|
||||||
|
||
|
Home > Internet passwords software |
Related keywords: internet, Internet, passwords, internet explorer, Internet Explorer, internet privacy, internet security, internet marketing, INTERNET, internet spy |
|
|
401. | 007 Spy Software 3.86 (e-spy-software.com) | ||
Web sites visited, files operations, every keystroke, username and password, online conversation (ICQ, MSN, AIM), and take screen snapshots at set intervals just like a surveillance camera directly point at the computer monitor. Features include start and stop scheduling, logs remote delivery, stealth mode, user filter, password protection, suspend on idle, HTML report, logs | |||
Updated: 3, 2006 | Rating: 1113 | Author: Jason H | Size: 1200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
402. | 1st Evidence Remover 2.14 (softheap.com) | ||
for files and see pictures, work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use and the other detailed information about your | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
403. | Advanced KEYLOGGER 1.5 (mykeylogger.com) | ||
in the world. Advanced KEYLOGGER records every keystroke, including passwords and logins, to encrypted easy-to-understand logs and can send reports secretly to your e-mail address or any number of other e-mails, specified by you. Advanced KEYLOGGER monitors the Internet activity precisely by logging all web-pages the user visits. Advanced KEYLOGGER records visual statistics of | |||
Updated: 9, 2005 | Rating: 251 | Author: Marianna Gorenstein | Size: 918 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
404. | Advanced Security Administrator 10.14 (softheap.com) | ||
your computer and restrict access to Internet with Security Administrator. This nice password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1104 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
405. | AIM Keys 3.10.9522 (aimsoft.com) | ||
with the new mouse activated macros and key/text shortcut sequences. Internet and Email commands have also been streamlined to make navigation easier. NEW! Task Scheduling. Now you can run macros in AIM Keys while your AWAY from your computer! NEW! Preview/Edit pane, which allows you to preview and edit macro syntax on the fly! NEW! Macro and Task log files. AIM Keys can | |||
Updated: 9, 2005 | Rating: 61 | Author: Randy Smith | Size: 2799 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
406. | Asterisk Password Recovery XP 2.14 (aidsoft.com) | ||
under Windows system allow a convenient storage of frequently used passwords, Asterisk Password Recovery XP is designed to help you read these passwords that are covered by the asterisks(*****). It works in all Windows system, as well as Internet Explorer. Many applications under | |||
Updated: 9, 2005 | Rating: 1363 | Author: FAD Software | Size: 368 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
407. | CryptoForge 3.2.5 (cryptoforge.com) | ||
on insecure media or transmitted on an insecure network (like the Internet), and still remain secret. Later, the information can be decrypted into its original form. CryptoForge integrates the strongest cryptography available today into the Windows environment. The file encryption module enables you to encrypt, decrypt, and wipe -with the built-in file shredder- files of any type, as | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
408. | Desktop Scout 4.0 (globalpatrol.net) | ||
home, school or office to monitor and record every detail of PC and Internet activity. The program contains several integrated tools which work together at the same time to record all programs used, keystrokes typed, web sites visited, files created or changed, and a screenshot logger which can take hundreds of snapshots every hour. The surveillance logs can be viewed in real-time | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
409. | Folder Guard Professional 7.5 (winability.com) | ||
personal files, or even completely hide your documents until a valid password is entered. You can protect sensitive system files from modification or destruction, disable access to the floppy, CD-ROM, and other removable drives, restrict access to Control Panel, Start Menu, applications, and more | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrei Belogortseff | Size: 1235 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
410. | Ghost Keylogger 3.80 (keylogger.net) | ||
email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs completly invisbly on all operating systems, even in the NT/2000/XP process list. Some applications of the keylogger - Monitor | |||
Updated: 3, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 600 kb | Demo Similar programs | |||
|
Home > Internet passwords software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|