1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
|
A program for recovering lost or forgotten passwords for RAR/WinRAR archives. Supports the customizable
|
|
|
FastWiper is a powerful wiping utility
|
|
|
Running minimized to an icon in the System Tray (or even invisible at all), HotCrypt lets you make text within any window unreadable for other people. You just press a hotkey, enter a password - an...
|
|
|
Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for MSN Instant Messenger. It is completely integrated into this program, allowing users to encrypt outgoing messages a...
|
|
|
Folder Password Expert is a software tool that lets you restrict access to the folders that contain your sensitive data. When folders are password protected and locked, their contents cannot be rea...
|
|
|
NETObserve 2.0 is a powerful, discrete remote web based surveillance and administration suite. It includes the ability to monitor Internet chat conversations, websites visited, windows, applicatio...
|
|
|
ViewRemote lets you record everything that happens on your computer and view it remotely, from any internet-connected computer in the world. ViewRemote records keystrokes, screenshots, and applicat...
|
|
|
WinForcer prevents other users of your PC from running programs or control panel applets that could damage the PC. You decide what they can or cannot do. Hide the desktop and Start button, Block ac...
|
|
|
PrivyPad is a text editor that can be used to create and edit plain (unsecured) or encrypted (secured) text files, as well as to E-Mail secured or unsecured messages and attachments.PrivyPad uses a...
|
|
|
Boss Everyware gives a clear picture of how a computer isbeing used. It secretly logsprogram names, window titles,visited URLs, user names, andkeystrokes. With its ReportManager, Boss Everyware als...
|
|
|
ICQ Password Recovery 2.0 can recover passwords to any version of ICQ. Just select the .dat file of the ICQ user and the username and password will instantly be decrypted. Tested on all ICQ versions.
|
|
|
View, print, or transfer your account balances. Keep track of your checking, savings, mortgage, credit card, and other accounts. Holds each transaction and the current balanceat that time.Stores ...
|
|
|
If you have many accounts of username/passwords, you always lost password, this tool will help you a lot, A hot key will activate it when needed.
|
|
|
NetVizor is a powerful, award-winning, monitoring and supervising solution for the corporate or personal network. NetVizor allows the administrator to monitor their entire network from one CENTRAL ...
|
|
|
A program to recover lost or forgotten passwords to files/documents created in Microsoft Office applications (all versions up to 2002/XP): Word, Excel, Access (including user-level passwords and ow...
|
|
|
Setting Database Userlevel security for Access Databases have always been safe ways of securingsensitive data. But chances are that in many a times, the owner who set thepassword forgot it or is no...
|
|
|
MacDetective is a smaller, powerful keystroke logging application for the Macintosh! MacDetective is one of the only working applications available for the Macintosh that allows you to record discr...
|
|
|
An advanced encryption utility which integrates into the Windows Explorer ...
|
|
|
PrivyPad is a text editor that can be used to create and edit plain (unsecured) or encrypted (secured) text files, as well as to E-Mail secured or unsecured messages and attachments.PrivyPad uses a...
|
|
|
PGPNotes is a Lotus Notes plugin which provides you with the ability to encrypt and decrypt messages/files using WinPT/GnuPG without leaving the Notes client itself. This ensures that important inf...
|
|
|
This special software allows you to decrypt and display password stored behind the asterisks. It is the first tool of its kind that works automatically on Web pages, Windows 9x/NT and Windows 2000/...
|
|
|
This ActiveX DLL for Visual Basic 6 contains 3 fast encryptionroutines and 3 internet encoding routines (Base64, quoted-printable and ROT13). There are also a checksum routinefor files and a checks...
|
|
|
Impossible to recover, Military Strength File Shredder!7 passes of impossible to break rotating 16k random key overwrites Your files CANNOT be reconstructed, not even partially, not by software or ...
|
|
|
Maintain a list of forbidden windows to secure the system.Keep your system safe from unauthorized eyes.
|
|
|
Please purchase this plugin only if you already own a registered copy of our Top Secret Messenger (TSM) product which included some other plugin. If you do not own TSM, you will need to order the ...
|
|