KeyBag PRO 1.0.47

Undetectable keystroke recorder captures passwords and keyboard activity, e-mails and chats, docs on your Mac. KeyBag Pro is a keystroke spy recorder that saves all system passwords, messages written, instant message charts, programs run, etc.This recovery utility restores all application passwords and even deleted texts enabling to export this data. Our password logger software boosts your data security and is fit for private and business use.

ArtistScope DRM for PDF 2.2

ArtistScope DRM is a total control solution for the Document Rights Management of documents, images and web pages where an author can assign different permissions per user or group of users. When DRM rights are assigned the document becomes "for their eyes only" and any copies of that document forwarded on cannot be viewed by others unless they also have rights of view. Tokens cannot be forged and certificates cannot be copied or redistributed.

Cerberus Security Guard 4.2.0

A tool to optimize your online activity (and not only) and ensure a safe and reliable Windows experience is pretty much requisite. Cerberus Security Guard is a program devoted to security challenges whose purpose is to keep your computer safe from attacks of Trojan horses, keyloggers, multiple interceptors, and other kinds of system hacks, including various types of spyware.

Cerberus Security Guard 4.2.0

A tool to optimize your online activity (and not only) and ensure a safe and reliable Windows experience is pretty much requisite. Cerberus Security Guard is a program devoted to security challenges whose purpose is to keep your computer safe from attacks of Trojan horses, keyloggers, multiple interceptors, and other kinds of system hacks, including various types of spyware.

Cerberus Security Guard 4.2.0

A tool to optimize your online activity (and not only) and ensure a safe and reliable Windows experience is pretty much requisite. Cerberus Security Guard is a program devoted to security challenges whose purpose is to keep your computer safe from attacks of Trojan horses, keyloggers, multiple interceptors, and other kinds of system hacks, including various types of spyware.

Cerberus Security Guard 4.2.0

A tool to optimize your online activity (and not only) and ensure a safe and reliable Windows experience is pretty much requisite. Cerberus Security Guard is a program devoted to security challenges whose purpose is to keep your computer safe from attacks of Trojan horses, keyloggers, multiple interceptors, and other kinds of system hacks, including various types of spyware.

Cerberus Security Guard 4.2.0

A tool to optimize your online activity (and not only) and ensure a safe and reliable Windows experience is pretty much requisite. Cerberus Security Guard is a program devoted to security challenges whose purpose is to keep your computer safe from attacks of Trojan horses, keyloggers, multiple interceptors, and other kinds of system hacks, including various types of spyware.

Cerberus Security Guard 4.2.0

A tool to optimize your online activity (and not only) and ensure a safe and reliable Windows experience is pretty much requisite. Cerberus Security Guard is a program devoted to security challenges whose purpose is to keep your computer safe from attacks of Trojan horses, keyloggers, multiple interceptors, and other kinds of system hacks, including various types of spyware.

Cerberus Security Guard 4.2.0

A tool to optimize your online activity (and not only) and ensure a safe and reliable Windows experience is pretty much requisite. Cerberus Security Guard is a program devoted to security challenges whose purpose is to keep your computer safe from attacks of Trojan horses, keyloggers, multiple interceptors, and other kinds of system hacks, including various types of spyware.

Cerberus Security Guard 4.2.0

A tool to optimize your online activity (and not only) and ensure a safe and reliable Windows experience is pretty much requisite. Cerberus Security Guard is a program devoted to security challenges whose purpose is to keep your computer safe from attacks of Trojan horses, keyloggers, multiple interceptors, and other kinds of system hacks, including various types of spyware.

DutyWatch Remote 1.2.41

Spy software includes keystroke and password recording. Due to ability to monitor employee web this perfect keylogger for Mac assists in time and expense tracking. Providing remote computer surveillance this spy software enables to view all computer statistics from a remote computer, via iPad or iPhone. DutyWatch Remote records all restricted words and sends a warning notification via e-mail with a screenshot attached in case of emergency.

