Excelsmarttools Premiu
Windentify Windentify is a state-of-the-art User Identification system that prevents any sort of unauthorized access to your PC. Secure, reliable, and with the unique facility to restrict access to systems and files to just a single users voiceprint, this is the best in voice-based security applications. Protect your personal data, sensitive documents and even restrict unauthorized access to your PC in your office. Windentify is a cost-effective, efficient and far superior alternative to traditional text-based password security currently found on mainstream PCs. It helps to prevent unauthorized user or any outside user can not get access to your system from getting access to your computer system by providing voice based password security....
Tsm Encryption Plugin For Outlook Please purchase this plugin only if you already own a registered copy of our Top Secret Messenger (TSM) product which included some other plugin. If you do not own TSM, you will need to order the complete package that includes the basic TSM installation and the Outlook Express plugin. Refund Policy There is an evaluation demo of TSM on our website. For this reason, our refund policy is restricted to replacement of goods damaged in shipment only. Please refer to our homepage DOWNLOAD link for further information. Once our software is downloaded, or is shipped to your premises, it is considered to be 'Opened'. It is part of our refund policy that all Opened Software cannot be returned for refund, regardless of the delivery method....
Safehold Ever wanted to leave your desk at work, but couldn't do so for fear of other people accessing your private data? Ever wanted to make sure that your kids do not access the computer without permission? Now there's a simple solution! Safehold by K-Labs Online is the complete personal desktop locking system. While activated, Safehold will deactivate all system keys - stopping access to the workstation - even stopping CTRL + ALT + DELETE! When a certain password is entered, full system control will be handed back to the user. Features include: 1. Complete System locking. 2. Disabling of System keys (such as CRTL, ALT, DELETE, TAB). 3. Hidden password. 4. 'AutoLock' Technology allows Safehold to automatically lock the computer when the mouse has been inactive for a specified amount of time....
Top Secret Messenger With Outlook Plugin Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for Microsoft Outlook. It is completely integrated into this program, allowing users to encrypt outgoing e-mails automatically by simply clicking on the Send button! Similarly, it automatically decrypts incoming e-mails as soon as they arrive....
Top Secret Messenger With Outlook Express Plugin Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for Outlook Express. It is completely integrated into this program, allowing users to encrypt outgoing messages automatically by simply clicking on the Send button! Similarly, it automatically decrypts incoming messages as soon as they arrive. If you have already purchased a registered version of Top Secret Messenger with some other plugin and would like to use it with Outlook Express, please purchase the cheaper standalone Outlook Express plugin that does not include TSM. Refund Policy There is an evaluation demo of TSM on our website. For this reason, our refund policy is restricted to replacement of goods damaged in shipment only. Please refer to our homepage DOWNLOAD link for further information. ...
Ectaco Phrasebook Span
Ms Access 2000 Password Recovery MS Access 2000 Password Recovery will display the password to any MS Access file type (file extensions of .mdb, .mda, and .mde). This program works for MS Access files saved in MS Access 2000....
Tsm Encryption Plugin For Outlook Express Please purchase this plugin only if you already own a registered copy of our Top Secret Messenger (TSM) product which included some other plugin. If you do not own TSM, you will need to order the complete package that includes the basic TSM installation and the Outlook Express plugin. Refund Policy There is an evaluation demo of TSM on our website. For this reason, our refund policy is restricted to replacement of goods damaged in shipment only. Please refer to our homepage DOWNLOAD link for further information. Once our software is downloaded, or is shipped to your premises, it is considered to be 'Opened'. It is part of our refund policy that all Opened Software cannot be returned for refund, regardless of the delivery method....
Rsaci Password Remover This program removes the RSACi password, also know as the Content Advisor password to Microsoft Inernet Explorer. Once this password is removed, you will never be able to see it again....
Atomic Mailbox Password Cracker A software solution capable of recovering lost or forgotten e-mail passwords for the mail clients that work with mail servers using POP3 and IMAP4 protocols. The program is universal and is independent of the e-mail client work design. The recovering of the password does not take more then 5 minutes including installation of this tool....
