|
||||||
|
||
|
Home > Computer theft software |
Related keywords: computer, computer security, computer game, Computer, theft, computer software, computer backup, identity theft, computer games, computer monitoring |
|
|
11. | MacPhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 548 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
12. | Secure Image Pro 4.0 (artistscope.com) | ||
direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the html page the image is first encrypted for insertion into a viewer. It is the applet viewer that sits on the page replacing the image. The | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
13. | Secure Image Pro 3.0 (artistscope.com) | ||
direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the html page the image is first encrypted for insertion into a viewer. It is the applet viewer that sits on the page replacing the image. The | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 5808 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
14. | Secure Image Pro OSX 4.0 (artistscope.com) | ||
direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the html page the image is first encrypted for insertion into a viewer. It is the applet viewer that sits on the page replacing the image. The | |||
Updated: 9, 2005 | Rating: 0 | Author: William Kent | Size: 1328 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
15. | SpyMyPC 2.0 (benutec.com) | ||
one solution if you want to know what others are doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, internet connections, passwords, chat conversations. Install SpyMyPC, set options "Run in Invisible Mode", so that it makes itself invisible to anyone. Shortcut keys helps you fast access to Log View and Unhide Mode | |||
Updated: 9, 2005 | Rating: 0 | Author: Benutec Software | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
16. | System Shield 2.1c (iolo.com) | ||
be instantly undeleted and viewed by anyone who has access to your computer. Obviously, this poses a very significant security problem, and individual PC users who do not wish their data to be accessible after deletion are not the only ones that are subject to this predicament. Businesses, schools, government agencies, and military institutions that frequently deal with extremely | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 656 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
17. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
that automatically generates a completed inventory card for each computer/client. Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic Netlog then reports any changes made on each client log-in to the inventory program. Other inventories, e.g. faxes, photocopiers and | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
18. | SafeHouse Hard Drive Encryption 2.10 (pcdynamics.com) | ||
on-the-fly encryption for your notebook or desktop personal computer. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse encrypted volumes appear on your PC as another Windows drive letter. All encryption is performed automatically and transparently on the fly. You can do anything with a SafeHouse virtual drive | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter Avritch | Size: 1972 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
19. | PAL PC Tracker Lite 1.01 (palsol.com) | ||
PC Tracker is a computer tracking and theft recovery software system. PC Tracker allows the user to do their own monitoring and works with both Laptops and Desktop computers. Every time you boot your computer and have an Internet connection, PC Tracker sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 1200 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
20. | PC PhoneHome 3.0 (pcphonehome.com) | ||
PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When you boot your computer and go online, PC PhoneHome sends a stealth e-mail message containing its exact location to a pre-determined e-mail address | |||
Updated: 9, 2005 | Rating: 0 | Author: Martin Moran | Size: 1602 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
|
Home > Computer theft software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|