Xml2pdf Hotfolder Xml2PDF is hot folder based XML to PDF converter. This software use the common strategy named hot or watch folders. It looks in certain folders called "hot folders" for XSL-FO, SVG, XHTML or XML files. When Xml2PDF Hotfolder finds a file in one of these hot folders, it converts the file to PDF and moves the resulting PDF document (and usually the source XML file and any associated log file) to the output folder. Each hot folder can have its own formatter settings that apply to all files processed from that folder. Single software instance can handle as much folders as you wish. All folders are configured separately and may use private formatter configuration, separate XSL transformation, tread priority and others. Also, we can't but mention native Xml2PDF support for various graphics s...
Cdsaver
Happy Port Scanner Happy Port Scanner reports all open TCP/UDP ports and maps them to the owning application. It maps those ports to running processes with the PID, process name and path. Port Scanner can be used to quickly identify unknown open ports and their associated applications. It can use to detect Trojans and spyware. ...
Itronics Audit Auditing of networked PC's with the following features: capture installed software from any terminal on a network; view OS version with build number, service pack etc; see memory details for: RAM, Page file, and virtual memory; view processor and BIOS details (OS dependant); view IP address information; see available drives with total space used free and drive serial number; view attached printers, whether local or networked; list terminals using specific software packages; catalogue total numbers of licenses in use for all software packages found; hardware security  monitors any changes to client terminal memory or processor, and more....
Tweaknow Regcleaner Pro Family License The Registry is a heart and soul of any Windows system. It contains information that controls how your Windows appears and how it behaves. Most applications today use registry to store configuration and other important data. When you install an application, a new registry entries will be created. This entries will automatically be deleted when you uninstall the application. Unfortunately, it is not always work that way. Sometimes, you will find that some applications fail to remove their own registry entries. This entry will become obsolete. After a long period, after installing and uninstalling a lot number of applications, your Windows registry will contain a large number of obsolete entries. This will significantly increase the registry size and thus will slowdown your computer, be...
Track Destroyer
Registry Healer Registry cleanup tool. Speed-up your Windows by cleaning and correction the registry! Registry Healer scans registry for invalid path references, invalid font references, unused keys. Registry Healer suggests the most safe correction for each invalid registry entry....
Novapdf Pro Using novaPDF Pro you can easily create high quality PDF files in an affordable and reliable way from any Windows application. It installs as a virtual printer driver and its easy-to-use interface helps you generate the PDF files by simply selecting the "print" command from any application (you can convert your Word documents, Excel sheets, PowerPoint presentations, AutoCad drawings, emails or web pages). Its purpose is to enable users to easily exchange electronic documents, independently of the application in which they were initially created. The resulted PDF files can be viewed on any computer with a PDF viewer (reader) installed. You can password protect the PDF files you create and permissions can be restricted to prevent the document from being viewed, printed, modified, copied or...
Top Screen Saver Builder Top Screensaver Builder is an easy to use screen saver builder. You can add background music and text to your screen saver. With Top Screensaver Builder you can build windows standard SCR files or distributable self-installing executable file. There are many types of transition effects for you to choose from. Supported pictures format includes jpg,gif,png,bmp,pif,tga or pcx. As for audio files, you can use either wav,midi or mp3 files. Pictures display or music playing delays can be configured to cater your demand. You can include unlimited number of pictures in your screen saver. ...
Linklines
Bloom Blossoms Screen Saver This screen saver contains more than 20 beautiful, full color images of flowers along with soothing cd quality background music. The screen saver is furnished on CD-ROM. The price includes shipping costs....
Flash Screensaver Maker Package favorite flash movies in one Screen saver. These movies can be played at one time or one by one. You or the end user can set many features of every movie such as playback range,time frame,scene domain,quality,background color etc. Certainly, you can save the movies package as a normal executable file and send it to your friends. Flash Screensavers Maker lets you create professional windows screen saver which carries powerful settings from Macromedia Flash movies . If you want to package many flash movies, please select Flash Screensavers Maker. Simply import your Flash animations into Flash Screensavers Maker, follow the various steps to customize your own Flash screensaver.Features List : 1 Professional Windows Screensavers. 2 Multiple Flash files in one time. 3 Flash-powered...
Auto Keylogger A K A Key Logger Auto Keylogger (a.k.a. Key Logger) records everything that is entered from the keyboard, to an encrypted file. Documents, e-mails, chat conversations, typed URL addresses, passwords, Internet forms, etc will be recorded neatly. Caps, symbols, backspaces will also be processed, so you will see the recordings as similarly as the original documents. It runs stealthly, it will be invisible to the users, so the users won't know that their keystrokes are being recorded....