Ectaco Flashcards Engl
Top Secret Messenger With Icq Plugin Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for instant messengers, such as America Online's ICQ. It is completely integrated into these programs, allowing users to encrypt and decrypt their messages automatically or manually with one click of a button right from the ICQ's message dialogs! Refund Policy There is an evaluation demo of TSM on our website. For this reason, our refund policy is restricted to replacement of goods damaged in shipment only. Please refer to our homepage DOWNLOAD link for further information. Once our software is downloaded, or is shipped to your premises, it is considered to be 'Opened'. It is part of our refund policy that all Opened Software cannot be returned for refund, regardless of the delivery method....
Storagecrypt 128bits Removable storage is now popular in the world . It is easy to use , but the data is not secure . Do you care about someone accesses your data by stealth ? StorageCrypt is the solution . It has ability to encrypt the disk drives which are using FAT or NTFS file system. StorageCrypt almost support all kind of removable storage , For example , usb hard drive , usb flash memory disk , pcmcia hard drive , compact flash memory , memory stick , etc . StorageCrypt only spends few seconds to encrypt entire storage drive. The encryption Algorithm is 128 bits IDEA . encrypt usb drive,encryp ...
Terminus 6 Terminus 6 - Leave No Traces - The ultimate data destruction toolkit. Terminus 6 brings professional IT security/COMSEC grade destructive power to the masses: erase files, slack space, free space, protect your privacy, destroy chunks of data even if they're not in a file, destroy huge files (2GB or larger) with ease, and more. Network-aware for easy remote data destruction, and International standards compliant - America's NISPOM/NAVSO/AFSSI/HIPPA, Australia's ACSI, Russia's GOST, Germany's VSITR, and more. $29.95 a seat makes Terminus affordable, and license packs make bulk purchases cheaper and easier. (NOTE to government purchasers: EFW is a CCR-registered vendor.) Individual copies are $29.95/seat, with license packs available for bulk purchases. See our website for license pack pri...
Esp Vision ESP delivers powerful recording features that allows you to monitor all areas of your PC, tracking every action down the last keystroke pressed or the last file deleted! ESP can be configured to silently E-Mail log files to a remote E-Mail address. Great for checking up on websites and applications that are used at home while you are out. ...
Ms Backup Password Recovery MS Backup Password Recovery recovers passwords to all versions of MS Backup .qic files. ...
Dtlibrary
Anti Secure Ultimate Password Recovery Anti-Secure Ultimate Password Recovery is an all-in-one password recovery tool for Windows. Lost or forgotten passwords for E-mail programs, instant messaging software such as AIM and Yahoo Pager, website accounts, MSIE AutoComplete fields, windows screen savers, and many more software programs can be instantly recovered. This program can also unmask or unhide passwords hidden behind asterisk password protected text boxes, find passwords in the Windows registry, scan for hidden URLs of programs installed on your system, recover the AppsProtector XP Password, remove the Internet Explorer content ratings or RSACi password, and reveal the Windows 95/98/ME password of the screen saver. to This program also contains a utility that can decode files encoded by MS Script Encoder. A datafile is als...
Passwords Base Passwords Base is developed to remember all your passwords and to store them in the protected kind. All that is necessary for you to remember, it the unique password to your passwords base. Every base encrypt by powerful algorithm, with a 256 bit key. Its intuitive interface make it easy to use by everyone....
Folder Security Guard Folder Security Guard allow You safe protect folders and data inside folders on your drives. You can hide folders completely making it invisible and inaccessible for people using your computer. Folder Security Guard allow You restrict access to the folders that contain your sensitive data over local or shared computers. After folder protection via Folder Security Guard, folder contents cannot be read, copied or modified. To access the locked folders, you should supply unlock via explorer content menu, or select protected folder in folders tree. If You set password protection, you should type correct password for unprotection. ...
Folder Password Guard FPG can lock the specified folder, user who want to open the folder must input the admin password. FPG can hide specified folder too. User must provide admin password to unhide it. An example of FPG wide application is that you can lock or hide the personal folders by FPG when this computer is shared to other persons. Any body who used your computer can't browse your locked folder unless you give them your password. The password is encrypt by SHA1 signature algorithm, which can't been cracked. FPG supports Windows 2K/XP/2003 now. ...
Csss Use your computer as a home or office security system! Remote listening of location from any telephone!...
Drs 2006
Taceo Essential Taceo is an email and document security software solution for small businesses, providing an easy-to-use content protection and rights management solution. Taceo is a fraction of the cost of most enterprise solutions, enabling small business owners and individuals to securely distribute sensitive email messages and documents while protecting the privacy, integrity and authenticity of their intellectual property. Taceo's toolbar integration within Microsoft Outlook makes securing email and attachments using powerful encryption as easy as a click of a button. Taceo also provides a right click access Wizard that applies rights management protections to files, preventing forwarding, printing and screen capture, and guides the user through assigning email recipients with ease. Users...
