1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
|
|
CryptoCommander is powerful file and e-mail encryption tool allowing to encrypt/shred files, send encrypted e-mails, create encrypted self-extracting compressed files to send encrypted files to per...
|
|
|
Project Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Project 2002/2000/98/95 password-protected documents (*.mpp) and templates (*.mpt). All passwords are ...
|
|
|
Armor2net personal firewall can stop hackers and data thieves and protect your PC from Internet-borne threats (worms, Trojan horses and spywares). This PC firewall software provides much more Inter...
|
|
|
When files are intended to be deleted, the files must be erase completely and irrecoverably so that no unauthorized users can recover and access those deleted files. This is highly critical in term...
|
|
|
Outpost Firewall is the most feature-packed Personal Firewall for Windows in the world. It gives peace of mind from any threats by Cookies, Ads, E-mail viruses, Backdoors, Spyware, Crackers, Adware...
|
|
|
Impossible to recover, Military Strength File Shredder!7 passes of impossible to break rotating 16k random key overwrites Your files CANNOT be reconstructed, not even partially, not by software or ...
|
|
|
MS Backup Password Recovery recovers passwords to all versions of MS Backup .qic files.
|
|
|
Surf Safe Pilot allows you to remove completely all tracks of viewed web-pages from your computer's hard drive with ease so your hard drive willbecome clean and safe.
|
|
|
SpyAnytime is the most powerful and easy-to-use tool to monitor and record all system usage secretly, such as all applications loaded, web sites visited, E-mail activity, files opened, passwords us...
|
|
|
Icon Lock-iT XP includes many new features designed specifically for home users and shared computers. New locking features make sure your files stay put while strong encryption keeps your private i...
|
|
|
CD Access Control Professional, controls which compact disks can be run on a local computer, this is done by setting a rule determing the times that the disk can be used and whether it is allowed o...
|
|
|
Purchase a download of the latest ShyFile version [to encrypt plain text, emails, webpages and binary files]ShyFile generates highly secured HTML files carrying your encoded text or the encoded sou...
|
|
|
CRYPTOCAT 3.0 is a new version of our encrypting product:Updated release features:1. MUCH MORE STRONGER encryption algorithm is implemented;2. Completely re-designed interface and new program optio...
|
|
|
NetVizor is a powerful, award-winning, monitoring and supervising solution for the corporate or personal network. NetVizor allows the administrator to monitor their entire network from one CENTRAL ...
|
|
|
Crime Catcher turns your web camera into a video surveillance system.It uses advanced motion detection which lead to accurate / reliable results.It has many features including:Advanced yet Reliable...
|
|
|
Encrypt and Hide: Files and Folders, My Documents, Favorites, Desktop, Internet History, Control Panel, Data/Time setting. Supports 8 encryption algorithms. Hide Folder start up is password protect...
|
|
|
CryptoFish is encryption utility that you can use to encrypt/decrypt files and folders to protect them from unauthorized use. CryptoFish uses a 448 bit Blowfish algorithm.It is very easy to use. It...
|
|
|
A program to recover or remove lost or forgotten passwords to view and edit Visual Basic for Applications (VBA) projects source code in Microsoft Office documents: Word 97/2000/XP, Excel 97/2000/XP...
|
|
|
An advanced encryption utility which integrates into the Windows Explorer and allows you to encrypt files, email messages, create self-extracting .exe files, work with .zip files. Program has 17 en...
|
|
|
Polar Encrypt is an intuitive windows encryption tool that allows you to encrypt & decryptyour data (folders, files and text) using the unbreakable new US standard 256-bit AES (Rijndael) algorithm....
|
|
|
Attempting to understand how the inside magic of Windows administering works may be a challenging task even for an experienced administrator. Needless to say, smaller companies that cannot afford h...
|
|
|
You could fiil up this order form if you wish to update our old products :- Stealth Keyboard Interceptor (SKIn98) v2.0, v5.0; - Stealth Keyboard Interceptor (SKInPro) v4.0, v5.0; - Stealth Keyboar...
|
|
|
Powerful Windows 9x/Me/NT/2000 security configuration and administration tool. TweakSEC can protect your system from incautious and malicious users as well as from anybody who could accidentally ma...
|
|
|
Do you wonder what your spouse, your kids, or employees are doing on the computer when you are not around? Do they hide windows as you walk by? Do you want to know exactly what is going on? If you ...
|
|
|
Please purchase this plugin only if you already own a registered copy of our Top Secret Messenger (TSM) product which included some other plugin. If you do not own TSM, you will need to order the ...
|
|