1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
HB Crypt Source DLL features 12 cryptographic algo's, compiled in C++. viz. Blowfish, Twofish, Rijndael, Skipjack, Serpent, Gost, RC4, TEA, DES, ARA, AES, RODTHA. This compact C++ DLL saves many ma...
|
|
Email Spy is email monitoring software and surveillance tool designed for consumers and businesses. If you positively need to know EXACTLY what your children, spouse or employees are sending by ema...
|
|
AntiSpy eliminates the traces of your work on computer. it includes the features:Internet Explorer(IE)- Clear Location Bar History- Clear Cookies- Delete History- Delete Temporary Internet FilesNet...
|
|
Smallest and HIPAA-compliant FTP client. Ideal for fast and secure file transferring and sharing on the Internet. Include HTML page encryption.Features: No installation or setup needed. Security w...
|
|
A program to recover lost or forgotten passwords to protected Personal Storage Files (*.pst) used by Microsoft Outlook (all versions) to store emails and contacts. The passwords are recovered insta...
|
|
The PrivacyKeyboard™ for Microsoft. Windows. NT/2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against ALL types of keylogging pr...
|
|
Anti Tracks is a complete solution to protect your privacy and enhance your PC performance. With a simple click Anti Tracks securely erase your internet tracks, computer activities and programs his...
|
|
Stealth Storage is a small and powerful file encryption tool. It encrypts files on-the-fly using well-known strong ciphers like BLOWFISH, RIJNDAEL etc. It is totaly invisible when installed. Nobody...
|
|
Crime Catcher turns your web camera into a video surveillance system.It uses advanced motion detection which lead to accurate / reliable results.It has many features including:Advanced yet Reliable...
|
|
The software allows users (1) to digitally sign and encrypt their emails and files to ensure confidentiality and authenticity, (2) to create and extract PKI or password protected archives, (3) to s...
|
|
MS Access 2000 Password Recovery will display the password to any MS Access file type (file extensions of .mdb, .mda, and .mde). This program works for MS Access files saved in MS Access 2000.
|
|
Polar Encrypt is an intuitive windows encryption tool that allows you to encrypt & decryptyour data (folders, files and text) using the unbreakable new US standard 256-bit AES (Rijndael) algorithm....
|
|
Spylo PC Monitor is the award-winning and highly flexible security monitoringsoftware used by parents, business organizations, and for the tasks like testingof usability or studies of PC usage. So...
|
|
Encrypt and Hide: Files and Folders, My Documents, Favorites, Desktop, Internet History, Control Panel, Data/Time setting. Supports 8 encryption algorithms. Hide Folder start up is password protect...
|
|
CyberSpy, the spy software solution for powerful PC monitoring and surveillance needs. Records all emails typed and viewed, chat conversations, websites, keystrokes, passwords typed, and even deskt...
|
|
Need to track employees and monitor workstations at all times? Want to see how others are using your PC while you are away?Spytech SpyAgent Professional is the award winning powerful monitoring sui...
|
|
Aye Parental Control helps parents restrict the time that children spend on computer and Internet. It is the utility for home PC that enables a parent regulate When and How-much of children's time ...
|
|
1st Security Center is a powerful security utility that allows you to restrict access to Windows important resources. This easy-to-use utility helps you to keep your computer in order. It enables y...
|
|
Boss Everyware gives a clear picture of how a computer isbeing used. It secretly logsprogram names, window titles,visited URLs, user names, andkeystrokes. With its ReportManager, Boss Everyware als...
|
|
WinDefender is an awards-winning, a powerful security utility that protects the contents of files and folders on your computer. WinDefender is either an encryption and security software. You will b...
|
|
Shred File 2002 is an all-encompassing file deletion utility used for removing sensitive documents and files. Shred File 2002 will actually encrypt the selected file repeatedly with a random, self-...
|
|
A program to recover passwords for backup files (*.qic) created with Microsoft Backup (in Windows 95/98). All passwords are recovered instantly; multilingual passwords are supported. ...
|
|
Multilingual Wordlists for more than 20 different languages to be used with password recovery utilities and dictionary-based attacks.English (~2,610,000 words)African (~128,000 words)Australian (~8...
|
|
A professinal program for encrypting, decrypting, and wiping files and folders of any type. GUIDESX uses 448 bit Blowfish and 128 bit DESX key to encrypt your sensitive data. GUIDESX has ability to...
|
|
Jammer's powerful protection gives you peace of mind. Its unrivaled multi-barrier system blocks every step an intruder takes with sophisticated counter-measures that protect the Registry, monitor a...
|
|