Real Registry Protector Real Registry Protector(RRP) is a utility designed to protect windows registry for writing, deleting or adding key and values. The RRP can protect the registry key you specified, and you can specify the treatment(PERMIT, REJECT, ASK ME). The RRP was Developed base on the system driver layer, so the RRP's protection can't be round. You can use RRP to protect important registry key. It's very important for stopping trojan/worm to write registry. Almost trojan/worm parasitize the operating system via writing registry(Such as the "Run" key or file associate key).RRP can reject these operation or report to you, then you can decide how to do it(For Expert). Besides, RRP can stop spite HTML file change your Internet Explorer(IE) setting(exp: homepage) via Internet Explorer(IE). There ...
Anti Keylogger Elite An powerful keylogger detect utility which can identify unknown keylogger. ...
Folder Password Expert Folder Password Expert is a software tool that lets you restrict access to the folders that contain your sensitive data. When folders are password protected and locked, their contents cannot be read, copied, modified or deleted. To access a locked folder, you must supply the correct password. The password for the locked folders is not stored in the Windows registry or somewhere else on your computer. Unlike other utilities, Folder Password Expert will not allow to access the locked folders in Windows Safe mode, DOS, or other operating systems....
Accesspw This utility will instantly display the password set on a Microsoft Access .mdb Database file (Office 97, 2000, XP) thus allowing you to open, edit, copy, and view the full contents, even if you have no idea what the original password was. ...
Direct Mp3 Splitter Jo
Password Auditor Developed especially to aid conformance with UK Miinistry OF Defence security requirements, this advanced software allows you to perform regular penetration testing against your networks, revealing weaknesses and recovering passwords. The software allows you to penetration test a network, and then quickly and simply produce a locked PDF report on the findings. You can also fix potential weaknesses, and produce a locked PDF report on these....
Retrievepdf V3 0 RetrivePDF allows you to retrive content from an Adobe Acrobat PDF file if you have forgotten the password. It will allow you to open PDF files where you have set the user password, as well as re-enable the options to copy, print, edit, and save the file where either password has been set....
Secura Archiver Secura Archiver is professional archiving software for use in personal or commercial environments that demand 128 bit data encryption to meet and exceed today's security standards. Using Blowfish encryption with a 128 bit key Secura Archiver achieves the same level of security that banks use for their online services and is even suitable for military operations. The integrated Key Manager stores security keys with your descriptions which allows you to quickly and conveniently choose the right security key for your archives....
Advanced Keylogger Advanced KEYLOGGER is an invisible surveillance tool that records every keystroke to encrypted user-friendly easy-to-understand logs. Logs can also be automatically sent to any number of specified e-mails. Advanced Keylogger also monitors the internet activity by logging all web-pages the user visits. Advanced KEYLOGGER keeps track of everything happening on the screen invisibly screenshotting what is on, also being capable of monitoring text and graphics copied and cut to the clipboard. Whenever whereever whatever is typed - it cannot be hidden from Advanced KEYLOGGER! ...
Atomic Zip Password Cracker Password recovery program for ZIP and WinZIP archives. The program is designed to reveal the forgotten passwords for ZIP archives. It has friendly user interface and many options that help to speed up the password recovering. ...
Desktop Atomic Clock
Atomic Asterisk Cracker A program to recover the passwords under asterisks in Windows XP and older versions...
Alparysoft Videolock For Webcam Your computer can recognize you! New image recognition security system for your computer. Alparysoft VideoLock for Webcam is a new surveillance security system based on the webcam aided facial image identification technology adapted for PC use. The product is designed to protect your computer and space around from unauthorized access and inform computer owner about the events happening at the workplace or home during his/her absence. ...
Cd Access Control Professional CD Access Control Professional, controls which compact disks can be run on a local computer, this is done by setting a rule determing the times that the disk can be used and whether it is allowed or ejected from the system. ...
