Aqt126 688
Spycleaner Spy Cleaner stands out in the spyware-removal field, but you'll have to pay for the quality. A slick interface sports controls similar to its competitors, offering options for scanning your drives and Registry, updating online, and saving the last, best system set-up as a backup. Scanning is fairly quick compared to other programs in the category. We especially liked the way this application displays results, separating different kinds of adware and spyware into categories so we knew in what manner our computer is infected....
Optimize Computer Keep your PC running faster, cleaner, and error free with Optimize Computer! This award wining application is a suite of 7 powerful tools designed to increase the performance of your computer, by correcting problems, cleaning and fixing Windows registry, and more!...
Cpr 2000 CPR 2000 is a set of tools that will definitely increase your overall system speed! Including System Tune Up, Internet Tune Up, Video/3D Card Tune Up, SwapFile Control, Cache Control, RAM Optimizer and Self-Tune Express! CPR 2000 is the ultimate tune up and maintenance tool for Windows 98, Second Edition and Millenium Edition! CPR 2000 will make your system and hardware run faster, smoother and at peak quality! CPR 2000 comes with an excellent documentation - making it easy to optimize EVERY system! As a bonus, CPR 2000 comes also with a programs revealer - finding little-known programs in Windows 98, Second Edition and Millenium Edition! - and a collection of keyboard shortcuts to help you manage and run Windows faster! CPR 2000 comes with an integrated critical files backup tool...
Acoustica Cd Dvd Label Maker A felt tip pen is nice for quickly labeling your CD / DVD, but if you want to add some class, you should try Acoustica CD / DVD Label Maker! Create your own CD/DVD labels and jewel cases with the ultimate in ease and flexibility! If you are sick of guessing what songs are on what CD, get the label maker that automatically puts your track list on your CD/DVD label!...
2000th Hellfire Screensaver The HellFire Screensaver puts on an impressive show of smoothly animated, photorealistic fire effects overlaid on a dimmed-out version of your desktop. It accomplishes this without the use of any 3D or 2D accelerators. You'll see burning flames, heat distortion, fireworks, and sparkles. High-quality stereo sound effects add to the realism....
Botanica 2 Screensavers A Registration Wizard that automatically registers your shareware version of Botanica 2: A screensaver for those who enjoy gardens, Botanica will beautify your screen with virtual growing flowers and plants. Bouquets of flowers, hanging gardens, wreaths, flowering shrubs and others can be selected or randomly grown by the program. Options give the user control over what style and shape their plants will grow along with the ability to add fruit, thorns and/or leaves. Twelve screensavers to choose from as well as freeze image key and password protection....
Islands Of Hawaii One of America's National Treasures. Pictures can't tell it the way it really is, but, next to being there, this is the best way to see it in full color. It includes all islands, the dancers, and some contemporary Hawaiian sound clips with half on the images. ...
Sword Of The Samurai This is not a game, it is a screen saver. SCREENSAVER DESCRIPTION: Samurai were the warrior class of Japan for almost 800 years. The samurai protected their Daimyo from attacks by other fuedal warlords. The sword was the weapon of choice for a samurai. They were trained in the martial art of ken-jutsu, "The Warrior Art of the Sword" and were guided by Bushido, "Way of the Warrior", a code of honor and social behavior. This screensaver displays 55 images of samurai with their glorious costumes and weaponry, drawn by Japanese artists from the mid to late 1800's....
Dna 25 Client DNA - Distributed Network Attack - 1 Server License / 25 Client Licenses ...
Infiltrator Security Scanner For Home Users Infiltrator is an easy to use, intuitive security scanner that can quickly audit your computer for vulnerabilities, exploits, and information enumerations. Infiltrator can reveal and catalog a plethora of information on your computer - such as installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more! Infiltrator can audit your computer's password and security policies, alerting you when changes should be made to increase security. All results can be generated into sleek, easy to read report by the report generator. Infiltrator also includes a bundle of network security utilities, such as cracking tools, ping and trace sweeps,network enumerator, whois lookups, and more....
Blancco Data Cleaner All-in-One solution for any data erasure and reuse needs: Blancco - Data Cleaner+ offers 100% secure erasure with integrated hardware testing, automatic hardware inventory and reporting, all at once! - Unlimited erasure for one PC (up to 4 ATA, IDE, SCSI, and USB hard drives of any size) - Windows OS version serial number detection reporting - Microsoft Office version number detection reporting - Detailed Hardware Asset Management information report (i.e. processor, memory, hard drive etc) - Hardware Functionality Test (as an add-on functionality, please ask for offer) Floppy disk downloading process requires Windows 2000 or later. Erasure can be performed in any IBM-compatible PC. Please note that after the purchase you need to download the software to floppy. Ex...
Procwatch Protect yourself from special spyware, memory hogs, and dangerous programs. Speed up your computer when stopping and/or removing unncessary programs. Warns and shows you the name of a programs as it loads, even if it's hidden from the Task Bar. You can add safe programs to a SafeList to suppress their warnings. A great supplement to firewall software. Also finds the type of spyware which doesn't use a network / internet connection unlike many spyware programs. Protects your privacy from programs which log keystrokes and captures screen snap-shots. Option to terminate suspicious running programs / processes. Easy to use at a competitive price. 1.1 fixed a program error in the unregistered version....
