|
||||||
|
||
|
Home > Stolen computer software |
Related keywords: computer, computer security, computer game, Computer, computer software, computer backup, computer games, computer monitoring, computer animation software, computer graphics |
|
|
1. | Criminal Tango 3.01 (sw-winsoft.de) | ||
buy many useful items for your work. However, to win the game the stolen money must be donated for beneficent aims. This board/dice game is for 1-6 human or computer players. A board/dice game for 1-6 players. Try to steal, plunder and betray other players and sooner or later you will find yourself in the prison because the police don't sleep in the | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Schwab | Size: 2907 kb | Shareware Go to category: Games & Entertainment > Board Similar programs | |||
2. | Puzzle Pak 2.0 (mgsoft.com) | ||
you finish a tournament puzzle you can compare your solution to the computers solution. Spoker - Place spokes on the wheels to solve the puzzles. Hedges - Add/remove hedges to solve the visibility problem. Neighbors - Place houses in yards to give everyone neighbors. Bee Hive - Add bees to the bee hive to solve the | |||
Updated: 9, 2005 | Rating: 0 | Author: Monty Giavelli | Size: 2176 kb | Shareware Go to category: Games & Entertainment > Puzzle & Word Games Similar programs | |||
3. | AlertMobile Pro 4.0.1 (softsecurity.com) | ||
is a special software for computer security incidents response. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and handles response commands. Features: - Recording of user logon name, date, time and computer name - Monitoring of active tasks list - Handling of critical programs list - Sending of | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 593 kb | Shareware Go to category: Network & Internet > Remote Computing Similar programs | |||
4. | Advatrack 5.84 (absolute-protect.com) | ||
lost/stolen computer in virtually any country of the world. Where ever your computer is connected to the Internet it makes HTTP connection to www.absolute-protect.com, which establishes location of the computer. Monitoring report for your computer available on-line or can be sent you by email. Calls phone number(s) you specify. No | |||
Updated: 9, 2005 | Rating: 49 | Author: Absolute Protect | Size: 357 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | Anti-lost CD Ejector Lite 2.2 (nesoft.org) | ||
yourself from CD loss. What's new in version 2.2 : - multi-drive control using hot keys. Only call Main Menu (by double pressing a hot key) and press a letter of the proper drive; - some interface improvements. Anti-Lost CD Ejector opens your CD-drive if a disk is left inside it when you shutdown Windows. And you can manage this process with advanced Anti-Lost CD Ejector | |||
Updated: 9, 2005 | Rating: 119 | Author: Andrew Lyapunov | Size: 777 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
6. | ComputerSafe 3.0.0.5 (com-guard.com) | ||
name suggests, ComputerSafeTM provides an internal Safe inside your computer where you can store your vital information and protect yourself against identity theft and data security breaches. ComputerSafe safeguards a virtually unlimited number of files. Its unique combination of file protection | |||
Updated: 9, 2005 | Rating: 0 | Author: Dev. Team | Size: 6199 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
7. | Innovatools ComputerWatermark 1.5 (computerwatermark.com) | ||
Innovatools ComputerWatermak you get a real chance to recover your computer in case it gets stolen, or make sure you have a proof in any dispute over the ownership of your computer or disk(s). Innovatools ComputerWatermark writes your name and address (or any other information you want) on the entire free surface of your disk drives. The existing files are not | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Dominic | Size: 1119 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
8. | CryptEnCrypt 1.10 (inetprom.com) | ||
from unauthorized access. That means anyone who has access to your computer will be able to open these files and read the contents. CryptEnCrypt allows you converting your existing files to encrypted files. Encrypted files contain just the same data as before, however the encrypted data is unreadable until it is decrypted, i.e. converted to the original state. CryptEnCrypt bases data | |||
Updated: 9, 2005 | Rating: 36 | Author: iNetProm SoftLab | Size: 632 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
9. | Cryptosystem ME6 7.31 (hermetic.ch) | ||
ME6 then you can sleep easily at night knowing that even if they are stolen the thief will obtain no information. The size, the type and the number of files which can be encrypted in a single operation is limited only by disk space. You can select a single file to be encrypted (or decrypted) by | |||
Updated: 2, 2006 | Rating: 0 | Author: Peter Meyer | Size: 1769 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | Hara-Kiri 2.02 (cyteg.com) | ||
on the disk! Uses: This program is useful in the case that your computer is stolen, Or if your computer is infiltrated by unwanted users. Imagine several situation, when "Hara-Kiri" may be useful for you: 1. Your PC is stolen Malefactor runs your computer with hope to profit by important secrets of your firm... But he don't know that it is | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Stolen computer software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|