Search Filter
Search Filter
Sort Listings By
Show Only
By Customer Review
Licence Type

Security

Results 41-60 of 549
WinJail
As Chroot / Jail implementation for Windows platform, WinJail provides environment partioning to jails with their own files, processes and user accounts, offering additional level of system security. WinJail is Chroot / Jail implementation for Windows that works on the principle of Partial virtualization when all processes started in jail trying use files or directories are redirected by another address - copy of the files needed. This concept makes WinJail software indispensable in case of multi-user work or working in unsafe environment. WinJail is paravirtualization and security related software. It provides separate disk sandboxes for any kind of applications like Unix chroot / jail commands. WinJail provides transparent redirections of file operations from common places like Windows folders to private copies of them. Itl also enables unique possibility to separate programs by users who launched it, and every user is able to use his private sandbox even for the same application.
(0 ratings)
Reviews0
PriceUSD 49.00
Views253
Mil Firewall
posted by7yfertsainSecurity
Mil Firewall is fast, stable and reliable firewall that blocks all network attacks and information leaks from your computer. With Mil Firewall you can use Internet and local networks for work or entertainment while keeping full control over what goes in and what goes out of your computer. You can use specific network access rules for each program or use global rules for all programs. There are predefined rules for many programs. Recent in v2.2: Added real-time network activity monitoring.
(0 ratings)
Reviews0
PriceUSD 29.90
Views201
SafeHouse Explorer USB Disk Encryption
posted bypavritchinSecurity
FREE SafeHouse Explorer provides total privacy and protection for your sensitive files and folders using passwords and strong 256-bit encryption. This software is amazingly simple to use and features a familiar Windows Explorer-like look and feel. Protecting files is as simple as dragging and dropping them into SafeHouse Explorer. Create any number of private storage vaults on any media including external drives, USB memory sticks and CD/DVDs.
(3 ratings)
Reviews0
PriceFree
Views450
Transfer Lotus Notes Contacts to Outlook
Do you want to convert Lotus Notes contacts to Outlook? Get SysTools Lotus Notes Address Book Converter and transfer Lotus Notes contacts to Outlook, Excel and vCards files. Lotus Notes Address Book converter software can convert all lotus notes contacts and contact groups into MS Outlook contacts and groups (distribution lists). Import Lotus Notes address book (names.nsf) to MS Outlook with SysTools Lotus Notes Address Book Converter software.
(0 ratings)
Reviews0
PriceUSD 99.00
Views304
Crack Access Password
MS Access password recovery tool retrieves passwords that are created on ms access to protect your mdb database. Undelete Ms Access password recovery software has user friendly graphical user interface so it is facile to interact with all user. MDB Password Recovery software performs exactly what the name says successfully captures password from Shielded MS Access Database. Software effortlessly recovers access password using recovery algorithms.
(0 ratings)
Reviews0
PriceUSD 15.00
Views442
Advanced Keystrokes Logger
posted bypdddddeinSecurity
Advanced keystrokes logger software is best parental monitoring tool that secretly monitors all typed keystroke and special characters on your desktop PC in an efficient manner. Professional keyboard surveillance application is specially designed and developed to watch all activities like visited website URLs, chat conversation, email id, passwords and typed documents etc. Password protected keylogger utility stealthily takes screenshot of all opened windows application on your personal computer or laptop and provides facility to save recorded data in password protected encrypted log files. Advanced keystrokes logger program completely runs in invisible way, hidden in start menu, control panel, add/remove program list and prevents guest users to change configuration setting.
(0 ratings)
Reviews0
PriceUSD 49.00
Views221
Pocket PC Device Forensic Tool
posted bypddmobiinSecurity
Mobile phone forensic application examines general information of all Windows based Pocket PC and PDA mobile device. Pocket PC investigation tool shows IMEI, IMSI number and manufacturer name of any PDA mobile phone. Utility shows all read/unread text messages and phonebook details of Windows based Pocket PC. PDA surveillance application displays complete mobile information and generates detailed report in text or HTML format of all examined information. Pocket PC device forensic tool shows phonebook/contact numbers, task and appointment details of PDA mobile phone with correct date and time. PDA investigation tool is compatible with all latest versions of Windows operating system like XP, Vista and provides support of graphical user interface (GUI) which assists technical as well as non technical users in operating the software.
(0 ratings)
Reviews0
PriceUSD 79.00
Views271
MS Outlook Password Recovery Tool
posted byddffindinSecurity
Professional outlook password breaker application is capable to restore all lost or unreadable multilingual passwords of email accounts configured on MS office outlook. Outlook password restoration program displays complete list of misplaced passwords and keeps recovered passwords in text file for further reference. MS outlook express password recovery utility is compatible with all major versions of Microsoft office outlook and outlook express.
(0 ratings)
Reviews0
PriceUSD 38.00
Views269
IE Asterisks Password Recovery Tool
posted byddaocbzinSecurity
Password recovery software recover all lost or forgotten user identity of all web based email account like Yahoo, Gmail, Orkut, Hotmail, Comcast, EarthLink, MSN, AOL, G Talk, MySpace and many more. Internet explorer secret code revelation tool restore secret key code of Autocomplete field, auto form, FTP account and unmask encrypted asterisk character string of password textbox of any windows application regardless of their length and complexity.
(0 ratings)
Reviews0
PriceUSD 38.00
Views201
Advanced Keyboard Logger
posted byddkycapinSecurity
Advanced key logger software works in hidden mode and secretly captures all typed keystrokes, visited websites screenshots at regular interval of time. Key recorder surveillance utility is very helpful in office supervision to keep an eye on employee’s activities, in parental monitoring so that parents can know what their children’s are doing on the internet when they were alone at home and used to monitor internet crimes like hacking etc. Key logger utility bypasses all the antivirus software or anti spy tools. Key logger monitoring tool provides user friendly interface which is password protected that prevents the unwanted users to gain access into the setting of software.