Aqt126 654
No Peeking Standard Edition No Peeking! is a personal privacy utility which allows you to password-protect any file, rendering it meaningless to anyone without the password. It was carefully designed to be unobtrusive, easy to use, and completely secure, with a state-of-the-art 56-bit encryption engine (1024 bits with the Professional version)....
Spypartner The Spy Professional SpyPartner - The Spy Professional - is your desktop security agent. Equipped with keylogger as well as screen shot recording technology, making it a complete spy partner, enabling you to track most activities on your PC, whether online activity, offline activity, your working activity, the amount of time you're using your computer, or even other activities that you might never imagine before. ...
Devicelock DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs or any other device, depending on the time of day and day of the week. DeviceLock enhances access control for Windows System Administrators and helps control removable disk usage. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. Network administrators can also use DeviceLock to flush a storage device's buffers. Remote control is also available....
Pc Privacy Guard PC Privacy Guard protects your privacy by cleaning your system of embarrassing, incriminating, or just plain space-hogging cookies, temp files, recent documents, typed URLs, and IE history. What makes PC Privacy Guard exceptional is that it gives you total contol over what is erased from your computer. You can choose to keep certain cookies as well as certain typed URLs. You can even populate the Recent Document menu with innocent files, and fill Media Player's history list with fake names. That means no one will know you've been trying to erase anything. PC Privacy Guard also is compatible with more than 150 plug-ins for cleaning every program imaginable. It does not contain spyware, adware, or third-party software. ...
Aqt126 653
A One Folder Encryption A-one Folder Encryption is a software for folder encryption. It let you easily protect data in your computer. When a folder encrypted with A-one Folder Encryption, It could not be accessed, copied, deleted, moved and renamed. With Folder Encryption, you could keep the special data secure , and you let others use your computer at will and without worry. Key Features: (1)Fastest and Simplest, with one-click Encryption and Decryption (2)When Folder Encrypted, folder not only can't be accessed, but can't be copied, deleted, and moved , renamed .... (3)Provide password setting for the software (4)This program does not apply in window 98 system, and does apply in NT,XP,2000,2003 system (5)For safety reason, Please not trying to en...
Access Mde Unlocker The Access MDE Unlocker allows you to make changes to locked Access MDE databases - e.g. changing a form or report design or adding functionality using macros. Access 2000 and above only. Please note: You cannot make changes to the VBA project using this tool, however the original VBA compiled code is not lost when making changes to forms/reports or macros. ...
1 Abc Net Password Organizer In these days, everyone has many different passwords, to login to a messenger or an e-mail account, security codes for online banking, PINs for his telephone and so on. 1-abc.net Password Organizer allows you to organize all your passwords and login data, you only have to remember your master password. Additionally, it offers many useful functions concerning modern and secure password management. Feature Overview: * Integrated random password generator - helps you if you do not have any idea how to create a new password * Copy function - to enter your passwords easily into the login fields * *.txt export function - prepare your secure data for printing, sending by e-mail or whatever you want. (Should of course be used with caution!) * Enter thousands of passwords if you want - your disk sp...
Iovsoft Encoder MS Access 2000 MDE Password database for your websites with additional encoding/decoding tools. MDE format does not allows anybody to view encoding/decoding source code. Allows to save website names, logins and passwords. For more details please visit www.busysoftorder.com/encoder.htm...
System Privacy Shield Privacy Protect - System Privacy Shield is a computer tracks clean tool, this tool will protect your privacy by cleaning all tracks on your computer(including internet and system activities). Supports popular browsers - System Privacy Shield supports popular browser such as Internet Explorer, MSN Explorer, AOL Explorer, Firefox, Opera and more. You only need to click one button and all activities on your computer will be deleted. It's simple and easy. Security Your hard-disk free space - Do you know the delete action and empty recycle bin action does not really delete your files? Recover tool can recover the deleted file. System Privacy Shield will really delete your files from your computer, completely implements and exceeds the US Department of Defense DOD 5220.22-M and NSA cleari...
Aqt126 653
Peoplelock Commander PeopleLock Commander (PL C) is an integrated security software. It has three main contributions to PL C users. Firstly, PL C encrypts the USB memory stick so that the data installed in the memory stick is protected from unauthorized accesses. Secondly, PL C allows users to lock the operations of their PCs. What is more, an encrypted USB memory stick can be used as a key to unlock those operations. Thirdly, PL C includes a keyboard and mouse macro, a function to record and replay a sequence of keyboard and mouse inputs. You do not need to use any virtual drive for this software. This is a stealthy encryption software for USB data storages, such as USB memory sticks and USB hard disks. By encrypting USB data storages, PeopleLock Commander(PL C) protects your data. PL C also equips with mous...
