This software is a powerful video monitoring tool. It allows you to use computer as a security system. Using webcam or IP camera, CSecurity can monitor your office or home.
USB Guardian is a special software application that prevents your computer from getting infected with nasty viruses an worms such as, Conficker, aka Downandup, Downadup and Kido!
SterJo Mail Passwords recovers forgotten mail passwords for common free email services like gmail, yahoo, hotmail, aol and others.
Encrypt / Decrypt any file you like. Password Protection, NO file association
SterJo Twitter Password Finder recovers forgotten Twitter logins stored by most web browsers.
Encrypt4all is a powerful encryption software used to store your private documents into a single encrypted archive, implements a real bit-per-bit data encryption.
SterJo Instagram Password Finder instantly recovers forgotten Instagram logins credentials by web browsers.
Filters access to websites, decide which websites your children can visit, and when, get email reports with all computer activities and much more with HT Child Control.
After your work on PC remains some items wich reduces your privacy level. Use the program and be sure in your privacy! "After Work" safely erases online and offline history: Temporary Internet Files from IE, Edge, Firefox, ...
The program encrypts and decrypts text using the algorithm of the Transposition cipher. Read more about the algorithm you can read on Wikipedia page https://en.wikipedia.org/wiki/Transposition_cipher.
The program encrypts and decrypts text using the algorithm of the Cardano Grille. Read more about the algorithm you can read on Wikipedia page https://en.wikipedia.org/wiki/Cardan_grille.
Many of us keep personal/work information in our PC’s, information that is meant strictly for our eyes only. This is where SterJo NetStalker comes to the rescue.
Forgotten password recovery software has a simple user interface, supports multiple hard disk drives, detects several SAM databases (if multiple OS were installed on one volume) and more. New Ultimate package includes linux-based Active@ LiveCD.
Track student attendance and tardiness. Parents can receive e-mail notification of any infraction occurred.
Check in and out and record attendance using networked check in stations or tablets.
HT Parental Controls provides parents with an easy way to set up your rules for all computer activities and protect children from all harmful and inappropriate content.
cliEN is a modern command prompt encryption / decryption tool that provides very high protection
This Driver-Level Keylogger works in the driver layer, uploads log files to cloud server; by using Builder/Recorder mode, can work on many computers at the same time.
Power Spy For Home secretly logs Facebook use, keystrokes, chats, emails, website visits, screenshots, Skype, microphone, clipboard data and more. You can receive logs via emails from a remote PC, iPad or a smart phone.
SafeDNS makes your internet safe. It blocks access to the infected sites, phishing resources, control & command centers of malware and botnets. You can block over 50 categories of websites or manage access via personal black/white lists.
Bitcoin Find & Recover is a crypto currency recovery tool that helps the user restore access to their funds. Supports desktop and mobile wallets. Automatizes searching for wallets on the disk, both deleted and existing.
Secure Erase: ProtectStar Data Shredder 5 Professional is a state-of-the-art and professional tool that has won numerous awards and that allows for secure deletion of data from hard drives and external data storage devices.
XL Delete is a powerful secure delete tool that will permanently delete files. XL Delete can permanently remove any type of file, entire folders, and even your favorite browsers' cookies, history, and cache files.
Monitor & manage everything your employees are doing on the computers. Stop all time-waster activities and improve productivity with HT Employee Monitor.
Create encrypted databases for storing any kind of information with Free Password Manager. Each database has its own access password and is encrypted using an AES algorithm. The program can be installed to a USB flash drive.
Easily investigate all the web pages and images that someone has viewed. This program will succinctly show the web page title, date/time it was viewed, and thumbnails of all the images viewed. As an added convenience, it searches for cache folders.
File Monster completely erases files from your system -- actually overwriting the information in the file so it can not be recovered. It can even erase pesky hidden files, system files, and read-only files.
PhoneCrypt is a telephone encryption software designed to combat eavesdropping and interception by providing Military Grade security for your confidential mobile phone conversations
Computer Monitoring Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, microphone, web visits, games, online searches & shopping and more. It takes screenshots like a spy cam. You can receive reports via emails.