Icon Lock It Xp 3 2 Icon Lock-iT XP provides strong file encryption and security for Windows XP Desktop files. Secure, safe password protection, lock and encrypt files or folders with a mouse click. Configurable user accounts enforce file ownership and let you decide who can lock files. Includes many new features designed for home users, shared computers, and the mobile professional. New self-decrypting option lets you send or distribute encrypted files with peace of mind. When choose the "Create self-decrypting file" option, instead of simply locking your file or folder, the new Icon Lock-iT XP will transform it into a self-extracting executable. This executable can be sent to a third party, placed on a CD or floppy for distribution or sale or safe transport from home to work, or placed in a shared fold...
Eliminator Rx Eliminator RX allows you to sleep sound at night knowing that where you've been and what you've viewed on your PC stays your business. Stop snoopers and identity thieves dead in their tracks. Eliminator RX is software that is completely hidden to everyone except you. Optional Stealth Mode allows you to access the interface using a special hot key sequence. ERX features automatic cleanings and a special emergency hot-key sequence to instantly perform a cleaning. Allows you to delete all or some the following activities: INTERNET CLEANER - History Logs - Site Address Bar - Google Toolbar Searches - MSN Toolbar Searches - Recent Files List - Cache Files - Auto-Complete Addresses - Favorites - Cookies WINDOWS CLEANER - Windows Histories Cleaned - Recent Documents L...
Screen Spy Screen-Spy fully-functional seven day trial makes it easy to see EXACTLY what they do on your PC. After you install it on your PC, Screen-Spy will begin SECRETLY recording screenshots (pictures) of your computer's screen! Taking screenshots allows you to see activity such as emails, chat conversations, web sites, programs and more! You determine how often a screenshot will be taken. For example, every thirty seconds. The screenshots are then viewed in the interface, which only you will know how to access. You can playback the activity just like a movie! Simply press play and watch the activity as it happened. PC Activity Recorder Screen-Spy records PC activity by taking pictures of your computer's screen. This includes emails, chats, web sites, games and much more. Hidden To Other...
007 Spy Software 007 Spy Software is a stealthy monitoring tool which allows you to secretly track all activities of computer users and automatically deliver logs to you via Email or FTP, including keystrokes, emails, online chats, passwords, web sites visited, and take screen snapshot at set intervals, but it does NOT require you to have advanced computer skills at all. When purchasing 007 Spy Software all your cost is a one-time fee as below. We will provide you with lifetime support and upgrade for FREE! *Note: The charge statement will appear on your bill as "DR *WARESIGH SOFT2" instead of "DR *007 Spy Software" since the word "SPY" is quite sensitive somewhere. ...
Super Rm To Mp3 Conver
Cyberspy CyberSpy, the spy software solution for powerful PC monitoring and surveillance needs. Records all emails typed and viewed, chat conversations, websites, keystrokes, passwords typed, and even desktop snapshots. Perfect spy tool for monitoring others who use your PC - children, spouses, or employees. Catch a cheating spouse, husband or wife!...
Spyanytime SpyAnytime PC Spy allows you to secretly monitor and record all activities of computer users with just a simple click, including keystrokes, emails, online chats, passwords, web sites visited, and take screen snapshot at set intervals, but it does NOT require you to have advanced computer skills at all. When registering SpyAnytime PC Spy all your cost is a one-time fee as below. We will provide you with lifetime support and upgrade for FREE! Please keep in mind that the Site License allows you to install the program on all computers of your company, while the Regular License is for specified number of computers. *Note: The charge statement will appear on your bill as "DR *WARESIGH SOFT" instead of "DR *SPYANYTIME PC SPY" since the word "SPY" is quite sensitive somewhere. ...
Netvizor Network Surveillance NetVizor is a powerful, award-winning, monitoring and supervising solution for the corporate or personal network. NetVizor allows the administrator to monitor their entire network from one CENTRAL location, with NetVizor's intuitive 'point and click' interface. Once NetVizor is deployed over your network you can remotely view logs and change the remote PC's settings all from the central location....
Spyanywhere Spyagent 4 0 Suite Ever want to monitor your home PC from work? Want to monitor PC's across your corporate network from your web-browser? Do you want the ability to remote control, administrate, and monitor remote computers? SpyAnywhere is your solution! SpyAnywhere provides the power to remotely control computer's with SpyAnywhere installed - all from your favorite web-browser! SpyAnywhere allows many powerful controls for remote control, and also allows you to remotely monitor other computers. SpyAgent allows you to accurately log ALL activity on your PC: websites visited, applications ran, internet connections made, windows viewed, passwords used, keystrokes typed, and even screenshots! SpyAnywhere integrates with SpyAgent to create a superb local and remote monitoring solution! ...
Spyanywhere Ever want to monitor your home PC from work? Want to monitor PC's across your corporate network from your web-browser? Do you want the ability to remote control, administrate, and monitor remote computers? SpyAnywhere is your solution! SpyAnywhere provides the power to remotely control computer's with SpyAnywhere installed - all from your favorite web-browser! SpyAnywhere allows many powerful controls for remote control, and also allows you to remotely monitor other computers....