Spytech Spycheck SpyCheck is a quick and easy to use tool that allows you to scan your PC quickly for files and website addresses visited that may contain sexually related content. SpyCheck is the ideal software for scanning your PC quickly to check if users have been checking out adult websites, or if they have sexually related files on their PC!...
Tinicrypt TiniCrypt gives you the power to securely encrypt your confidential and sensitive files at the touch of a button. Simply right click on the files or folders you want to encrypt, choose Encrypt from the drop down menu, enter your password and TiniCrypt will begin the process of encrypting your files. ...
Cryptex 100 Gb Encrypted Vault Protect vital information on your PC with a secure and hidden vault by Cryptex. Feel better knowing that ANY file you lock in the vault will be protected with strong encryption to ensure maximum protection against theft and peeping eyes....
Cryptex 60gb Encrypted Vault Protect vital information on your PC with a secure and hidden vault by Cryptex. Feel better knowing that ANY file you lock in the vault will be protected with strong encryption to ensure maximum protection against theft and peeping eyes....
Cryptex 6gb Encrypted Vault Protect vital information on your PC with a secure and hidden vault by Cryptex. Feel better knowing that ANY file you lock in the vault will be protected with strong encryption to ensure maximum protection against theft and peeping eyes....
Personal Data Vault Tenebril's Personal Data Vault (PDV) acts as a safe-deposit box for your confidential documents. A vault encrypts and password-protects your data, providing a single, secure place to store your sensitive information. The PDV shreds deleted files to Department of Defense standards to ensure that they are destroyed beyond recovery. A variety of strength levels allow you to delete files using quick wipes or to perform wipes with the most advanced cryptographic algorithms available. The Personal Data Vault protects your data from loss by performing manual or automatic backups and supports a wide array of media (CD ROMs, DVDs, removable disks and more); data in backup copies is encrypted at the same level of security as the original file. The Passwords folder keeps an organized list of ...
Alysta Auctionmaker 2
Cipherscrypers It is a wonderful frendly multiplatform program purposed for encrypting any files with many kinds of cryptographic algoritms like DES, AES, Blowfish, RC2, RC4 and password based encryption - PBEWithMD5AndDES. Lists of keys and encrypted files is encrypting with password for yours safety and privacy....
C I A CIA is a File Encryption software integrated into the Windows explorer shell.Its features include User-friendly interface,128 bit RC2 and 168 bit DES-3key encryption supported, Digital certificates for secure file transfers, Secure deletion prevents unauthorized access to deleted files, System-wide password for all encrypted files belonging to a user, Automatic password removal from memory(CIA locking), Secure Folders(file operations are restricted to the particular user)**upgrade(many great features added) (Available free to existing registered users)....
Password Revealer Reveal asterisk password with one click. No need to install and uninstall. Drag the cursor over the hidden asterisk password to reveal it. Easy way to recover password. It can also reveal hidder passwords on IE web pages....
Super Spy SuperSpy is keylogger software, which is used to monitor computer usage secretly. It can automatically record password entered, Web site visited, e-mail messages written, online chats, Keystrokes produced, Word , Excel created etc., and time stamp all these activities to an encrypted file. It can send the report to you by e-mail at set intervals. The software run in invisible mode, nobody except you knows its existence, and only you can access the Super Spy with a password. It's easy to configure, very small size. The software also can be scheduled a run time, it runs automatically when people start the computer....
Blancco Pro Total concept for data erasure: Blancco Pro is the tailored solution for servers and RAID systems - Unlimited erasure for one PC/server (up to 16 ATA, IDE, SCSI, USB, FireWire (IEEE1394) hard drives of any size) - High-speed, simultaneous erasure up to 16 HDD - Extensive server and RAID support (i.e. Compaq SMART2, Compaq Smart Array 5xxx support, IBM ServeRAID) - Detailed Hardware Asset Management information report (i.e. processor, memory, hard drive etc) Floppy disk downloading process requires Windows 2000 or later. Erasure can be performed in any IBM-compatible PC. Please note that after the purchase you need to download the software to floppy. External floppy disk writers are not supported. If you wish to have other delivery method, please contact us at: sales@blancco.c...
Alterwind Log Analyzer
Blancco Lite Pure data erasure tool - Unlimited erasure for one computer (one IDE hard disk drive of any size) - Simple erasure information report Floppy disk downloading process requires Windows 2000 or later. Erasure can be performed in any IBM-compatible PC. Please note that after the purchase you need to download the software to floppy. External floppy disk writers are not supported. If you wish to have other delivery method, please contact us at: sales@blancco.com ...
Diskise Create completely encrypted hard drives, securely shred files and erase Internet and Windows history and registry entries. Also features a powerful automatic file shredder to automatically securely delete files as they are deleted, as well as an encrypted password manager, password creator, command prompt support, right click file encryption and much more....
