Activeactions Personal License ActiveActions is an launch tool that also acts like hotkey manager. You can launch documents, links, open folders or desktop objects and do any thing of this type with just one keyboard click. This program can be used as assistant in email creating (inserting standard phrases into mail clients, chat clients and so on ...), programming, for easy access to daily Windows function (like, exit, logoff, hibernate and more). It also helps you to surfing internet using quick access to your favourite bookmarks. ...
Alchemy Remote Executor Execute programs on remote network computers. Network Administrators use this software to manage network workstations and servers, install patches, run diagnostic utilities, etc. without leaving their own workplace....
Server 2000 Server 2000 will manage your list of Servers and leave you with lists of servers that are all still alive. This can be useful for making sure that all of your web sites are still active, or that all the computers on your network are responding. The amount of uses really is endless! ...
Select A Net Select-a-Net is a Windows utility for managing multiple network and web browser configurations. Select-a-Net makes it easy to switch among, as well as backup, various network configurations. Whether you're a laptop user on the go or are constantly re-configuring desktop computers on a network, Select-a-Net can ease the process and save you time. You can use a Select-a-Net configuration file created on one computer to initialize the network and browser settings on another computer. Select-a-Net can be optionally run in the Windows system tray making it quick and easy to switch configurations on the fly. Select-a-Net not only makes it easy to switch among multiple network configurations it also offers an easy solution for backing up your current network and browser settings, making it ...
Here Is Your Ninepence A tool used to monitor a server's status to see if it is running. Program can handle multiple servers and multiple ports for each server. Program will notify you via pop-up and/or e-mail when it finds a problem....
Adregcln AdRegCln helps You to wipe out the garbage from Your system registry....
Image Printer Driver 95 98 V2 Source Code Upgrade For registered owners of the V1.0 or V1.1 Image Printer Driver for Win 95/98. V2.0 driver adds support for color printing, multiple resolutions, various paper sizes including a custom paper size, and external control of the print file from an application....
Planet Jupiter 3d Screensaver Jupiter is twice as massive as all the other planets of the Solar system combined. At the same time it rotates faster than any other planet - in less than 10 hours. Its low density indicates that the planet is composed primarily of the lightest elements - hydrogen and helium. Colorful latitudinal bands, atmospheric clouds and storms illustrate Jupiter's dynamic weather systems. The planet is well-known for "The Great Red Spot", a complex storm moving in a counter-clockwise direction, across the planet. Jupiter is encircled by at least 61 satellites and a series of thin rings which makes it similar to a miniature solar system. When viewed through a modern telescope, the flattened disk of Jupiter has a pearly color with bands of pastel browns and blues. But you will get a much better view...
Santa Clock Screen Saver A Santa is displayed in a nice desktop clock that displays the time that is set on your computer. Here comes santa clause plays once in the background and then stops. A nice screensaver to have for Christmas....
Powerplay Power Play with the mountain lion. 35 action photos of the beautiful and graceful queen of the mountains. Music accompanies. ...
Awesome Deep Space Screen Saver 800x600 A photo slideshow screen saver with beautiful photos of deep space objects by the Hubble Telescope. All images are scaled for 800x600 (a 1024x768 version is also available, see our web site) . Other screen saver features include transition effects, black white mode, password use, and extract photos as wallpaper, including built-in wallpaper cycling every hour or every day....
Alertmobile Pro AlertMobile Pro™ is a special software for computer security incidents responce. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and handles responce commands. AlertMobile Pro™ has the following features: - Recording of user logon name, date, time and computer name; - Monitoring of active tasks list; - Handling of critical programs list; - Sending of SMS alerts to the security administrator's mobile phone; - Receiving of control commands from the security administrator's mobile phone; - Protection from unauthorized external access. AlertMobile Pro™ can be used by security administrators for control of the corporate security policy, by parents for monitoring of their children computer activity, or by anyone el...
