Screen-Spy freeware records a screenshot every 30 seconds (adjustable) while remaining completely hidden from view in stealth. Access the hidden interface through secret methods. Playback activity like a movie with an easy VCR like interface.
Lock the Bad Guys out of your USB ports with MyUSBOnly; Endpoint security solution MyUSBOnly prevents unauthorized access to USB devices and prevent sensitive data from leaking out and secure your files. Syslog entries for copied files/folders.
A quick and easy way to protect sensitive information on your computer from children, employers, roommates and anyone else who uses your computer, including hackers! A hacker can't steal what they don't know exists to begin with.
1-2-3 Spyware Free provides automatic mobile protection against all known threats combined with ultimate performance. Regular online updates ensure protection against future threats, and real-time protection prevents viruses from infecting your PC.
PerfectGuard is developed to protect your OS both from hackers and viruses.PerfectGuard gives its users comprehensive system protection and scalable computer access control.
Insider creates compressed archives and works with these files while the archives themselves are not evident on the user??™s computer.They are strongly encrypted and hidden inside image files.The encoding program is also hidden inside another program
Password Generator is a software program designed to generate passwords of any length, which are very difficult to crack due to a random combination of lower, upper-case letters and numbers. Password Generator is very easy-to-use.
Create encrypted databases for storing any kind of information with Free Password Manager. Each database has its own access password and is encrypted using an AES algorithm. The program can be installed to a USB flash drive.
SIM Card Seizure uses a SIM card reader to recover SIM card data including deleted text messages. Find out if they're cheating on you. See who your kids are texting. Simply put the SIM card in the included reader, download the data, and analyze.