|
||||||
|
||
|
Home > Information security software |
|
|
441. | ActMon Computer and Internet Monitoring 5.04 (ActMon.com) | ||
the current window or program that is running on your computer. All information is stored in strongly encrypted, compact log files, that can be easily archived. ActMon can hide the logs on the monitored PC or send them via network or email. The monitoring can be opted to be invisible to the user and ActMon is protected against manipulation: The program runs completely maintenance | |||
Updated: 8, 2004 | Rating: 215 | Author: Team ActMon | Size: 1602 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
442. | Cresotech PocketSafe 1.32 (cresotech.com) | ||
card, bank account and document data as well as other confidential information. The records in database are stored encrypted and password-protected. The mobile world requires mobile solutions with data confidentiality protected: PocketSafe gives you this full protection. PocketSafe allows you to secure | |||
Updated: 8, 2004 | Rating: 0 | Author: Cresotech Team | Size: 310 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
443. | FolderSafe 2.1 (occultsoft.com) | ||
of your choice, manage your net shares. If you want to improve security of some sensitive folders/files, FolderSafe can help. FolderSafe Features - Office XP style UI - Easier to utilize - Complete control over access to your choice - Protection from both the local and remote access - Transparent to both users and applications - Easier net share management System | |||
Updated: 8, 2004 | Rating: 120 | Author: Ken Li | Size: 3066 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
444. | ID_Bank 1.10.021 (rainbow-innov.co.uk) | ||
from Rainbow Innovations. ID_Bank is able to hold your personal information relating to usernames, passwords, pins, login details etc; information you often forget or write on scraps of paper that anyone else can read. Your information is stored in a secure encrypted file, all you need to remember is one password to access it. ID_Bank includes the following features | |||
Updated: 8, 2004 | Rating: 0 | Author: John Hudson | Size: 1694 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
445. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
446. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
447. | PestPatrol 3.0 (safersite.com) | ||
biggest threats to your network security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could lose passwords, customer data, intellectual property - even your | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
448. | Privacy Master 3.9 (webroot.com) | ||
difficult, if not impossible, to secure your personal and sensitive information. Privacy Master creates a safe haven within your computer where everything you choose is encrypted and hidden from prying eyes. Powerful 128-bit encryption combined with a unique session-based program style provide the | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
449. | Secure Disk Pro 3.0 (securedisk.netfirms.com) | ||
the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, clean recent documents lists for popular applications, can recover HD space, and many more. Protect your privacy with Secure Disk Pro and completely eliminate | |||
Updated: 8, 2004 | Rating: 114 | Author: DD Software | Size: 1030 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
450. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
There is an Admin program available for retrieving the keystroke information in a convenient report format. The report stores the keystrokes according to application as well as date and time. The program will record everything - including all passwords typed, all chat room activity, etc. It also lets you see all deleted keystrokes. The Program will stay in hidden mode and | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Information security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|