Search results for 'computer protection shield'.
1923 products found. Showing 13-24 in 10 groups sorted by relevance.
13. Smart Protector
This is useful, as people who use your computer will not wonder where all their history, recent files, cookies etc. have gone. Using Save State/Restore State capability you are able to leave the computer in exactly the same state as it was, so that no one could understand you have used such a program. DetailsDownload trial (Full version: 636 KB) Buy now ($25.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Smart Soft
This is necessary in that case when you wish to do some work on the computer which must not be fixed anywhere, but you need to save the information which you had in computer before your work. The Eraser - Tool is used for cleaning the private information kept on your computer.
Outpost Firewall PRO is the award-winning protection application providing a superior arsenal of defense against PC infiltration. Outpost can place your computer into stealth mode, making it invisible to hackers. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox.
Using Talisman, you can build any interface for your computer. You can create a set of independent themes, and store them on any disk in the local computer or on a local area network. Talisman Desktop has the password protection function and supports the multiuser configuration of Windows 2000 and Windows XP.
Outpost Firewall PRO is the award-winning protection application providing a superior arsenal of defense against PC infiltration. Outpost can place your computer into stealth mode, making it invisible to hackers. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox.
Outpost Firewall PRO is the award-winning protection application providing a superior arsenal of defense against PC infiltration. Outpost can place your computer into stealth mode, making it invisible to hackers. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox.
Outpost Firewall PRO is the award-winning protection application providing a superior arsenal of defense against PC infiltration. Outpost can place your computer into stealth mode, making it invisible to hackers. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox.
One particularly scary and dangerous feature of all spy software is recording of computer user's keystrokes for the purpose of monitoring computer activity. While you are typing out your password and credit card details online it is possible a hacker can be recording your every keystroke on his computer with the right spy software.
Flagship software application Anti- keylogger(TM) for Microsoft® Windows® NT/2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against most types of unauthorized keylogging software, both KNOWN and UNKNOWN. These applications can help you to detect and eliminate (deactivate) threats to the integrity and security of your computer network.
RSS SolidLicence V2 is an extremly secure and easy to use copy protection and anti piracy system for small and medium software companies and shareware authors. You can define many limitations when generating licence keys for your software - for example you can define time limits (a fixed expiration date or a number of valid days after installation), you can specify on which computer your licence key will be considered valid (you can freely specify which components of the computer are taken to identify it) and you can define if a licence key is for an evaluation or a full version of your software.