Blancco Data Cleaner All-in-One solution for any data erasure and reuse needs: Blancco - Data Cleaner+ offers 100% secure erasure with integrated hardware testing, automatic hardware inventory and reporting, all at once! - Unlimited erasure for one PC (up to 4 ATA, IDE, SCSI, and USB hard drives of any size) - Windows OS version serial number detection reporting - Microsoft Office version number detection reporting - Detailed Hardware Asset Management information report (i.e. processor, memory, hard drive etc) - Hardware Functionality Test (as an add-on functionality, please ask for offer) Floppy disk downloading process requires Windows 2000 or later. Erasure can be performed in any IBM-compatible PC. Please note that after the purchase you need to download the software to floppy. Ex...
Resource Sentry Protect your vital corporate resources, guard the bottom line, prevent the loss and destruction of important intellectual property and trade secrets, improve productivity, detect inappropriate behavior. Do all of this, and more, with RESOURCE SENTRY...RESOURCE SENTRY captures an astonishing variety of information on any monitored computer, including all websites visited, downloaded images and HTML pages, keystrokes, applications run, opened windows, memory consumed, drive space used, URLs typed directly into the browser address bar, operating system information, user data, and most importantly, full-color JPEG screenshots of the entire user desktop. The data is collected on intervals that you specify, is encrypted, stored in a hidden folder on the target machine, and can be retrieved at ...
Swipe Pro With History Cleaner Swipe uses two scientifically proven methods designed by the US Defense Department and Defence Signals Directorate, as well as proprietary methods to securely overwrite and destroy information from hard drives. Also includes a built in history eraser!...
Allwebmenus Pro
Paq Keylogger Family Key Logger Paq keyloggers, family key logger keystroke logger is a keylogger spy program newly produced in 2003. It can log and spy all keyboard events and view it conveniently. It also has ability of invisibly monitor, password protect etc. This quickly updating spyware tool is suited for the investigative or spector needs of law enforcement, government, business, and private individuals. New features in version 2.04 Runs more quicky, you can not feel that it is running background when you try it. Support(log) more languague, please download a trial version to find whether it is fit for your country lauguage. Main features: Log all the keyboard events, including function keys such as F1, Home etc. Build-in log view tool, you can view the log file in text only mode or function key mode. ...
Dekart Private Disk Multifactor Dekart Private Disk Multifactor is an easy-to-use, secure and reliable disk encryption software. Provides 100% protection of private information without making you think about security. Dekart Private Disk Multifactor lets you easily and effectively eliminate the password risk and secure sensitive information. The software allows you to secure your disk(s) (including removable media) with a powerful and proven encryption algorithm (AES 256-bit), ensuring that only authorized users may access it. The algorithm has been certified by the National Institute of Standards and Technology as corresponding to Advanced Encryption Standard (AES) and Secure Hash Standard (SHA-1). Users can store their encryption keys on such widely spread removable storage devices as USB flash disks, pen drives and...
Dekart Logon Protect access to notebook and desktop computers running Microsot Windows 95/98/ME/NT/2000/XP. Dekart Logon allows to store all your passwords to Windows machines on one removable storage device (USB flash drive or CD disk), a smart card or USB token and adds the strong authentication and convenience to the standard Windows logon procedure. With Dekart Logon, you don't have to waste time entering complicated passwords, as all login data is entered automatically once the USB flash drive is connected to the computer. Whenever you temporarily leave the computer, you can temporarily lock the computer by simply removing the USB key. The login and password of the user are securely stored on the USB key, which can be protected with the user defined PIN code and (optional) his biometric data. Th...
Dekart Private Disk Dekart Private Disk is an easy-to-use, secure and reliable disk encryption software. Provides 100% protection of your private information, making your important files invisible and protected from unauthorised access. Dekart Private Disk creates one or more virtual disks on your hard drive and/or other external storage devices. Once a user creates a virtual encrypted disk, that disk is assigned a new drive letter and appears to the user like any other system drive (like the A: or C: drive). When the disk is mounted, the data is automatically encrypted and decrypted when the user writes or reads this data respectively. Dekart Private Disk encrypts and decrypts all data stored on the encrypted disk with virtually no performance penalty. When the disk is unmounted, either manually or by log...
Allpdf Converter
Clevercrypt Enhanced Protect your files with incredible 1,280 bit military grade encryption, just by placing them into your encrypted CleverCrypt hard drive! Simply create a secure hard drive up to 40 GB and drag drop your files for instant password protection and encryption. Even if your whole computer (or laptop) is stolen nobody will be able to access information inside your CleverCrypt drive without knowing your passwords. Remember, 1 in 5 orders receive a FREE copy of Swipe Pro, our secure deletion system. ...
