Search results for 'computer protection'.
1919 products found. Showing 1-15 in 10 groups sorted by relevance.
1. LockGear Enterprise - 1...19 Licenses
LockGear Enterprise is a powerful and easy-to-use software utility that allows password protection of your system from unauthorized access when you are off your workplace. Also LockGear Enterprise can automatically lock your computer after a period of idle time (when not using computer). DetailsDownload trialBuy now ($17.00) Find similar
Platform: Windows 95, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Softros Systems, Inc.
Easy - effective - safe Exactly these three points were the guidelines for the development of this program about children's protection. An absolutely easy solution that regulates within the installation automatically and doesn't require any more system interventions, it is effective at once, it's permanently actual and so safe with it, that even sly computer professionals won't be able to evade it.
3. Extra Drive Creator Pro
Extra Drive Creator Pro - suite of tools for creating Extra drives on your computer. All information kept on this drive will be lost after reboot of your computer. RAM Drive - tool is used for creating an extra drive without creating more partitions on the hard drive of your computer. DetailsDownload trialBuy now ($29.99) Find similar
Platform: Windows NT, Windows 2000, Windows XP, Windows Server 2003
Language: English, Spanish
Vendor: WinTools Software Engineering, Ltd.
AlertMobile Pro is a special software for computer security incidents responce. AlertMobile can be used by security administrators for control of the corporate security policy, by parents for monitoring of their children computer activity, or by anyone else who wants to ensure that nobody uses his or her computer without permission.
5. Smart Protector
This is useful, as people who use your computer will not wonder where all their history, recent files, cookies etc. have gone. Using Save State/Restore State capability you are able to leave the computer in exactly the same state as it was, so that no one could understand you have used such a program. DetailsDownload trial (Full version: 636 KB) Buy now ($25.00) Find similar
Platform: Windows 95, Windows NT, Windows 2000, Windows XP, Windows 98, Windows ME
Vendor: Smart Soft
One particularly scary and dangerous feature of all spy software is recording of computer user's keystrokes for the purpose of monitoring computer activity. While you are typing out your password and credit card details online it is possible a hacker can be recording your every keystroke on his computer with the right spy software.
Outpost Firewall PRO is the award-winning protection application providing a superior arsenal of defense against PC infiltration. Outpost can place your computer into stealth mode, making it invisible to hackers. The program detects and blocks hacker attacks, guards the privacy of data stored on your computer, monitors network activity of your system and applications, provides secure web surfing, and prevents Internet worms from activating from your inbox.
Using Talisman, you can build any interface for your computer. You can create a set of independent themes, and store them on any disk in the local computer or on a local area network. Talisman Desktop has the password protection function and supports the multiuser configuration of Windows 2000 and Windows XP.
This is necessary in that case when you wish to do some work on the computer which must not be fixed anywhere, but you need to save the information which you had in computer before your work. The Eraser - Tool is used for cleaning the private information kept on your computer.
RSS SolidLicence V2 is an extremly secure and easy to use copy protection and anti piracy system for small and medium software companies and shareware authors. You can define many limitations when generating licence keys for your software - for example you can define time limits (a fixed expiration date or a number of valid days after installation), you can specify on which computer your licence key will be considered valid (you can freely specify which components of the computer are taken to identify it) and you can define if a licence key is for an evaluation or a full version of your software.