Streaming Flag Screen
Spyagent Stealth Edition SpyAgent is a powerful monitoring and surveillance tool that is useful on all Windows platforms. SpyAgent allows you to monitor and record all system keystrokes, websites visited, windows viewed, applications ran, internet connections, passwords used, internet chats (icq/aim/msn/yahoo), and even take snapshots of the desktop. SpyAgent allows you to see how long websites and programs have been used, as well as the username of the user using them. SpyAgent allows you to get an accurate picture of who is using your PC, when, how, and what for. SpyAgent also has built in content filtering so you can keep others from running specified applications and websites! SpyAgent Stealth Edition comes pre-configured for OPTIMAL stealth - no user interaction or configuration is needed - just double cli...
Securityworks Spytech SecurityWorks is a complete set of nine different security utilities for personal and corporate use. The included utilities include password storage, secure encryption, secure deletion, desktop lockdown, powerful action surveillance and monitoring, application password protection, trojan removal and scanning, cover your tracks secure deletion, and port security scans. SecurityWorks covers a broad spectrum of security applications, all for an affordable price and unlimited tech support. ...
Weberadicator WebEradicator is the award-winning security solution that securely eradicates your PC activity histories. WebEradicator has the ability to cover up your previous PC activity: such as emails sent and received, websites visited, documents viewed, files ran, and much more! - as well as eradicate selected files and directories that you specify! WebEradicator allows you to use your PC in private without having to worry about others seeing what you have been doing, or reading your sensitive data. All data is eradicated, leaving no traces left in your PC. ...
Icon Lock It Keep your data locked and secure with encryption and password protection. If you share a computer at work or at home, or just want to keep your data secure. It doesn't get any easier than Icon Lock-iT! To secure a file or folder just right-click its icon, access Icon Lock-iT and enter a password. These files can then only be opened with Icon Lock-iT and your password. We've also included a handy "Hint" feature just in case you forget your password. With Icon Lock-iT! you don't have to bother with locking your entire system. Lock only the files and folders you want to keep secure, from hundreds to just one or two. The all new Icon Lock-iT features support for 128 bit Encryption! It's thousands of times more powerful!...
Max Net Shield Max Net Shield is the ultimate in internet / PC privacy and security. Max Net Shield combines the utility of an internet history cleaner, file encryption, and spy software / adware detection and removal. Erase your tracks, protect your homepage from hijacking software, remove keylogger adware software, and encrypt your sensitive files or folders. Compare to any other internet security software...Max Net Shield is superior and a great value!...
Steganography
Antispy Pro Upgrade After upgrade of your AntiSpy software to AntiSpy Pro you will get version which gives you more control over cleaning process. Additional Pro features: Free Space Elimination Scan disk for files. Plug-ins support. Powerfull PluginsFactory program included - to create custom plug-ins. plus a lot of plugins (clelanig of tracks for AOL chats, Acrobat Reader, WinZip, WinRar, FlashGet, GetRight, ICQ, Kazaa, MSN, Macromedia Flash MX, MS Office, MS Paint, PowerDVD, WinAmp, ZoneAlarm and others)...
Supereraser SuperEraser designed to clear the history of your activities on a PC. You can eliminate the traces of your work in Internet Explorer (IE), AOL, Netscape Navigator, Mozilla and Opera browsers, Start Menu, Windows and Common Controls and others. It offers a variety of cleaning operations that are set up and tuned from the Settings dialog box. After having performed a complete clearing of your PC, you can be sure than nobody will get information about the Web-sites you have visited, the documents you have opened, the messages you have sent and the applications you have used. We are so confident that you'll be satisfied with your SuperEraser purchase, that we are offering a 30-day, money-back guarantee. If you are not completely satisfied with the software, just send us a message (eraser...
Email Security Labels Email security classifications for Outlook provides an easy to use method for users to select a security classification for outbound messages. This easily deployable solution for classifying emails in corporate, government and military environments ensures that confidential information doesn't get leaked, while ensuring minimum user response....
Antispy Pro AntiSpy eliminates the traces of your work on computer. it includes the features: Internet Explorer(IE) and AOL (6.0, 7.0) Clear Browser History Clear Location(Address) Bar History Clear Cookies Clear Auto-Complete Forms and Passwords cache Delete Temporary Internet Files Delete Downloaded Program Files Delete index.dat Delete IE Plug-ins Exclude lists for Cookies\Downloaded program files\Temporary Internet Files\Address Bar Change IE Window Title and Home Page Netscape Navigator (4+, 6+), Mozilla and Opera Clear Address Bar History Clear Cookies Clear Browser Cache Start Menu Clear Run History Clear Find History Clear Recent Documents List Clear Start Click History(Win2000/ME/XP) Clear Order History(Win2000/ME/XP) Windows C...