Visnetic Safefile This file encryption program creates an encrypted virtual drive on your computer that can only be loaded using a specific password. Once loaded, any kind of file can be dragged and dropped into it, rendering the file virtually untouchable by anyone but you. It also allows you to generate self-decrypting email attachments, allowing the user to send encrypted email to anyone. The recipient doesn't have to have a copy of the program installed. Designed for deployment across any sized organization, it also features fully centralized administration capability, including key recovery....
Visnetic Firewall VisNetic Firewall is a stateful packet level firewall solution built to protect Windows-based Servers, telecommuters / mobile users, and LAN workstations not currently protected by a firewall. VisNetic Firewall is more secure than application-based personal firewalls, yet less expensive than high-end firewalls, providing peace-of-mind through comprehensive intrusion protection. Security-conscious professionals running software and/or hardware Internet sharing solutions are as concerned about internal threats as they are about external threats. There is currently not a hardware firewall solution that protects companies against these threats and existing software firewall solutions are priced outside of the small to medium business market....
Minos Lock Minos Lock is a highly performed files security software that can hide or encrypt any number of files, folders and documents in seconds. Folders and files are protected with a password when you login the ABC Lock program. Protected files are undeletable, hidden and highly secured, hide files from kids, friends and co-workers, prevent them from viruses, trojans, worms and spyware, protects them from networked computers, cable users and hackers...
Remora Usb Disk Guard Pro Remora (rmB4ere) : warmwater fishes of the family Echeneidae, characterized by an oval sucking disk on the top of the head. With this apparatus the remora, or suckerfish, attaches itself to sharks, swordfishes, drums, marlins, and sea turtles. In this way it travels without effort... Remora USB Disk Guard Pro is a "project" based file encryption/compression tool, or a strong file encryption/compression switch which can startup from your USB storage devices. With Remora USB Disk Guard Pro, you can secure all your files anytime and anywhere, and use them conveniently at the same time. Main features: (1) A easy and fast tool to encrypt and decrypt files. (2) A easy and fast tool to encrypt and decrypt folder. (3) Encrypt and compress/ decrypt and decompress multiple files and folde...
Alive File Encryption
Ez Password EZ Password allows you to securely store and easily retrieve passwords, logins, PINs and other confidential information. Encryption, backups, convenient interface....
Remora Usb File Guard Pro Remora (rmB4ere) : warmwater fishes of the family Echeneidae, characterized by an oval sucking disk on the top of the head. With this apparatus the remora, or suckerfish, attaches itself to sharks, swordfishes, drums, marlins, and sea turtles. In this way it travels without effort... Remora USB File Guard Pro is designed to do file encryption, compression and schedule backup in your USB storage devices. With Remora USB File Guard Pro, you can secure all your files and store them in USB disk anytime and anywhere. Main features: (1) Copy files and folders to mobile disk and do encryption in a fly. (2) Copy files and folders to mobile disk and do compression and encryption at the same time in a fly. (3) Create schedule folder backup and do compression and encryption to copies. (4) ...
Ietoolbox Passwords Manager For Internet Explorer Passwords Notes keeper, Form Filler, File Viewer, Favorites Viewer/Searcher, and QuickLinks toolbar plug-in for Internet Explorer. IeToolbox is integrated with Internet Explorer like the IE Search and Favorites sidebars, and hides away when not needed. No need to switch to another program and copy/paste to get to your data. IeToolbox features: - Well-behaved: NO ADWARE, NO SPYWARE - Unobtrusive: hides away when not needed - Secure: your passwords and notes are encrypted with strong encryption Now your passwords will always be "right there" for you in IE when you need them. And IeToolbox can even fill-in the account name/user name/password automatically for you. And there is also a Notes tab where you can enter notes, such as transaction details, or anything that is importa...
Ace Password Sniffer The most powerful and effetive password sniffer. Ace Password Sniffer can listen on your LAN and enable network administrators or parents to capture passwords of any network user. Currently Ace Password Sniffer can monitor and capture passwords through FTP, POP3, HTTP, SMTP, Telnet, and etc. Ace Password Sniffer works passively and don't generate any network traffic, therefore, it is very hard to be detected by others. And you needn't install any additional software on other PCs or workstations. If your network is connected through switch, you can run the sniffer on the gateway or proxy server, which can get all network traffic. This stealth-monitoring utility is useful to recover your network passwords, to receive network passwords of children for parents, and to monitor passwords a...
Threatsentry Designed to protect servers running Microsoft Internet Information Services, (IIS), ThreatSentry is an advanced neural application that continuously collects, analyze and organizes server events into an evolving baseline of acceptable activity. Each server connection is compared against this baseline to identify and take action against any activity falling outside of acceptable parameters. Upon installation ThreatSentry begins to collect and organize IIS-specific data into clusters that reflect the normal use patterns (both trusted and untrusted) within the server environment, ("Training Mode"). The process of organizing these clusters is guided through the use of a built-in knowledgebase of published attack signatures. Once the required number of training events has been collected, Thr...
