|
||||||
|
||
|
Home > Security products software |
Related keywords: security, Security, computer security, internet security, security software, information security, sell products online, SECURITY, products, file security |
|
|
501. | HackerWacker Personal Edition 2.3.23.01 (hackerwacker.com) | ||
and strings you define. All logs and data are encrypted for maximum security, and automatically decrypted when viewed. Other features include stealth mode option, hot key access, Email logs, Monitoring and logging across your home network, LAN or the Internet in real-time with an optional add-on | |||
Updated: 8, 2004 | Rating: 16 | Author: Thomas Streiff | Size: 5259 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
502. | Logbook 1.7 (home.t-online.de) | ||
===================================== Logbook fьr Windows 9x/ME Version 1.7 ===================================== Functions: ---------- Registration of working hours on PC including time of boot up, shut down, standby and user change. Resistant to manipulations. Detailed reports and totals of | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 34 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
503. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
504. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
505. | PestPatrol 3.0 (safersite.com) | ||
biggest threats to your network security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could lose passwords, customer data, intellectual property - even your | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
506. | Privacy Master 3.9 (webroot.com) | ||
within your computer that only you have access to. Whether it's an outside hacker, or someone sitting at your keyboard, you can rest assured that your personal information stays personal. Secure your personal information - Protect yourself from data theft - Guard your privacy on the Internet -- hide, lock, and encrypt your sensitive information and | |||
Updated: 8, 2004 | Rating: 0 | Author: Steve Thomas | Size: 1457 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
507. | ProtectZ 1.60 (actualsecurity.com) | ||
is a security utility for personal and public accessible computers. This software-only solution enables you to restrict access to any non-virtual folders and files, to edit a lot of different system policies of Windows 95/98/Me. ProtectZ enables you to make files and folders invisible or "read-only", to make them undeletable, to forbid rename them, to make them | |||
Updated: 8, 2004 | Rating: 723 | Author: Konstantin Evseenko | Size: 574 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
508. | Secure Disk Pro 3.0 (securedisk.netfirms.com) | ||
the history of all activities on your PC. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, clean recent documents lists for popular applications, can recover HD space, and many more. Protect your privacy with Secure Disk Pro and completely eliminate | |||
Updated: 8, 2004 | Rating: 114 | Author: DD Software | Size: 1030 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
509. | The Keytrap Application invisible keylogger 2.1 (keytrap.camouflagesoft.com) | ||
This keylogger program will silently monitor and record all keyboard activity. The keystrokes are stored in an encrypted file in a secret location. There is an Admin program available for retrieving the keystroke information in a convenient report format. The report stores the keystrokes according to | |||
Updated: 8, 2004 | Rating: 116 | Size: 458 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
510. | WIDO Logbook 1.3 (home.t-online.de) | ||
WIDO Logbook for Windows NT, 2000 and XP Version 1.0 from 10.02.2003 Copyright © Witold Domogala http://www.wido-software.de Email: domogalla@t-online.de --------------------------------------------- 'WIDO Logbook' consists of 2 programs: 1. LogbookService.exe 2. LogbookReports.exe REGISTRATION | |||
Updated: 8, 2004 | Rating: 0 | Author: Witold Domogalla | Size: 1519 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Security products software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|