Top 1851-1900 Security & Privacy Programs     (from 3088 category titles)
Order programs after downloads or name     (currently are listed after downloads)

Outlook Express Accounts Password Recovery 1851)   Outlook Express Accounts Password Recovery 1.2.40.1
ASAP OE Accounts Password Recovery is a tool for recovering forgotten or lost passwords to Outlook Express mail and news accounts. The program recovers and visualizes the settings of mail and news accounts of Outlook Express.

Lizard Safeguard PDF Security 1852)   Lizard Safeguard PDF Security 2.6
PDF document security software with DRM controls. Control who can view PDF documents & how they are used. Prevent copying, sharing, modifying, screen grabbing. Control the number of views and prints & when documents expire. No useless passwords.

Keystroke Logging Software 1853)   Keystroke Logging Software 3.0.1.5
Keylogger software runs in invisible mode to keep track of visited websites, typed emails passwords, online chats, and employee logins. Utility monitors computer user activities. Keystrokes recorder tool can save all entered data in hidden log files

ZAiD 1854)   ZAiD 1.1
Program ZAID stores our personal data like logins and passwords in a password protected file. Data cannot be read without providing valid password. We can use the program even if someone is standing behind us!

Voip Communicator 1855)   Voip Communicator 4.2
Voip 's is the market's leading free SIP based softphone available for download. Based on the advanced architecture of eyeBeam 1.5 (Phoner's carrier grade telephony client), the new Phoner is designed to showcase some of the feature rich capabilities

Voip Ekiga Communicator 1856)   Voip Ekiga Communicator 2.0.11
Ekiga's is the market's leading free SIP based softphone available for download. Based on the advanced architecture of eyeBeam 1.5 (Phoner's carrier grade telephony client), the new Phoner is designed to showcase some of the feature rich capabilities

PC Shield AntiVirus and Firewall 1857)   PC Shield AntiVirus and Firewall 2008.019
The Shield Pro provides essential virus protection from viruses, hackers, and privacy threats. Powerful yet easy to use, protect yourself, your family, and your PC online with The Shield Pro. Free updates and technical support! $20 Off ONLY $29.99

Keyboard Logging Software 1858)   Keyboard Logging Software 3.0.1.5
Key logger tool can monitor your employee, children, and spouse while you are away. This surveillance software can capture pc user activities details including keystrokes, instant messaging chat sessions, typed emails, and visited websites URLs.

McAfee Active Virus Defense SMB8i, 5User 1859)   McAfee Active Virus Defense SMB8i, 5User DE Retail-BOX
The new security solution "Panda Antivirus + Firewall 2008" provides the maximum, automatic protection from all viruses, worms, Trojan horses, spyware and hackers.

iMonitorPC Pro with Online Monitoring 1860)   iMonitorPC Pro with Online Monitoring 2.5.7
iMonitorPC is the most easy-to-use tool to monitor and record all system usage secretly, such as all applications loaded, Internet chats, web sites visited.It can be used in a network or with online monitoring.

Settings Lock 1861)   Settings Lock 1.1.0
Password protect 13 Windows settings and functions: Computer time and date, System Restore, Video display properties, Internet Options, Add/Remove Programs, User Accounts, Windows Security Center, System Properties, Add Hardware Wizard, etc.

All-Spy Keylogger 1862)   All-Spy Keylogger 4.3
All-Spy Keylogger is a spy solution that records invisibly keystrokes, applications, websites visited, chat history sending reports to a specified email address. The application helps you find out who has used a computer.

Access Get Password and Remove 1863)   Access Get Password and Remove 2.1.0.5
Access Get Password and Remove is an easy-to-use utility with powerful functionality for recovering lost or forgotten MS Access MDB database passwords. It includes additional functionality on changing or removing the existed passwords.

Safe n Sec Pro+Anti-Spyware 1864)   Safe n Sec Pro+Anti-Spyware 3.0
AntiVirus, AntiHacker, AntiSpyware. Real-time Proactive Computer Protection against viruses, spyware, vulnerabilities and threats with an on-demand anti-spyware scanner and remover.