Neat Install
Securewallet Passwords are a part of life! Just about everything - your ATM card, your house alarm, your calling card - requires a password. The PC is no exception. These days, not only must you remember the log-on code for your ISP account but also the user names and passwords for the many Web sites that require registration. The solution to this mess is a SecureWallet. SecureWallet saves all your passwords securely in an encrypted file so that you never forget any password again. The encryption is done by strong encryption algorithm. All passwords can be sorted by categories. Search, Export and Import are also present. SecureWallet main window displays a list of protected applications and user names. When you open an entry, you can view notes, instruct the program to generate a random passwor...
Point Lock Pro Registration Point Lock PRO allows you to set protection for your computer system and data. It guards your system against data leaks to snoopers and unauthorized users both on the Internet and on your local area newtorks. Also, prevents unintentional deletions and modifications to your protected files caused by operational mistakes or malicious intent by unauthorized users. All you need to do is select the data or programs you want to prevent access and no one else will be able to view the data or run the program without your authorization. Point Lock PRO for Windows offers an effective protection of your private data and makes it easy to safely manage access to your system and all of its components. With state-of-the-art technology, businesses and individuals can effortlessly protect their systems, d...
Point Lock Pro Upgrade Point Lock PRO protects computer systems and data, blocks data leaks and prevents unintentional deletion caused by operational mistakes and/or inappropriate applications. All you have to do is select the data or program you want to hide/lock and no one else will be able to access the data or run the program without your authorization. Point Lock PRO for Windows offers an effective protection of your private data and makes it easier to safely manage access to your system and all of its components. Using the state-of-the-art technology, businesses and individuals can effortlessly protect their system, folders, and files against deliberate or accidental misuse....
Masking Password Generator Pro An industrial strength password or number generator for the individual home computer user or the large corporation or organization. Generating strong, difficult-to-crack random numbers or passwords has never been easier! Create one or many millions of passwords using simple wizards or a complex and very flexible masking syntax. Generate extremely obscure passwords, pronounceable passwords, or even passwords derived from words of the included dictionary. Have the generator obscure them as much or little as you like so they are very secure but still easy to memorize. Define a mask that incorporates your company security policy and generate passwords as often as you need without any more worry about password policy compliance. The program can reside in the Windows system tray, with a ho...
Goof Ball
Spylo Pc Monitor Spylo PC Monitor is the award-winning and highly flexible security monitoring software used by parents, business organizations, and for the tasks like testing of usability or studies of PC usage. So what is the way you know what your staff (or family) are doing on your computer? This software tells you exactly who is doing what on your computer and at what time. This stealth-monitoring utility provides you the information about every runned application, every keystroke, stored password, established internet connection and takes a screen shots of these events. Program logs are extremely compact - screen shots are JPG compressed, monitoring eats very small amount of processor time and monitor is invisible to user - it is not shown by Alt+Tab or in system tray. ...
Shatterbox Shatterbox is an easy to use utility for hiding or destroying sensitive files. Many people don't realize that when files are deleted from a computer they can still be recovered from the hard drive. Shatterbox eliminates that possibility by destroying the structeral data of files and then permanently removing them from the system. Files destroyed with Shatterbox can never be recovered. Shatterbox also has the ability to hide files on a system without affecting the actual data. Files hidden with Shatterbox are extremely difficult to locate and even if found, could only be restored by select, experienced individuals. It takes mere seconds to perform operations with this smart utility. The peace of mind that comes with it lasts much longer....
Sleuthwatch 4 5 SleuthWatch 4.5 is the newest version from SonnarSoft. It's user friendly and now network compatible so you don't even have to leave you chair to see what someone else in the company has been doing! Just run SleuthWatch 4.5 at any time and it will capture the screen at your time choosing! Sleuthwatch 4.5 also includes keylogging that will capture every key that is pressed on the keyboard! You can then come back at any time and search through pictures and the key log using the SleuthWatch Image Viewer and the Key Log viewer that allows you to search for different key words. ...
Lockout Desktop Security Educational Version This is an Educational user licence(s) for Lockout Desktop Security...
