Software Downloads | Home | Submit | Latest News | Category | Contact us |
Search for laptop security Anti Theft Laptop Cop 2011.14 in Awareness Technologies, Inc. Anti-theft Laptop Cop is an invisible piece of software that gives you secret access to your stolen laptop remotely over the Internet no matter where the thief takes the computer. By being able to take control of your laptop without the thief's knowledge, a whole world of possibilities beyond just recovering the laptop opens up to you. Anti-theft Laptop Cop's Geolocation feature offers real time laptop geo-tracking that is more accurate than GPSLaptop Assistant 1.0 in DeSofto Laptop lid controller will increase your laptop security -- it will lock laptop when you close it. Also, it can suspend/shutdown the computer after specified time, play the sounds and execute applications. Different schemes for different power sources. The auto-mute option makes your PC silent when it going to sleep/suspend mode, turning off or while desktop locked. Also, the sound is automatically muted when the screensaver appears.Protegent 360-Complete Laptop Security 12 in Uunistal Systems Port Locker - We are providing laptop tracking software, laptop theft, notebook theft, laptop data security, notebook data security, notebook tracking, lost laptop, laptop travel security, locate stolen laptop.LAlarm Free Edition 1.2 in LAlarm Systems LAlarm is laptop alarm software, which sounds an alarm when a laptop is in danger of being stolen or losing data. LAlarm helps protect laptop and data. It protects the laptop against theft. It prevents data loss associated with hard disk drive errors or damages. It prevents a laptop failure due to a disk problem. It also protects data and prevents the hardware damage associated with sudden power loss.LAlarm 1.1 in LAlarm Systems LAlarm is a laptop alarm that helps protect laptop and data against theft and loss. LAlarm emits high-volume siren sound when a thief tries to steal a laptop. The software detects damages or errors in a hard disk drive and alerts the user for a repair. It helps prevent data loss before it becomes a serious problem. Furthermore the software alarms in case the battery power is about to run out. This feature helps prevent data loss.Inspice Trace 4.1 in Inspice Inspice Trace is a laptop tracking security software that protects your data and laptop. Email you location of your laptop. Accurate and worldwide tracking. 100% privacy safe. Tamper-proof. Stealth operation. Also it lets you destroy sensitive data in your laptop with an upgrade. Laptop theft is one of the top 3 computer crimes among virus and hacking. Protect your data and laptop against theft today.Cryptex - 1 TB Vault 2 in VisionWorks Solutions Inc. Cryptex gives you laptop and information security by providing you with the ability to work directly out of an encrypted vault. When the vault is unlocked, you can work out of it like any other hard drive on your computer. When the vault is locked, it will disappear from view. All data remains on disk in an encrypted format.Cryptex - 100 GB Vault 2 in VisionWorks Solutions Inc. Cryptex gives you laptop and information security by providing you with the ability to work directly out of an encrypted vault. When the vault is unlocked, you can work out of it like any other hard drive on your computer. When the vault is locked, it will disappear from view. All data remains on disk in an encrypted format.Cryptex - 6 GB Vault 2 in VisionWorks Solutions Inc. Cryptex gives you laptop and information security by providing you with the ability to work directly out of an encrypted vault. When the vault is unlocked, you can work out of it like any other hard drive on your computer. When the vault is locked, it will disappear from view. All data remains on disk in an encrypted format.Cryptex - 60 GB Vault 2 in VisionWorks Solutions Inc. Cryptex gives you laptop and information security by providing you with the ability to work directly out of an encrypted vault. When the vault is unlocked, you can work out of it like any other hard drive on your computer. When the vault is locked, it will disappear from view. All data remains on disk in an encrypted format.MacPhoneHome 3.0 in Brigadoon Software, Inc. PC PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When the stolen computer goes online it will send a stealth message containing its location. Recovery agents at MacPhoneHome will work with our customer, the local ISP and the investigating law enforcement agency to recover the stolen computer.MacPhoneHome 3.0 in Brigadoon Software, Inc. PC PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When the stolen computer goes online it will send a stealth message containing its location. Recovery agents at MacPhoneHome will work with our customer, the local ISP and the investigating law enforcement agency to recover the stolen computer.MacPhoneHome 3.0 in Brigadoon Software, Inc. PC PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When the stolen computer goes online it will send a stealth message containing its location. Recovery agents at MacPhoneHome will work with our customer, the local ISP and the investigating law enforcement agency to recover the stolen computer.PC PhoneHome 3.0 in Brigadoon Software, Inc. PC PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When the stolen computer goes online it will send a stealth message containing its location. Recovery agents at PC PhoneHome will work with our customer, the local ISP and the investigating law enforcement agency to recover the stolen computer.PC PhoneHome 3.0 in Brigadoon Software, Inc. PC PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When the stolen computer goes online it will send a stealth message containing its location. Recovery agents at PC PhoneHome will work with our customer, the local ISP and the investigating law enforcement agency to recover the stolen computer.
|