Want to hire a development team?
Search Filter
Search Filter
Sort Listings By
Show Only
By Customer Review
Licence Type

Most Popular Scripts | Tools & Utilities | Security

Results 101-120 of 511
1st Network Admin
posted bysoftheapinSecurity
1st Network Admin offers a comprehensive protection for Windows-based network workstations under a public environment. It lets you restrict access to almost every corner of Windows for all PC workstations you have in your network, apply executable patches to them remotely, and schedule reboots, shutdowns, and Windows Explorer restarts from a single administrator's computer connected to a TCP/IP-based network or Internet. 1st Network Admin is very useful for Internet cafes, public-access terminals, libraries, large corporations, schools and for other applications where you have to deal with lots of stand-alone PC workstations to be secured and constantly maintained.
(0 ratings)
Reviews0
PriceUSD 59.00
Views332
Family Keylogger
posted byfkn0001inSecurity
Family keylogger is complete windows monitoring software allows parents to track all activities carried out on computer system by kids, spouse and children in their absence. Family keylogger is free parental control software records each voice chat conversations, sending and receiving mails, username, passwords, installed websites, visited sites and capture screenshots on every mouse click and stop taking screenshots during PC idle time.
(0 ratings)
Reviews0
PriceUSD 69.90
Views369
The Best Keylogger
The Best Keylogger is a Invisible Keylogger surveillance, Keystrokes Recorder, Spy Software tool that registers every activity on your PC to logs. The Keylogger allows you to secretly track all activities from all computer users and automatically receive logs to a desire e-mail. With this tool you will have TOTAL control of what is happening on your computer.
(0 ratings)
Reviews0
PriceUSD 49.00
Views759
Lock Folder Lock File!
This site is the place to go if you want to dramatically improve the level of security on your computer. Here you can find out more information about a powerful utility called Lock Folder Lock File!, which allows you to lock specific files, folders or even entire drives. You can find out all the information you need on this easily navigable site, complete with screenshots, detailed overviews and downloads for trial versions.
(0 ratings)
Reviews0
PriceUSD 34.95
Views494
SecureTower
SecureTower is your ultimate solution for data leak protection. An advanced and extremely effective system, it will help you to monitor how the Internet resources in your company are being used. You can stay in complete control by being constantly aware of any unauthorized attempts to transfer confidential information over the Internet. It keeps track of all user activities in the network and immediately notifies you if it detects leaking data
(0 ratings)
Reviews0
PriceUSD 3,995.00
Views332
VarySafe
posted bycheewooinSecurity
VarySafe is a document security program which makes data encapsulated stand alone executable viewer file. This viewer decrypts and view internal encrypted data only in the authenticated computer by using hardware fingerprint identification. It is also possible to set the expiration date and user's permission type (view or view + print). Any printing data can be used as a data input by using VarySafe printer.
(0 ratings)
Reviews0
PriceUSD 299.00
Views382
HTML Password Wizard
posted byfocusnetinSecurity
If you have a website, you may want to password protect some web pages of your site. Visitors need to login before enter these protected web pages. With HTML Password Wizard, you can encrypt and password protect web page, html page and whole website in minutes. HTML Password Wizard uses strong industrial standard encryption algorithms to encrypt the web pages with password, and the password will not be stored in the encrypted web pages. It can protect multiple web pages and visitors need to login only once. You can encrypt and password protect web pages with single password or multiple user names and passwords, and the number of user names and passwords is unlimited. To password protect web pages with this tool, what you need to do is just clicking a few buttons.
(0 ratings)
Reviews0
PriceUSD 39.95
Views1387
WinJail
As Chroot / Jail implementation for Windows platform, WinJail provides environment partioning to jails with their own files, processes and user accounts, offering additional level of system security. WinJail is Chroot / Jail implementation for Windows that works on the principle of Partial virtualization when all processes started in jail trying use files or directories are redirected by another address - copy of the files needed. This concept makes WinJail software indispensable in case of multi-user work or working in unsafe environment. WinJail is paravirtualization and security related software. It provides separate disk sandboxes for any kind of applications like Unix chroot / jail commands. WinJail provides transparent redirections of file operations from common places like Windows folders to private copies of them. Itl also enables unique possibility to separate programs by users who launched it, and every user is able to use his private sandbox even for the same application.
(0 ratings)
Reviews0
PriceUSD 49.00
Views463
Mil Firewall
posted by7yfertsainSecurity
Mil Firewall is fast, stable and reliable firewall that blocks all network attacks and information leaks from your computer. With Mil Firewall you can use Internet and local networks for work or entertainment while keeping full control over what goes in and what goes out of your computer. You can use specific network access rules for each program or use global rules for all programs. There are predefined rules for many programs. Recent in v2.2: Added real-time network activity monitoring.
(0 ratings)
Reviews0
PriceUSD 29.90
Views527
Transfer Lotus Notes Contacts to Outlook
Do you want to convert Lotus Notes contacts to Outlook? Get SysTools Lotus Notes Address Book Converter and transfer Lotus Notes contacts to Outlook, Excel and vCards files. Lotus Notes Address Book converter software can convert all lotus notes contacts and contact groups into MS Outlook contacts and groups (distribution lists). Import Lotus Notes address book (names.nsf) to MS Outlook with SysTools Lotus Notes Address Book Converter software.