Gfx Alchemy
Journal Safe 2001 Journal Safe 2001 allows safe storage of personal information via encryption and decryption techniques. With customizable Encryption Keys the possibilities are limitless when it comes to data protection. Journal Safe 2001 also incorporates spell checking features with customizable dictionaries for accurateness. Security Features can be adjusted from non-existent to paranoid with the ability to keep security logs for failed log in attempts. Journal Safe 2001 also maintains all entries in a central file for easy backup and recovery. Complete Help pages included for additional assitance....
Spycamera Do you want to know what is going on in your computer while you are not using it? Do you want to know which sites visit your subordinate? Are you curious with whom your girlfriend in correspondence? Do you want to control of access of unwanted Internet sites by your kids? Why sometimes when you did not use your computer for a sometime you might find some changes in the computer and who did it? In those cases you need this program. The SpyCamera starts together with Windows. SpyCamera is not visible for other users, nobody knows that the program exists!!! Important:that program is not shown itself and you will not find it by pressing Alt-Ctrl-Del in the task list!!! No way to discover the program in your computer! It works as long as computer works but it is activated only in programmed tim...
Cryptup Encryption of your private data: files, pictures, reports, etc. is the only way to protect them from prying eyes. Not only that! Say you want to send one of those files as an e-mail attachment and don't want anybody but the recipient to see it? CryptUp can do all this for you and more! And it does it very simply at a mouse click in the Windows Explorer. It also 'shreds' the files you delete. The shredded files will be irremediably and definitively destroyed, whatever the means, existing or to come, used to try to restore them (specifications of US DSS (Defence Security Service) Industrial Security). Don't be mistaken by Cryptup look and size; it is a very powerful tool, with encryption keys up to 2,048 bits. Written in 'pure' C language, it is very compact and fast (no unnecessary huge...
Lockout Desktop Security Business Version This is a Business user licence(s) for Lockout Desktop Security...
Password Manager If you have many accounts of username/passwords, you always lost password, this tool will help you a lot, A hot key will activate it when needed....
Getwebpics
Onlyme OnlyMe automatically locks your PalmOS device whenever the device is turned off. OnlyMe is fast, easy, and secure. If you misplace your device, OnlyMe ensures that no one reads your information. Since OnlyMe locks your device whenever the screen is turned off, you do nothing special to ensure the privacy of your information. OnlyMe is designed to let you turn on your device as easily as possible. Entering your password can be as easy as making one quick gesture with your stylus or finger. And your device returns to the state that it was last in. No need to switch applications! OnlyMe is more secure than the device's built-in operating system security facility! Now includes German language program version. Now PalmOS v5 compatible....
Paragon Disk Wiper Personal Are you selling, discarding or donating hard disk? Paragon Disk Wiper allows safe recycling of hard disks. It erases data on your hard disk - you can feel certain that all personal information is eliminated - including partitions, folders, directories, files, file tables, dynamic drive overlays and master boot record information; all viruses including master boot sector viruses. Easy, quick and safe Disk Wiper fits on one bootable diskette. You only need to boot the computer with it, specify erasing parameters and begin wiping. Graphical wizard interface will make this process ease. Paragon Disk Wiper can erase the data overwriting it in one pass, or in multiple passes. This ensures eliminating of data....
Paragon Encrypted Disk 3 X Protect private and sensitive data from potential unauthorized access. No matter what is your particular needs, protecting your data on computer, sharing one computer between several persons or secured transfer of data to friend, co-worker or boss, Encrypted Disk will help you to fulfill your tasks. Official product page: http://www.paragon-gmbh.com/index_ed.htm...
Virtualstream Library offers compression, encryption, and hashing by several algorithms; automates all routine operations; and tracks all errors with any data or files on disk and in memory. It is highly optimized for 32- and 64-bits and includes optimization for perfomance, speed, and memory usage....
Secura Secura is a full-featured file manager similar to Windows Explorer. However, the biggest difference is that this program provides a completely secure environment for data and documents on your system. It's capable of encrypting files and locking folders, thus making them inaccessible to other users. Like Explorer, Secura supplies its very own shell context menu. As you browse your hard drive, simply right-click an item and select the appropriate protection option from the menu. The program gives you the option of preventing Explorer from displaying these items. Meanwhile, files and folders are stored inside tabs on the interface, which require passwords for entry....
