|
||||||
|
||
|
Home > Computer security software |
Related keywords: security, computer, Security, internet security, computer game, security software, Computer, information security, computer software, SECURITY |
|
|
21. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
their productivity and profitability. This is the most remarkable security product for a computer you have seen. Program works in background, transparent for user, and captures the following events: - Application start - Switching between applications/windows. In addition program saves static text elements and windows edit controls: - Window content of most chat | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
22. | WebCam Monitor 3.54 (deskshare.com) | ||
When an alarm condition is detected, the program can flash your computer screen, sound an audible alarm, or send you an email. The application can be easily programmed to begin and complete recording on a predefined schedule. It's easy to upload your files to any FTP location periodically, or after an alarm condition is detected. In addition to capturing and transmitting | |||
Updated: 3, 2006 | Rating: 2799 | Author: Steve P | Size: 8783 kb | Shareware Go to category: Communications > Web/Video Cams Similar programs | |||
23. | iMediaCONVERT 3.3.19 (imedialearn.com) | ||
your files, since iMediaCONVERT is integrated in PowerPoint. Security conscious, iMediaCONVERT allows you to maintain a high degree of content control - presentations cannot be copied or edited, protecting your material against unauthorized changes and/or copyright infringement. Converted files maintain the original structure and hierarchical features of your PPT presentations | |||
Updated: 2, 2006 | Rating: 381 | Author: iMediaLearn iMediaLearn | Size: 7770 kb | Commercial Go to category: Education > Teaching & Training Tools Similar programs | |||
24. | EmailObserver 5.2.2 (softsecurity.com) | ||
today on the IT market. After installation on the monitored computer it will invisibly copy all outgoing emails and accurately send them to your secret email address pre-configured by the program Control Panel, no matter which email client software a monitored user might use (either Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar). Full control over outgoing | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
25. | EmailObserver 5.2.2 (softsecurity.com) | ||
today on the IT market. After installation on the monitored computer it will invisibly copy all outgoing emails and accurately send them to your secret email address pre-configured by the program Control Panel, no matter which email client software a monitored user might use (either Microsoft Outlook Express, Eudora, Pegasus, The Bat! or similar). Full control over outgoing | |||
Updated: 2, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 739 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
26. | Advanced Anti Keylogger 3.7 (anti-keylogger.net) | ||
scary and dangerous feature of all spy software is recording of computer user's keystrokes for the purpose of monitoring computer activity. While you are typing out your password and credit card details online it is possible a hacker can be recording your every keystroke on his computer with the right spy software. Especially developed unique protection algorithm | |||
Updated: 2, 2006 | Rating: 132 | Author: Eric Nilsson | Size: 783 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
27. | Power Clock 6.03 (powerclock.com) | ||
like a traditional mechanical clock. Power Clock is easy for non-computer people to use. Your employees can learn to use Power Clock in a matter of minutes. Built-in Email. Employees are notified of waiting mail when they clock in. Job, Phase, and Production tracking. Automatic lunch and | |||
Updated: 2, 2006 | Rating: 0 | Author: Robbie Fletcher | Size: 3716 kb | Shareware Go to category: Desktop > Clocks & Alarms Similar programs | |||
28. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from networked PCs | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | Capturix VideoSpy 3.02.1817 (capturix.com) | ||
for a image on media archive. You even record the screen of the computer, this can be useful if your computer is shared with more people. Ready for multiple processor systems Capturix VideoSpy is a complete software that combines video surveillance and domotics. Supports any video for windows device (like USB Webcam or Tv Tuner card) and network cameras or video | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexandre Simoes | Size: 9442 kb | Commercial Go to category: Audio & Multimedia > Video Tools Similar programs | |||
30. | Secret Explorer 6.6.1471 (unhsolutions.com) | ||
feature you can also move all your personalized information from one computer to another, basically familiarizing a new system with you. This system inspection tool is designed to browse and edit hidden data stored in undocumented Windows Protected Storage. Find IE form autocomplete data, passwords to protected web sites, account and identity passwords, internet passwords, and | |||
Updated: 2, 2006 | Rating: 0 | Author: Vitas Ramanchauskas | Size: 504 kb | Shareware Similar programs | |||
|
Home > Computer security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|