Sentinel Professional Complete System Monitoring: Sentinel Takeover all the control of Windows based Computers Sentinel captures screenshots in scheduled time and stores them in a secure area for your later review Sentinel Monitoring Features Sentinel captures screenshots (Full screen or active screen) Sentinel Captures screenshots in a adjusted period System Watch (You are able to determine log in and log off time of your PC). Files and Folders ( Monitoring opened, created, modified, deleted files and folders) Software Record (Monitoring programs used and their connected dll files) Web Site Record (visited web sites and downloaded files) Keyboard Record :Recording all keyboard activity and keystrokes occurred. Chat Record: Watch all instant messaging programs like MSN, YAHOO, ICQ Reporting and Expo...
Inthepicture InThePicture encrypts files messages into redundant parts of Windows BMP imagefiles. Provide extra security for e-mail attachments with up to 100 user-defined keys. Supports 16-color, 256-color 24-bit BMP files, and the user interface supports drag drop. Fully compatible with Windows95, WindowsNT Windows98. ...
Access Password Recovery Genie Access Password Recovery Genie is a program to recover passwords for MS Access databases. -- All versions of MS Access are supported (including Access 2003) -- State of the art password recovery engine - all passwords are recovered instantly -- Recovers database passwords -- Recovers user-level security accounts and passwords -- Multilingual passwords are supported -- Full install/uninstall support ...
Password Archive 2005 Password Archive 2005 securely stores your passwords and all your personal confidential information. With a single password you can protect all your important data using industrial encryption standards. Store all passwords and your important data in one secure, protected place. You will never lose or forget anything again. Protect your data by creating strong passwords and stop worrying about forgetting them. A built-in password generator will help you. Store any type of information, including passwords, credit cards and accounts numbers, addresses, instructions, contact details, clothing sizes....
Aqt126 653
Diskscience DiskScience creates on-the-fly encrypted, virtual volumes that look and feel just like the disks with which you are already familiar. Encryption is highly optimized for maximum throughput and is often faster than device transfer rates. Encryption algorithms include: 256-bit AES, DES, Triple DES, and 256-bit GemStone. Creating new DiskScience volumes is easy. The New Volume Wizard guides the creation of empty volumes. The Cloning Wizard makes it simple to copy the contents of an existing floppy, CD, DVD (including movie DVD - outside the U.S.), or other disk, into a secure (or not) virtual volume. Cloned CDs/DVDs prove especially useful since they offer hard disk like performance and they can be used on computers that don’t even have CD/DVD drives. With relatively low power consum...
Storagesafe StorageSafe provides high performance security for USB and IEEE1394 based storage with on-the-fly device encryption, guards against 180,000+ common passwords, and DoD Std. 5220.22-M compliant secure file and device erase. Devices are split into custom sized public and private areas. The public area is not encrypted. The private area is encrypted with the 256-bit Advanced Encryption Standard (AES). It’s easy to use. Simply enter the correct password once, and protected devices will have the familiar look and feel of unprotected storage. All program functions except (Install/Uninstall) work under Windows Guest/Limited User accounts. The single unit, direct download price is $24.99; multi-unit pricing and site licenses are available. To ensure your complpete satisfaction, we...
Secukeeper Are your files and folders safe? Do you keep your files and folders away from spyware? Are your sensitive data safe? SecuKEEPER Strongly lock your files and folders away from prying eyes. Today you do not go spending hundreds of dollars on encryption software. SecuKEEPER is an All-in-one file encryption software, Your best choice - can secure everything,offers four types of encryption protection for files at various security levels, can rapidly Lock files to prevent access without actually encrypting them, or Hide the locked files so they're not even visible,can Encrypt files and folders, optionally making them self-decrypting so they can be opened on a system that doesn't have SecuKEEPER installed.Private coffer feature creates encrypted virtual drives in which you can store especially s...
Safe N Sec Safe'n'Sec - effective utility to protect a personal computer against unknown system vulnerabilities and threats. - Protection against new threats and vulnerabilities - Protection of your system from external attacks and unauthorized access - Identifying the sources of new threats - Detection and elimination of known threats - Maximum protection and minimum load Current protection solutions (antivirus software and personal firewalls) are extremely effective at combating known threats and vulnerabilities. Antivirus applications protect users only against known viruses. Personal firewalls help prevent intruders from gaining access to personal computers. These solutions are based on reactive technologies that perform actions only in response to malicious activities toward your data. ...
Aqt126 653
Ecyware Greenblue Inspector Ecyware GreenBlue Inspector is an integrated web analyzer environment that offers multiples ways to test your web applications. You can analyze on the run or record a session for deeper analysis coverage....
Hide Secret Files Hide Secret Files is a security product based on an unequalled data hiding method. As a result of many years research within our company, this product hides and safely protects from erasure your private information. Hide Secret Files is the ultimate tool allowing you to have exclusive secured access to sensitive information based on a password. No one except you, who know the password, will be able to access the secured data. Not even your own operating system will have permission to alter the information. The latest, and one of the most annoying secondary product of nowadays Internet evolution, the spy-ware activity, is absolutely inoffensive against the protection guaranteed by Hide Secret Files The hidden data won't be visible even for your own OS so the Safe Mode booting or movi...
