Vyom Network » Home | Free eBook Downloads | Job Discussions | Fundoo Site | Jobs & Employment | Free Online Exams | Free Source Codes | VyomWorld |
|
AppleScript (244 Downloads) Compression (39 Downloads) Control Tiles (19 Downloads) Files (301 Downloads) Menus (92 Downloads) Optimizers (70 Downloads) Security (223 Downloads) Shapes (49 Downloads) Sherlock (5 Downloads) Viruses (29 Downloads) Wipe Expert 1.60 Wipe Expert is an award winning privacy protection tool that helps remove all traces of online and offline activity. Did you know that a consequence of internet browsing is the recording of many confidential data on your computer: visited pages,...LogonWatcher 2.0 LogonWatcher shows who are logged in on up to 1000 computers from your network. Visually all your net can be splitted to 20 regions as you wish. You can see at one time who is logged on workstation and what he is doing right now. This is applica...ViPNet Password Roulette 2.9.2 ViPNet Password Roulette is an absolutely free of charge password generator. To help persons, who are in charge of the password management, INFOTECS released an absolutely free of charge software password generator, which generates random passw...Type Safe 1.0 1.0 Key Stroke logger - Track people using your pc Type safe is a new and inovative piece of pc security software, designed to allow you to find out where people using your pc have been on the web, what instant message chats they've been having,...NetVizor 4.18 NetVizor is the latest in powerful network monitoring. Monitor your entire network from one centralized location! NetVizor allows you to track workstations and individual users that may use multiple PC's on a network. NetVizor tracks keystro...Active Shield 3.2 Shield your PC against spyware and adware. Active Shield is an ultimate heuristic screen against trojans and spyware. Don't wait while malicious programs strike roots in your computer. Don't let them ever reach you PC! Remember that acti...AEVITA Tracks Eraser 1.4 AEVITA Tracks Eraser is a slim and highly configurable data erasing program that will protect your computer privacy from nosy people. Using it, you can securely erase your usage tracks in Windows, Internet Explorer, MS Office and other applications!&...Mars Notebook 1.31 Very useful tree-styled notebook. Full featured text editor with tables, formatting, hyperlinks, pictures... Any amount of sections can be created at any tree level, supports strong data encryption. Import/export from/to MS Word, HTML and more...&nbs...VideoCAD 4.0 Program for professional CCTV system design. VideoCAD is a tool of view area and cameras' arrangement calculation that will help you in designing CCTV of any complexity and functions. VideoCAD is user-friendly, allowing even the beginners...DeviceLock Plug and Play Auditor 5.72 DeviceLock Plug and Play Auditor is a non-intrusive clientless software solution that generates reports displaying the USB, FireWire and PCMCIA devices currently connected to computers in the network and those that were connected. Its multithrea...MySecurityVault 3.0 Securely manage and encrypt passwords, files, and personal information. MySecurityVault provides unparalleled security for your most confidential information. Auto-fill Internet forms, scan your system for sensitive data, and prevent identity theft.&...KIKSTER CLEAN&DESTROY 1.1 Kiksters purpose is fully, avtomaticaly, 15 seconds, interval, cleaning and destroying of bad or useless data on the computer. Because of its capability of extreme cleaning, helps against spyware and adaware .Its freeware!...Keyboard Spy 1.6 Keyboard Spy is a utility to save keyboard keystrokes in a log file in the background like a spy. It records all keyboard keystrokes on your computer.It's a background application that does not appear in the Dock....Security expert 3.3.0.8 Comprehensive:Viciousness program detect technology covers from System AutoStartup setting to Password Stealing action monitor. Essential: Automaticly up-to-date Patchs, discovers missing system Patches and deploys them safely. Immunity: Predifined S...Samurai Host-based Intrusion Prevention System Samurai repairs all of the major flaws known to exist in Microsoft Windows operating systems. Unlike signature-based protection, Samurai repairs the problem, so that all attacks capitalizing on a specific v...Spytector 1.2.5 Spytector is an advanced monitoring application, with never seen before features, easy to use interface and extremely powerful functions. Spytector is tracking all the activities of PC users (visited websites, all the keystrokes, opened windows,...Actual Spy 2.8 Actual Spy enregistre toutes les actions des utilisateurs et les evenements du systeme pendant votre absence. Il genere des rapports en HTML et en texte plein. L'acces au programme est protege par mot de passe. Actual Spy enregistre toutes l...Ghost 3.5 Ghost 3.5 allows you to quickly and easily protect important files and folders on your computer by making them invisible. Various features let you easily keep track of and automate your files. ...Crush 1.0 Crush is a simple text encryption program. Crush asks for two passwords and then encrypts the text file that you have selected. To decrypt just put in the two passwords and crush decrypts your text file. Crush is perfect for encrypting sensitive E-ma...Cone of Silence 1.0b2 Cone of Silence is an application that blocks key capture programs while it is running. There are many utilities out there that save all key strokes to a file. The purpose of these programs (usually) is to save anything you have been typing in case o...BigSecret 4.2 BigSecret offers an easy interface and password protection to hide files and folders by making them invisible ...Eureka Public Key 1.0 Public Key version of the strong Eureka Encryption technology. Very easy to use. ...Enigma Pad 1.2.1 Enigma Pad turns text documents into "cipertext" using a symmetric key algorithm. Very easy to use security for sensitive e-mails and other documents. ...WeakPasswords 1.0 Each system can be simultaneously tested and as poor passwords are discovered, they are shared with all running tests to speed up the process! ...Burn 2.5 Files and folders dragged onto the Burn icon will be overwritten by a user-selected number of times with a user-selected pattern, then renamed, then deleted. Both data and resource forks are deleted. ... |
|
Copyright © 2010. Vyom Links.com. All Rights Reserved. | Contact Us | Privacy Policy | About Us | Terms and Conditions |