|
||||||
|
||
|
Home > Stolen software |
Related keywords: stolen computer, stolen laptop |
|
|
11. | Credit Card Knight 1.3 (fspro.net) | ||
your credit card data from being stolen by carders. Most Internet Explorer users have autocomplete settings on. When you are shopping on-line and filling an order form, Internet Explorer saves the data you have entered into a safe place (Windows Protected Storage). Protected Storage, however, is not so safe and it is possible to read what it keeps. So your credut card data may be | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 776 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
12. | PAL PC Tracker Lite 1.01 (palsol.com) | ||
your system and is password protected. In the event the computer is stolen, the customer must make a report with the local police and then notify the PC Tracker support team, which will provide full tracking and recovery support. When the stolen computer goes online it will send a stealth | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 1200 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
13. | PC PhoneHome 3.0 (pcphonehome.com) | ||
e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the local police and then notify the PC PhoneHome Command and Tracking Center, which will provide full tracking and recovery support. When the stolen computer goes online it will send a stealth message to the pre-determined e-mail address containing its location. Once | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
14. | Protect Folder 98 3.0 (everstrike.com) | ||
and travel frequently. After all, if your notebook gets lost or stolen, you do not want strangers to see your financial data, or credit card or Social Security numbers. A free trial version is available for download. Protect Folder 98 is a new security tool that lets you lock your files, folders, and drives with your personal password. Protect your files from hackers, viruses, and | |||
Updated: 9, 2005 | Rating: 48 | Author: Richard Davids | Size: 772 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
15. | MacPhoneHome 3.0 (pcphonehome.com) | ||
e-mail address set by the customer. In the event the computer is stolen, the customer must make a report with the local police and then notify the PC PhoneHome Command and Tracking Center, which will provide full tracking and recovery support. When the stolen computer goes online it will send a stealth message to the pre-determined e-mail address containing its location. Once | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
16. | Lock Folder XP 3.4 (everstrike.com) | ||
and travel frequently. After all, if your notebook gets lost or stolen, you don't want strangers to see your financial data, credit card or social security numbers. Lock Folder XP is distributed electronically over the Internet. Free trial version is available for download. Retail price is only $24.95 Lock Folder XP is a new security tool that lets you lock your files, folders and | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
17. | Hara-Kiri 2.02 (cyteg.com) | ||
Uses: This program is useful in the case that your computer is stolen, Or if your computer is infiltrated by unwanted users. Imagine several situation, when "Hara-Kiri" may be useful for you: 1. Your PC is stolen Malefactor runs your computer with hope to profit by important secrets of your firm... But he don't know that it is necessary to press a combination of | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
18. | Identity Knight 1.3 (fspro.net) | ||
Your credit card numbers, SSN, driver license and e-mails can be stolen easily! Download Identity Knight, the unique credentials protection software | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
19. | FingerPoint 1.4 (neurotechnologija.com) | ||
avoid using of paper documents or magnetic cards, which can be lost, stolen, forgotten, etc. Demo version allow enroll only 10 persons. For more information please contact us or review our Web Site. FingerPoint is an end user software package for person identification using his/her fingerprints as a unique | |||
Updated: 9, 2005 | Rating: 16 | Size: 8012 kb | Demo Go to category: System Utilities > Other Similar programs | |||
20. | Lock Ness 3.1 (folder-lock-ness.com) | ||
Lock Ness is ideal for notebooks. If your notebook is lost or stolen, your sensitive data will be protected against unwanted access. Install Lock Ness and you have an easy way to password protect and lock folders. Lock Ness lets you protect your privacy and stop others from tampering with your sensitive data. Lock Ness is security software to password protect and lock folders | |||
Updated: 9, 2005 | Rating: 82 | Author: Arthur Wagner | Size: 770 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Stolen software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|