted user-friendly easy-to-understand logs. Logs can also be automatically sent to any number of specified e-mails. Advanced Keylogger also monitors the internet activity by logging all web-pages the user visits. Advanced KEYLOGGER keeps track of everything happening on the screen invisibly screenshotting what is on, also being capable of monitoring text and graphics copied and cut to the clipboard. Whenever whereever whatever is typed - it cannot be hidden from Advanced KEYLOGGER! ...
Aqt126 772
Atomic Zip Password Cracker Password recovery program for ZIP and WinZIP archives. The program is designed to reveal the forgotten passwords for ZIP archives. It has friendly user interface and many options that help to speed up the password recovering. ...
Atomic Asterisk Cracker A program to recover the passwords under asterisks in Windows XP and older versions...
Alparysoft Videolock For Webcam Your computer can recognize you! New image recognition security system for your computer. Alparysoft VideoLock for Webcam is a new surveillance security system based on the webcam aided facial image identification technology adapted for PC use. The product is designed to protect your computer and space around from unauthorized access and inform computer owner about the events happening at the workplace or home during his/her absence. ...
Cd Access Control Professional CD Access Control Professional, controls which compact disks can be run on a local computer, this is done by setting a rule determing the times that the disk can be used and whether it is allowed or ejected from the system. ...
Stealth Recorder Pro The Stealth Recorder Pro is a new type of computer software that enables you to record a variety of sounds and transfer them automatically through internet without being notified by original location or source. This program supports various sound formats including MP3, WMA, and Wave. Since it can transfer what is recorded to an Internet email or FTP site in the background automatically and stealthily, you can easily send or receive the contents of a conference or a transcript of lectures promptly. Say, you have two computers in separate locations such as one at your office and the other at home; you can listen to voices or sounds near one computer at the other remote location privately. You can also control activities of Stealth Recorder Pro at a remote location through a web browser on ...
Aqt126 772
Hslab Logger Business The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media. Using this software to become possible to receive the information about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file name or keyword) or to CD/DVD/Zip and other removable media. This is very useful for the rigid control over use of computer systems in business and for the parental control over children's actions. The program is NOT keylogger and does not write any keystrokes! This is a principle positi...