Fx Resound Movie Audio
Paragon Disk Wiper Professional Are you selling, discarding or donating hard disk? Paragon Disk Wiper allows safe recycling of hard disks. Disk Wiper erases data on your hard disk - so you can feel certain that all personal information is eliminated. It's easy, quick and safe. Professional version of Paragon Disk Wiper is intended for use by IT specialists in various companies. They could be technicians in computer repair services or computer leasing companies, IT technicians relocating computer hardware in large company etc. Paragon Disk Wiper features: New features: - WinXP support; - new NT/2k/XP fdisk; - refresh function; - set label function; - scripts under Windows; - New installation program (created with IS 6.31). Boot up and wipe Disk Wiper fits on one boot...
Leviathan Pc Firewall The Leviathan PC Firewall is an application which will prevent hackers from accessing your computer, it will monitor and log activity on certain ports (which can be customized) and has other features including Keep Alive to maintain your connection....
Xp Protector XP-Protector is security tool for Windows XP and Windows 2000. It provides easy and comprehensive access to many security features of these systems, so that home users without experience with administering computers can take advantage of their improved security features. ...
Cryptofish CryptoFish is encryption utility that you can use to encrypt/decrypt files and folders to protect them from unauthorized use. CryptoFish uses a 448 bit Blowfish algorithm. It is very easy to use. It will add "Encrypt with Cryptofish" command to the context menu that appears when you right-click a file in Windows Explorer. It also has built-in key manager and temporary "key memory". ...
Pocket Excel Password Recovery Pocket Excel Password Recovery is a program to recover lost or forgotten passwords for Pocket Excel files. All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Ftp Control
Dochrana DOchrana is a utility which will hide the Cancel button from login dialog in Windows systems. If a user does not have account (profile) on your computer, DOchrana will not allow him/her to log-in. DOchrana also adds Exit button to the login dialog so that it's possible to shutdown the computer without logging-in....
System Monitor Detector System Monitor Detector is an application to help you determine if you are being monitored by any kind of system monitor or spyware program. SMD does this by presenting you with several tools that will help you detect these kinds of programs. SMD, unlike most other application of this sort, does not rely on lists to detect system monitors. Instead it works to help you detect them wich is a much more reliable method......
Windefender WinDefender is a tool that you can use to secure your confidential data and protect your files and folders on computers running Windows 95/98/ME. It provides real-time protection and security service with strong encryption. Once you encrypt your private folders then can use them just all others, non-encrypted ones - files will be decrypting 'on the fly'! For any required files and folders you can assign access right, i.e. make it read-only or hide, for example. WinDefender works well and provides lots of security options....
Burybury BuryBury lets you manage your personal files and keep them out of sight of others. 'Others' would be spouses, kids, bosses etc. All files are securely encrypted, renamed and buried on your hard drive. Prying eyes cannot determine the true nature of your files by titles, length or extension name. The familiar Windows Explorer interface is used (with password protection) so that it appears (to you only) that all your 'special' files are visible (even though they are really buried). A simple click can 'unbury' a file or a whole folder tree. All data is strongly encrypted using the TwoFish algorithm. BuryBury comes with a Tutorial and Help file and is for Win95/98 and WinNT/2K. Download from http://www.winsite.com/bin/Info?1000000034624 ...
Real Passwords Ever tried to think of a good, yet easy to remember password? Ever tried one of those password generators that give you impossible to remember passwords such as D!bx%79Yh? Real Passwords generates passwords out of real words so that they are easy to remember. However, if you get an irresistible desire for those cryptic passwords, Real Passwords can do those as well. Real Passwords can generate thousands of passwords very quickly....