Antispy AntiSpy is designed to clear the history of your activities on a PC. You can eliminate the traces of your work in Internet Explorer (IE), AOL, Netscape Navigator,Opera, Mozilla, Start Menu, Windows, Multimedia and Messenging programs, Common Controls and has impressive list of other features from cleaning Media Player, ACDSee, RealPlayer history to network logons history, history of opened and searched files, temp files and swap file. Works on all Windows platforms. In browsers it can clear Cookies, Downloaded Program Files, index.dat files, Plug-ins, cache, location bar history and more. Supports exclude lists and filters by date.It even supports secure wipe\shred files option to make sure nobody can restore it. Plus it will save you a lot of space on your drives. ...
States And Capitals
Jvcrypt JvCrypt is a powerful encryption and compression utility that allows you to encrypt your sensitive files with ease. With JvCrypt you can store your passwords in a secure password database and even require a password when starting. JvCrypt can even be ran from the command line or from a batch file....
Ispynow 3 0 iSpyNOW is the critically acclaimed, award winning remotely deployable computer monitoring application. iSpyNOW is first of its kind - offering users the ability to remotely monitor a machine via a web interface without ever having physical access to that PC. iSpyNOW 3.0 now sets a standard in the remote monitoring and surveillance market. No matter if the remote Pc is online or offline, running a firewall our router configuration iSpyNOW 3.0 will record information secretly in complete stealth mode undetectable to any user!...
Behind Asterisks Xp This nifty software allows users to decrypt passwords hidden under asterisks "*" characters. Most programs fail to uncover passwords on XP or NT systems, Behind asterisks works on any Windows systems. Windows systems allow a convenient storage of frequently used passwords, such as passwords for your dial-up (or FTP,SMTP and so on) connections. The password is placed in the edit box, but it's hiding behind a row of "*******" characters. What are you to do if you want to recover the forgotten password ? Behind asterisks will recover it for you. ...
Spytech Spyagent SpyAgent is a powerful monitoring and surveillance tool that is useful on all Windows platforms. SpyAgent allows you to monitor and record all system keystrokes, websites visited, windows viewed, applications ran, internet connections, passwords used, internet chats (icq/aim/msn/yahoo), and even take snapshots of the desktop. SpyAgent allows you to see how long websites and programs have been used, as well as the username of the user using them. SpyAgent allows you to get an accurate picture of who is using your PC, when, how, and what for. SpyAgent also has built in content filtering so you can keep others from running specified applications and websites! ...
Starr Wars Parody Scre
Spytech Spyagent Spytech SpyAgent is a powerful and easy-to-use software utility that allows you to log all keystrokes typed and applications launched. All logs are easily viewed with the built in log viewers and can be saved to a convenient, easily viewed text format. SpyAgent can be ran on windows startup in active monitoring mode with an optional splash warning screen. This allows you to have the option to let others using your workstation that they are being monitored (or not). A built in stealth mode is available to keep users from task-ending or knowing about SpyAgent....
Securewallet Passwords are a part of life! Just about everything - your ATM card, your house alarm, your calling card - requires a password. The PC is no exception. These days, not only must you remember the log-on code for your ISP account but also the user names and passwords for the many Web sites that require registration. The solution to this mess is a SecureWallet. SecureWallet saves all your passwords securely in an encrypted file so that you never forget any password again. The encryption is done by strong encryption algorithm. All passwords can be sorted by categories. Search, Export and Import are also present. SecureWallet main window displays a list of protected applications and user names. When you open an entry, you can view notes, instruct the program to generate a random passwor...
Secure Password Manager Secure Password Manager is a desktop utility that spares you the trouble of filling in your logins, passwords, and other personal data manually. You can automatically fill in password in ANY application (IE, Netscape, Opera, ICQ, MSN...) . Secure Password Manager uses industrial strength 256-bit AES/Rijndael/Blowfish encryption to keep your passwords secure....
Laptoplocate Net Tometa LaptopLocate.net is a software utility that will monitor a computer's IP address to allow server administrators and general users to locate their computer. Using cutting edge technology, each time a computer that has LaptopLocate.net is turned on, the IP address of the computer is transmitted to a pre-determined location via email and logged for reference. This information is also transmitted to our servers and logged in the event your computer is ever stolen. LaptopLocate.net is helpful in finding where computers, especially mobile computers are currently located. If the computer is stolen, Tometa Software will coordinate with law enforcement agencies to help track down a registered user's computer before valuable equipment and data is compromised. LaptopLocate.net uses almost ...
Computer Security Security should be a very important and concerning issue in you every day activity. No matter you are part of a company or a home user, it is very important to protect your files. Computer Security does that for you encrypting sensitive data, hiding it in innocent carriers, allowing safe transfer through encrypted self-extract package, deleting files beyond recovery and locking application from your children or " welcomed quests". Encryption is done using one of over 20 algorithms like Twofish, Cast128, Blowfish or Shaphire II. A special algorithm is used for secure erase that overwrites every bit of information with a random number of layers of data....