Secrets Protector Pro 2005 A three-in-one privacy protector tool built for those who like their personal stuff handled carefully. This product gives you the features of a folder locker, a secure eraser and a privacy manager. The Hide Secret Files proud successor, enforced with strong encryption, secure file deletion technique and a smart built-in trace remover will help you to protect your secret data and online privacy better than ever. All confidential data will be hidden beyond the reach of ANY intruder and you will be the only one able to handle them. And what you want to delete will be DELETED. Your personal classified data and your online and offline activity traces will be wiped for good. Secrets Protector Pro 2005 is the ultimate security tool to protect your sensitive information on your personal comput...
Winencryptor WinEncryptor is the first encryption program in the world capable of defeating keylogging software without resorting to difficult to use, mouse based, 'virtual keypads'. WinEncryptor's KeyLogShield will render keylogging cracking of encrypted files obsolete. This represents a leap forward in modern encryption protection and is entirely unique in the world today. WinEncryptor features 10 encryption methods, including the current AES (Advanced Encryption Standard) approved for use by the U.S. National Institute of Standards and Technology (NIST) and the U.S. Computer Security Research Center (CSRC)....
Xl Delete XL Delete 1.1 is a powerful secure delete tool that will permanently delete any of your files using one of its five wipe methods or with a custom method that you create. Many people believe that emptying the recycle bin will delete a file forever. This is not true, when you delete a file and empty it from the recycle bin, the file is in fact still on your hard drive. The only thing that happens when you empty the recycle bin is that Windows marks the area where the file is on the hard drive as overwriteable so that it can reuse the space when necessary. This allows special data recovery software to be able to actually undelete the file and view all of its original contents. When you delete a file with XL Delete, the file data will actually be overwritten several times using specialized d...
Aqt126 653
Password Commander 2 5 Password Commander manages and generates passwords, sticks them to Web pages and Programs. It fills forms automatically with one click, lets you “drag” password and login and “drop” them exactly to the field, offers to put frequently used passwords in “bookmarks” that are accessible via System Tray or a Floating Panel, that is always on your desktop, if you wish. PC is compatible with biometric devices and will recognize you by your fingerprint. It is portable and run from USB-flash drive. Passwords and personal data are strongly encrypted with BlowFish. PC lets you export, import, print and back up passwords, save them to passcards and send to another computer. Over 4500 registered users called Password Commander useful, friendly and irreplaceable program. Just try it now ...
Abacre File Encryptor Encrypt any files or folders using 39 advanced encryption algorithms. Other features: Secure Password Generator; Text Pad to encrypt any text; Wipe Files command to permanently remove files your computer; command line parameters; Shell integration....
Hideit HideIt! is your personal data key. With its help, you can easily and reliably hide any files on your home or work PC from outsiders, and unauthorized users. Nobody except you can get access to your hidden folders and files. No one will ever know that you made some of your files invisible to others or even that there is some hidden data. The program itself does not require any installation and does not create any suspicious program files or other attributes that could attract attention and show that you are hiding your data. But how is it possible to hide data without any complicated actions and any professional computer skills or knowledge? The solution is as simple as HideIt! HideIt! creates guarded and invisible space on your hard drive. This space is a private "hiding place" where...
Nlcsystems NLCSystems - one of the most flexible and universal cryptosystems to protect your computer and information. It's flexibility makes it useful for corporate and personal protection at the same time - it uses unique non-linear cryptoalgorithm, which allows us to present this features: *Fast unbreakable premium cryptoalgorithm based on non-linear dynamics. *Support of any file formats. Full OLE features support. *NLC uses newest automatiztion methods for protection - working with protected files never was so secure and simple! *Context menus integration - instant access to any files and program options. *Customizable encryption options - you can manually select between advanced security and speed. *Excellent interface with detailed help. *Support of self-decryptable (SFD) files - you ...
Track Destroyer We all know the risks of exposing your identity and activities while on the computer these days. Worst case, your entire identity could be stolen. Perhaps your boss will uncover that you've been surfing the web when you really should've been working, or your spouse find traces of the adult sites you've been visiting... Sure, you could go rummaging through your entire system trying to manually clean out your files, but what if you miss something? What if you accidently delete a crucial file and lose important data? Don't take the risk. Let Track Destroyer carefully and percisely scan and incinerate incriminating data. Unlike some other privacy protection tools which only delete the files and thus can be easily recovered by some data recovery tool, our Track Destroyer completely remove...
Aqt126 652
Touchlocker TouchLocker1.03 is a manual input locking software. When you leave your work computer for some reason it will automatically hide your open windows and lock the mouse and keyboard to prevent others from modifying your working data.When you want to run some program for long time and don't want others to close or terminate it, you can use our software to lock the mouse and keyboard....
