Agent Spy Pro 2.1.10

Agent-Spy.com offers Computer and Internet Monitoring Solutions for Home, Small Business and Corporate Needs, Parental Control and Remote Based Administration. Agent Spy software includes several integrated recording modules that monitor: chat conversations, e-mails sent and received, Internet usage, keystroke logger, passwords, Facebook, Twitter, Google Plus+ etc. Agent Spy Software can be installed on remote computers! More: www.agent-spy.com

Activity Monitor Pro 1.5.7

Activity Monitor Pro offers effective security on computers and provides the equivalent of the security camera! Activity Monitor Pro runs hidden in the background to secretly record keystrokes typed, passwords entered, websites visited, applications/files used and takes screenshots of the activities. Recorded data will be sent to you by email or FTP/Email address automatically and secretly. Find out more on www.activity-monitor.com

Security Task Manager 2.1.8

Security Task Manager is able to help PC users to get more control of their computer, speeding up processes. By showing the user a rundown of all their files, including those which are trying to install themselves, or ones which are potentially malicious, Security Task manager helps users to delete old, unnecessary or potentially harmful programs. Additional tools help to disable keyloggers and delete internet histories.

Security Task Manager 2.1.8

Security Task Manager displays a complete list of active processes, ranked by their potential security risk. By analyzing all active processes, Security Task Manager can identify potential security risks such as malware, keyloggers, spyware, and Trojans, and provides tools to quarantine those processes. It can also display file paths, CPU usage, and its description, as well as whether it is recording any of your keyboard or mouse actions.

Security Task Manager 2.1.8

Security Task Manager offers a range of security-minded tools and features, as well as a way of analyzing threats that does not rely on any electronic certification process. One problem that this piece of software deals with is malware. Specifically, it targets malware that your normal anti-virus software may have passed over. Security Task Manager also lets you immediately quarantine any processes that seem suspect.

Security Task Manager 2.1.8

Security Task Manager displays a complete list of active processes, ranked by their potential security risk. By analyzing all active processes, Security Task Manager can identify potential security risks such as malware, keyloggers, spyware, and Trojans, and provides tools to quarantine those processes. It can also display file paths, CPU usage, and its description, as well as whether it is recording any of your keyboard or mouse actions.

Security Task Manager 2.1.8

Speed up your computer with SecurityTaskManager. Slow processes and malicious programs prevent you from getting anything done quickly, and may even be a way for criminal hackers to take over your PC. Keep an eye on your files, and delete anything that looks suspicious, while reading information about all of your software programs with one simple tool. Security Task Manager is suitable for professionals and anyone who needs to keep their computer.

Security Task Manager 2.1.8

Security Task Manager displays a complete list of active processes, ranked by their potential security risk. By analyzing all active processes, Security Task Manager can identify potential security risks such as malware, keyloggers, spyware, and Trojans, and provides tools to quarantine those processes. It can also display file paths, CPU usage, and its description, as well as whether it is recording any of your keyboard or mouse actions.

Security Task Manager 2.1.8

Security Task Manager displays a complete list of active processes, ranked by their potential security risk. By analyzing all active processes, Security Task Manager can identify potential security risks such as malware, keyloggers, spyware, and Trojans, and provides tools to quarantine those processes. It can also display file paths, CPU usage, and its description, as well as whether it is recording any of your keyboard or mouse actions.

Security Task Manager 2.1.8

Security Task Manageris based on behavior analysis and protects Windows computers from new malware and security-critical software. The compact and fast tool analyzes Windows processes running on computers and shows a unique security risk rating for each process. It displays full file path of a process, its description and manufacturer, computers the process runs on and embedded hidden functions, such as keyboard monitoring or browser supervision.

Security Task Manager 2.1.8

Security Task Manager is an enhanced task manager for a Windows PC, allowing users to see additional information about every active process. It will scan and display information about each process running along with a security risk rating so you can decide how to handle that process. Processes can be turned off, deleted or quarantined from the Security Task Manager interface.

Clipboard Auto Clear 1.01.33

Worried about spy ware reading your clipboard? Want to free up the huge resources that some clips consume? Clipboard Auto-Clear is the set it and forget it utility which will clear your Windows clipboard whenever it is not in use.

Stellar Phoenix Outlook Password Recovery 6.0

Stellar Phoenix Outlook Password Recovery is a reliable software to reset or retrieve the lost and forgotten password of email accounts in your MS Outlook desktop email client. It provides you with the feature of adding PST files in multiple ways and creates six set of valid passwords from which you can select any and open the locked PST files. Further, it possesses the ability to decrypt the encrypted PST files of any size small or large

SterJo Strong Password Generator 1.0

SterJo Strong Password Generator creates strong and random passwords based on the characters you want to use. Nowadays password security should be taken really seriously, especially after several announces for security breaches into some large companies like Yahoo, Opera and Dropbox.

7thShare iTunes Backup Unlocker Pro 1.3.1.4

7thShare iTunes Backup Unlocker offers easy and efficient ways to recover iPhone/iPad/iPod backup password and enable access to iTunes backup file. This powerful iOS backup unlocker can recover contacts, SMS, photos, Email, etc stored in backup file. Besides, this software work with iPhone 7/7Plus/SE/6s/6s Plus/6/6 Plus/5s/5c/5/4S/4, iPod Touch 5/4, iPad Pro/iPad Air 2/iPad Air/mini 3/2/4/mini/3/2, etc.

Touch N Go 1.0.61228.

Touch N Go is a Biometric Framework (SDK or API) that allows programmers to integrate fingerprint recognition in their application with just FOUR lines of code. It supports multiple database (Oracle, MS SQL, MySQL Enterprise, Sybase, and IBM DB2, etc.) and multiple programming languages (C/C++, C#, .NET, VB.NET, F#.NET, Java, Ruby, Delphi, etc.). It also supports most fingerprint scanners available in the market.

JRecoverer for MS SQL Server Passwords 1.4.0

Audit and recovery of Microsoft SQL Server passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.

JRecoverer for MySQL Passwords 1.4.0

Audit and recovery of MySQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.

JRecoverer for Oracle Database Passwords 1.4.0

Audit and recovery of Oracle Database passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.

JRecoverer for PostgreSQL Passwords 1.4.0

Audit and recovery of PostgreSQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.

JRecoverer for Oracle Database Passwords 1.4.0

Audit and recovery of Oracle Database passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.

JRecoverer for MySQL Passwords 1.4.0

Audit and recovery of MySQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.

JRecoverer for PostgreSQL Passwords 1.4.0

Audit and recovery of PostgreSQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.

JRecoverer for MS SQL Server Passwords 1.4.0

Audit and recovery of Microsoft SQL Server passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.

JRecoverer for MS SQL Server Passwords 1.4.0

Audit and recovery of Microsoft SQL Server passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.

Page 20 of 539       10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30