Spooky Spins
Steganography Steganography enables you to use digital data hiding techniques (steganography) to hide and encrypt files within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not look suspicious, so nobody even knows that there is any encrypted information. The carrier files are fully functional and identical to the original files (except for size) , so if data was hidden in a picture file, the picture can still be viewed normally. The program gives you the option to hide a small text message, or one or more files that you select. It uses 256bit encryption, advanced compression and you can specify a password to extract the hidden files....
Goldtach Pro This powerful and easy-to-use internet security tool is only 2 megabytes.It integrates four functions: Personal Firewall, Process Commnication Control, E-mail Protection and Webpage Content Filtration. GoldTach Pro can effectively protect against hackers' intruding into your PC and filching personal data by e-mail; prevent Trojan, worm and other malice webpage code from damaging your software system. Furthermore, GoldTach Pro can block most float and pop-up ads window for your better view of the webpage and protect your privacy by block cookies.If your IE settings had been modified by the malice webpage,you can restore it with GoldTach Pro's additional tool: IE Restorer.You can know the current net status by GoldTach Pro's tray icon. It installs easily,and works with few settings . ...
Windowsguard 2005 Premium Ordering is easy, just follow these 2 steps: 1. Choose number of computers required below. 2. Click Order Now to select Payment Method. (ie Online, Bank/Wire Transfer, Check/Money Order, Fax and Invioce)...
Windows Security Officer Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows 9.x (including Windows ME) operating system. It has the capability of providing extremely strong, secure control of who can access a personal computer resources, and exactly what they can do and when they can do it while they have access to those resources. If a users time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to your personal computer. It offers administrative support for controlling which users are allowed to access your computer and the level of ac...
1st Security Center 1st Security Center is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, Printers, and System. You can disable your boot keys, DOS programs, Registry editing and network access. You have got an ability to hide your desktop icons, individual drives, Start menu items and the taskbar features, it enables you to stop others from tampering with your desktop. If you set up the special list of allowed applications nobody will run unwanted programs. The powerful feature "User Working Ti...
Spinning Globe Screen
Personal Antispy Personal Antispy can provide every computer with strong protection against most types of unauthorized activity monitoring software, both known and unknown. It effectively finds and removes keyloggers, trojans and other spy software. Personal Antispy is based on wide knowledge of spy software behavior and made by professionals in this area. Remember - antivirus is not enough! Antivirus software and firewalls cannot detect most keylogger programs. Top 7 reasons to own Personal Antispy: You have confidential information on your computer (bank account information, credit card information, employee records, etc. You are suspecting your spouse is spying on your online activity. You like to cyberchat with the opposite sex, and don't want your spouse getting suspicious. You don't want o...
Blazingtools Perfect Keylogger Basic Edition Do you want to know what your buddy or colleague is typing? Or perhaps you want to check up on your children or spouse and know what they are doing on the computer? With Perfect Keylogger it is possible in just 2 minutes! This program runs on the installed computer, fully hidden from its users, and logs everything that is typed in a protected file. Install Perfect Keylogger and take total control of the PC! Features: Absolutely invisible mode; Logs texts typed in the every application, including passwords; Optimized for Windows XP; Sends log by e-mail (in the stealth mode); External log viewer; Invisible in Windows NT/2000/XP Task Manager and Windows 9.x/Me Task List; Strong encryption of the log file; Records keystrokes in the specified applications; Exports log to HTML ...
Absolute Disk Wiper Business License Wipe your disk by using low-level functions....
Fastwiper FastWiper is a powerful wiping utility...
Regblock Finally an anti-spyware program designed for beginning and advanced users. Regblock is a leading anti-spy technology that sports four primary areas of anti-spyware defense to make your computing safer! Scanning and Removal: The powerful scanning engine goes to work for you targeting a wide base of adware and spyware. You choose want you want to remove or want to keep. Regblock can even root out stealthy keyloggers that try to evade detection using advanced stealth tactics. System Inoculation: Just as physician's prescribe antibiotics to treat infections, Regblock acts as a computer antibiotic for your system's registry so that spyware and adware cannot get a hold in the vulnerable part of your system. RegBlock helps protects your computer against the installation of spy software BEFORE...
Socketq Activex Networ
Keyboard Logger Business Do you want to know what your children, spouse or significant other type on your computer when you are away from it? The Keyboard Logger key logger records every keystroke made on your computer on every window, even on password protected boxes. This key logger is completely undetectable and starts up whenever your computer starts up. See everything being typed, emails, messages, documents, web pages, usernames, passwords, and more....
Keyboard Logger Keyboard Logger is an ultra small and very powerful key logging utility...
Absolute Disk Wiper Personal License Wipe your disk by using low-level functions...
Swipe Pro Swipe uses two scientifically proven methods designed by the US Department of Defense and Australian Defence Signals Directorate, as well as several proprietary methods to securely overwrite and destroy information from hard drives. By securely overwriting individual files, Swipe can ensure a level of security second to none. ...
aqt133

1st Files Privacy Tool 1st Files Privacy Tool can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : 'Hidden', 'Read Only', 'Full Control'. It works with any Windows platforms : 9.x/ME/NT/2000/XP . 1st Files Privacy Tool can work with Network folders and fully supports protection of removable media (such as floppies, CD Roms, DVD, ZIP and some SCSI and RAID drives) on all platforms. This easy-to-use program allows you to protect your files and folders (including subdirectories) in various ways. You can hide them or prevent others from deleting, renaming, executing, or modifying your files in any way. The Wildcard feature allows you to specify which files you want to protect (for example, all EXE or...
