|
Utilities/
Security
|
|
Send e-mail messages easily and securely from your portable PC while you are traveling around the world! Using this program you will increase your e-mail security and privacy as well as get rid of annoying change of settings for your e-mail program. 236 |
|
Utilities/
Security
|
|
Password Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock... 226 |
|
Utilities/
Security
|
|
Secure your PC and restrict access to it with Advanced Security Level. It gives you an excellent administrative support to control the users access rights for your computer by setting up the desired access control level for each user. 224 |
|
Utilities/
Security
|
|
NCrypt TX is a text based cryptographic tool with hashing capabilities. Supports DES, Rijndael-AES, SHA, and MD5 algorithms. Convert your e-mail or other messages into a sequence of hexadecimal characters. 224 |
|
Utilities/
Security
|
|
WebEradicator is the award-winning security solution that securely eradicates your PC activity histories. WebEradicator has the ability to cover up your previous PC activity, as well as eradicate selected files and directories that you specify! 246 |
|
Utilities/
Security
|
|
Spytech SpyLock is the award winning powerful and secure desktop lockdown system that allows you to quickly and securely lock your PC down while you are away. SpyLock securely locks down your PC desktop to prevent others from accessing your PC. 268 |
|
Utilities/
Security
|
|
Worried about how others are using your computer - or what they are doing - while you are away? SpyAgent is the powerful, award-winning solution, that can log all keystrokes, windows, websites, applications, internet connections, chats, emails, more! 308 |
|
Utilities/
Security
|
|
KGB Spy Software is a multifunctional keyboard tracking software (a.k.a. key logger) that is widely used by both regular users and IT security specialists to record keystrokes. 315 |
|
Utilities/
Security
|
|
Did you know that your computer collects information about where you go on the internet, details on forms you fill up and so on? This information represents danger to you if it is discovered by somebody. To protect yourself, use Evidence Destructor. 229 |
|
Utilities/
Security
|
|
Restrict access to Windows, protect PC, password-protect boot, apply access restrictions to PC, deny access to Control Panel, disable boot keys, context menus, DOS, Registry editing, Internet, network access. Hide desktop icons, disk drives, etc. 258 |
|
Utilities/
Security
|
|
CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. 267 |
|
Utilities/
Security
|
|
Controls access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level, allocates access to files and folders between users according to predefined schedules, and protects system files and folders. 237 |
|
|
Our Choice |
|
|
New Soft
|
|
|