Aobo Mac OS X Keylogger is an invisible Keylogger for Mac OS X with multiple-user support. Aobo Mac Keylogger stealthily records Keystrokes, Websites, Chats, Screenshots and IP address. It also sends logs to Email box or uploads logs to FTP space.
A new era is beginning: For the first time, the usual optimum high security from G Data TotalCare is completely undetectable.
CookieCrumbler enables you to easily manage cookies. The well-designed program interface offers you versatile functions to delete, edit and sort cookies.
Hide your real IP to protect your privacy on the Internet. Auto Hide IP enables you to surf anonymously and automatically change your IP address every few minutes, preventing identity theft and hacker intrusions, all with the click of a button.
First free cloud-based antivirus. Includes a light antivirus agent connected in real time to PandaLabs’ Collective Intelligence servers, protecting your computer from the latest malware variants.
SecretsSaver Personal will save any private information including bank details to payment systems access as well as internet payment systems such as e-gold and pay-pal from computer spies and theft.
Get rid of trojans, spyware, adware, trackware, dialers and keyloggers in one click! The easiest and handiest spyware scanner in the world!
Power Spy Software lets you know exactly what people do on a computer while you are away. It secretly logs Facebook, Twitter, keystrokes, chats & IMs, emails, websites visited, photos shared, videos watched, microphone sound, video talk, ...
Update to 1.30! Touch Hider is the best hiding tools to hide your private files - photos, multimedias, audios, videos, songs, voice - all confidential documents on your mobile! It is deisinged specially for touch screen mobile - safe, fast and easy!
Allows you to control access to PC, Internet sites, programs and system functions. A choise #1 for parents who don`t want wheir children play for hours in games, navigate on bad sites, launch unallowed programs or crash an operating system.
Portable Penetrator is a complete solution for securing your wireless network and identifying any security flaws before hackers have a chance to do so. This wifi security software provides detailed reports, exposing security issues quickly.
ESP+ Monitoring is an transparent easy-to-use monitoring and surveillance tool for personal PCs. ESP+ captures all users activity on the PC - including screen capturing for visual surveillance.
The primary function of the Softlock.USB is to protect software from illegal copying, but the robust unit can also be used to carry passwords, signatures, or other data of a highly sensitive nature.
USB Secure can password protect any portable media including USB drives, External drives and even memory cards. It supports plug and play and automatic execution. No admin rights or install required on the other computer.
Free Hide IP, the best free privacy protection software, could hide your real IP address for FREE, anonymize your web surfing, keep your computer safe from hacker attacks and other risks, all with a single click of a button without any configuration.
Avast Pro Antivirus 2015 provides essential security plus additional features for greater protection. Home-Network Scanner scans your network for issues, while SafeZone and SecureDNS build yet another line of defense.
With Exe Guarder you can converter normal exe-file to shareware. Once the executable is protected by exe guarder, you may copy it to another computer as it will stay protected. So you can publish it as shareware (also known as trialware or demowar
The program is designed to encrypt and decrypt files using GOST, Blowfish, IDEA, Misty1, Rijndael, Twofish, Cast128, Cast256, RC2, RC5, RC6, DES, TEA, CHR, BIT.
Employee monitoring software contains several tools to improve employee productivity, and benefit your company. It combines surveillance suites, which let you remotely monitor PC activities, with blocking features to stop employees wasting work time.
Invisible Browsing it’s a software to hide IP address preventing others or any website from logging your internet address without your permission. Invisible Browsing is also an efficient internet track eraser.
First Cookie Manager supporting the new browser independent cookies (Flash Cookies, Silverlight Isolated Storage) together with conventional cookies of Internet Explorer, Firefox and many more browsers. Allows deleting, viewing, blocking and more.
Avira Professional Security will reliably protect your Windows computers from virus and hacker attacks while using as few resources as possible. The program can be administered extremely efficiently via the Avira Security Management Center.
Eusing Maze Lock uses a pattern based technique to lock your computer. You can set your own unlock pattern. And just draw your pattern connecting the dots and unlock your computer.
KinderGate Parental Control is a tool that allows home users control Web resources used by their children. KinderGate lets you set Internet access mode to allow or deny access at a certain time or on certain days.
SpotAuditor is the best password recovery software. The software recovers over 40 programs passwords: Google Chrome, Internet Explorer, Firefox, Opera, FTP, hotmail, Microsoft Office Outlook passwords, recovers passwords behind the asterisks.
USB Manager is a small Windows utility that can quickly enable and disable USB devices. It has no interface and runs from the system tray. You can control the devices from the right-click context menu.
Free Rising Antivirus protects your computers against all types of viruses, Trojans, Worms, Rootkits and other malicious programs. Ease of use, Active Defense technology, friendly and popular interface, prevent all malicious threats away from you.
Smart Keystroke Recorder is an advanced monitoring tool. It allows you to investigate everything that happens on your PC. The program works on all Windows systems.
Secretly logs MSN Messenger / Windows Live Messenger incoming and outgoing chat text messages. Takes screen snapshots of MSN Messenger video chats every X seconds. You can check logs by simply receiving emails or opening a web page.