Stealth Recorder Pro The Stealth Recorder Pro is a new type of computer software that enables you to record a variety of sounds and transfer them automatically through internet without being notified by original location or source. This program supports various sound formats including MP3, WMA, and Wave. Since it can transfer what is recorded to an Internet email or FTP site in the background automatically and stealthily, you can easily send or receive the contents of a conference or a transcript of lectures promptly. Say, you have two computers in separate locations such as one at your office and the other at home; you can listen to voices or sounds near one computer at the other remote location privately. You can also control activities of Stealth Recorder Pro at a remote location through a web browser on ...
Deskman Professional E
Hslab Logger Business The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media. Using this software to become possible to receive the information about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file name or keyword) or to CD/DVD/Zip and other removable media. This is very useful for the rigid control over use of computer systems in business and for the parental control over children's actions. The program is NOT keylogger and does not write any keystrokes! This is a principle positi...
Hslab Logger Personal The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media. Using this software to become possible to receive the information about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file name or keyword) or to CD/DVD/Zip and other removable media. This is very useful for the rigid control over use of computer systems in business and for the parental control over children's actions. The program is NOT keylogger and does not write any keystrokes! This is a principle positi...
Password Protect Password Protect is a software program to protect your documents against unwanted access. It will not let other users view, copy, or modify your sensitive data. What differs Password Protect from other utilities? You can password protect folders located on external and USB drives. Folders remain protected in DOS, Windows safe mode and other operating systems. Password Protect provides strong protection for your sensitive data, as it does not store your passwords on your hard drive or in the Windows registry where malicious users can easily find them. Password Protect is easy to use as it comes with a step-by-step wizard to select and password protect your folders. Password Protect supports Windows Explorer, so you can right click a folder to protect it and double-click a folder to unprotec...
Cryptplugin CryptPlugin is a plugin for Eudora Mail Clients Version 3.x, 4.x and 5.x . CryptPlugin will encrypt a given message using RSA RC2 block cipher or RC4 stream cipher. First you choose a password and a encryption algorithm, and CryptPlugin will automatically encrypt and encode the selected message. After this, the message can only decrypted and read by a recipient who has already CryptPlugin installed and knows the encryption key. CryptPlugin is an easy and fast way to add powerful encryption/decryption capabilities to Eudora mail....
Info Tech Professional Random Password Generator Easy to use Random Password Generator, it is driven by a prime modulus multiplicative linear congruential pseudorandom number generator. This particular mathematical approach, combined with a novel method of determining a different seed each time passwords are generated, guarantees the user the greatest possible randomness with the longest possible non-repeating string. The Info Tech Professional Random Password Generator allows the security conscious system administrator the choice of generating random passwords of any length and in any combination of three character types: letters (upper and lower case), numbers, and/or special characters. The Info Tech Professional Random Password Generator is extraordinarily fast and occupies only 200 Kb of disk space uncompressed. The Info Tech P...
Deskman Professional Edi
Icccrets Password Recovery System ICCcrets scans your PC for cached passwords, and decodes password fields containing asterics. ...
Crime Catcher Crime Catcher is software for your webcam that allows your computer to act as a security system. The software will monitor for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Hide Crime Catcher completely from view! Email notifications with attachments FTP images to an FTP server Webpage mode - image uploaded every x seconds Remotely login to your webcam and see live images in realtime. Mask out areas which could cause false alarms; Reports can be produced on captured images in HTML. Test for movement to allow you tune the settings to ensure movement detection is sensitive enough / too sensitive. Overlay a caption / date and time onto the image. Easily combine captured images into a movie! Have a dog bark or ano...
Accent Office Password Recovery You don't need to be a hacker in order to recover a lost password from an Office document. Accent OFFICE Password Recovery supports a wide range of Office document formats and includes a handy Wizard that helps you to choose proper password recovery algorithms. Recover lost passwords quickly and easily!...
Facecode FaceCode - Face Recognition PC access control software FaceCode gives you complete access control to your PC like no other product before. Specially designed to prevent children, family members, co-workers and other workstation users from gaining access to your computer, FaceCode is the only product that can ensure the real identity of the user. Using a simple web-camera and without the need to type in username or password FaceCode is the perfect user friendly access control software to your PC. Using state of the art face recognition technologies, FaceCode recognises existing PC users and logs them onto their own user area, while prevents unauthorized users from logging to your computer without your presence, even if they know your user name and password. Combine with artifici...
