|
||||||
|
||
|
Home > Computer theft software |
Related keywords: computer, computer security, computer game, Computer, theft, computer software, computer backup, identity theft, computer games, computer monitoring |
|
|
21. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
22. | Privacy Master 3.9 (webroot.com) | ||
many people have access to your computer? Do you know who they are? Hackers, visitors, co-workers, family members? The reality is most computers are accessible to multiple users making it difficult, if not impossible, to secure your personal and sensitive information. Privacy Master creates a | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
23. | SafeHouse Hard Drive Encryption 2.10 (pcdynamics.com) | ||
on-the-fly encryption for your notebook or desktop personal computer. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse encrypted volumes appear on your PC as another Windows drive letter. All encryption is performed automatically and transparently on the fly. You can do anything with a SafeHouse virtual drive | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Avritch | Size: 1972 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
24. | SpyMyPC 2.0 (benutec.com) | ||
one solution if you want to know what others are doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, internet connections, passwords, chat conversations. Install SpyMyPC, set options "Run in Invisible Mode", so that it makes itself invisible to anyone. Shortcut keys helps you fast access to Log View and Unhide Mode | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
25. | System Mechanic Professional 6.0s (iolo.com) | ||
repairing Windows security flaws that leave you open to attack from computer enemies such as spyware, adware, viruses, hackers, and identity thieves. Keep your System Spotless with the PC Cleanup Wizard by automatically removing all forms of PC and Internet junk, keeping Windows fresh, fast, and sparkling clean. Increase PC and Internet Performance by up to 300% with the new PC | |||
Updated: 2, 2006 | Rating: 64 | Author: iolo technologies | Size: 33888 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
26. | System Shield 2.1c (iolo.com) | ||
be instantly undeleted and viewed by anyone who has access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament. Businesses, schools, government agencies, and military institutions that frequently deal with extremely | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
27. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
that automatically generates a completed inventory card for each computer/client. Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic Netlog then reports any changes made on each client log-in to the inventory program. Other inventories, e.g. faxes, photocopiers and | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
28. | Secure Image Pro 4.0 (artistscope.com) | ||
direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the html page the image is first encrypted for insertion into a viewer. It is the applet viewer that sits on the page replacing the image. The | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
29. | Secure Image Pro 3.0 (artistscope.com) | ||
direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the html page the image is first encrypted for insertion into a viewer. It is the applet viewer that sits on the page replacing the image. The | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 5808 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
30. | Secure Image Pro OSX 4.0 (artistscope.com) | ||
direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the html page the image is first encrypted for insertion into a viewer. It is the applet viewer that sits on the page replacing the image. The | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 1328 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
|
Home > Computer theft software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|