Alchemy Deluxe
Privatefirewall W Pest Patrol Anti Spyware Privatefirewall 4.0 is a Personal Firewall and Intrusion Detection Application that eliminates unauthorized access to your PC, at home, the office, or on the road. Privatefirewall is easy to install/use and provides reliable and high-performance protection right "out of the box". Privatefirewall's intuitive interfaces allow advanced users to easily adjust default settings to create custom configurations. Features include: Packet Filtering, Port Scanning, IP/Website Protection, Email Anomaly Detection, and Advanced Application Protection. Privatefirewall is high-performance desktop security that is affordable, feature-rich and simple to use. Privatefirewall now includes eTrust PestPatrol Anti-Spyware, which detects and removes spyware, adware, and other web-based threats to protect your...
aqt132

Turbocrypt Disk Encryption Software 512 Bit, Transparent, On-The Fly Disk Encryption; Strong Security Made Easy. Easy to set-up and use. TurboCrypt allows you to keep sensitive files secure, with out changing the way you work. Create encrypted Volumes up to 2,000 Gigs in size. Similar to a firewall or Virus Scanner, TurboCrypt works in the background. When a Virtual Encrypted Volume is unlocked, it is recognized by your computer as a sepaerate Drive letter. Enter your password once to unlock the Virtual Encrypted Drive, and then access and use all encrypted files stored on that drive, just as you would any other drive on your system (ie. your C: drive). Think of TurboCrypt as a Virtual Safe, in which your files can both exist and function. Keep your music and movie archives on an encrypted Virtual Drive. Play files direct...
Easy Password Storage Tired of trying to remember all your different passwords? Sick of Internet Explorer's built in password saving that lets anyone using your computer access your password protected accounts? Now you can store all your passwords for easy access in one secure, encrypted location. Saves all your usernames, passwords and the locations they are used at. Password protected, now you only have to remember one password instead of hundreds! All information is encrypted and secure. Copy your username or password with the click of a button. Quicklinks take you directly to the website or location where your password is used. Sortable lists makes it easy to find what you\re looking for. Does not Contain any Adware, Spyware, or other Third Party Software. A brandable (a.k.a. Private ...
Tweaksec Powerful Windows 9x/Me/NT/2000 security configuration and administration tool. TweakSEC can protect your system from incautious and malicious users as well as from anybody who could accidentally make harmful or irritating system configuration changes. TweakSEC can also protect your system from intruders by setting various network security options which are not enabled by Windows defaults. It can protect Wallpaper, Screensaver etc. settings....
Computer Monitor Keylogger Secretly monitor all activity on your computer, capturing keystrokes, programs, internet explorer websites and screenshots. Completely invisible and easy to use, all information captured is stored in an encrypted log file. The log file can be sent secretly at scheduled intervals to any specified email address. All activity in Internet Explorer can be monitored, and webpages are cached for viewing offline. Screenshots can be taken at given intervals, capturing everything that is currently on the screen. Monitor your computer while you are away, retrieve lost information, monitor your childrens activity, and much more! Capture keystrokes, even passwords! Capture programs used Capture websites in Internet Explorer Capture screenshots Encrypted log file Secretly email log...
Air Force Aviation
Folder Security Professional Folder Security Professional allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only, preventing modification or deletion by other users or programs. The program can lock local hard disks as well as Floppy drives, CDrom drives and removable disks and supports FAT/FAT32/NTFS. It can repair and prevent malicious changes on most options of the Internet Explorer, such as Start Page, Default URL, Window Title, Context Menu, and etc. It can also prevent changes on various settings of the Windows system, such as desktop settings, security policies, and many others. It allows to create any number of accounts with each one has his own password and protection list. This tool is self-protected, it can be uninstalled only by th...
Savemine SaveMine is latest file protection by hiding folder, file encryption with your desirable password. Fast and easy to use, you just click and SaveMine will takes only a second to protect a gigabyte folder, it can't open, delete or copy with out the correct password....
Cipherit Simple text encrypt/decrypt utility. Key based encryption algorithm. Load and save encrypted ".cff" files....
Host Security Personal Host Security Personal(HSP) not only password-protects files and folders, it also protects you from hacker attacks when you surfing the Internet. HSP allows you to specify which websites or IP addresses can be accessed so can be used to block unhealthy websites. It can also block popular instant messengers, such as MSN Messenger, Yahoo! Messenger, ICQ, and AOL Instant Messenger. HSP also restricts uses of local hard disks, CD-ROM drives, floppy drives, and removable disk drives so without your permissions unauthorized people can't copy files from your computer, install programs in your computer, or play games with your CD-ROM. It supports FAT/FAT32/NTFS and works under Windows 2000/XP....
