Filetrix


Search in:   Description   Keywords   Title   Company


Search for:    


Match:   Any word   All words   Exact phrase



Category:  Security & Privacy Sort by:    Title     Date     Size     Company     Category  

Matches:  1245 First     Previous       Page 118 of 125       Next     Last

KeyboardLocker
Shareware
Disables the keyboard, leaving the mouse active. An exit phrase must be entered before the keyboard is reactivated. Can be used to secure dedicated servers or kiosks, or to show a DVD to a small child without them destroying your computer! Use with Skype to prevent toddlers pressing keys during a call Once KeyboardLocker is enabled, you can ONLY use the keyboard to type in the Exit Phrase. You can use the mouse to start your DVD movie playing.

HomeGuard Professional
Demo
HomeGuard professional is an easy to use software with extensive monitoring and blocking features for tracking and controlling the use of computers in home and office networks. HomeGuard records web activity and automatically blocks all adult and inappropriate content in websites in addition to customizable website block and allow lists and filtering based on file type, keystroke logging, screenshots, program blocker, printer monitor and more.

Crypto 2000
Shareware
Crypto is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Crypto can be configured to optionally place its program icon in the taskbar notification tray.

Disk CleanUp 2000
Shareware
Disk CleanUp is a small disk utility designed to clear previously deleted files. Deleting a file will normally just remove the file's directory entry, but the data itself still remains on the disk. CleanUp will completely eliminate the contents of your deleted files. Disk CleanUp provides options to specify an NSA approved disk erasure method and background execution priority. Disk CleanUp works with any FAT16 or FAT32 hard drive as well as NTFS

Spam Ignorer Corporate Edition
Freeware
Spam Ignorer is a poweful antispam system designed to protect your mail server from spam with 100% of effectiveness and in a simple way. Spam Ignorer checks and validates the origin of the messages, to ascertain whether the senders are included in the valid sender lists (White List). Any sender not listed on the white list will receive a validation message. Just by replying it, the sender will be added to the white list.

Digital Patrol
Shareware
Digital Patrol is a powerful antivirus solution for protecting your computer from all sorts of malicious software and hacking attempts. Unlike most other solutions, it can also be run in conjunction with other antivirus products without causing conflicts or slowdowns. The best antivirus program supports every edition of Windows and it provides a user-friendly and responsive interface.

Kruptos 2 Go
Shareware
Kruptos 2 Go is password protection tool for your USB Drive which protects your privacy and important data from data theft, data loss or leaks. Just drag and drop your files and folders into Kruptos 2 Go's encrypted Vault and they will immediately be password protected which prevents your important data from being modified, read or even accessed without the correct password.

BlowFish 2000
Shareware
BlowFish is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the files you want to protect from prying eyes. Files can also be quickly encrypted and decoded directly from the MS Windows Explorer by using the pop-up context menu. This utility uses the Blowfish encryption algorithm. BlowFish can be configured to op

Easy File Hider
Shareware
Quickly and easily hide files and folders! Your password-protected list of files and folders can be toggled between hidden and visible with the push of a button!

Computer Monitor
Shareware
Secretly monitor all activity on your computer, capturing keystrokes, programs, internet explorer websites and screenshots. Completely invisible and easy to use, all information captured is stored in an encrypted log file. The log file can be sent secretly at scheduled intervals to any specified email address.


Matches:  1245 First     Previous       Page 118 of 125       Next     Last