Want to hire a development team?
Search Filter
Search Filter
Sort Listings By
Show Only
By Customer Review
Licence Type

Most Popular Scripts | Tools & Utilities | Security

Results 181-200 of 511
The EZ Data Encryption Software
posted byalexcasinSecurity
The DataCryp website offers the DataCryp protection suite which is a series of tools designed to protect your websites source code from competition theft and email harvesters. Suitable for most Windows based operating systems (Mac Version coming soon), this software package is ordered instantly through your website at $19.95 and delivered automatically to your customer. The software requires free registration to obtain an unlock code which is handled automatically through the DataCryp website, giving you a truly hands free eBusiness. The DataCryp software suite is unique as it includes a PayPal encryption tool to protect downloadable products from being "stolen" by educated visitors who can extract the download link form the PayPal payment information by viewing the pages source code.
(0 ratings)
Reviews0
PriceUSD 29.95
Views747
PowerKey
posted byinfoinSecurity
PowerKey is an advanced encryption toolkit designed to protect your most sensitive data. Thanks to its easy-to-use and flexible interface you can now fastly encrypt your files and not worry about your information anymore, cause now it's safe. PowerKey allows creation of SFX packages (like WinZip). It also features secure deletion (Wipe) option providing you with the powerful tool designed to avoid restoration of sensitive data.
(0 ratings)
Reviews0
PriceUSD 24.00
Views975
LanAgent Standard
LanAgent is a smart tool to monitor all actions of a remote computer user. The program records various kinds of data, which will be sent to you on your first request: keystrokes; connections established; websites visited; programs, files or directories opened; clipboard contents and so on. A detailed report on a specified time period is always available to you, yet the program is absolutely invisible to this remote user.
(0 ratings)
Reviews0
PriceUSD 49.90
Views844
Phishing Doctor
Using phishing doctor You can archiving log files, viewing log entries, or Setting the alert event level.It responds to two types of alerts: Spam Mail Alerts and Spam Site Alerts. The Spam Mail Alert is a popup window that is displayed when you recieve an e-mail that is suspected to be a phishing e-mail. The Spam Site Alert is a popup window that is displayed when you try to navigate on a site that is suspected to be a phishing one.
(0 ratings)
Reviews0
PriceUSD 29.00
Views1055
TrustPort Workstation
Antivirus Program, Personal Firewall, Encryption Application TrustPort Phoenix Rebel Workstation is a security platform consisting of an antivirus program, personal firewall, encryption application, digital signature and on-line encryption tools. It is designed for the protection of individual workstations in the network as well as those of separate users.
(0 ratings)
Reviews0
PriceUSD 49.00
Views1008
TrustPort Servers
TrustPort Servers can help to solve your problems with the viruses that are contained in files and documents, which are stored at and copied to Windows file servers in company's local network area. Components: - TrustPort Antivirus intended for permanent protection of data being stored on file-servers. - TrustPort Firewall is a basic component of server's protection from outer intrusion.
(0 ratings)
Reviews0
PriceUSD 181.00
Views1006
TrustPort Disc Shredder
The Disc Shredder utility removes all the data from your disc. The software runs directly from the boot diskette or CD. The application uses DOS operating system so there is no need to remove the disc for deletion from the computer and connect it to another one with functional operating system Windows. By using Disc Shredder you can easily and safely remove all data on the hard disc located in your PC.
(0 ratings)
Reviews0
PriceUSD 1,028.00
Views996
TrustPort Archive Encryption
This software is designated for Windows operating system. It allows on-demand encryption and decryption of files and folders into PDA compatible CPH format or to create encrypted archives. There is also a possibility to create self-extracting EXE archives that can be unpacked independently on TrustPort Encryption. These archives can be also packed into ZIP envelope to be able to send them as e-mail attachments.
(0 ratings)
Reviews0
PriceUSD 32.00
Views1074
Secure Storage Pro
posted byrayslabinSecurity
Want to be absolutely sure your data is always protected? Want to have your files encrypted but don't want to hinder access to them? Get Secure Storage Pro, a virtual disk utility that encrypts data on the fly. Place all your confidential data (files, documents, pictures, e-mails, etc) onto a virtual disk and set the password. Only the password bearer will be able to access data, the others won't even know it's there! 100% FREE Trial.
(0 ratings)
Reviews0
PriceUSD 79.00
Views1056
Public Access Desktop
posted bysofthiveinSecurity
Make a foolproof public access workstation, protect the critical files, and manage applications to be run. You can create an Internet Kiosk for cybercafe, library information terminal, in-store terminal or restrict children activities on home PC, etc. Set the proper type of access to a locked desktop such as user-name and password authentication, time-locked code (that allows users to access PC for a given period only) or a combination of both.