Personal Passworder Standard Personal Passworder keeps more than just passwords! This award-winning password manager will keep your passwords, serial numbers, credit card numbers, phone entries and other information safely and securely. You can even create customized groups for your data! All data is encrypted with hacker-proof, reliable algorithm and all users have their own password-protected accounts. The program supports several interface languages and comes with a number of useful tools for safe work and personal comfort. You will never forget your passwords again, because Personal Passworder will remember them for you!...
Agile Lines
Encrypted Briefcase Personal Encrypted Briefcase Personal(EBP) allows you to hide folders and encrypt files with on-the-fly AES encryption. Just create one or more encrypted briefcases from local folders and move your sensitive files into the specified folder and they will be encrypted/decrypted in real-time. You can work with the files as usual, and when you're done, lock the briefcase, which will store the files securely and also hide the entire folder from view. Additional features include a password-protect interface, supports for FAT/FAT32/NTFS, and protection under Windows Safe Mode. Laptops users will find this tool to be very useful. With EBP, you will not worry about leak of sensitive business data any longer in case of the computer was stolen. This tool is foolproof, easy-to-use, and self-protected....
Personal Passworder Deluxe Personal Passworder keeps more than just passwords! This award-winning password manager will keep your passwords, serial numbers, credit card numbers, phone entries and other information safely and securely. You can even create customized groups for your data! All data is encrypted with hacker-proof, reliable algorithm and all users have their own password-protected accounts. The program supports several interface languages and comes with a number of useful tools for safe work and personal comfort. You will never forget your passwords again, because Personal Passworder will remember them for you!...
Folder Security Personal Folder Security Personal allows you to hide and lock folders and files. You can choose to hide them completely or restrict access by making them read-only ,preventing modification or deletion by other users or programs. The program can also lock local hard disks as well as Floppy drives, CDrom drives and removable disks and supports FAT/FAT32/NTFS. This program can also repair and prevent malicious changes on most options of the Internet Explorer, such as Start Page, Default URL, Window Title, Context Menu, and etc. Additional features include support for special folders (My Documents, Send To etc.), disable/enable the Registry Editor, default drives sharing, and password protected interface. This tool is foolproof, self-protected, and easy-to-use with drag-and-drop operation fully support...
Inet Protector 2 0 iNet Protector allows you to password protect Internet connection and restrict access to the Web. With iNet Protector you can enable and disable Internet connection any time. In order to enable Internet access, valid password must be entered. You can also schedule time periods when Internet connection should be disabled or enabled. Built-in timer allows you to enable Internet connection for a specified amount of time....
Aframe Professional R
Perfect Privacy Perfect Privacy protects your privacy by eliminating your Internet and offline computer usage traces, such as history lists, address bar drop downs, cache, accessed document lists and other tracks that are stored to your computer as you use it....
Program Protector Program Protector is state of art security utility, which allows you to password protect programs. You can password protect any Windows application. Program Protector is very easy to use and does not require any special computer knowledge....
Gridlock Pro GridLock is a security application designed to simplify, speed up and increase the security of your Palm device without using text based passwords. It uses a simple 5x5 grid of squares to represent a unique pattern that is used instead of a normal text `password`. GridLock Pro contains these extra features to make your Palm device even more secure: * Extra secure "tri state" grid with over 800 billion combinations. * Grid sizing option. * Show Owner Information so that your Palm device may be returned to you if found. * Maximum Fails option to permanently lock your Palm after a certain amount of failed attempts to access it. * Free lifetime upgrades and support. * Now with OS5 support. ...
Ecrypt Easy to use file encryption to keep that important information out of the wrong hands....
Point Lock Pro Registration Point Lock PRO allows you to set protection for your computer system and data. It guards your system against data leaks to snoopers and unauthorized users both on the Internet and on your local area newtorks. Also, prevents unintentional deletions and modifications to your protected files caused by operational mistakes or malicious intent by unauthorized users. All you need to do is select the data or programs you want to prevent access and no one else will be able to view the data or run the program without your authorization. Point Lock PRO for Windows offers an effective protection of your private data and makes it easy to safely manage access to your system and all of its components. With state-of-the-art technology, businesses and individuals can effortlessly protect their systems, d...
Aff Lines Pack
Point Lock Pro Upgrade Point Lock PRO protects computer systems and data, blocks data leaks and prevents unintentional deletion caused by operational mistakes and/or inappropriate applications. All you have to do is select the data or program you want to hide/lock and no one else will be able to access the data or run the program without your authorization. Point Lock PRO for Windows offers an effective protection of your private data and makes it easier to safely manage access to your system and all of its components. Using the state-of-the-art technology, businesses and individuals can effortlessly protect their system, folders, and files against deliberate or accidental misuse....