Password Manager Password Manager is a very useful utility to manage your passwords. Remember one password, Left the Others to Password Manager. Through Password Manager, what you have to remember is only one password. All the datas are stored encrypted in your own computer. It come with some useful utility such as 'secure file remover', 'password generator', 'password guard', etc....
Delta Wallet
Intouch Lock Award-winning, versatile and comprehensive security solution for home users and system administrators alike to restrict access to the PC and sensitive information on it. This password-protected security utility allows you to block access to files, folders, disks, applications, Web, Control Panel modules, IE parameters, Desktop, Start menu and much more. Multi-user and multi-profile support. Built-in scheduler. Event logging. Stealth-mode support....
Advanced File Shredder Advanced File Shredder securely erases files or folders on your PC using seven pass US Government standard wiping and cryptographically strong random number key. Shredded files cannot be restored by any data recovery software. Protect yourself: Windows physically does not remove files from your hard disk and sensitive data like personal, business or financial information can be easily restored. Info: Order Type - "Site License" allows unlimited number of installations within your company...
Cryptdecrypt CryptDecrypt is a powerful software applications designed for electronic data protection. CryptDecrypt utilizes well known algorithms for data encryption including AES (Advanced Encryption Standard) that is an approved industrial security encryption algorithm in the USA. It has easy-to-use interface, is integrated with Windows Explorer, supports drag-and-drop operations, features multiple encryption algorithms to choose from and even provides data erasing capability....
Encode It Encode It is a easy to use file security system using the new SCC 524,288 Bit encryption method - very secure and a single system wide password. In addition, it employs 21 layers of protection to ensure your data is secure. Includes Decode It - a very small decoding utility that you can take anywhere and decode any number of files encoded by your copy of Encode It, because each application will generate an unique keycode upon installation. Also includes full support for decoding one or more files directly from within Windows Explorer, plus all the goodies including Copy, Move, Delete, Rename, Printing, Viewing, Exporting, Drag Drop, and many more functions that make Encode It the number one choice among professionals. Download Encode It now and start using it today! ...
Passgen PassGen is a tool for creating secure cryptic passwords. It allows you to create random passwords that are highly secure and extremely difficult to break due to optional combinations of any or all of the following: Numeric [0-9] Alpha Lowercase [a-z] Alpha Uppercase [A-Z] Special Characters (!@#$%^ *-,) Extended Characters (ÂcÂY§©€"®) You can create 1000's of passwords using from 4 to 50 characters. This application is used by New Users, Power Users, Network Administrators and Internet Service Providers to create secure passwords. You will never have to think of another random password....
Default Printer
Accent Excel Password Recovery Lost a password to an MS Excel workbook? Lost passwords for modifying sheets in an MS Excel workbook? Accent EXCEL Password Recovery will break the passwords and allow you to access your documents again! Passwords to workbook sheets are found almost instantly. To reduce the time of searching for a password to a workbook, the program has three search methods: a brute-force attack, an attack by an enhanced mask, an enhanced dictionary-based attack....
Remote Logger Remote Logger is a small, easy-to-use keylogger with remote installation feature....
Skf Encrypt This program encrypts your files using a key you specify. It is as efficient as file encryption gets, the encrypted file is the same size as the unencrypted file....
Cd Inspector Now you can easily prevent the using of the CDs with inadmissible (not tested, dangerous) software or with other inappropriate content. Earlier the system administrators had a headache how to provide an access to CD-ROM drives in such a way that CD-ROM would be available for users in their everyday work and at the same time CD-ROM wouldnt be a source of danger of undesirable software intrusion. Many parents would like to protect their children from the PC games stuffed with the scenes of violence and pornography that are quite often distributed on CD-ROMs. Thus, CD Inspector allows you to solve the problem of CD-ROMs access management. Using CD Inspector the administrator creates a database file of the permitted compact disks and adds the additional CDs there when required. The database...
Accent Office Password Recovery Lt If you use programs from the MS Office software package, then an unpleasant situation may occur when you forget or lose passwords to you MS Office documents. In most cases, the quickest way of access to the password-protected data is to recover the password. It can be done by means of the following programs: AEXPR, AWRDPR. These programs operate with certain MS Office documents. But what should you do, if you actively use a whole number of programs comprising MS Office rather than only one application? In this case, you may need a combined solution. Let us offer you such a solution: Accent Office Password Recovery (LT). By means of this program accumulating in itself the functions of AEXPR, AWRDPR, you will get an access to potentialities of these programs from one application. By means of...