(0 ratings)
Reviews0
PriceUSD 99.00
Views650
Crack Access Password
MS Access password recovery tool retrieves passwords that are created on ms access to protect your mdb database. Undelete Ms Access password recovery software has user friendly graphical user interface so it is facile to interact with all user. MDB Password Recovery software performs exactly what the name says successfully captures password from Shielded MS Access Database. Software effortlessly recovers access password using recovery algorithms.
(0 ratings)
Reviews0
PriceUSD 15.00
Views884
Advanced Keystrokes Logger
posted bypdddddeinSecurity
Advanced keystrokes logger software is best parental monitoring tool that secretly monitors all typed keystroke and special characters on your desktop PC in an efficient manner. Professional keyboard surveillance application is specially designed and developed to watch all activities like visited website URLs, chat conversation, email id, passwords and typed documents etc. Password protected keylogger utility stealthily takes screenshot of all opened windows application on your personal computer or laptop and provides facility to save recorded data in password protected encrypted log files. Advanced keystrokes logger program completely runs in invisible way, hidden in start menu, control panel, add/remove program list and prevents guest users to change configuration setting.
(0 ratings)
Reviews0
PriceUSD 49.00
Views401
MS Outlook Password Recovery Tool
posted byddffindinSecurity
Professional outlook password breaker application is capable to restore all lost or unreadable multilingual passwords of email accounts configured on MS office outlook. Outlook password restoration program displays complete list of misplaced passwords and keeps recovered passwords in text file for further reference. MS outlook express password recovery utility is compatible with all major versions of Microsoft office outlook and outlook express.
(0 ratings)
Reviews0
PriceUSD 38.00
Views494
IE Asterisks Password Recovery Tool
posted byddaocbzinSecurity
Password recovery software recover all lost or forgotten user identity of all web based email account like Yahoo, Gmail, Orkut, Hotmail, Comcast, EarthLink, MSN, AOL, G Talk, MySpace and many more. Internet explorer secret code revelation tool restore secret key code of Autocomplete field, auto form, FTP account and unmask encrypted asterisk character string of password textbox of any windows application regardless of their length and complexity.
(0 ratings)
Reviews0
PriceUSD 38.00
Views397
Advanced Keyboard Logger
posted byddkycapinSecurity
Advanced key logger software works in hidden mode and secretly captures all typed keystrokes, visited websites screenshots at regular interval of time. Key recorder surveillance utility is very helpful in office supervision to keep an eye on employee’s activities, in parental monitoring so that parents can know what their children’s are doing on the internet when they were alone at home and used to monitor internet crimes like hacking etc. Key logger utility bypasses all the antivirus software or anti spy tools. Key logger monitoring tool provides user friendly interface which is password protected that prevents the unwanted users to gain access into the setting of software.
(0 ratings)
Reviews0
PriceUSD 49.00
Views380
History Killer Pro
posted byghochinSecurity
History Killer Pro secures your online and offline privacy by removing dangerous and compromising files. This very intuitive and user-friendly program offers customizable features that let you control what gets cleaned and what stays. Custom view of Recycle Bin content will give you control over deleted files with their exact location. History Killer Pro is your online privacy guarantee.
(0 ratings)
Reviews0
PriceUSD 49.95
Views417
iPod Copier
iPod Copier is very easy to use tool to Copy your iPod Device(Any Type), you can copy tracks from iPod to your local hard drive. With iPod Copier you can: 1- View all Audio/Video iPod Contents. 2- Play Audio/Video Tracks of the iPod. 3- View the properties of the Audio/Video tracks of the iPod. 4- Copy Audio/Video tracks from iPod to local hard drive. 5- Search in the tracks properties to easily find the desired track. 6- Support All iPod Types.
(0 ratings)
Reviews0
PriceFree
Views575
Clean N' Optimize
Clean N' Optimize is a powerful easy to use tool to Clean, Optimize, and protect your system. It has highly customizable cleaning options and supports the most common web browsers and chat applications. It has a built in Shredder, so the cleaned files/folders can not be recovered again and separate shredder to manually shred files, folders, drives empty space, and recycle bin with the most famous and secure shredding algorithms.
(0 ratings)
Reviews0
PriceFree
Views525
MDB Password Recovery
MS Access password recovery tool retrieves passwords that are created on ms access to protect your mdb database. Undelete Ms Access password recovery software has user friendly graphical user interface so it is facile to interact with all user. MDB Password Recovery software performs exactly what the name says successfully captures password from Shielded MS Access Database. Software effortlessly recovers access password using recovery algorithms.
(0 ratings)
Reviews0
PriceUSD 15.00
Views557
Reveal IE Password
posted bydatawprinSecurity
Windows internet explorer hidden password recovery tool assists user to unmask misplaced or forgotten passwords of email accounts configured on Yahoo, Gmail, Hotmail, AOL, Orkut, Rediffmail, MSN and other search engine accounts. Identity password revealer unmasks lost confidential or secret login details (including username or password) of administrator accounts configured on web. Lost password rescue tool allows user to save recovered password on desirable location of hard disk drive in a text file format. Software is perfectly compatible to work with windows based operating systems including Win 98 2000 2003 XP XP Professional and Vista Editions. IE password revival application can retrieve back lost passwords of news group accounts, online shopping accounts, web forms, FTP accounts and Windows application accounts. Asterisks (****) characters password restoration utility just requires 128 MB RAM and 10 MB free hard disk space to get installed on computer system.
(0 ratings)
Reviews0
PriceUSD 38.00
Views481
Results 101-120 of 511