SpyBoss Pro 1865)   SpyBoss Pro 3.3.0
Computer Spy Keylogger & Internet Monitoring Software Program. Secretly Monitor & Record: Keystrokes, Screenshots, Email, Instant Messenging, Chatting, Websites Visited, Passwords & Usernames, Programs Run and much much more ... Windows Vista, XP

Folder Shield 1866)   Folder Shield 1.2.7
Folder Shield is Comprehensive Application that protects your Folders / Files and Documents from unauthorized access with as ease you can imagine. Protect your folder(s) by either hiding them completely or partial

Ventis BackupSuite 2008 1867)   Ventis BackupSuite 2008 8.4
Ventis BackupSuite 2008 is the current top market backup software. A state of the art user interface streamlines the backup handling process. Files can be archived in Zip files to save space, also when backing up to Ftp server. Scheduler is included.

tripode 1868)   tripode 3.1
Tripode is a secure, simple, easy to use tool that allows the user to order and clasify images saving them in compressed and/or encrypted files, besides, it can visualize and edit the saved images.

Digital Document Shredder 1869)   Digital Document Shredder 7.6.5
An advanced, powerful and feature rich digital document shredder system, and is the world's leading digital shredding software system that permanently removes selected files and folders and other information from your computer

Antivirus Plus powered by CA 1870)   Antivirus Plus powered by CA 2008
Verbessert! Die überarbeitete Benutzeroberfläche bietet eine bessere Übersicht und erstklassige Benutzerfreundlichkeit, hilft Ihnen dabei, schnell und unkompliziert Einstellungen zu konfigurieren, den Programmstatus zu prüfen und den PC dauerhaft zu

Internet Security Suit powered by CA 1871)   Internet Security Suit powered by CA 2008
Verbessert! Die überarbeitete Benutzeroberfläche bietet eine bessere Übersicht und erstklassige Benutzerfreundlichkeit, hilft Ihnen dabei, schnell und unkompliziert Einstellungen zu konfigurieren, den Programmstatus zu prüfen und den PC dauerhaft zu

Antivirus Plus powered by McAfee 1872)   Antivirus Plus powered by McAfee 2008
Verbessert! Die überarbeitete Benutzeroberfläche bietet eine bessere Übersicht und erstklassige Benutzerfreundlichkeit, hilft Ihnen dabei, schnell und unkompliziert Einstellungen zu konfigurieren, den Programmstatus zu prüfen und den PC dauerhaft zu

claviscom SCHREDDER 1873)   claviscom SCHREDDER 7.0.4
In working with computers and the surfing of the internet numerous digital traces emerge on the hard disk, and the normal operating systems don’t delete these traces completely.

Rising Antivirus Free Edition 1874)   Rising Antivirus Free Edition 20.44
RISING Antivirus Free Edition protects your computers against all types of viruses, Trojans, worms, Rootkits and other malicious programs. Easy to use, Active Defense and Smartupdate technology make RISING Antivirus an install and forget product.

Keylogger 1875)   Keylogger 5.0.1.5
Best key logger software invisibly handles spying tasks with no trouble by monitoring all typed keystrokes which include sent emails, passwords, visited websites, chat conversations, look at e-mails and even watch the sites surfed to.

PDA Mobile Investigation Software 1876)   PDA Mobile Investigation Software 2.0.1.5
Pocket pc surveillance tool extract complete information of using hardware and software of mobile phone with windows operating system. PDA forensic tool provide support to all multimedia windows mobile like Motorola, Samsung, LG, Sony Ericsson, Nokia

Active Directory Reports 1877)   Active Directory Reports 9.12.01
Active Directory Reports tool is an efficient, dynamic, and powerful solution for organizations to centrally manage Active Directory objects and resources on local and remote computers within a domain.

Advance Keylogger Software Ex 1878)   Advance Keylogger Software Ex 3.0.1.5
Computer keystrokes recording tool captures real time user activities done on your desktop or laptop in your absence. Keylogging application takes screenshots in regular time interval and sent all user information to user specified email address.

Steel USB Sentry 1879)   Steel USB Sentry 2.0
Steel Usb Sentry controls usage of portable storage media such as iPods, USB Sticks, Usb hard drives. Network USB sentry effectively prevents users from introducing malicious programs, pirated softwares and other un-authorized data in the network.

SecExFile Home 1880)   SecExFile Home 1.1
SecExFile brings one-click file protection to the desktop. It integrates with Windows Explorer to make securing your personal or corporate data easy. SecEx File can be configured to email the armoured file once encryption is completed.

Invisible Private Folder 1881)   Invisible Private Folder 2.1.1.2
The Invisible Private Folder can help you keep your files protected from kids, friends and co-workers. It allows you to add any folders to the virtual invisible private folder.