Declan S French Flashc
Accent Word Password Recovery Lost a Microsoft Word password? No problem! Breaking passwords for opening documents and saving changes; three types of attacks (brute-force, attack by an enhanced mask, enhanced dictionary-based attack); flexible, customizable password search options; help through all stages of the search. You can find it all in Accent WORD Password Recovery. Try the limited version for free and discover that everyone can effectively recover lost passwords!...
Accent Money Password Recovery If you lose or forget the password for MS Money, don't despair - use Accent Money Password Recovery to recover the password faster than you will remember or find the password otherwise. The Accent Money Password Recovery can recover the passwords in MS Money 99/2000/2001. Simply open your password protected file, and this program will find, show, and save the password. AMPR has a nice GUI....
Accent Access Password Recovery If you lose or forget the password for MS Access, don't despair - you can use Accent Access Password Recovery to recover the password faster than otherwise. The Accent Access Password Recovery can recover the passwords in MS Access 95/97/2000. You simply open your password protected file and this program will find, show, and save the password....
Look N Stop Look 'n' Stop is a personal Firewall. Look 'n' Stop allows you to control all transfers between your computer and Internet in order to stop all suspicious packets and to stop non-trusted applications to connect to Internet. Look 'n' Stop provides two levels of filtering. First one is at network level, all incoming and outgoing packets are watched. Second one is at application level, all application trying to connect to internet are watched. For Internet filtering, a configurable ruleset allows you to define the authorized packets and the packets you'd like to block. A default ruleset is provided with Look 'n' Stop. This default ruleset suits for a standard Internet use. For application filtering, Look 'n' Stop maintains a list of applications authorized to connect to Internet. Ever...
Dad Your The Best Scre
Ultimate Zip Cracker V 7 2 The Ultimate ZIP Cracker uses several powerful algorithms to restore lost ZIP, ARJ, MS-Word and MS-Excel passwords. UZC is amazingly fast, capable of testing more than 4,500,000 ZIP passwords/sec on a Pentium III. Implementing a true 'Try before you buy' principle, UZC recovers your passwords before purchasing the program. Simply purchase the program to reveal the passwords. Supporting four file types, UZC cost less than most programs supporting only one, making it an invaluable addition to your software toolbox....
Passwocular The Passwocular allows you to read the password string which is displayed in edit control as an asterisks. Did you ever try to remember that darned internet login in your office computer to use it home? ******* - looks not very informative? The Passwocular will open up this string. The latest version will reveal the passwords in the Internet Explorer windows....
Tsm Encryption Plugin For Msn Please purchase this plugin only if you already own a registered copy of our Top Secret Messenger (TSM) product which included some other plugin. If you do not own TSM, you will need to order the complete package that includes the basic TSM installation and the Outlook Express plugin. Refund Policy There is an evaluation demo of TSM on our website. For this reason, our refund policy is restricted to replacement of goods damaged in shipment only. Please refer to our homepage DOWNLOAD link for further information. Once our software is downloaded, or is shipped to your premises, it is considered to be 'Opened'. It is part of our refund policy that all Opened Software cannot be returned for refund, regardless of the delivery method....
Timewatcher Update Here you can order updates to the computer program TimeWatcher. TimeWatcher allows you to control the access to computers. It contains many features very useful for businesses selling computer access time. Also parents can use it to restrict their kids computer usage....
Top Secret Messenger With Msn Plugin Top Secret Messenger (TSM) is a powerful and secure public-encryption add-on for MSN Instant Messenger. It is completely integrated into this program, allowing users to encrypt outgoing messages automatically by simply clicking on the Send button! Similarly, it automatically decrypts incoming messages as soon as they arrive. If you have already purchased a registered version of Top Secret Messenger with some other plugin and would like to use it wit MSN Instant Messenger, please purchase the cheaper standalone MSN plugin that does not include TSM. Refund Policy There is an evaluation demo of TSM on our website. For this reason, our refund policy is restricted to replacement of goods damaged in shipment only. Please refer to our homepage DOWNLOAD link for further information. ...
Csjami Minicom Lite
Keypack KeyPack for Windows 98/95/NT/2000 is a special utility designed to manage and keep track all kind of passwords, including web site access codes, software serial numbers and other secret numbers you may have. Using easy to use interface you can quickly and safely store, edit, search, create backup, print, or even generate new passwords. ...
