Unauthorized Related Downloads
|
My Privacy 4.0
|
My Privacy probes the confidential information stored on your computer on its vulnerability to unauthorized access by hackers. The software finds all personal information and suggests its... |
|
|
|
|
Kool Firewall 2.43.11
|
Kool Firewall is firewall security software designed to monitor the traffic into and out of your system. Kool Firewall has built-in algorithms to detect malacious or unauthorized access to your... |
|
|
|
|
HTML Guard 2.33
|
The software HTML Guard keeps people from unauthorized copying of parts of your Internet sites. Thus it is possible to encode HTML source code and to block the right mouse button, text selection... |
|
|
|
|
MoleBox Pro 2.5.5
|
MoleBox Pro packages all the application files into a single efficient EXE file, which runs without extracting packed files to the hard drive. MoleBox Pro protects your DLLs, ActiveX components and... |
|
|
|
|
Pos Photos Privacy Keeper 1.1
|
With Pos Photos Privacy Keeper - an essential product from the authors of Photo Pos Pro photo editor you can easily protect your photos from unauthorized view. Pos Photos Privacy Keeper allows you... |
|
|
|
|
ShareCrypt 2.1
|
ShareCrypt has been designed to effectively and transparently encrypt shared network drives or folders by allowingsimultaneous data access to different users and preventing unauthorized access from... |
|
|
|
|
Find My Credit Card 2.1
|
Find My Credit Card is a software application intended for probing the confidential information stored on your computer on its vulnerability to unauthorized access by hackers. Perhaps, you have no... |
|
|
|
|
UserMonitor for Classroom or Computer Lab 1.7
|
UserMonitor assists teachers, instructors or administrators. You can broadcast your screen to other screens, see screens of other users and monitor active programs on other computers. Detect... |
|
|
|
|
ActMon Computer Monitoring Software 5.20
|
All-round activity recording tool. It allows parents and administrators to track the use of PCs easily and invisibly. Logs keystrokes (even XP login), active programs, chat, Instant Messages.... |
|
|
|
|
Chris PC-Lock 3.10
|
Chris PC-Lock is a useful Windows application with keyboard locking functions. Now you can enjoy your spare time without any worry that somebody unauthorized will access your computer. More than... |
|
|
|
|
Folder Shield 2003 1.3
|
Folder Shield enables you to make folders completely invisible. Just specify all confidential folders, activate Folder Shield's protection and all folders will be hidden and your sensitive data... |
|
|
|
|
Zend Guard 5.0
|
Zend Guard, with its key components of Encoding, Obfuscating and Licensing, protects your PHP applications from reverse engineering, unauthorized customization, unlicensed use and redistribution.... |
|
|
|
|
My Privacy Multi-User 3.1
|
My Privacy Multi-User probes the confidential information stored on your computer on its vulnerability to unauthorized access by hackers. The software finds all personal information and suggests... |
|
|
|
|
AiS Watermark Pictures Protector 3.7.0
|
Protect your images published on the Web from unauthorized use by adding a visible watermark that can include logo, company name, your site URL or any custom text. You can process multiple images... |
|
|
|
|
Internet Cleanup for Windows 5.0
|
Protect your Privacy! Internet Cleanup secures your personal identification by locking key files and folders from unauthorized access. Hide your private info from prying eyes! |
|
|
|
|
4S Lock 1.06
|
4S Lock is a security widget that provides additional level of custom-made protection from unauthorized access to your computer, including protection from logging into the system with domain... |
|
|
|
|
LoginTrap 1.2.5
|
ProteMac LoginTrap monitors all login events and detects whether a login attempt was successful or failed. After a login attempt was made the program captures an image from the iSight camera, so... |
|
|
|
|
DB query 1.3
|
DB Query is distributed client/server application for querying on databases with data protection against unauthorized access. It is partitioned into two logical units which run in conjunction on... |
|
|
|
|
Rohos Logon Key 2.7
|
It allows to access Windows in a secure way by USB drive, biometric USB drive, Bluetooth mobile or eTokens, replacing the Windows login. For Windows Vista program install two-factor authentication... |
|
|
|
|
Secure Folders XP 3.0
|
This application combines the ultimate power of industry-standard strong data protection algorithms with unique stealth technologies to shelter your confidential information from both unauthorized... |
|
|
|
Software: 21 to 40 of 188 | Pages: 1 2 3 4 5 6 ... 10 All | Freeware
|