Masking Password Generator Pro An industrial strength password or number generator for the individual home computer user or the large corporation or organization. Generating strong, difficult-to-crack random numbers or passwords has never been easier! Create one or many millions of passwords using simple wizards or a complex and very flexible masking syntax. Generate extremely obscure passwords, pronounceable passwords, or even passwords derived from words of the included dictionary. Have the generator obscure them as much or little as you like so they are very secure but still easy to memorize. Define a mask that incorporates your company security policy and generate passwords as often as you need without any more worry about password policy compliance. The program can reside in the Windows system tray, with a ho...
Spylo Pc Monitor Spylo PC Monitor is the award-winning and highly flexible security monitoring software used by parents, business organizations, and for the tasks like testing of usability or studies of PC usage. So what is the way you know what your staff (or family) are doing on your computer? This software tells you exactly who is doing what on your computer and at what time. This stealth-monitoring utility provides you the information about every runned application, every keystroke, stored password, established internet connection and takes a screen shots of these events. Program logs are extremely compact - screen shots are JPG compressed, monitoring eats very small amount of processor time and monitor is invisible to user - it is not shown by Alt+Tab or in system tray. ...
Shatterbox Shatterbox is an easy to use utility for hiding or destroying sensitive files. Many people don't realize that when files are deleted from a computer they can still be recovered from the hard drive. Shatterbox eliminates that possibility by destroying the structeral data of files and then permanently removing them from the system. Files destroyed with Shatterbox can never be recovered. Shatterbox also has the ability to hide files on a system without affecting the actual data. Files hidden with Shatterbox are extremely difficult to locate and even if found, could only be restored by select, experienced individuals. It takes mere seconds to perform operations with this smart utility. The peace of mind that comes with it lasts much longer....
Sleuthwatch 4 5 SleuthWatch 4.5 is the newest version from SonnarSoft. It's user friendly and now network compatible so you don't even have to leave you chair to see what someone else in the company has been doing! Just run SleuthWatch 4.5 at any time and it will capture the screen at your time choosing! Sleuthwatch 4.5 also includes keylogging that will capture every key that is pressed on the keyboard! You can then come back at any time and search through pictures and the key log using the SleuthWatch Image Viewer and the Key Log viewer that allows you to search for different key words. ...
Aerotags Html2zip
Lockout Desktop Security Educational Version This is an Educational user licence(s) for Lockout Desktop Security...
Journal Safe 2001 Journal Safe 2001 allows safe storage of personal information via encryption and decryption techniques. With customizable Encryption Keys the possibilities are limitless when it comes to data protection. Journal Safe 2001 also incorporates spell checking features with customizable dictionaries for accurateness. Security Features can be adjusted from non-existent to paranoid with the ability to keep security logs for failed log in attempts. Journal Safe 2001 also maintains all entries in a central file for easy backup and recovery. Complete Help pages included for additional assitance....
Spycamera Do you want to know what is going on in your computer while you are not using it? Do you want to know which sites visit your subordinate? Are you curious with whom your girlfriend in correspondence? Do you want to control of access of unwanted Internet sites by your kids? Why sometimes when you did not use your computer for a sometime you might find some changes in the computer and who did it? In those cases you need this program. The SpyCamera starts together with Windows. SpyCamera is not visible for other users, nobody knows that the program exists!!! Important:that program is not shown itself and you will not find it by pressing Alt-Ctrl-Del in the task list!!! No way to discover the program in your computer! It works as long as computer works but it is activated only in programmed tim...
Cryptup Encryption of your private data: files, pictures, reports, etc. is the only way to protect them from prying eyes. Not only that! Say you want to send one of those files as an e-mail attachment and don't want anybody but the recipient to see it? CryptUp can do all this for you and more! And it does it very simply at a mouse click in the Windows Explorer. It also 'shreds' the files you delete. The shredded files will be irremediably and definitively destroyed, whatever the means, existing or to come, used to try to restore them (specifications of US DSS (Defence Security Service) Industrial Security). Don't be mistaken by Cryptup look and size; it is a very powerful tool, with encryption keys up to 2,048 bits. Written in 'pure' C language, it is very compact and fast (no unnecessary huge...
Lockout Desktop Security Business Version This is a Business user licence(s) for Lockout Desktop Security...
Advanced Random Passwo
Password Manager If you have many accounts of username/passwords, you always lost password, this tool will help you a lot, A hot key will activate it when needed....