Smart Bomb Pc Shutdown
User Time Administrator If you are concerned your child may be spending too much time online or playing games -- or you don't want him/her to use your PC when you're either asleep or away from home -- this type of software offers a solution. It allows you to set limits on how much time your child spends on the computer or online. User Time Administrator lets you specify when exactly and how long the computer can be used and define users which will be allowed to use the computer without any limits. You can schedule time intervals and the number of hours each child can use the computer per day a week. It automatically logs your child out of their computer when it's time for lights out. Also you can prevent the PC usage until the specified date, after the specified date or between specified dates. User Time Administ...
User Time Control Center If you are concerned your child may be spending too much time online or playing games -- or you don't want him/her to use your PC when you're either asleep or away from home -- this type of software offers a solution. It allows you to set limits on how much time your child spends on the computer or online. User Time Control Center lets you specify when exactly and how long the computer can be used and define users which will be allowed to use the computer without any limits. You can schedule time intervals and the number of hours each child can use the computer per day a week. It automatically logs your child out of their computer when it's time for lights out. Also you can prevent the PC usage until the specified date, after the specified date or between specified dates. User Time Control...
1st Privacy Tool For Windows 1st Privacy Tool is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables you to impose a variety of access restrictions to protect your privacy. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, Printers, and System. You can disable your boot keys, DOS programs, Registry editing and network access. You have got an ability to hide your desktop icons, individual drives, Start menu items and the taskbar features, it enables you to stop others from tampering with your desktop. If you set up the special list of allowed applications nobody will run unwanted programs. The powerful feature 'User Working Time'...
Dark Files Dark Files can help you keep your files protected. You can choose who gets access to what files on your computer. This program provides three levels of protection to suit any user : "Hidden", "Read Only", "Full Control". It works with any Windows platforms : 9.x/ME/NT/2000/XP . Dark Files can work with Network folders and fully supports protection of removable media (such as floppies, CD Roms, DVD, ZIP and some SCSI and RAID drives) on all platforms. This easy-to-use program allows you to protect your files and folders (including subdirectories) in various ways. You can hide them or prevent others from deleting, renaming, executing, or modifying your files in any way. The Wildcard feature allows you to specify which files you want to protect (for example, all EXE or DLL files). The file sy...
Slots Cosmos
Advanced Html Encrypt And Password Protect Advanced HTML Encrypt and Password Protect allows you to encrypt HTML pages with strong encryption algorithms and protect them with a password. The program will prevent anyone from viewing the source code or stealing your art work. Encrypted pages will have the same look as the original ones and can be viewed in all modern web browsers. Based on JavaScript technology, Advanced HTML Encrypt and Password Protect offers three encryption schemes including Simple, Medium and Strong encryption. The program also provides the user with a wide variety of other security-related options, such as disabling the right-click or screen printing, inserting copyright information, and more. Advanced HTML Encrypt and Password Protect can stop spam robots from extracting email addresses from your pages. Ad...
Magiclocks Super Controller MagicLocks all-in-one Super Controller combined with six security and control modules for your PC. They are Invisible Disk, File/Folder/Program Lock, Internet Controller, History Cleaner, I/O Device Lock, and PC Lock. The software safeguards your valuable data being copied or viewed by intruder, prevent unauthorized user transfer data to/from the PC, and control the access rights when other user use your computer. 1. Invisible Disk The software makes a part of your current hard disk secure disks. Keep data be invisible from kids, friends and co-workers. Only you can see access with proper login. Use it like a real hard disk. Built in data encryption for the best protection. Max 4 secure disks can be created by each user and disk size from 33MB to 4GB per disk. 2. File/Folder/Pr...
Remote Password Stealer Track all the password-input events in the Windows system, including Windows 98, Windows ME, Windows NT, Windows 2000 and Windows XP. The main purpose is to...... 1. Find password that you have forgotten. Once you forget the password that you have inputted before, you can find a copy in Remote Password Stealer. 2. Steal a password from a machine. Remote Password Stealer is also an awesome password stealer to steal AOL password (Remote Password Stealer is the unique password spy tool that works with AOL SignOn screen, including AOL 9.0 Plus), Yahoo password, AIM password, MSN password, Email password, FTP password, ICQ password, messenger password, IE password, password in Windows XP User Account Manager, dial-up connection password etc., and send the passwords to your e-mail address. ...
Security Toolkit The Security Toolkit gives you the power to encrypt your hard drives, USB drives, CD/DVD's. Also featured is a powerful file shredder, encrypted password manager, secure Internet History shredder and spyware remover....