KeystrokesWatch 1.4.42

KeystrokeWatch presents a feature-rich monitoring tool that creates detailed reports about keyboard activity performed on your Mac. Working undetectable, KeyBag Pro captures every keystroke typed on any application, creates the record of notes written, instant message charts, programs run, etc. Including the ability to record all passwords entered, this surveillance tool finds its appliance both in private and business use.

Logon Sentry 1.2.46

Monitor all login attempts both succeeded and failed. In order to prevent an access to your data, this program generates an alert and captures an image from the iSight camera. You won't be lost in guesses trying to figure out the identity of the outsider since Logon Sentry will recognize the spy and provide you with an image accuracy of the computer trespasser.

1st Network Admin 3.3

Comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to every corner of PC workstation, apply executable patches remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. In total, 1st Network Admin supports over 600 different security restrictions, options and tweaks.

CD-DVD Lock 3.04

CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. CD-DVD Lock will allow you avoid many of headaches connected with unauthorized software installations from any removable media, and also prevent data leak by removable media.

Security Administrator 14.0

Stop others from tampering with your PC. Deny access to Control Panel applets, disable boot keys, context menus, DOS windows, Registry editing, network access, hide desktop icons, local, network and USB drives, Start menu items, taskbar. Apply password protection to Windows, restrict users to running specific applications only, control Internet usage, view statistics of working of your kids or employees.

Access Lock 3.304

Access Lock is a system-tray security utility, which enables you to lock your PC with a password by two methods. The first one hides your desktop and shows a screen saver while the second one does not hide it allowing others to watch what happens there. It also prevents unauthorized access on boot, logs the attemps of breaking the lock and allows people around to leave messages while the system is locked.

Public PC Desktop 7.72

Setup an Internet kiosk or a public access PC; disable access to vital files and allow only necessary applications to be run including Internet Explorer. Lock access to the desktop using username and password authentication, time-locked code (allows users to access PC for a given period of time only) or a combination of both. The program is ideal for public libraries, Internet cafes, information terminals or homePCs to limit childrens

ABC Security Protector 5.5994

This nice free security utility enables you to protect your PC by disabling some features like: use of the MS-DOS command prompt in Windows and real mode DOS applications from within the Windows shell, and disable function keys on boot up like the F5, F6 and F8 keys. The program is very useful if you want to disable the lowlevel access to your system. It's easy to use, excellent online help is also available. Try our password and security tools,

File & Folder Protector 3.595

Protect Files and Folders is a an easy-to-use password-protected security utility you can use to password-protect certain files and folders, or to hide them from viewing and searching. Upon accessing any protected file or folder, dialog box querying password appears on the screen, and by entering a valid password, user gets access to the selected file or folder.

Easy Disk Drive Safeguard 10.0

Use Easy Disk Drive Safeguard to hide and lock your local, network, Floppy and USB drives as well as disable the AutoRun feature for them. A password protection can be applied to the program to prevent your users from changing the security settings you enforce.

Outlook Express Protector 2.394

Control access to Outlook Express and its e-mail and address data bases with Outlook Express Protector. When it is active, no programs can get access to the files and nobody can steal or spoil your data. When you try to start Outlook Express or open Address Book, the program requests you to enter a password to grant access. If a user does not enter a valid password or cancels the authentication dialog box, OE will not be opened.

kascouponcode.com 1.0

Kaspersky Antivirus software is among the best antivirus solution that is available to us. The antivirus is winner of many awards and effectively protects you computer from various Trojans, worms, virus, spywares, malwares, rootkits as well as bots. The software is also capable of detecting various kinds of new threats that may harm your computer and prevents them from entering and infecting your PC.

Port Locker Software 5.0.0.1

Unistal?s Port Locker software prevents vital & important data to be transferred from one PC to another using Flash drive, DVD/CD Writers, PCMCIA Ports and Ethernet Ports etc. Port Locker prevent two way threat to businesses because the Flash drive, DVD/CD writers, PCMCIA ports, Ethernet ports can be used not only to carry sensitive data out, but also upload malicious software code onto company's network.

Access Administrator 5.104

Protect your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and..

Page 14 of 49       4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24