|
||||||
|
||
|
Home > Stolen software |
Related keywords: stolen computer, stolen laptop |
|
|
1. | EXECryptor 2.3.7 (softcomplete.com) | ||
user defined information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents illegal creation of keygen. EXECryptor supplies you with one-touch trial technology that allows to turn your full-feature application in 'try-before-you-buy' version in a few | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
2. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
ME6 then you can sleep easily at night knowing that even if they are stolen the thief will obtain no information. The size, the type and the number of files which can be encrypted in a single operation is limited only by disk space. You can select a single file to be encrypted (or decrypted) by | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
3. | Note Studio for Windows 3.1.1 (dogmelon.com.au) | ||
having their important data compromised if their device is lost or stolen. Note Studio allows you to encrypt notebooks. This means that even if your device falls into the wrong hands, your notes will not be readable. But it is the ease of organizing notes that makes Note Studio most powerful. The way | |||
Updated: 2, 2006 | Rating: 0 | Author: Ant Wiese | Size: 10105 kb | Shareware Go to category: Home & Hobby > Personal Finance Similar programs | |||
4. | LaptopLocate.net 2.9.2 (tometasoftware.com) | ||
to our servers and logged in the event your computer is ever stolen. LaptopLocate.net is helpful in finding where computers, especially mobile computers are currently located. If the computer is stolen, Tometa Software will coordinate with law enforcement agencies to help track down a registered user's computer before valuable equipment and data is compromised | |||
Updated: 2, 2006 | Rating: 0 | Author: Luke Richey | Size: 4839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | Japanese Roulette 1.0 (doublegames.com) | ||
play any game she wants and to loose a round sum. The money she had stolen was returned by the girl as soon as it was possible. This moment this successful lady invites you to her casino to play Japanese Roulette, to try pungent sensations, to feel Japanese atmosphere created by the designers, to | |||
Updated: 9, 2005 | Rating: 0 | Author: Stefan Jones | Size: 1730 kb | Shareware Go to category: Games & Entertainment > Casino & Gambling Similar programs | |||
6. | PC PhoneHome 3.0 (pcphonehome.com) | ||
e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the local police and then notify the PC PhoneHome Command and Tracking Center, which will provide full tracking and recovery support. When the stolen computer goes online it will send a stealth message to the pre-determined e-mail address containing its location. Once | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
7. | MacPhoneHome 3.0 (pcphonehome.com) | ||
e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the local police and then notify the PC PhoneHome Command and Tracking Center, which will provide full tracking and recovery support. When the stolen computer goes online it will send a stealth message to the pre-determined e-mail address containing its location. Once | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
8. | AlertMobile Pro 4.0.1 (softsecurity.com) | ||
- Dismounting of all protected drives - Tracing the route of stolen or lost notebook or desktop PC - Sending to mobile phone the confirmation of command execution status AlertMobile can be used by security administrators for control of the corporate security policy, by parents for monitoring of their children computer activity, or by anyone else who wants to ensure that nobody | |||
Updated: 9, 2005 | Rating: 16 | Author: Raytown Corporation LLC | Size: 593 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
9. | AlertMobile Pro 4.0.1 (softsecurity.com) | ||
- Dismounting of all protected drives - Tracing the route of stolen or lost notebook or desktop PC - Sending to mobile phone the confirmation of command execution status AlertMobile can be used by security administrators for control of the corporate security policy, by parents for monitoring of their children computer activity, or by anyone else who wants to ensure that nobody | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 593 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
10. | Lost Idols - Puzzle Crusade 1.01 (suricate-software.com) | ||
Idols! In this puzzle/adventure game, the Golden Idols have been stolen from the sacred monastery. You must travel to the high Himalayan mountains and deep caverns and retrieve them. However, your task will not be simple, because the thief has hidden these treasures within treacherous and cunningly designed maze-like puzzle-rooms. So stay sharp, and watch your step. One wrong move | |||
Updated: 9, 2005 | Rating: 0 | Author: Suricate Software | Size: 3750 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
|
Home > Stolen software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|