Frozen Icons
Access Workgroup Password Recovery Access Workgroup Password Recovery is a program to recover lost or forgotten passwords for MS Access workgroup files. All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Mouse Trap Mouse Trap is a powerful security tool for Windows 95, 98, NT, 2000, and XP. It traps your mouse in place until you enter your password, while disabling system keys like Alt-Tab and Ctrl-Alt-Del to prevent tampering. It can hide itself in the system tray until you need to use it; it can also be configured to trap the mouse on system startup or at a certain time of day. New for version 4.0: can be set to release the mouse at a certain time of the day, can automatically trap after your computer has been idle for X amount of minutes, settings and exit can be password protected, Privacy Screen (Blacks out the rest of the screen when trapped), and much more!...
Outpost Firewall Award-winning solution that provides a superior arsenal of defense against all types of Internet threats. Combines powerful real-time spyware protection with bi-directional firewall filtration so that your online safety is always at maximum. Easy-to-use program will keep your surfing history private and your critical data tightly secluded from outsiders. Program displays network connection status in real time and maintains full history log....
aqt132

Outpost Firewall 50 Business License Agnitum, a publisher of Windows security applications, distributes Outpost Personal Firewall Pro 2.0, a powerful, full-featured firewall for Windows that hides your computer from hackers, detects and blocks intrusions, and quarantines Internet worms and viruses that enter your computer. New features in version 2.0 include the program's ability to auto-configure the correct values for 95 percent of your computer's applications, system, and LAN settings; an intuitive graphical interface that makes it easy to fine-tune Outpost's settings; and Windows Start-Up processing that ensures that Outpost is running and protecting your system before any malicious program can be loaded. In addition, version 2.0 also offers enhanced firewall protection that has earned Outpost top honors in independen...
Flow Pro
Jammer Jammer's powerful protection gives you peace of mind. Its unrivaled multi-barrier system blocks every step an intruder takes with sophisticated counter-measures that protect the Registry, monitor applications and inspect both incoming and outgoing connections by using its amended firewall. As a potent protection device, Jammer is like a cyber fortress defending you from attackers. Dangerous software such as Trojans, Backdoors, Ad-ware and Spy-ware can't get through Jammer's multiple walls. Its system monitor shows clearly and simply what processes are taking place at any moment and every connection made to and from your computer. It is designed so even novice users can easily control its powerful engines....
Outlook Express Password Recovery Outlook Express Password Recovery is a program to recover lost or forgotten passwords for e-mail accounts and Outlook Express Identities. All passwords are recovered instantly regardless of length. Multilingual passwords are supported. ...
Myob Password Recovery MYOB Password Recovery is a program to recover lost or forgotten passwords to the MYOB Accounting files (including MYOB 2005). All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Password Officer Deluxe Password Officer offers a professional solution for all your password issues: generating, entering, storing, securing, changing, organizing, transporting and accessing. Security coupled with convenience: the strongest possible encryption, secure database of your most valued secrets, automatic logon to applications, servers, information systems, terminals and web pages, quick search, smart-card support. Now you can be more productive and secure. -universal Single Sign-on solution -fully handles logon to web-pages -fills in the URL, forms, clicks to buttons -detects and fills in any program window -automatically runs programs -allows to define and run keyboard macros -one-click to your favorite password -quick search for right password -complex, yet easy to use stylish interface...
Id Bank Passwords can be trouble especially on the Internet. You may have too many to remember and if you don't take care someone else will gain access to them! ID_Bank can help solve your problem. ID_Bank is a secure identity and password protection system from Rainbow Innovations. ID_Bank is able to hold your personal information relating to usernames, passwords, pins, login details etc; information you often forget or write on scraps of paper that anyone else can read. Your information is stored in a secure encrypted file, all you need to remember is one password to access it. ID_Bank includes the following features: Store your passwords and ID data in named files, you are not limited to one file that must contain all your data Your data is encrypted using the Rijndael 128 bit encryption ...
