0

Effective Password Manager

Effective password manager is the perfect tool for storing all your most sensitive and valuable information like passwords, logins, pin codes and access codes as well as credit card and account numbers, lock combinations etc. It creates a reliable and well protected database which you can conveniently search and get the right information in no time. You can also store backup copies on various types of media and easily restore the database in case of a hard drive failure.
Just imagine! No more lost or forgotten passwords! Fast and reliable access to the necessary information! A truly effective way to manage your confidential information.
0

Evidence Cleaner

Evidence Cleaner is a very user-friendly application designed to remove all traces of your PC activity, including your surfing habits (cache, history, cookies etc.), recent documents list, Clipboard contents and Recycle Bin, amongst many others.

Practically every application on your PC keeps a record of your activity in the form of a Recent File/Documents list. Plenty of free plug-ins are available from the Evidence Cleaner official website, which let Evidence Cleaner remove all activity from numerous applications.
0

Privacy Shredder

cleaning up all the tracks of your Internet and system activities. It can clean your browser’s cache, cookies, Web forms data, entries in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, clean recent documents lists for popular applications
0

OurSecret

Steganography enables you to use digital data hiding techniques (steganography) to hide and encrypt files within other files (carriers) such as picture or sound files. This allows you to encrypt sensitive information, while at the same time hiding it in a file that will not look suspicious, so nobody even knows that there is any encrypted information. The carrier files are fully functional and identical to the original files (except for size) , so if data was hidden in a picture file, the picture can still be viewed normally. The program gives you the option to hide a small text message, or one or more files that you select. It uses 256bit encryption, advanced compression and you can specify a password to extract the hidden files.
0

Secure Password Manager

Secure Password Manager is a desktop utility that spares you the trouble of filling in your logins, passwords, and other personal data manually. You can automatically fill in password in ANY application (IE, Netscape, Opera, ICQ, MSN…) . Secure Password Manager uses industrial strength 256-bit AES/Rijndael/Blowfish encryption to keep your passwords secure.
0

Spyware Killa Italian Version

Se dopo aver scaricato musica, hai cominciato a vedere quei noiosi messaggi che appaiono sul tuo schermo, vuol dire che sei stato infettato da Spy Ware eo Ad Ware! Ma non preoccuparti – Noi abbiamo la soluzione con il prodotto software piC9 rivoluzionario su Internet oggi. SPYWARE KILLA! SpyWare Killa analizzerC Gratuitamente il tuoi PC e ti avviserC se ci sono file che infettano il tuo PC! Come la maggior parte delle persone, avrai speso molti soldi per il tuo computer. Non permettere ad aziende sconosciute su Internet di infettare il tuo PC inserendo SpyWare o AdWare sul tuo PC a tua insaputa! Prova adesso Gratuitamente SpyWare Killa e controlla personalmente se il tuo PC C( infetto Sarai felice di averlo fatto!
0

Folder Password Expert

Folder Password Expert is a software tool that lets you restrict access to the folders that contain your sensitive data. When folders are password protected and locked, their contents cannot be read, copied, modified or deleted. To access a locked folder, you must supply the correct

Read more
0

Password Protect

Password Protect is a software program to protect your documents against unwanted access. It will not let other users view, copy, or modify your sensitive data. What differs Password Protect from other utilities? You can password protect folders located on external and USB drives. Folders remain protected in DOS, Windows safe mode and other operating systems. Password Protect provides strong protection for your sensitive data, as it does not store your passwords on your hard drive or in the Windows registry where malicious users can easily find them. Password Protect is easy to use as it comes with a step-by-step wizard to select and password protect your folders. Password Protect supports Windows Explorer, so you can right click a folder to protect it and double-click a folder to unprotect it.
0

Ardamax Keylogger

Ardamax Keylogger is a small, easy-to-use keylogger that captures users activity and saves it to a logfile. The logfile can be viewed as a text or web page. Use this tool to find out what is happening on your computer while your away.
0

HSLAB Logger Personal

The complete solution for the background control and logging the users activity.
This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media.
Using this software to become possible to receive the information about user’s actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file name or keyword) or to CD/DVD/Zip and other removable media.

This is very useful for the rigid control over use of computer systems in business and for the parental control over children’s actions.

The program is NOT keylogger and does not write any keystrokes! This is a principle position. The information, collected by the program is more enough for the control over use of a computer and without recording of the user’s passwords.

Using this software you can:

  • record user’s activity;
  • record actions only the selected users or all users;
  • record the restricted actions or all actions;
  • use a ban list for prevention of some actions;
  • rectrict access to removable drives end execute some actions when the restriction occur;
  • rectrict access to programs end execute some actions when the restriction occur;
  • rectrict access by keywords end execute some actions when the keyword found;
At access to removable drives you can set the following actions:
  • write information about this event to log and continue;
  • eject removable media and continue;
  • shutdown Windows.
At access to programs you can set the following actions:
  • write information about this event to log and continue;
  • kill restricted program and continue;
  • shutdown Windows.
0

HSLAB Logger Business

The complete solution for the background control and logging the users activity.
This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and usings removable media.
Using this software to become possible to receive the information about user’s actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file name or keyword) or to CD/DVD/Zip and other removable media.

This is very useful for the rigid control over use of computer systems in business and for the parental control over children’s actions.

The program is NOT keylogger and does not write any keystrokes! This is a principle position. The information, collected by the program is more enough for the control over use of a computer and without recording of the user’s passwords.

Using this software you can:

  • record user’s activity;
  • record actions only the selected users or all users;
  • record the restricted actions or all actions;
  • use a ban list for prevention of some actions;
  • rectrict access to removable drives end execute some actions when the restriction occur;
  • rectrict access to programs end execute some actions when the restriction occur;
  • rectrict access by keywords end execute some actions when the keyword found;
At access to removable drives you can set the following actions:
  • write information about this event to log and continue;
  • eject removable media and continue;
  • shutdown Windows.
At access to programs you can set the following actions:
  • write information about this event to log and continue;
  • kill restricted program and continue;
  • shutdown Windows.