Pc Police Silver PC Police Silver is a complete secret keylogger and Internet and folder tracker for Microsoft (R) Windows (TM). It utilizes advanced and powerful features. The logged data is protected and encrypted for high security. The main program is password-protected. The logs can be exported to 4 different file formats and printed in a friendly format. PC Police is totally undetectable and unremovable. Only the person who installed it is able to remove it. PC Police logs everything typed on the monitored computer including some special keys like TAB and BACKSPACE for clarity. PC Police records every Internet visit and opened folder path on the monitored computer. It gives the ability to review the visited websites and access the opened folders. PC Police provides an easy and user-frien...
Sky Island Mountains S
Pc Police Gold PC Police Gold is a complete secret keylogger, Internet and folder tracker, and copied text for Microsoft (R) Windows (TM). It utilizes advanced and powerful features. The logged data is protected and encrypted for high security. The main program is password-protected. The logs can be exported to 4 different file formats and printed in a friendly format. PC Police is totally undetectable and unremovable. Only the person who installed it is able to remove it. PC Police logs everything typed on the monitored computer including some special keys like TAB and BACKSPACE for clarity. PC Police records every Internet visit and opened folder path on the monitored computer. It gives the ability to review the visited websites and access the opened folders. PC Police logs all copied text...
Pc Police Professional PC Police Professional is a complete secret keylogger, chat monitor, Internet tracker, file logger and program recorder for Microsoft (R) Windows (TM). It utilizes advanced and powerful features such as remote monitoring and action alerts. The logged data is protected and encrypted for high security. The main program is password-protected. The logs can be exported to 4 different file formats and printed in a friendly format. PC Police is totally undetectable and unremovable. Only the person who installed it is able to remove it. With PC Police Professional there is no need to be at the monitored computer to view the captured data. You can set it up so you view the activities performed on the computer almost instanteneously. PC Police logs everything typed on the monitored comput...
Pc Police Keylogger PC Police KeyLogger is a complete secret keylogger for Microsoft (R) Windows (TM). It utilizes advanced and powerful features. The logged data is protected and encrypted for high security. The main program is password-protected. The logs can be exported to 4 different file formats and printed in a friendly format. PC Police is totally undetectable and unremovable. Only the person who installed it is able to remove it. PC Police logs everything typed on the monitored computer including some special keys like TAB and BACKSPACE for clarity. PC Police provides an easy and user-friendly way to view the recorded data from user actions. There is an easy mechanism for grouping,segmenting and sorting the data unavailable with other products. PC Police provides an easy and fast way for e...
Express File Encrypter Express File Encrypter is an encryption utility which can encrypt your personal file into an encoded format (E File) to protect your personal data from unwanted viewers. It is very easy to use, only a few clicks are needed to encrypt a file . Express File Encrypter can encrypt your pictures, PDF files, text files, or Word document file, and many more....
Pc Police Chatlogger PC Police ChatLogger is a complete secret chat/IM logger and monitor for Microsoft (R) Windows (TM). It utilizes advanced and powerful features. The logged data is protected and encrypted for high security. The main program is password-protected. The logs can be exported to 4 different file formats and printed in a friendly format. PC Police is totally undetectable and unremovable. Only the person who installed it is able to remove it. PC Police logs BOTH sides of chat and IM conversations plus the date/time, chat windows and computer users chatting. The supported chat clients are AOL IM (AIM), ICQ, MSN Messenger and Yahoo Messenger. PC Police provides an easy and user-friendly way to view the recorded data from user actions. There is an easy mechanism for grouping,segmenting an...
Siguardian Lite
P C Police P.C. Police elegantly tracks all keyboard, Internet and Windows folder access activities on your computer. It gives you the power to uncover lost documents and view passwords,catch cheating spouses, malicious users and negligent employees on the spot. It secretly logs almost all PC activities including text copying on the computer. It is password-protected, its main log files are encrypted and it has stop/resume functionality. You can set and change your password, view different date logs, print the logs, set up a warning screen for legal purposes and more....
Tray Safe Personal License Tray Safe - the safest place to keep your passwords, user names, credit card numbers and other confidential information. This software provides powerful encryption, fast access and absolute security for your most valuable data. This tool is an absolute necessity for anybody who frequently uses the Internet for shopping, surfing and work. Combination of absolute protection and instantaneous access to passwords makes this application a must-have...
Clevercrypt CleverCrypt allows you to create a completely secure hard drive for you to place all of your confidential or sensitive files in. Simply create a secure drive using CleverCrypt, then Copy Paste your files into your new drive and your files will be automatically encrypted, ensuring total security. ...
Tinicrypt TiniCrypt gives you the power to securely encrypt your confidential and sensitive files at the touch of a button. Simply right click on the files or folders you want to encrypt, choose Encrypt from the drop down menu, enter your password and TiniCrypt will begin the process of encrypting your files. ...
Cryptex 100 Gb Encrypted Vault Protect vital information on your PC with a secure and hidden vault by Cryptex. Feel better knowing that ANY file you lock in the vault will be protected with strong encryption to ensure maximum protection against theft and peeping eyes....