Onlyme OnlyMe automatically locks your PalmOS device whenever the device is turned off. OnlyMe is fast, easy, and secure. If you misplace your device, OnlyMe ensures that no one reads your information. Since OnlyMe locks your device whenever the screen is turned off, you do nothing special to ensure the privacy of your information. OnlyMe is designed to let you turn on your device as easily as possible. Entering your password can be as easy as making one quick gesture with your stylus or finger. And your device returns to the state that it was last in. No need to switch applications! OnlyMe is more secure than the device's built-in operating system security facility! Now includes German language program version. Now PalmOS v5 compatible....
Paragon Disk Wiper Personal Are you selling, discarding or donating hard disk? Paragon Disk Wiper allows safe recycling of hard disks. It erases data on your hard disk - you can feel certain that all personal information is eliminated - including partitions, folders, directories, files, file tables, dynamic drive overlays and master boot record information; all viruses including master boot sector viruses. Easy, quick and safe Disk Wiper fits on one bootable diskette. You only need to boot the computer with it, specify erasing parameters and begin wiping. Graphical wizard interface will make this process ease. Paragon Disk Wiper can erase the data overwriting it in one pass, or in multiple passes. This ensures eliminating of data....
Paragon Encrypted Disk 3 X Protect private and sensitive data from potential unauthorized access. No matter what is your particular needs, protecting your data on computer, sharing one computer between several persons or secured transfer of data to friend, co-worker or boss, Encrypted Disk will help you to fulfill your tasks. Official product page: http://www.paragon-gmbh.com/index_ed.htm...
Virtualstream Library offers compression, encryption, and hashing by several algorithms; automates all routine operations; and tracks all errors with any data or files on disk and in memory. It is highly optimized for 32- and 64-bits and includes optimization for perfomance, speed, and memory usage....
Ad Popup Killer
Secura Secura is a full-featured file manager similar to Windows Explorer. However, the biggest difference is that this program provides a completely secure environment for data and documents on your system. It's capable of encrypting files and locking folders, thus making them inaccessible to other users. Like Explorer, Secura supplies its very own shell context menu. As you browse your hard drive, simply right-click an item and select the appropriate protection option from the menu. The program gives you the option of preventing Explorer from displaying these items. Meanwhile, files and folders are stored inside tabs on the interface, which require passwords for entry....
Paragon Disk Wiper Professional Are you selling, discarding or donating hard disk? Paragon Disk Wiper allows safe recycling of hard disks. Disk Wiper erases data on your hard disk - so you can feel certain that all personal information is eliminated. It's easy, quick and safe. Professional version of Paragon Disk Wiper is intended for use by IT specialists in various companies. They could be technicians in computer repair services or computer leasing companies, IT technicians relocating computer hardware in large company etc. Paragon Disk Wiper features: New features: - WinXP support; - new NT/2k/XP fdisk; - refresh function; - set label function; - scripts under Windows; - New installation program (created with IS 6.31). Boot up and wipe Disk Wiper fits on one boot...
Leviathan Pc Firewall The Leviathan PC Firewall is an application which will prevent hackers from accessing your computer, it will monitor and log activity on certain ports (which can be customized) and has other features including Keep Alive to maintain your connection....
Xp Protector XP-Protector is security tool for Windows XP and Windows 2000. It provides easy and comprehensive access to many security features of these systems, so that home users without experience with administering computers can take advantage of their improved security features. ...
Adinf32 Full Protecti
Cryptofish CryptoFish is encryption utility that you can use to encrypt/decrypt files and folders to protect them from unauthorized use. CryptoFish uses a 448 bit Blowfish algorithm. It is very easy to use. It will add "Encrypt with Cryptofish" command to the context menu that appears when you right-click a file in Windows Explorer. It also has built-in key manager and temporary "key memory". ...
Pocket Excel Password Recovery Pocket Excel Password Recovery is a program to recover lost or forgotten passwords for Pocket Excel files. All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Dochrana DOchrana is a utility which will hide the Cancel button from login dialog in Windows systems. If a user does not have account (profile) on your computer, DOchrana will not allow him/her to log-in. DOchrana also adds Exit button to the login dialog so that it's possible to shutdown the computer without logging-in....
System Monitor Detector System Monitor Detector is an application to help you determine if you are being monitored by any kind of system monitor or spyware program. SMD does this by presenting you with several tools that will help you detect these kinds of programs. SMD, unlike most other application of this sort, does not rely on lists to detect system monitors. Instead it works to help you detect them wich is a much more reliable method......
Windefender WinDefender is a tool that you can use to secure your confidential data and protect your files and folders on computers running Windows 95/98/ME. It provides real-time protection and security service with strong encryption. Once you encrypt your private folders then can use them just all others, non-encrypted ones - files will be decrypting 'on the fly'! For any required files and folders you can assign access right, i.e. make it read-only or hide, for example. WinDefender works well and provides lots of security options....