Flex Gif Animator
Act Password Recovery ACT! Password Recovery is a program to recover lost or forgotten passwords to the ACT! contact management databases (including ACT! 2005). All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Simply Accounting Password Recovery Simply Accounting Password Recovery is a program to recover lost or forgotten passwords to the Simply Accounting company files. All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Peachtree Password Recovery Peachtree Password Recovery is a program to recover lost or forgotten passwords to the Peachtree Accounting company files. All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Word Document Password Recovery Word Document Password Recovery is a program to recover lost or forgotten document protection and write reservation passwords to the Microsoft Word 2003/2002/2000/97 documents (*.doc) and templates (*.dot). All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Project Password Recovery Project Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Project 2002/2000/98/95 password-protected documents (*.mpp) and templates (*.mpt). All passwords are recovered instantly regardless of length. Multilingual passwords are supported....
Flash Screen Saver Bui
Outlook Password Recovery Outlook Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Outlook XP/2000/98/97 password-protected Personal Storage files (*.pst). All passwords are recovered instantly regardless of length....
Access Password Recovery Access Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Access XP/2002/2000/97 password-protected databases. All passwords are recovered instantly regardless of length. Multilingual passwords are supported. ...
Excel Password Recovery Excel Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Excel 2003/XP/2002/2000/97 documents protected with password for open. The program supports the "brute-force" attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program automatically saves password searching state and can resume an interrupted attack (after a stop, crash, etc.) ...
Word Password Recovery Word Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Word 2003-95 documents protected with password for open. The program supports the "brute-force" attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program automatically saves password searching state and can resume an interrupted attack (after a stop, crash, etc.)...
Rar Password Recovery RAR Password Recovery is a powerful tool to recover lost (forgotten) passwords for a RAR/WinRAR (2.xx and 3.xx) archives. The program supports the "brute-force" attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program is able to resume the previous interrupted attack....
Fireplace Screensaver
Filewipe Option to wipe unused disk space including previously deleted files. Prevent someone from undeleting files and recovering your private data. Multiple files or entire directories can be chosen at one time. Right-click delete feature can be used in Windows Explorer. Works with Windows 95/98/NT/ME/2000/XP. Option to clear your clipboard memory. ...
My Accounts View, print, or transfer your account balances. Keep track of your checking, savings, mortgage, credit card, and other accounts. Holds each transaction and the current balance at that time. Stores multiple account names, numbers, notes, plus automatically calculate balances from your adjustment entry. Sorts by account name. 2.0 includes two free utilities. You can transfer account data to/from your PC. The other utility allows you to view or print reports of your account balances. Also removed the intro/splash screen to speed up program use, added menus UNDO, CUT, COPY, PASTE. Now saves transactions for each account. ...
Procwatch Protect yourself from special spyware, memory hogs, and dangerous programs. Speed up your computer when stopping and/or removing unncessary programs. Warns and shows you the name of a programs as it loads, even if it's hidden from the Task Bar. You can add safe programs to a SafeList to suppress their warnings. A great supplement to firewall software. Also finds the type of spyware which doesn't use a network / internet connection unlike many spyware programs. Protects your privacy from programs which log keystrokes and captures screen snap-shots. Option to terminate suspicious running programs / processes. Easy to use at a competitive price. 1.1 fixed a program error in the unregistered version....
Coba COBA ??™ for Microsoft. Windows. 95/ 98/ ME/ NT/ 2000/ XP is an ultimately invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users' activity on the PC. All data collected by the monitoring are saved to an encrypted log file. The log file can be optionally sent via e-mail to a specified address (or saved to specified shared resource in LAN environment) for further inspection and analysis. ???? ??™ is able to save log files in special database for further analysis and retrieving information by specifying a search condition. New powerful user-friendly log file analyzer is included. ...
4safe Strongdisk 2 8 Server Unlimited 4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected disk a password and/or an electronic key is required. Any documents, tables and databases can be kept on protected disks and can be opened directly from protected disks. No need to encrypt existing disk, StrongDisk will create new virtual encrypted disks for you. The content of protected disk is physically stored in a common file, that enables to make easily backup copies. With StrongDisk you can also: --protect your TEMP folder to avoid secret data leakage through temporary files; --completely delete files with wiping out their contents; --securely shutdown Windows with wiping the swapfile(p...