RunSafe 1882)   RunSafe 1.10
Run programs from your desktop as a Windows limited user. Drag and drop security for your Windows XP computer. Don't risk running email or web browsers as an Administrator. Protect yoruself with RunSafe

The Shield _Deluxe 1883)   The Shield _Deluxe 2010
The Shield Deluxe 2010 combines reactive antivirus and spyware detection methods with the latest proactive technologies to provide your computer with the most effective protection against malicious programs.

OneNote Password 1884)   OneNote Password 10.1.6805
OneNote Password breaks passwords for password-protected MS OneNote (.one) files.

Returnil Virtual System 1885)   Returnil Virtual System 1.6
Returnil Virtual System 2006 makes your Windows system impervious to virus attack to spyware tracking.

PC PhoneHome 1886)   PC PhoneHome 2.15.1
PC PhoneHome sends a stealth email message containing its exact location to a pre-determined email address of the users choice. Recovery agents at PC PhoneHome work with global ISPs and the local police to recover the stolen computer.

Spyware Medic 1887)   Spyware Medic 1.0
Spyware Medic for Windows will protect the privacy of your personal information by removing Spyware, Adware, Key Loggers, Browser Hijackers, Malware and other dangerous programs that hide on your system and spy on you without your knowledge.

Spy Emergency - Spyware Remover 1888)   Spy Emergency - Spyware Remover 1.4.0.3
Scan your computer for hidden AdWare and Spyware, Remove them permanently. Our Adavanced Software Stops adware and spyware from sneaking into your system. You are notified the moment a spyware application attempts to run on your system. FREE DOWNLOAD

Advanced Spyware Remover Pro - Junk Remover 1889)   Advanced Spyware Remover Pro - Junk Remover 2.9
Advanced Spyware Remover Pro is the latest in Spyware Detection and Removal. Advanced Spyware Remover Pro will hunt down and remove from your machine Spyware and Adware. Download our FREE Spyware elimination scanner and see if there is any Spyware installed in your machine. FREE DOWNLOAD

Password Recovery Engine for Access 1890)   Password Recovery Engine for Access 1.2
"Password Recovery Engine for Access" is easy-to-use wizard-like software that will quickly and easily help you recover passwords for Access database files (*.mdb files). Also the Software will help you to find *.mdb files on your computer.

LAN ICU for IBM LAN Server 1891)   LAN ICU for IBM LAN Server 1.40
Backup and Repairs IBM LAN Server and Warp Server Corruption

Password Agent Lite 2.0.3 1892)   Password Agent Lite 2.0.3
A password manager program that allows you to store all your passwords in a single, easy to navigate, and secure database.

Network Security Protector 1893)   Network Security Protector 2.5
The best network-based security software for public environment applications to secure and maintain a lot of network PC workstations located in different places.

El. Toolbar Killer 1894)   El. Toolbar Killer 1.02
This little tool was created to remove the very annoying spyware "Elite Toolbar". Because there was no program on the market that could fully remove this spyware we decide to develop one.

Panda BusinesSecure with TruPrevent Technologies 1895)   Panda BusinesSecure with TruPrevent Technologies 3.06
is the ideal security solution for small and medium-sized companies which need to protect the workstations and file servers which make up their corporate networks.

Private Notetaker 1896)   Private Notetaker 2.1
A highly portable application including a text processor and an encryption program. It automatically encrypts each file using the Blowfish algorithm and also allows you to protect files with individual passwords. No extra operations required.

Dekart Password Carrier 1897)   Dekart Password Carrier 2.02
Portable and secure password manager - provides one-click login to web sites from USB drives.

User Monitor 1898)   User Monitor 2.00
The User Monitor is a program that performs hidden monitoring of a user's actions. The User Monitor controls all of the user's actions that were performed on the computer, it also provides information about the time spent on the current program.

Easy Disk Drive Safeguard 1899)   Easy Disk Drive Safeguard 3.41
Use Easy Disk Drive Safeguard to hide and lock your local, network, Floppy and USB drives as well as disable the AutoRun feature for them. A password protection can be applied to the program to prevent your users from changing the security settings.

Lizard Protector 1900)   Lizard Protector 1.1
Protect your content from unauthorized copying, printing and distribution. Determine when it expires. HTML, web page, web site, elearning, document, image and flash security with US Government strength encryption & Digital Rights Management controls.



Browse Pages: [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] 38 [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] [55] [56] [57] [58] [59] [60] [61] [62]
2006-2008 RedSofts.com - Privacy Policy