Software Downloads | Home | Submit | Latest News | Category | Contact us |
Security & Privacy Zip Password Finder 1.0 in ASTONSOFT Co. Zip Password Finder 1.0Program Selector Pro 98/ME 4.3 in Leithauser Research Program Selector Pro provides access control and usage management. Replaces standard Windows 95/98/ME user interface (task bar, Start button, and icons) with user configurable list box of program names. Supervisor level password is required to add programs to the program list box. Administrative level password is required to restore the original Windows interface. Programs can also be individually password protected. Virus protection included.Logger 2.0.3 in Handy Software Lab Program for the background control of workstations in a network environment. The program is started from a logon sctipt and is almost invisible to the user (it is visible in a Task List). It reads the captions of windows appearing on the top (topmost) and writes down them to a log file by the local machine and on the remote resource, allocated for this purpose.Evidence Eliminator 5.058 in Internet Washers Evidence Eliminator is an Internet Washer that destroys sensitive local files and documents and erases your tracks. The software erases cache, cookies, history, typed URL, index.dat, email history, pictures and recent used applications. Because Windows is not capable of deleting information beyond recovery, you are at risk! Evidence Eliminator makes sure that all your sensitive information is deleted in a non-recoverable way.Stealth Keyboard Interceptor for Win NT/2000/XP 6.0.2 in Raytown Corporation LLC Stealth Keyboard Interceptor for Windows NT/2000/ XP (SKIn2000) is a monitoring program which allows to intercept all keystrokes, mouse clicks, captions of active windows, static text and other. It has a unique set of features that makes SKIn2000 the powerful program, suitable for perfect monitoring of user's computer activity.Scam Sensor for Outlook 2.0 in ByteGems.com Software Scam Sensor is a Microsoft Office Outlook add-in that examines every e-mail message you read and notifies you if the message is a phishing scam. It does not use any online databases of fraud e-mails or forged hyperlinks. Instead, the program uses a set of special algorithms which use information received from an e-mail message to determine whether the message tries to cheat the reader. No training needed. Install Scam Sensor and feel safe.Stealth Keyboard Interceptor for Win NT/2000/XP 6.0.2 in Raytown Corporation LLC Stealth Keyboard Interceptor for Windows NT/2000/ XP (SKIn2000) is a monitoring program which allows to intercept all keystrokes, mouse clicks, captions of active windows, static text and other. It has a unique set of features that makes SKIn2000 the powerful program, suitable for perfect monitoring of user's computer activity.UniKey Software Protection SDK 1.0 in SecuTech Solution Inc. Integrated with UniKey, SecuTecho s software protection system not only can protect software from piracy, but also provide software sales and distribution management, license control. The UniKey Software Protection System offers numerous licensing options, such as expiration dates, user limit, demo, trial version, renting, leasing. With easy to use tools like API, enveloper, developers can easily make encryption which is difficult to crack.UniKey Video Protector 1.0 in SecuTech Solution Inc. Only the UniKey Video Protector Player is able to play the encrypted media. Therefore you need the encrypted archive file and a Unikey with the correct license. The encrypted file is read block by block, decrypted with the Unikey, and played back with the UniKey Video Protector Player. With this method the whole video or audio file will never be stored completely in the memory.Family Spy Software 11.9 in eMatrixSoft Family Spy software is a keylogger, Facebook and system spy software for home PC monitoring. It secretly monitors and logs all their chats, emails, web site visits, videos watched, downloads, apps used, user names, passwords and more. It monitors Skype, Yahoo Messenger and other IMs. It sends log reports to your email every hour or sooner as you wish.Leak Blocker 1.1.2 in Delta Corvi LLC Leak Blocker prevents data leakage from corporate computers using removable devices. It can be used to achieve two main goals: restricting the use of external devices and activity monitoring (including file access actions). In addition Leak Blocker can allow only read operations.
|