Sticky Password Sticky Password virtually sticks the passwords to programs and WEB pages. You access them quickly and safely. Intelligent feature will find it automatically so you don't have to remember account name to find appropriate password. The passwords are stored in the encrypted database and never appears on the screen. * Stores passwords for all your accounts in the strongly encrypted database * Allows to stick account information to any program window or WEB page and access it in a moment * Ease of use: one program icon and one menu! * Strong password generator * Automated backup passwords database: you can restore passwords at any day and time! * Export passwords to simple text file ...
aqt132

Cryptex 600 Mb Encrypted Vault Protect vital information on your PC with a secure and hidden vault by Cryptex. Feel better knowing that ANY file you lock in the vault will be protected with strong encryption to ensure maximum protection against theft and peeping eyes....
Virtual Personality A professional telephone voice changer utility. High quality natural voice. Works with your PC speakers as well as over a telephone line or internet. Needs only a standard voice modem. Endless of different voices. Supports voice/ bidirectional conversation recording (or any phone on the same lin). 24 pitches and 8 band equalizer. You speak into the PC microphone and the new voice is heard on your computer speakers on the telephone at the other end of the line or through the internet. Ideal for private investigators and for businesses or individuals that wish to filter crank calls. Unlike hardware based products and support telephony, and software products that support only internet this innovative product, supports all media types - telephony, cellular and internet. No one will recognize ...
Virtual Personality A professional telephone - internet voice changer voice changer utility. High quality natural voice. Pitch and frequency independent controls. Works with your PC speakers as well as over a telephone line or with internet applications like yahoo chat. Works with the PC speakers as well as over a telephone line with a special telephone adapter. Doesn't need any modem for telephony. Voice file manipulations. Supports Windows 95/98/Me/NT/2000/Xp. You speak into the PC microphone and the new voice is heard on your computer speakers or on the telephone at the other end of the line. Ideal for private investigators and for businesses or individuals that wish to filter crank calls. Supports 24 individual voices recording. No one will recognize you , not even your own mother. You can cause your ...
Aqt126 652
S O S Automation Baby - Medical monitor and alarm system. Implemented in software on a home PC. Constantly monitor the surroundings and call you upon emergency, by means of the telephone and also sends you sms and email messages. Upon an alarm event it enables you to monitor through th telephone, the PC surrounding in real time, (sometimes also talking back to the monitored target), and broadcast live audio/video through the internet. It supports Windows 95/98/Me/2000/XP and demands a voice modem mode, microphone and speakers. Its installation is extremely simple and takes a few minuet. S.O.S.Automation serves also as a standard automatic answering machine. This enables S.O.S.Automation to share any telephone line with any other use. S.O.S.Automation supports also be directional communication. You can ca...
Dataguard ...
Visual Ip Trace Trace IP addresses and web sites. Use Visual IP Trace to trace and report hackers, see the geographical locations of websites and IP addresses on a world map, get detailed information about the registered owner of a web site or IP address....
Spotauditor SpotAuditor reveals passwords saved in Internet Explorer, recovers ICQ, Far ftp, Dial up, Outlook and MSN messenger passwords, IE Auto Complete Fields. It is a program for viewing and cleaning the secret data stored by Internet Explorer. SpotAuditor allows deletion of unwanted entries from the system protected storage. The program also explores Outlook Accounts, Visited URLs, Installed Programs and Start Run Programs on a local machine or remote computers. SpotAuditor allows to clear Internet Explorer history, delete cookies and temporary internet files. You can recover and restore any lost or forgotten password ever entered in Internet Explorer. If you forget your passwords or need to access some passwords or confidential information stored in your computer, SpotAuditor can really help yo...
Privatefirewall Privatefirewall 3.0 is a Personal Firewall and Intrusion Detection Application that eliminates unauthorized access to your PC, at home, the office, or on the road. Privatefirewall also constantly monitors the sensitive areas of a PC where intrusion can occur and reports on their status allowing users to take appropriate action. Privatefirewall is easy to install/use and provides reliable and high-performance protection right "out of the box". Privatefirewall's intuitive interfaces allow advanced users to easily adjust default settings to create custom configurations. Features include: Internet traffic (packet) filtering, port scanning, IP tracking, SecurePOP email protection, and a proprietary Application Control Engine, which monitors all applications that access the Internet to furth...
Aqt126 652
Mr G File Encryption The security of your file is very important.Mr.G File Encryption used the newest encode algorithm,supply you the safe encode and decode function.Now,you will not worry about your work being peeked and stolen.Mr.G File Encryption can encode any length and any type of file.The encode algorithm was impossible to be reverse. It was very stable and easy to use.There is a very convenient function that Mr.G File Encryption supply. You can generate a key.exe for you encoded file, put it in your flash disk. when you want to decode your file, just run the key.exe in your flash disk. So you don't have to remember the password, or input it.Just with the key in your flash disk,and the encoded file in harddisk,even without need of the main program, you can take your secret to antwhere with no worry.The ...