(0 ratings)
Reviews0
PriceUSD 49.00
Views213
History Killer Pro
posted byghochinSecurity
History Killer Pro secures your online and offline privacy by removing dangerous and compromising files. This very intuitive and user-friendly program offers customizable features that let you control what gets cleaned and what stays. Custom view of Recycle Bin content will give you control over deleted files with their exact location. History Killer Pro is your online privacy guarantee.
(0 ratings)
Reviews0
PriceUSD 49.95
Views219
Smartphone Forensic Tool
posted byrecdtininSecurity
Pocket PC forensic software extracts all detailed information of Windows based Mobile Phones and PDA devices like database information, operating system registry information, file information, phone information, model number, manufacturer name, IMEI number, text messages etc. PDA surveillance examiner utility detects entire saved information through USB port within few seconds and generates reports in both html and text format for further use.
(0 ratings)
Reviews0
PriceUSD 79.00
Views297
iPod Copier
iPod Copier is very easy to use tool to Copy your iPod Device(Any Type), you can copy tracks from iPod to your local hard drive. With iPod Copier you can: 1- View all Audio/Video iPod Contents. 2- Play Audio/Video Tracks of the iPod. 3- View the properties of the Audio/Video tracks of the iPod. 4- Copy Audio/Video tracks from iPod to local hard drive. 5- Search in the tracks properties to easily find the desired track. 6- Support All iPod Types.
(0 ratings)
Reviews0
PriceFree
Views369
Recover Internet Explorer Password
posted bysubdrpuinSecurity
Internet explorer password unmask utility rescues all encrypted saved passwords and login information of online shopping sites, email portals, Yahoo, Gmail, MSN, business sites and other commercial sites. IE password recovery software safely recovers all lost, hidden secrets codes, forgotten passwords of any length and also regains auto complete form data (identity password, auto complete fields) from windows password registry. Internet explorer password finder application instantly retrieves multiple IE account passwords and windows application passwords with incoming/outgoing sever information. IE passwords unmask utility decrypts secret codes and unhide all special characters passwords. Advanced IE password breaker tool instantly recovers Unicode passwords and secret codes in few seconds just by dragging lens on password field. Utility is fully capable to store all recovered password list of multiple account users in a text file at defined location for future reference.
(0 ratings)
Reviews0
PriceUSD 38.00
Views180
Clean N' Optimize
Clean N' Optimize is a powerful easy to use tool to Clean, Optimize, and protect your system. It has highly customizable cleaning options and supports the most common web browsers and chat applications. It has a built in Shredder, so the cleaned files/folders can not be recovered again and separate shredder to manually shred files, folders, drives empty space, and recycle bin with the most famous and secure shredding algorithms.
(0 ratings)
Reviews0
PriceFree
Views357
MDB Password Recovery
MS Access password recovery tool retrieves passwords that are created on ms access to protect your mdb database. Undelete Ms Access password recovery software has user friendly graphical user interface so it is facile to interact with all user. MDB Password Recovery software performs exactly what the name says successfully captures password from Shielded MS Access Database. Software effortlessly recovers access password using recovery algorithms.
(0 ratings)
Reviews0
PriceUSD 15.00
Views337
Reveal IE Password
posted bydatawprinSecurity
Windows internet explorer hidden password recovery tool assists user to unmask misplaced or forgotten passwords of email accounts configured on Yahoo, Gmail, Hotmail, AOL, Orkut, Rediffmail, MSN and other search engine accounts. Identity password revealer unmasks lost confidential or secret login details (including username or password) of administrator accounts configured on web. Lost password rescue tool allows user to save recovered password on desirable location of hard disk drive in a text file format. Software is perfectly compatible to work with windows based operating systems including Win 98 2000 2003 XP XP Professional and Vista Editions. IE password revival application can retrieve back lost passwords of news group accounts, online shopping accounts, web forms, FTP accounts and Windows application accounts. Asterisks (****) characters password restoration utility just requires 128 MB RAM and 10 MB free hard disk space to get installed on computer system.
(0 ratings)
Reviews0
PriceUSD 38.00
Views303
Keyboard Keystrokes Logger
posted byfrkgpadinSecurity
Download keystrokes recorder software records computer keyboard activities in a secret log file. Keyboard activity tracker program is helps you to watch your kids or employees computer and internet usages in your absence. Keystroke tracker utility works in stealth mode and not detected by any antivirus software or anti spy tool. Keylogger program records all typed text, username, passwords, internet usage in a secret log files.
(0 ratings)
Reviews0
PriceUSD 45.00
Views200
Free Internet/System History Cleaning Studio
Free Internet/System History Cleaning Studio was customized for you to clean system and erase the IE cache, cookies, history, typed URLs, auto complete history, and Window's temporary folder, run history, search history, open/save history, recent documents, etc. With it, no more worry about track history access by others who use your computer now!
(0 ratings)
Reviews0
PriceUSD 27.99
Views259
PC Commander
posted bycoretechinSecurity
PC Commander gves you total control over anything running on your Windows PC, all conveniently from your web browser. Stop processes, manipulate services, download files, log off or disconnect users, view event logs, restart the computer and much more. Take advantage of our free 30-day trial and experience it for yourself!
(0 ratings)
Reviews0
PriceUSD 39.99
Views181
Results 41-60 of 549