File Uploader
4safe Strongdisk 2 8 Server 70 Users 4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected disk a password and/or an electronic key is required. Any documents, tables and databases can be kept on protected disks and can be opened directly from protected disks. No need to encrypt existing disk, StrongDisk will create new virtual encrypted disks for you. The content of protected disk is physically stored in a common file, that enables to make easily backup copies. With StrongDisk you can also: --protect your TEMP folder to avoid secret data leakage through temporary files; --completely delete files with wiping out their contents; --securely shutdown Windows with wiping the swapfile(p...
4safe Strongdisk 2 8 Server 40 Users 4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected disk a password and/or an electronic key is required. Any documents, tables and databases can be kept on protected disks and can be opened directly from protected disks. No need to encrypt existing disk, StrongDisk will create new virtual encrypted disks for you. The content of protected disk is physically stored in a common file, that enables to make easily backup copies. With StrongDisk you can also: --protect your TEMP folder to avoid secret data leakage through temporary files; --completely delete files with wiping out their contents; --securely shutdown Windows with wiping the swapfile(p...
Xtyftp Smallest and HIPAA-compliant FTP client. Ideal for fast and secure file transferring and sharing on the Internet. Include HTML page encryption. Features: No installation or setup needed. Security with the embedded NIST standard AES encryption. Multi-thread file tranferring. Recursive folder transferring. Explorer-like user interface....
4safe Strongdisk 2 8 Server 20 Users 4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected disk a password and/or an electronic key is required. Any documents, tables and databases can be kept on protected disks and can be opened directly from protected disks. No need to encrypt existing disk, StrongDisk will create new virtual encrypted disks for you. The content of protected disk is physically stored in a common file, that enables to make easily backup copies and send them through internet. With StrongDisk you can also: protect your TEMP folder to avoid secret data leakage through temporary files; completely delete files with wiping out their contents; securely shutdown Windows with w...
Federation Booker
Boss Everyware A comprehensive tool for monitoring computer usage....
Boss Everyware Site License Educational A comprehensive tool for monitoring computer usage....
Kgb Spy KGB Spy is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists to record keystrokes....
4safe Strongdisk 2 8 Server 10 Users 4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected disk a password and/or an electronic key is required. Any documents, tables and databases can be kept on protected disks and can be opened directly from protected disks. No need to encrypt existing disk, StrongDisk will create new virtual encrypted disks for you. The content of protected disk is physically stored in a common file, that enables to make easily backup copies. With StrongDisk you can also: --protect your TEMP folder to avoid secret data leakage through temporary files; --completely delete files with wiping out their contents; --securely shutdown Windows with wiping the swapfile(p...
Xtycrypto xTyCrypto is a standard light-weighted COM component for ASP, VC++, VB, ASP.NET, etc. xTyCrypto is the HTTP layer implementation of SSL. Features: 1. RSA public key encryption, 2 Standard AES (Rjindael) symmetric key encryption. 3. Digital sigtature. 4. Include sample projects....
Family Forest Descenda
Da Password Recovery Pro When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this feature becomes more of a pain, rather than help. See the password behid the asterisks with this software....
4safe Strongdisk Pro 4Safe StrongDisk Pro enables to keep sensitive data on protected disk in Windows 95/98/ME and NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected disk a password and/or an external key is required. Any documents, tables and databases can be kept on protected disks and can be opened directly from protected disks. No need to encrypt existing disk, StrongDisk will create new virtual encrypted disks for you. The content of protected disk is physically stored in a common file, that enables to make easily backup copies. With StrongDisk you can also: --protect your TEMP folder to avoid secret data leakage through temporary files; --completely delete files with wiping out their contents; --securely shutdown Windows with wiping th...
Password Protected Lock Password Protected LockUp is an excellent system-tray utility you can use to restrict access to your PC. It's attractive, secure, and very easy to use. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and provides a scrolling message that you can edit as you like. You can have the program power down your monitor after a selected period of 'lock-up' time and even set start/stop times for other users to limit their access to your PC. Optionally, it can show LockUp Screen or launch Windows Screen Saver. Also it has special Screen Saver. Besides, it has the network client validation feature for Windows logon. ...