Passwords By Mask Passwords by Mask is a application designed to generate passwords of any character content. This application is smallest, easiest and realfast program could be used for network administrators,internet service providers and other jobs where passwords must be created and administered. Passwords by Mask allow users to do choice type of password symbols. You can to fix random or specified alphabetic, random or specified numeric, random or specified alphanumeric,random or specified special or random or specified all keyboard characters for every password symbol. This feature allow to generate a User ID and Password at random at same time. Passwords by Mask can to use Windows clipboard for transfer passwords between program and other applications. ...
Advanced Password Generator Advanced Password Generator is a Windows based application designed to generate passwords of any length or character content. This application is used by network administrators, internet service providers and others to create and administer passwords. It is fast, small and easy to use. Advanced Password Generator gives users a choice of random number generators that produce extremely random seed values. Random number generators are best written in low-level languages. Some that are built into this application are impossible to write in a high-level language like Basic, Pascal, C++ or others. Advanced Password Generator will create alphabetic, numeric, alphanumeric or all keyboard character passwords of user-defined lengths. Passwords can be generated in lowercase or mixed case....
Estop eSTOP! was developed as a security product with the intent to view and (e)mergency STOP problem TCP connections. It displays in real-time any TCP connection in or out of your computer. Web connections are an example of a TCP connection. It can block TCP connections by IP/hostname or port and it also can log connections. This item is delivered as an unlock code via email....
256e Chat This is great if you don't want anyone to see the messages you are sending across the internet. Using this program will make it impossible for your ISP or anyone trying to see messages sent from your computer over the internet. Online banks use 128 bit encryption which can only be cracked using a quantum computer! 256 bit encryption is military strength....
Csjami Minicom Lite Fr
Perlguardian Encrypt your perl source code , cgi source code perl modules with ease using online web based form simple copy and paste the script and encrypt ! For a Demo Please visit http://www.perlguardian.com...
Winscript Decoder WinScript Decoder is a tool decode all files these are encode by Window Script Encoder. WinScript Decoder decode for all file these are encode by Window Script Encoder:.asp, .asa, .htm, .html, .js.. Decode one file . Decode all files in a folder. Example: Before Decode: After Decode: function GetDisplayInputPoint(val) nbsp; nbsp; nbsp; if isnull(val) Or val = "" then nbsp; nbsp; nbsp; nbsp; nbsp; nbsp; GetDisplayInputPoint = "" nbsp; nbsp; nbsp; else nbsp; nbsp; nbsp; nbsp; nbsp; nbsp; if cdbl(val) nbsp; nbsp; nbsp; nbsp; nbsp; nbsp; nbsp; nbsp; nbsp; val = 0 nbsp; nbsp; nbsp; nbsp; nbsp; nbsp; else nbsp; nbsp; nbsp; nbsp; nbsp; nbsp; nbsp; nbsp; nb...
Extended Task Manager Home License The Warecase eXtended Task Manager (XTM) is a powerful auxiliary tool designed for simplifying the environment of the software developer. XTM is an extended task monitoring and troubleshooting tool for Microsoft Windows 2000 OS and later versions of Windows. XTM can give fast solutions for sudden problems which may arise in a product's functioning without having to either reinstall it from the user workstation or even without needing to close the application. - Debugging and improving application development. - A rich workstation investigation tool. - White box testing sessions for the QA department. - Investigation tool for integration possibilities. - Accelerating application support process. - And much more.... IMPORTANT! The Home License applies to the use of XTM...
Swift Paste Swift Paste is a powerful clipboard software. Windows clipboard can only store one data when you cut/copy data. Swift Paste can store multiple clipboard datas and easy paste these datas to active window. Otherwise, you can also store your E-Mail, website, address, password, product info, etc to Swift Paste then paste them at anytime....
Wintasks 5 Professional Based on years of research, the award-winning WinTasks is now one of the most popular tools in the war against malicious software, and the perfect complement to your firewall and anti-virus software. Whether you are new to Windows, a business professional, or a systems administrator, you can rely on WinTasks to quickly improve your computer's security and speed....
Cool Cd Burner
Evidence Eraser Evidence Eraser is the only TRUE way to totally delete unwanted files and programs from your system. Fully optimizes your system as well. ...