Shatterbox
Cryptex 60gb Encrypted Vault Protect vital information on your PC with a secure and hidden vault by Cryptex. Feel better knowing that ANY file you lock in the vault will be protected with strong encryption to ensure maximum protection against theft and peeping eyes....
Cryptex 6gb Encrypted Vault Protect vital information on your PC with a secure and hidden vault by Cryptex. Feel better knowing that ANY file you lock in the vault will be protected with strong encryption to ensure maximum protection against theft and peeping eyes....
Personal Data Vault Tenebril's Personal Data Vault (PDV) acts as a safe-deposit box for your confidential documents. A vault encrypts and password-protects your data, providing a single, secure place to store your sensitive information. The PDV shreds deleted files to Department of Defense standards to ensure that they are destroyed beyond recovery. A variety of strength levels allow you to delete files using quick wipes or to perform wipes with the most advanced cryptographic algorithms available. The Personal Data Vault protects your data from loss by performing manual or automatic backups and supports a wide array of media (CD ROMs, DVDs, removable disks and more); data in backup copies is encrypted at the same level of security as the original file. The Passwords folder keeps an organized list of ...
Cipherscrypers It is a wonderful frendly multiplatform program purposed for encrypting any files with many kinds of cryptographic algoritms like DES, AES, Blowfish, RC2, RC4 and password based encryption - PBEWithMD5AndDES. Lists of keys and encrypted files is encrypting with password for yours safety and privacy....
C I A CIA is a File Encryption software integrated into the Windows explorer shell.Its features include User-friendly interface,128 bit RC2 and 168 bit DES-3key encryption supported, Digital certificates for secure file transfers, Secure deletion prevents unauthorized access to deleted files, System-wide password for all encrypted files belonging to a user, Automatic password removal from memory(CIA locking), Secure Folders(file operations are restricted to the particular user)**upgrade(many great features added) (Available free to existing registered users)....
Selten Atlantics End W
Password Revealer Reveal asterisk password with one click. No need to install and uninstall. Drag the cursor over the hidden asterisk password to reveal it. Easy way to recover password. It can also reveal hidder passwords on IE web pages....
Super Spy SuperSpy is keylogger software, which is used to monitor computer usage secretly. It can automatically record password entered, Web site visited, e-mail messages written, online chats, Keystrokes produced, Word , Excel created etc., and time stamp all these activities to an encrypted file. It can send the report to you by e-mail at set intervals. The software run in invisible mode, nobody except you knows its existence, and only you can access the Super Spy with a password. It's easy to configure, very small size. The software also can be scheduled a run time, it runs automatically when people start the computer....
Blancco Pro Total concept for data erasure: Blancco Pro is the tailored solution for servers and RAID systems - Unlimited erasure for one PC/server (up to 16 ATA, IDE, SCSI, USB, FireWire (IEEE1394) hard drives of any size) - High-speed, simultaneous erasure up to 16 HDD - Extensive server and RAID support (i.e. Compaq SMART2, Compaq Smart Array 5xxx support, IBM ServeRAID) - Detailed Hardware Asset Management information report (i.e. processor, memory, hard drive etc) Floppy disk downloading process requires Windows 2000 or later. Erasure can be performed in any IBM-compatible PC. Please note that after the purchase you need to download the software to floppy. External floppy disk writers are not supported. If you wish to have other delivery method, please contact us at: sales@blancco.c...
Blancco Lite Pure data erasure tool - Unlimited erasure for one computer (one IDE hard disk drive of any size) - Simple erasure information report Floppy disk downloading process requires Windows 2000 or later. Erasure can be performed in any IBM-compatible PC. Please note that after the purchase you need to download the software to floppy. External floppy disk writers are not supported. If you wish to have other delivery method, please contact us at: sales@blancco.com ...
Search Maker Pro 3 2 U
Diskise Create completely encrypted hard drives, securely shred files and erase Internet and Windows history and registry entries. Also features a powerful automatic file shredder to automatically securely delete files as they are deleted, as well as an encrypted password manager, password creator, command prompt support, right click file encryption and much more....
Blancco Data Cleaner All-in-One solution for any data erasure and reuse needs: Blancco - Data Cleaner+ offers 100% secure erasure with integrated hardware testing, automatic hardware inventory and reporting, all at once! - Unlimited erasure for one PC (up to 4 ATA, IDE, SCSI, and USB hard drives of any size) - Windows OS version serial number detection reporting - Microsoft Office version number detection reporting - Detailed Hardware Asset Management information report (i.e. processor, memory, hard drive etc) - Hardware Functionality Test (as an add-on functionality, please ask for offer) Floppy disk downloading process requires Windows 2000 or later. Erasure can be performed in any IBM-compatible PC. Please note that after the purchase you need to download the software to floppy. Ex...