Wipeout Pro Wipe your browser history and optimize your drives automatically. WipeOut is a privacy-enhancement, system-cleanup, and tuning tool that suits novices and power users. Securely wipe free space, clear cookies, temporary Internet files, and file-access history from the registry and recent folder and a significant amount of unnecessary registry entries. Once the cleanup is complete WipeOut Pro will cause the system defragmenter to defragment your hard drive(s). WipeOut Pro will do all this automatically when you shutdown your computer and turn your computer off for you when it's done. Customization features include: adding additional directories you want to wipe, additional registry keys you want to clear, cookies you want to keep, wipe files in the recycle bin, clear the swap file, choose ...
Snooptrap Based on award-winning technology. Access your private data instantly. SnoopTrap is unlocked via answering a question that you provide yourself and can change or edit at any time. For instance, you could make SnoopTrap ask you "What is the meaning of life?". Your customized answer could be anything that comes to your mind. This makes it easy to remember your question, and virtually impossible for others to guess what the answer is....
Encrypt Decrypt Pdf Encrypt Decrypt PDF allows you to Encrypt and Decrypt protected Adobe Acrobat PDF files in batch mode. With this software, you may freely secure your PDF files from being printed, changed, copied, extracted, signed, filled, assembled and/or merged, and you also may remove the password of your PDF files, if you already know the owner or user password. All versions of Adobe Acrobat are supported. Features: Does NOT need Adobe Acrobat software; Encrypt decrypt PDF files in batch; Supports PDF 1.5; Supports Adobe Standard 40-bit encryption and Adobe Advanced 128-bit encryption; Password protect opening of the document; Prevent printing of the document; Prevent copying of text/graphics; Prevent changes to the document; Prevent changes to form fields a...
Aqt126 652
Elite Keylogger Elite Keylogger is the best selling surveillance software for monitoring and recording every detail of PC and Internet activity everywhere: in your home or in your office. Elite Keylogger includes several integrated stealth modules that record: chats, instant messages, emails, websites visited, absolutely all keystrokes, each and every program launched, all passwords and even Windows logon password, usernames and time they worked on your computer, desktop activity, clipboard and more. Elite Keylogger is your only complete privacy fortress that will protect your PC and inform you about every keystroke made! Elite Keylogger provides the equivalent of a digital surveillance history so that you can see exactly what your family members, neighbours, employees or other users are doing on the co...
Mcafee Virusscan 2005 Stop viruses and keep your PC safe with McAfee VirusScan! VirusScan is an easy-to-use antivirus solution that ensures your PC is protected from viruses, worms, Trojans, spyware, web dialers, and other malicious threats. VirusScan stops threats coming from email, instant messaging, shared files, and more....
Handy Keylogger Handy Keylogger - superior stealth keystroke recorder for PC surveillance! With Handy Keylogger you can: record key strokes, capture desktop activity, monitor internet usage, log chats and emails, monitoring applications and windows users work with, record instant messengers, capture passwords, send logs via e-mail, install keylogger on any Windows platform and more! Handy Keylogger will record all keystrokes typed secretly, completely undetectable to the user! The Keylogger will also capture international keyboards and major 2-byte encodings and character sets! Handy Keylogger will record all passwords typed on your keyboard and store the information into highly secure logs only you can view. Additionally, our Keylogger will capture passwords even if they are masked differently from "*" o...
Quick Keylogger Quick Keylogger - Perfect Invisible Family Keystroke Logger for PC surveillance! Software for PC surveillance has become extremely popular recently, additionally, it is really important for many users and PC owners. Quick Keylogger is a very powerful and easy to use solution for PC surveillance. Quick Keylogger is easy-to-use, very simple and small. Quick Keylogger is extremely compact, still being award-winning tool. With Quick Keylogger you can easily record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode and is completely undetectable spyware: you will not see it in processes list, registry, Add/Remove Programs utility, anywhere. Quick Keylogger includes what many consider to be the BEST key logger engine on th...
Spamfighter Pro If you are looking for a Outlook Outlook Express tool to remove spam from your inbox, look no further. SPAMfighter is the tool you are looking for. Simple, reliable and efficient. A lot of anti-spam products rely on filters and other rule based technologies, but spammers work every day to stay out of these filters. What works one day doesn't work the next. SPAMfighter works completely different. SPAMfighter is using the power of a very large community of people that instantly report if they receive a spam mail. When several people have reported the same spam mail, it's automatically filtered for the rest of the community. In this way very few people in the community will ever see the spam mail. On top of that a lot of spam is filtered before it ever hits the community, but how we do th...
Aqt126 652
Password Tracker Deluxe Password Tracker Deluxe allows you to safely and securely store and organize your passwords, usernames, and associated notes. Password Tracker Deluxe version 3.0 now has "Autoscan", the ability to continuously monitor your system to insert usernames and passwords automatically, without any user action! This latest release retains the simple and easy-to-use interface of previous versions, but has added powerful features like autoscan, auto program launch, and random password generation! An unlimited number of users can each store individually password-protected lists. The flexible notes field can store just about any type of information you need to keep secure, such as PIN numbers, credit card information, safe combinations, etc. In addition, Password Tracker Deluxe can be used to automatic...
Keylogger Express Keylogger Express is an easy to use utility to stealthily record every keystroke on your computer. It allows you to secretly monitor and record all keystroke activities (eg. email, online chat, password) of computer. The full version software runs invisibly and automatically start itself every time your computer is started....