Secure Clean Pc When you work on your computer surfing the Internet, paying your bills online, logging in with passwords, your PC records the information traces of all your actions. For example, the history of all web sites you visited, all the pictures you downloaded, all the pages and text you saw, are recorded by the system. So when you log in next time, you don't need to type the user names and passwords again. The information that you may consider as confidential is kept on your computer unprotected and may be recovered by people with some minimal computer knowledge. In general, this is done for ease of use, but the problem is you compromise with your security by using these features. Possibly, your collaborators or boss would like to access private information at your workplace, that may even affect...
Boss Everyware Corporate License Educational A comprehensive tool for monitoring computer usage....
Family Forest Descendant
Advanced Security Level Advanced Security Level is the best computer security application for Windows-based computers. It gives you an excellent administrative support to control the user access rights for your computer by setting up the desired access control level for each user. You can restrict access to Control Panel applets including Display, Network, Passwords, Printers, System, Add/Remove Programs, etc. You can assign separate system profile folders for computer users providing each of them with own custom Desktop, Start Menu, Favorites, My Documents, etc. Optionally you can hide desktop icons, local and network drives; disable Start Menu items, DOS, boot keys, Registry editing, taskbar, task manager and network access; lock screen with password; and much more. You can apply password protection for Windows...
Statwin Pro StatWin is a comprehensive computer activity monitoring solution for individuals and businesses. It gives you valuable statistics. It lets you analyze how effectively you or your employees are using computers. The software counts aggregate operation time, average operation time per day and per run for a given computer or user. You can even view statistics for a certain period of time - day, week, month or year. StatWin collects information about applications launched, running time, close-down time, names of users. This statistics lets you find out which programs are used most often and learn if any inappropriate software (games, for example) is used in the office. Modem and Internet monitoring features are intended to track time spent browsing the Web. The report shows name of the use...
Password Reminder Password Reminder is easy to install and easy to use. All you need to do to recover a password is just drag the magnifying glass from Password Reminder over the "****" field.It can reveal almost any password in Windows--IE Password,Administrator Password in 2000/NT,Cache Password in 95/98/ME,etc.With this magic tool you can find out your forgotten passwords easily,such as hotmail password,msn pasword,etc.It can even recover Administrator password as long as you have Administrator or System privilege. Features: get the password of Administrator.But make sure you have Administrator or System privilege.Only for Win 2000/NT. reveal almost any password (including AutoComplete Passwords on forms) that is stored in IE, but masked like ****** . get award bios password. earse bio...
Aes Encryption Com Component xTyAESCrypter is a standard light-weighted COM component for ASP, VC++, VB, etc. xTyAESCrypter implements the NIST standard AES (Rjindael) symmetric key encryption algorithm. Features: Efficient interfaces for encrypting/decrypting data....
Blue Tango The Text Scrambler Protect the privacy of your email and workplace documents. Instant download. Encrypts/decrypts all or portions of text or rich text documents. Guards against "robots" reading your web-based mail. Only $16. Blue Tango is the fun and practical way to make your messages discrete. It keeps text, rich text and even portions of messages confidential. And that's important. Blue Tango encrypts plain text (like data in .txt files which have no formatting) and rich text (like data in .doc, .rtf, or HTML files which have formatting such as fonts and colors). You create the text and then scramble all or portions of it using a password of your choosing. Recipients can unscramble the encoded portions as long as they know your password. It is intended to be an easy-to-use, low-cost, secure alte...
Ezgourmet Soup Cookboo
File Securer Software File Securer is a powerful tool designed to protect your sensitive folders and personal files. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally. With exceptional easy of use, File Securer let you be enabled to hide your folders and files any where. The locking and unlocking object function are integrated with system pop menu. It's so easy, selecting object, clicking right button of the mouse, then clicking 'lock' or 'unlock', that's all. If someone want to access you locked object, the system will say "Sir, give me you password please!", and the tools will record all the error password and win-user, then report to you....