Resource Sentry Protect your vital corporate resources, guard the bottom line, prevent the loss and destruction of important intellectual property and trade secrets, improve productivity, detect inappropriate behavior. Do all of this, and more, with RESOURCE SENTRY...RESOURCE SENTRY captures an astonishing variety of information on any monitored computer, including all websites visited, downloaded images and HTML pages, keystrokes, applications run, opened windows, memory consumed, drive space used, URLs typed directly into the browser address bar, operating system information, user data, and most importantly, full-color JPEG screenshots of the entire user desktop. The data is collected on intervals that you specify, is encrypted, stored in a hidden folder on the target machine, and can be retrieved at ...
Swipe Pro With History Cleaner Swipe uses two scientifically proven methods designed by the US Defense Department and Defence Signals Directorate, as well as proprietary methods to securely overwrite and destroy information from hard drives. Also includes a built in history eraser!...
Paq Keylogger Family Key Logger Paq keyloggers, family key logger keystroke logger is a keylogger spy program newly produced in 2003. It can log and spy all keyboard events and view it conveniently. It also has ability of invisibly monitor, password protect etc. This quickly updating spyware tool is suited for the investigative or spector needs of law enforcement, government, business, and private individuals. New features in version 2.04 Runs more quicky, you can not feel that it is running background when you try it. Support(log) more languague, please download a trial version to find whether it is fit for your country lauguage. Main features: Log all the keyboard events, including function keys such as F1, Home etc. Build-in log view tool, you can view the log file in text only mode or function key mode. ...
Sdprotector Basic
Dekart Private Disk Multifactor Dekart Private Disk Multifactor is an easy-to-use, secure and reliable disk encryption software. Provides 100% protection of private information without making you think about security. Dekart Private Disk Multifactor lets you easily and effectively eliminate the password risk and secure sensitive information. The software allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES 256-bit), ensuring that only authorized users may access it. The algorithm has been certified by the National Institute of Standards and Technology as corresponding to Advanced Encryption Standard (AES) and Secure Hash Standard (SHA-1). Users can store their encryption keys on such widely spread removable storage devices as USB flash disks, pen drives and...
Dekart Logon Protect access to notebook and desktop computers running Microsot Windows 95/98/ME/NT/2000/XP. Dekart Logon allows to store all your passwords to Windows machines on one removable storage device (USB flash drive or CD disk), a smart card or USB token and adds the strong authentication and convenience to the standard Windows logon procedure. With Dekart Logon, you don't have to waste time entering complicated passwords, as all login data is entered automatically once the USB flash drive is connected to the computer. Whenever you temporarily leave the computer, you can temporarily lock the computer by simply removing the USB key. The login and password of the user are securely stored on the USB key, which can be protected with the user defined PIN code and (optional) his biometric data. Th...
Dekart Private Disk Dekart Private Disk is an easy-to-use, secure and reliable disk encryption software. Provides 100% protection of your private information, making your important files invisible and protected from unauthorised access. Dekart Private Disk creates one or more virtual disks on your hard drive and/or other external storage devices. Once a user creates a virtual encrypted disk, that disk is assigned a new drive letter and appears to the user like any other system drive (like the A: or C: drive). When the disk is mounted, the data is automatically encrypted and decrypted when the user writes or reads this data respectively. Dekart Private Disk encrypts and decrypts all data stored on the encrypted disk with virtually no performance penalty. When the disk is unmounted, either manually or by log...
Clevercrypt Enhanced Protect your files with incredible 1,280 bit military grade encryption, just by placing them into your encrypted CleverCrypt hard drive! Simply create a secure hard drive up to 40 GB and drag drop your files for instant password protection and encryption. Even if your whole computer (or laptop) is stolen nobody will be able to access information inside your CleverCrypt drive without knowing your passwords. Remember, 1 in 5 orders receive a FREE copy of Swipe Pro, our secure deletion system. ...
Visnetic Safefile This file encryption program creates an encrypted virtual drive on your computer that can only be loaded using a specific password. Once loaded, any kind of file can be dragged and dropped into it, rendering the file virtually untouchable by anyone but you. It also allows you to generate self-decrypting email attachments, allowing the user to send encrypted email to anyone. The recipient doesn't have to have a copy of the program installed. Designed for deployment across any sized organization, it also features fully centralized administration capability, including key recovery....
Ru Ru
Visnetic Firewall VisNetic Firewall is a stateful packet level firewall solution built to protect Windows-based Servers, telecommuters / mobile users, and LAN workstations not currently protected by a firewall. VisNetic Firewall is more secure than application-based personal firewalls, yet less expensive than high-end firewalls, providing peace-of-mind through comprehensive intrusion protection. Security-conscious professionals running software and/or hardware Internet sharing solutions are as concerned about internal threats as they are about external threats. There is currently not a hardware firewall solution that protects companies against these threats and existing software firewall solutions are priced outside of the small to medium business market....
Minos Lock Minos Lock is a highly performed files security software that can hide or encrypt any number of files, folders and documents in seconds. Folders and files are protected with a password when you login the ABC Lock program. Protected files are undeletable, hidden and highly secured, hide files from kids, friends and co-workers, prevent them from viruses, trojans, worms and spyware, protects them from networked computers, cable users and hackers...