Callerip CallerIP monitors activity on open ports on your system, which are often not protected by firewalls, and identifies backdoors that could allow harmful Trojans to steal your confidential information. Automated alerts instantly notify you of a backdoor threat. Worldwide WHOIS lookups show domain and network contact information for IP addresses, including abuse reporting information. Connections to your system are provided in real-time, including the connection time, remote and local IP address, country of origin, remote and local ports being accessed. For Windows XP systems, the process ID is also identified, which helps determine if it is a legitimate process or may be harmful. A simple click on an IP address shows you where the connection originates on a global map, along with domain an...
Keylogger Express Pro Keylogger Express 2.01 can record ANY and EVERY keystroke on your computer. Also, it has a built in uninstaller which can help you to uninstall the software as easy as click a button. Keylogger Express 2.01 is a good tool to make you know what happened to your computer when you are away. It runs invisibly and automatically when your computer is started....
Aye Parental Control Aye Parental Control helps parents restrict the time that children spend on computer and Internet. It is the utility for home PC that enables a parent regulate When and How-much of children's time that can be spent on the computer whether it be playing games or surfing the Internet. It also has the ability to block access to specified programs and websites. Features: Define at what time and for how much time your children are allowed to access the computer an internet. Offer two time options: Parents can define a specific time period or an accumulated time amount. Support all kinds of internet connections. Restrict children modifying system time. Forbid children to bypass/shutdown/delete the software. Block the specified programs and websites. Monitor the activities of Internet Exp...
Aqt126 652
Armor System5 This professional package is designed to give you some of the most powerful encryption tools on today's market. Armor System5 (ARS5) comes loaded with 40 most secure and popular encryption algorithms world has to offer. Protect your documents from unauthorized use, send email that only selected people can read, and compose your own encrypted documents. You can be ultimately in charge of the level of security you want. ...
Aptpassport In this data driven age there is an ever growing requirement for us to keep secure control of all the P.I.N.s (Personal Identifier Numbers) that we are presented with for accessing our personal accounts. These accounts may be from web sites that require a simple ID/Password, online Banks that require several additional Question/Answer combinations, to many other types of non-web related secured data. For example - Keys for software installation, mobile phone PUKs, - the list goes on and on! So whether we like it or not we have all these PINs that we have to keep secure, yet it is also important that they are quickly accessible and easily deployed. (One-click automated login for example.) AptPassport delivers on all fronts and is the cost effective solution that gives you peace of mind ...
File Destroyer With Full Resell Rights ust add files, select how many times the data should be wrote over and shredded before it is permanently deleted from your computer. Powerful and Very easy to use. SUPER BONUS: Order now and receive MASTER Resell Rights so you can sell Password Saver and keep 100% of the profits! ...
Security Task Manager Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. You can choose to terminate any process, delete it, or alternately quarantine it, which will disable it from running again without actually deleting it. If you buy Security Task Manager you get the software SpyProtector for free. SpyProtector contains tools to protect your computer from keylogger, spyware and trojans. SpyProtector deletes traces of your Internet and computer activity and prevents keyboard input monitoring. Furthermore SpyProtector warns you when the registry is changed....
Hidefolder 3 Hide Folder is a secure and user-friendly program for password-protecting users important files, folders and discs. It prevents unauthorized access to everyones sensitive information and programs. The software makes the protected folders completely invisible, inaccessible or accessible in the read-only mode. Protected folders and their contents are prevented from being renamed, modified, deleted, copied, moved, accessed or even seen on the system. Hide Folder 3.1 lets user specify some selected programs that are still allowed to access the protected areas (such as virus scanners, disk drive utilities, etc). ...
Aqt126 652
Disk Password Protection Disk Password Protection 4.0: a comprehensive suite of hard-drive protection/access restriction tools. Protect your disk/partitions with a password, ban all reading/writing activity, limit launch of specified files to authorized personnel only, etc. Disk Password Protection 4.0 offers users the option to choose what kind of protection they need. First is the Boot Protection. When chosen, any unauthorized person will not be able to boot a computer without entering the correct password. The program also offers Partition Protection. Any person can chose to have one or several partitions where all confidential information is stored. When protection is activated, the partition will be invisible to the operating system and the disk space taken up by sensitive data will appear as free disk spa...
Disk Password Protection Disk Password Protection 4.0: a comprehensive suite of hard-drive protection/access restriction tools. Protect your disk/partitions with a password, ban all reading/writing activity, limit launch of specified files to authorized personnel only, etc. Disk Password Protection 4.0 offers users the option to choose what kind of protection they need. First is the Boot Protection. When chosen, any unauthorized person will not be able to boot a computer without entering the correct password. The program also offers Partition Protection. Any person can chose to have one or several partitions where all confidential information is stored. When protection is activated, the partition will be invisible to the operating system and the disk space taken up by sensitive data will appear as free disk spa...
