Security & Privacy

Exterminate It! Stay protected with custom updates, a huge malware database, and smart removal!

Exterminate It!

Exterminate It! is a powerful antimalware solution that defends your PC and notebook with ease. Now you can feel the meaning of Real Protection with "Submit State" - the fastest possible responder to malware threats. Get a personal update within 24 hours! Huge, daily-updated Malware Database ensures your protection. Exterminate It! is compatible with other security suites. Guard Yourself, Your House, and Your Family against Digital Threats!

antimalware tools, remove malware, computer malware removal, antispyware software, anti malware, trojan removal, antimalware download, antirootkit, anti spyware, trojan remover, rootkit removal software, antimalware, antispyware tools

Disk Password Protection 5.1.11: Password protect the operating system load, disks, and their partitions

Disk Password Protection 5.1.11

Utility used to password protect hard disks and partitions as well as the operating system load. Access to data is restricted at the low level. The utility protection mechanisms start working with the hard disk directly before the operating system and third party software and hardware are loaded. Uninstalling the utility will not remove the protection, all protected partitions and disks will remain so until you disable the password protection.

protection, volume, volume encryption, secure nt, boot password, disk encryption, crypto, partition lock, disk lock, access control, securent, systme lock, partition

Cryptic Disk 5.0.9: Professional, yet easy, disk encryption software for your data security

Cryptic Disk 5.0.9

Cryptic Disk creates virtual encrypted disks and also encrypts hard disks, USB drives and memory cards. This allows you to maintain secrets both on a home computer and on a workstation. Data encryption makes use of the best algorithms (any of the following modern cryptographic algorithms can be used: AES/Rijndael, Serpent, Twofish, Blowfish, CAST6), and takes place in real time without affecting computer performance. Cryptic Disk provides its use

cryptic disk, exlade, disk encryption software

PC Agent 8.1: PC Agent monitors the activities of all users on a computer unnoticed.

PC Agent 8.1

PC Agent monitors and records the activities of all users on a computer unnoticed. The monitoring captures not only the most common activities like keystrokes, visited websites and screenshots, but also Internet activities such as sent and received emails and many more. PC Agent is specially designed to send the records in several different ways.

invisible, activities, keylogger, email, software, password, monitoring, record, hide, keystroke, address, webcam, screenshot

Mini Key Log 6.1: Mini Key Log monitors and records the activities of all users unnoticed.

Mini Key Log 6.1

Mini Key Log monitors and records the activities of all users on a computer unnoticed. The monitoring captures not only the most common activities like keystrokes and visited websites, but also screenshots and many more. Mini Key Log is specially designed to monitor a computer quickly and easily.

invisible, activities, keylogger, software, password, monitoring, record, hide, keystroke, webcam, screenshot

1AVMonitor Remotely Monitor your Webcam, Desktop, Microphone, or Phone-Line!


Remotely monitor your webcam, your desktop, or your microphone with this powerful all-in-one surveillance tool. Features include motion detection , sound detection, and secure website publication with access to live video, and all detected activity.

website, detection, desktop, children, monitor, remote, audio, surveillance, motion, home, video, child, intrusion

Blank And Secure 4.06: Is a portable tool to securely delete the data and block the recovering of data

Blank And Secure 4.06

"Blank And Secure" is a portable tool to securely delete the data. Secure delete files are required to block the recovering of deleted data. Secure deletion is possible with this program, because "Blank And Secure" overwrites the data with zeros before deleting. The data recovery is impossible after this operation. So please only use if the data really should be permanently deleted.

safe, obliterate, dependable, unconditioned, absolute, secure, trustworthy, clean, reliable, sterile, delete, blank, dependably

Results 1-7 of 5858      Page 1 2 3 4 5 ... 837 | Next