(0 ratings)
Reviews0
PriceUSD 49.00
Views1112
IM Lock Home Edition Single User
posted by3ComvigoinSecurity
IM Lock controls and blocks access to Instant Messaging and peer to peer services that put your family at risk from internet hazards. Free trial version available - sets up in less than a minute. Blocks all popular services: MSN Messenger, Yahoo Messenger, ICQ, AIM, Skype, eMule, iTunes, and many more. Also controls web browsing. IM Lock is continually updated to detect and block new programs as they are released. Easy setup and administration.
(0 ratings)
Reviews0
PriceUSD 29.00
Views1083
System Optimizer And Tweaker
With System Optimizer And Tweaker you can control your Windows system ,it includes many powerful tweaks and hidden Registry settings. The simple user interface enables fast access to settings that affect the speed, security, efficiency, and convenience of your computer, System Tweaker And Optimizer also includes tweaks for many known software applications,Win Tweak Manager is the best utility for modifying system settings.
(0 ratings)
Reviews0
PriceUSD 19.00
Views1079
Mom Knows Best
posted byioniioniinSecurity
Mom Knows Best is an easy way to restrict and monitor usage of your computer. Our logging features, keyword triggers and our manual white/black lists make Mom Knows Best a great solution for home or small business use. See whats being typed into any program, when its typed and by the user that typed it. Use keyword triggers to restrict a broad range of web sites quickly. Or restrict by domain and file rules.
(0 ratings)
Reviews0
PriceUSD 35.00
Views935
Max Secure Content Audit Enterprise
posted byrachnapinSecurity
Content Audit is a powerful tool that allows administrators to scan all the Internet content enters into their network. It comes with maximum protection and pre-set monitoring functions, which can easily be customized to meet department (group) or user needs. Administrators in the organization decide what type of content is appropriate for each department (group) and user. It is based on the client server architecture and uses push deployment
(0 ratings)
Reviews0
PriceUSD 29.95
Views1380
Elite Spy Software
posted bywidestepinSecurity
Elite Spy Software is the professional monitoring tool. Fast and Powerfull! Elite Spy Software helps people keep tabs on what is going on on their computers while they are away or while they are operated by other users. Elite Spy Software works in low-kernel 100% stealth mode and gurantees that all keystrokes on the local PC are recorded and stored into encrypted user-friendly report, which can be secretly e-mailed to your mailbox.
(0 ratings)
Reviews0
PriceUSD 69.00
Views1011
DiskLogon
posted byhsctiminSecurity
DiskLogon is one of the most powerful and securest logon software. Like smart card logon software, it enables you to log on to your computer with a portable disk. It can save you the trouble of typing your user name and password every time you log on. All you have to do is to plug your portable disk in your computer, and you can log on to your computer quickly and safely.
(0 ratings)
Reviews0
PriceUSD 19.95
Views878
Pivo SSH Component
Pivo SSH was developed for commercial organization for securing remote shell access. The protocol supports compression and tunneling multiple TCP connections over one secured connection. SSH supports various authentication schemes such as password-based, keyboard-interactive, allowing the client authorize itself using several schemes at the same time. Some SSH implementations also support PKI infrastructure for server and client authentication.
(0 ratings)
Reviews0
PriceUSD 49.00
Views1056
Pivo Security Component
Modern software must be more than secure, it must be unbreakable. No home-made solutions, nothing like that. The proven way is complete power of standard-based software components which offer you unprecendented level of security of your information! Think about S/MIME, PKI, PGP, SSL/TLS, SSH, SFTP, PDF ... Too much TLAs? Each abbreviation absorbs knowledge and experience of avowed security specialists. And you've got this all with Pivo.
(0 ratings)
Reviews0
PriceUSD 49.00
Views1110
SpyDefense
Simple for beginners. You can use SpyDefense's Express mode to quickly and easily remove spyware from your computer. Using settings designed by our experts, SpyDefense checks for spyware in all known locations. Complex for advanced users. Advanced and Custom scan modes allow you to customize SpyDefense to provide the exact level of protection you need. Intuitive for everybody. SpyDefenses unique user interface has an user-friendly design.
(0 ratings)
Reviews0
PriceFree
Views1699
Privacy Restorer
Your PC knows a lot about you. What websites you�ve visited. What you�ve seen and downloaded. Your passwords, personal preferences, files you�ve used, programs you�ve installed, your usage habits, and more. It�s an open book for all to see�and exploit. With a simple mouse click, award-winning Privacy Restorer permanently removes the history of your activities on a PC.
(0 ratings)
Reviews0
PriceUSD 29.95
Views913
Results 181-200 of 511