Extended Task Manager Enterprise License The Warecase eXtended Task Manager (XTM) is a powerful auxiliary tool designed for simplifying the environment of the software developer. XTM is an extended task monitoring and troubleshooting tool for Microsoft Windows 2000 OS and later versions of Windows. XTM can give fast solutions for sudden problems which may arise in a product's functioning without having to either reinstall it from the user workstation or even without needing to close the application. - Debugging and improving application development. - A rich workstation investigation tool. - White box testing sessions for the QA department. - Investigation tool for integration possibilities. - Accelerating application support process. - And much more.... ...
Work Performer Work Performer is a program what will help you to save huge amount of precious time performing all simple computer work without your participation. The original algorithm integrated into Work Performer allows recording all actions of the mouse and keyboard then subsequently reproduce them as though you work on a workplace. Also the program may be used for creation of visual tutorials and presentations....
Ghost Control Ghost Control is a software that can record, save, and replay any mouse or keyboard actions you do while working on your computer. Everything you record is being processed within Ghost Control System which remembers not only mouse and keyboard actions but also it remembers many parameters of windows environment in a moment of recording. That will bring you a feeling that Ghost Control actually knows what are you doing on a computer, not only that "he" will record just mechanical mouse moves and keyboard strokes, "he" will record the whole task you did with many invisible operating system parameters included. The recorded task can be executed while you are away using advanced scheduling system included. You can simply manage daily, weekly, monthly schedules. Everything you record can be e...
123registry 123Registry is for users who want to see what starts up at Machine Startup. The program monitors and administers the Registry and startup folder via the Users input. This program makes looking for virusses in the Registry Run Key a breeze. It also has a backup and restore function wich is ideal after system crashes. It also displays the windiws product key and other information about the currant windows installation....
Comm Drv Standard Ed
4diskclean Gold Finds and fixes PC problems fast, keeping your system running at peak performance and reliability, and properly maintains Windows to prevent problems altogether. This awarded software will clean and fix up your PC ! . Delete unnecessary files and temporary folders. Free up to one gigabyte. . Fix invalid Windows registry keys (New). Speed boot time. . Eliminate duplicate songs and files easily. . Erase all internet files (browser cache, history, cookies). . Auto clean Internet Explorer cache on browser exit. . Block spyware, adware and bad cookies (2990 items). . Clean third-party application temp files and recent opened file lists (MRUs). . Clean all windows shortcuts that do not point to an existing file. . Erase items typed in to the start menu-run, start menu-...
Laptop Battery Monitor Laptop Battery Monitor, is an intelligent laptop battery monitoring software. It accurately displays an estimated time, until your battery will discharge, or fully charge. You no longer have to worry on how much battery power you have left, when you can have this information in hours, minutes and seconds. Features : - Display remaining time until the battery is fully discharged (when running on batteries) - Display remaining time until the batteru is fully charged (when the battery is charging from the AC power supply) - Application runs in system tray, using minimum memory and screen space - Custom indicator colors - Sound alerts when charging starts/stops, battery is full charged, or battery charge drops under a predefined percentage - Automaticly starts when you turn on your la...
Disk Space Clean Clear Pro The World's Fastest Hard Drive Cleaner! Recover Hard Drive Space of Your PC only 1 Minute! With it's advanced search and clean capability it can find over 81 types of thousands of junk files in less than a minute.With ability to control which files are to be deleted this is a very easy to use tool....
Extended Task Manager License Pack The Warecase eXtended Task Manager (XTM) is a powerful auxiliary tool designed for simplifying the environment of the software developer. XTM is an extended task monitoring and troubleshooting tool for Microsoft Windows 2000 OS and later versions of Windows. XTM can give fast solutions for sudden problems which may arise in a product's functioning without having to either reinstall it from the user workstation or even without needing to close the application. - Debugging and improving application development. - A rich workstation investigation tool. - White box testing sessions for the QA department. - Investigation tool for integration possibilities. - Accelerating application support process. - And much more.... ...
Code128 Barcode Creato
Evidence Terminator Act now! We can help! "EVIDENCE TERMINATOR" can DEEP CLEAN your hard drive to remove hidden traces of what you've done! Once Evidence Terminator is installed, you can forget about it as it clears out damning evidence every time you start your system! Regularly $69.95, purchase before midnight tonight and save $20.00 ! IMPORTANT NOTICE: Please make sure that you enter your email address correctly as this is where we will send your registration information. ...