|
||||||
|
||
|
Home > Software > Security & Privacy > New |
|
|
1. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor Netâ„¢ is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
2. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor Netâ„¢ is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
3. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
4. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
5. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
6. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
7. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
8. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
9. | Masker 7.0.6 (softpuls.com) | ||
Hide files and have them automatically encrypted! MASKER is able to hide your sensitive files within another file (carrier file), which is absolute discrete and looks like regular file without changing the exterior impression. MASKER encrypts files using strong encryption algorithms. (CAST 128-bit, MASKER is able to hide your sensitive files within other files (carrier files), which are absolute discrete and look like regular files without changing the exterior impression | |||
Updated: 3, 2006 | Rating: 16 | Author: Evgeny Zaretskiy | Size: 2399 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | Dekart Private Disk 2.07 (dekart.com) | ||
Powerful, reliable and flexible disk encryption program that lets you create encrypted disk partitions (drive letters) to protect your confidential information. Private Disk hides your programs and data, and restricts access to them. Dekart Private Disk includes innovative Disk Firewall mechanism - a unique | |||
Updated: 2, 2006 | Rating: 0 | Author: Dekart Contact | Size: 1159 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
11. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
Typically you encrypt files because you don't want others to see them, but sometimes you want to send someone an encrypted file. Most if not all encryption programs allow you to do so--they vary, however, in terms of how difficult the process is. AEP2006 PRO's most noteworthy feature may be its flexibility | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
12. | Wipe Expert 1.60 (bodrag.com) | ||
Wipe Expert is an award winning privacy protection tool that helps remove all traces of online and offline activity. Did you know that a consequence of internet browsing is the recording of many confidential data on your computer: visited pages, credit card info, passwords? Did you know that by simply | |||
Updated: 2, 2006 | Rating: 16 | Author: Dragos Diaconescu | Size: 2984 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
13. | Advanced Archive Password Recovery 3.01 (elcomsoft.com) | ||
Advanced Archive Password Recovery is a program to recover lost or forgotten passwords for ZIP/PKZip/WinZip, ARJ/WinARJ, RAR/WinRAR and ACE/WinACE archives. Supports the customizable brute-force attack, effectively optimized for speed (for ZIP, up to 15 million passwords per second on Pentium 4) | |||
Updated: 2, 2006 | Rating: 2362 | Author: Vladimir Katalov | Size: 1569 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
14. | Zaep AntiSpam 4.1.0.3 (Zaep.com) | ||
Zaep AntiSpam eliminates 100% of the spam you receive without the added hassle of other anti-spam solutions. It doesn't require training to recognize a spam message. It doesn't require that you review its results for any mistakes. It eliminates spam and lets you enjoy receiving new email rather than | |||
Updated: 2, 2006 | Rating: 0 | Author: Douglas Papenthien | Size: 1190 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
15. | Spam Nullifier Pro 3.7.0.2 (spamnullifier.com) | ||
Eliminate Junk E-Mail Spam, Viruses, Tojans, Spyware. Works with POP3, IMAP, HTTP servers like Yahoo! & Hotmial. This Anti Spam Filter - powerful e-mail checker programs with effective spam elimination. Discover the safe way to stop unwanted viruses & spam e-mails before they get to your PC. Can be used as an | |||
Updated: 2, 2006 | Rating: 42 | Author: Spam Nullifier | Size: 3961 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
16. | StrongDisk Pro 2.9 (strongdisk.de) | ||
StrongDisk creates protected disks inside your Windows system. With such disks you can work as with usual hard drive- The main difference is that all data written to the disk is encrypted "on fly", while the content of the protected disk is stored in common file with arbitrary name. In order to access | |||
Updated: 9, 2005 | Rating: 0 | Size: 1096 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
17. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
18. | PC Activity Monitor (PC Acme) 6.4 (keyloggers.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
19. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PC PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
20. | SecureWord 1.5 (cezeo.com) | ||
SecureWord was originally designed as the most convenient and fully functional program for storing important information such as logins, passwords and files. Taking into consideration that somewhat similar programs exist, let us explain you why you should choose SecureWord and in what ways we enhanced and | |||
Updated: 9, 2005 | Rating: 0 | Author: Pavel Sokolov | Size: 563 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
21. | Privacy Guardian 3.2 (winguides.com) | ||
Privacy Guardian is a safe and easy-to-use privacy protection tool that securely deletes online Internet tracks and program activity records that are stored in your browser and other hidden files on your computer. Privacy Guardian guarantees your privacy by ensuring all traces of your online Internet and | |||
Updated: 9, 2005 | Rating: 0 | Author: PC Tools | Size: 2337 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
22. | Universal Shield 4.0 (everstrike.com) | ||
Universal Shield 4.0 by Everstrike Software is the ultimate protection tool for your computer - hide files, folders, and drives, and set access rules using flexible security combinations for your most precious data. A unique feature of Universal Shield is the perfect combination of data hiding and encrypting | |||
Updated: 9, 2005 | Rating: 212 | Author: Richards Davids | Size: 1759 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
23. | Security Task Manager 1.6f (neuber.com) | ||
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. The security risk | |||
Updated: 9, 2005 | Rating: 101 | Author: Alexander Neuber | Size: 1467 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
24. | SecurityPlus 4.33 (softbytelabs.com) | ||
SecurityPlus! is a powerful encryption & decryption utility with a file viewer, thumbnails, slideshow and program selector, runs in the tray and offers full privacy of images, other files, and applications using on-the-fly encryption/decryption. SecurityPlus! is very fast and won't take long to | |||
Updated: 9, 2005 | Rating: 0 | Author: M. Purkhardt | Size: 568 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
25. | ShyFile - File and Email Security 6.24 (shyfile.net) | ||
ShyFile encodes your text and packs it into an extra file that is to be attached to an outgoing email or uploaded to a website. The recipient thereof does not need to have ShyFile installed to be able to decode since any regular Internet browser is able to take care of it, i.e. opening it and prompting the | |||
Updated: 9, 2005 | Rating: 16 | Author: John Bettels | Size: 4419 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
26. | Panda Antivirus platinum 7 7.06 (pandasoftware.com) | ||
Panda Antivirus Platinum 7.0, an innovative security solution that adapts perfectly to the needs of today's small businesses and professionals , protecting information from viruses and hackers with a single product. With a series of additional security features, including a firewall and script blocker , this | |||
Updated: 9, 2005 | Rating: 410 | Author: Panda Software | Size: 25470 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
27. | Password Spectator Pro 3.10 (refog.com) | ||
Internet security has long become a buzz word. Everywhere you go, you hear about it. Naturally, it is great to feel yourself safe and secure when surfing the Net. When you enter your password on most sites, you see only asterisk signs. This feature is intended to protect your passwords; but sometimes this | |||
Updated: 9, 2005 | Rating: 0 | Author: ReFog Software | Size: 1410 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
28. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PC PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
29. | QuickWiper 7.6.3 (aks-labs.com) | ||
QuickWiper is a disk and file wipe utility. QuickWiper allows to wipe files in handy manner. Wiping free disk space option protects all the files you ever delete before beginning using QuickWiper. System Clearer clears in one-click cookies and history, IE cache and typed URLs, temporary and recent | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 922 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
30. | Lock Folder XP 3.4 (everstrike.com) | ||
Lock Folder XP is a new security tool that lets you lock your files, folders and drives with your personal password. Now nobody but you can access your most sensitive information. Locking folders, files and drives also effectively protects you from malicious programs, such as viruses, worms and trojans. Here | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Software > Security & Privacy > New |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|