PDF Anti-Copy 1.0.5

UNLIKE normal PDF protection utilities only adding restrictions to PDF files, PDF Anti-Copy reprocesses all the words and graphics on the sensitive PDF pages to secure PDF documents, without changing the original content format. The processed PDF files could be opened and viewed by PDF Readers, but copying and converting the content on the Anti-Copy Pages will not work even the cracker uses the PDF unlocking or restriction removing programs.

Super Keylogger 3.3.4

Super Keylogger is a professional yet very easy to use invisible keylogger for big and small companies, network administrators, concerned parents and PC owners. Super Keylogger includes several integrated recording modules that monitor: chat convos, e-mails, Internet history, keystrokes recorder, passwords! For more details: www.superkeylogger.com

Keystroke Logger Pro 1.7.15

Keystroke Logger Pro is an invisible keylogger for Windows systems that runs hidden in the background. Keystroke Logger Pro secretly records keystrokes, passwords, websites visited and also takes screenshots at set intervals just like a surveillance camera. More details: www.keystroke-logger.com

Free Hide IP 4.1.9.2

Free Hide IP, the best free privacy protection software, could hide your real IP address for FREE, anonymize your web surfing, keep your computer safe from hacker attacks and other risks, all with a single click. With it, you can send anonymous emails through any web based mail system, or get un-banned from restricted websites. Free Hide IP works with Internet Explorer, FireFox, Opera, Maxthon, MyIE and is compatible with all types of Internet.

Folder Password Lock Pro 10.8.0

Folder Password Lock Pro is a professional security tool to lock, hide and protect your folders and files. With very easy to use interface, just a few click, you can lock your folder and keep it safe, no one can open it without a password. This tool also provide protect for your folder and files to avoid delete, modify by mistake. You can also monitor a specified folder, any file created, modified and deleted will be logged.

Platinum Hide IP 3.5.7.8

Use Platinum Hide IP to keep your real IP address hidden, surf anonymously, secure all the protocols on your PC, and provide full encryption of your activity while working in Internet without any configuration. You can send anonymous emails, get un-banned from forums or blocked websites; you can even decide the IP location by selecting a country in the country list we provide. Platinum Hide IP works with Internet Explorer, Firefox, Opera, etc.

Hide IP Easy 5.5.6.2

Hide IP Easy allows you to hide your real IP, surf anonymously, prevent hackers from monitoring your online activity or getting your personal information, and provide full encryption of your online activity, all with a simple click of Hide IP button. With it, you can send anonymous emails, un-ban yourself from forums, Blogs, etc. You also decide to use fake IP from which country. Hide IP Easy works with Internet Explorer, Firefox, Opera, etc.

PowerSpy 12.18

Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.

Skype Spy Monitor Pro 2.58

Skype Spy Monitor Pro secretly records Skype incoming and outgoing IMs, calls and video chats. It logs all Windows users on a PC. It runs completely invisibly so that Skype users won't know its existence. It sends logs to an email or ftp like every 60 minutes. It is a great tool for monitoring your kids, spouse, employees, competitors and friends on Skype while you are away. You are able to know exactly what they are talking about online.

Power Spy Keylogger 12.22

Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.

Power Spy Lite 2.57

Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.

Auto Hide IP 5.6.4.2

Hide your real IP to protect your privacy automatically on the Internet. Auto Hide IP enables you to surf anonymously and automatically change your IP address every few minutes. With it, you are able to conceal your identity online by showing them a fake IP, preventing identity theft and hacker intrusions, all with the click of a button. You can also select fake IP from different countries via Choose IP Country option and can Check IP directly.

Power Spy for Windows 12.21

Power Spy secretly logs Facebook use, keystrokes, chats, emails, web sites, web cam images, user names, passwords, applications excuted and more. It records IMs in Skype, Yahoo Messenger, ICQ and others. Power Spy runs silently with system startup and automatically sends log reports to your email or ftp. Easy to install and setup. It is widely used in offices, homes, schools, detective agencies and police department.

Network LookOut Administrator Pro 4.2.5

The Network LookOut Administrator Pro allows you to see live screens of remote computers. This way, you can always watch what users are doing on the remote computer. Additionally, you have the ability to take control of a remote computer by controlling the mouse and keyboard; this is especially useful when you need to assist the person who uses the remote computer. If you are an administrator, you can easily administer remote computers.

DDACS 2.0

DDACS is a Windows security product, based on several filters and intended to complement protection of PC offered by the operating system. DDACS is designed to counter primarily zero-day attacks, by preventing them with access control and isolating already attacked programs. DDACS is suitable for both personal computers and servers.

DDACS 2.0

DDACS is a Windows security product, based on several filters and intended to complement protection of PC offered by the operating system. DDACS is designed to counter primarily zero-day attacks, by preventing them with access control and isolating already attacked programs. DDACS is suitable for both personal computers and servers.

DDACS 2.0

DDACS is a Windows security product, based on several filters and intended to complement protection of PC offered by the operating system. DDACS is designed to counter primarily zero-day attacks, by preventing them with access control and isolating already attacked programs. DDACS is suitable for both personal computers and servers.

DDACS 2.0

DDACS is a Windows security product, based on several filters and intended to complement protection of PC offered by the operating system. DDACS is designed to counter primarily zero-day attacks, by preventing them with access control and isolating already attacked programs. DDACS is suitable for both personal computers and servers.

DDACS 2.0

DDACS is a Windows security product, based on several filters and intended to complement protection of PC offered by the operating system. DDACS is designed to counter primarily zero-day attacks, by preventing them with access control and isolating already attacked programs. DDACS is suitable for both personal computers and servers.

DDACS 2.0

DDACS is a Windows security product, based on several filters and intended to complement protection of PC offered by the operating system. DDACS is designed to counter primarily zero-day attacks, by preventing them with access control and isolating already attacked programs. DDACS is suitable for both personal computers and servers.

DDACS 2.0

DDACS is a Windows security product, based on several filters and intended to complement protection of PC offered by the operating system. DDACS is designed to counter primarily zero-day attacks, by preventing them with access control and isolating already attacked programs. DDACS is suitable for both personal computers and servers.

DDACS 2.0

DDACS is a Windows security product, based on several filters and intended to complement protection of PC offered by the operating system. DDACS is designed to counter primarily zero-day attacks, by preventing them with access control and isolating already attacked programs. DDACS is suitable for both personal computers and servers.

DDACS 2.0

DDACS is a Windows security product, based on several filters and intended to complement protection of PC offered by the operating system. DDACS is designed to counter primarily zero-day attacks, by preventing them with access control and isolating already attacked programs. DDACS is suitable for both personal computers and servers.

Undetectable Keylogger 1.2.42

Undetectable Keylogger is an invisible spy tool just like a hidden surveillance camera pointed directly at your computer monitor! Undetectable Keylogger is a superior stealth monitoring and surveillance application that can secretly record information on your PC: websites visited, usernames, passwords, screenshots, incoming and outgoing emails + more. Undetectable Keylogger is really undetectable! More at www.undetectable-keylogger.com

Skype Spy Monitor 9.60

Skype Spy Monitor secretly record Skype's incoming and outgoing chat messages. It runs completely invisibly so that Skype users won't know its existence. Skype Spy Monitor send log reports to your email or ftp periodically. You can also check logs directly on the monitored PC. It is a small but powerful program that consumes very little system resource. Perfect for monitoring employees, children or spouse, and even investigating crimes.

Page 1 of 541       1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20