The Pc Detective Pro The PC Detective Pro is a power full spy utility that monitors your PC or multiple PCs over a Lan logging all activity including websites visited, applications run, all keystrokes, chat conversations, Instant messages and regular screen captures all in complete stealth, so users will not be aware of it presence, enabling you to keep track on what your kids, spouse, employees etc are up to on your PCs. It is designed to be used either on a standalone machine or over a LAN where all activity is logged for viewing at a later date and can also be viewed over a network in real time. It also includes a popup blocker, website blocker application blocker and has the ability to run applications remotely over a Lan and to send instant messages to a user over a network. All logging can be emailed a...
Sentry Professional Sentry locks down your computer to keep it secure when you aren't around. Many options are provided - you can customize the appearance of your screen, have your favorite screen savers run from within Sentry, and even take messages from people who may drop by. Sentry can be activated instantly. It can be launched after your system is idle for a specified period of time, by clicking on an icon in the system tray, or by typing in a set hotkey....
The Pc Detective Pro 2 10 Users The PC Detective Pro is a power full spy utility that monitors your PC or multiple PCs over a Lan logging all activity including websites visited, applications run, all keystrokes, chat conversations, Instant messages and regular screen captures all in complete stealth, so users will not be aware of it presence, enabling you to keep track on what your kids, spouse, employees etc are up to on your PCs. It is designed to be used either on a standalone machine or over a LAN where all activity is logged for viewing at a later date and can also be viewed over a network in real time. It also includes a popup blocker, website blocker application blocker and has the ability to run applications remotely over a Lan and to send instant messages to a user over a network. All logging can be emailed a...
Aqt126 651
Hide Folders Pro Hide Folders is an access control utility that allows you to hide your sensitive folders out from users and applications. You need only to select folder(s) you wish to hide from prying eyes and click a button to hide these folders. ...
Advanced File Encryptor Advanced File Encryptor uses the AES 256-bit encryption algorithm to encrypt your files. It installs onto the context menus in Windows making it easily accessible for all files and folders. In addition to encrypting and decrypting files, Advanced File Encryptor can also make self-extracting encrypted files. This feature would be helpful if you need to e-mail an encrypted file to a friend or colleague who does not have Advanced File Encryptor. Also, Advanced File Encryptor contains a secure delete feature which insures deleted files are really deleted. Files that are 'wiped' are not recoverable. With Advanced File Encryptor your private files remain private and your deleted files will in fact be deleted....
Hide Folders Xp 2 Select unlimited number of folders and files of your choice to hide and protect by a password. In one mouse click your selected folders became invisible: it is impossible to find hidden folders, access any file in them and remove them (even when removing upper-level folders). You may leave your computer unattended without worrying if someone will access your private data. Then just run the program and enter your password - your hidden folders will become visible instantly....
Access Boss Attempting to understand how the inside magic of Windows administering works may be a challenging task even for an experienced administrator. Needless to say, smaller companies that cannot afford hiring a dedicated tech guy to manage administrative rights on corporate network PCs are becoming victims to this circumstance. Introducing Access Boss, the unique easy-to-use tool that enables person in charge of access rights restriction in corporate environment make his job without having to be a computer genius! All you have to do is install Access Boss on machine under Administrator account, run the program and choose which users access time should be restricted. To do so you simply mark the required hour(s) of any day of the week as either allow or deny. It is all that simple! Once you appl...
Aqt126 651
Watchman Watchman is now the tool of choice for protecting your system in a reliable way. With a simple interface, Watchman delivers file protection, application usage logging, and access control management. Simple and productive: - Stops unwanted applications - Protects system settings - Protects documents from tampering - Monitors application usage - Sends security alerts by e-mail Install and forget about it! Watchman runs silently in the background, keeping your system safe from unauthorized eyes at all times. Make sure your system is always protected with Watchman, a powerful and easy-to-use security tool for Windows....
Lock My Pc Lock My PC allows you to lock your computer with a password while you leave it for a time. It shows a lock screen, disables Windows hotkeys and mouse. You can use a hotkey or the system tray to lock your PC. To unlock the computer you must enter correct password only. The program can log invalid entry attempts and has option to keep your PC locked even if power failure occurs or someone switch it off and on....
Strong Encryption Package Strong Encryption Package is an add-on for Stealth Encryptor and Private Pix. Seven additional encryption types including AES-Advanced Encryption Standard (Rijndael), Mars, Blowfish 448 bits, 3DES, Twofish, Serpent, Skipjack....
The Pc Detective Se The PC Detective SE is a power full spy utility that monitors your PC logging all activity including websites visited, applications run, all keystrokes, chat conversations, Instant messages and regular screen captures all in complete stealth, so users will not be aware of it presence, enabling you to keep track on what your kids, spouse, employees etc are up to on your PCs. It is designed to be used on a standalone machine where all activity is logged for viewing at a later date or can be emailed at regular intervals for your viewing elsewhere. It also includes a popup blocker, website blocker application blocker....
I Cipher Ap Extremely fast and reliable image file encryptor/decryptor with build in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection against an unauthorized use or theft. Only person with a correct encryption code can decrypt images back to their intelligible form. ...
Aqt126 651