Category Archives: Security & Encryption

28May/17
iwantsoft-security-eye-logo.jpg

Security Eye

Security Eye is a versatile surveillance software that turns a computer into a powerful security system that helps you monitor your home, office or any other place. It includes several features that convert your computer into a complete security system that is easy to use.

Security Eye is easy to use and extremely reliable for day-to-day operation. Configuration takes only a few minutes, even for a novice.

Video Security Features
– Use motion sensing to trigger recording, or record continuously or periodically.
– Overlay the current date/time
– Use a timer to determine when the system is armed.
– Images are captured as JPEG images, and videos are compressed with xVid encoder.
– Receive alerts via loudspeaker, email, and even SMS message.
– Run Security Eye in background so that only you will know about its operation.
– Access the program and cameras remotely, using browser.


Get Security Eye now:


Try Security Eye
Purchase the full version for unlimited use

Summary: surveillance software

Concepts: Security, Computer, Physical security, Xvid, JPEG, SMS, Computer software, The Current

Categories:
/technology and computing/hardware/computer
/technology and computing/mp3 and midi
/technology and computing/hardware/computer networking/router

Tags: Security Eye, versatile surveillance software, Video Security Features, browser.Get Security Eye, Run Security Eye, xVid encoder, powerful security, current date/time, complete security, day-to-day operation, JPEG images, SMS message, surveillance softwareConcepts, Security EyePurchase, Physical security, unlimited useSummary, computing/hardware/computer networking/router, timer, loudspeaker, novice, Configuration, home, office, place, alerts, motion, recording, record, cameras, videos, Access, program, version, email, CurrentCategories, /technology

20Nov/16

Generate Word List

Generate Word List

Generate custom word lists of any size directly from Windows. Generate Word List is an advanced Windows word list generator. At top speeds, generate word lists in Windows for many applications. Start generating lists of unlimited lengths with the click of a button. Features multiple list types, along with custom character sets so you only create the data that you need. Optional feature to automatically writes to separate files, in the event your word lists are large. Includes a calculator to estimate how many words a word list will be based on parameters, and the amount of disk space it will require to generate. This small graphical tool for Microsoft Windows makes it easy for anyone to bulk generate word lists for fun or profit. Don’t waste time with other tools. This will get the job done quickly.

Get Generate Word List now:


Purchase the full version for unlimited use

Summary: Windows, Microsoft Windows

Concepts: Microsoft, Graphical user interface, Microsoft Word, Microsoft Windows, Windows Vista, Macintosh, Operating system, Apple Inc.

Categories:
/technology and computing/operating systems/windows
/technology and computing/software/databases
/business and industrial/advertising and marketing/telemarketing

Tags: generate word, Generate Word List, generate word lists, Generate custom word, quickly.Get Generate Word, Windows word list, Features multiple list, small graphical tool, Graphical user interface, Microsoft Windows, unlimited lengths, event your word, Microsoft Word, Optional feature, Windows Vista, custom character, Microsoft WindowsConcepts, disk space, Apple Inc.Categories, unlimited useSummary, speeds, button, size, parameters, generator, click, applications, types, data, files, time, tools, words, job, version, fun, Macintosh, Operating, /technology, systems/windows/technology, computing/software/databases/business

26Aug/16
filestream-inc-filestream-secure-disk-logo.jpg

FileStream Secure Disk

FileStreamA? Secure Disk is the perfect solution for protecting sensitive information from theft and other attacks. This program makes a part or all of your hard disk, or removable drive, into a secure vault. All your private information stored on the Secure Disk will be protected by Strong Encryption. You can create multiple Secure Disks to compartmentalize data with the ability to move files from one Secure Disk to another. What you can do: * Make your personal files and folders private without any hassle. * Protect sensitive information on Laptop in case it is lost or stolen. * Create multiple Secure Disks from hard disks or USB disks. * Don’t have to encrypt the entire drive to have security protection. * Can still share computer but only you can see your Secure Disk. The Secure Disk vaults on your computer and on removable storage devices can only be accessed with the right login ID and password. This solution is easier to use and more flexible than encrypting your entire hard drive. In case your computer is logged in and left unattended, no one can access your sensitive information without logging into your Secure Disks.

Get FileStream Secure Disk now:


Try FileStream Secure Disk
Purchase the full version for unlimited use

Summary: theft

Concepts: Hard disk drive, Personal computer, Cryptography, Protection, Digital audio player, Solid-state drive, Computer, Computer storage media

Categories:
/technology and computing/hardware/computer components/disks
/technology and computing/hardware/computer
/technology and computing/hardware/computer/portable computer/laptop

Tags: Secure Disk, multiple Secure Disks, sensitive information, FileStream Secure Disk, Secure Disk vaults, hard disk, Hard disk drive, FileStream Secure DiskPurchase, removable storage devices, entire hard drive, right login ID, Digital audio player, USB disks, hard disks, removable drive, secure vault, perfect solution, Strong Encryption, private information, Solid-state drive, entire drive, personal files, security protection, unlimited useSummary, computing/hardware/computer components/disks/technology, computing/hardware/computer/portable computer/laptop, storage mediaCategories, hassle, theft, attacks, FileStreamA, program, folders, Cryptography, data, Disks.Get, version, theftConcepts

13Aug/16

Sentry Professional

Sentry locks down your computer to keep it secure when you aren’t around. Many options are provided – you can customize the appearance of your screen, have your favorite screen savers run from within Sentry, and even take messages from people who may drop by.

Sentry can be activated instantly. It can be launched after your system is idle for a specified period of time, by clicking on an icon in the system tray, or by typing in a set hotkey.

Get Sentry Professional now:


Purchase the full version for unlimited use

Summary: system tray

Concepts: Time, Periodization, Graphical user interface

Categories:
/home and garden/home improvement and repair/locks and locksmiths
/technology and computing/consumer electronics/tv and video equipment/projectors
/technology and computing/hardware/computer

Tags: set hotkey.Get Sentry, favorite screen savers, Graphical user interfaceCategories, specified period, garden/home improvement, unlimited useSummary, computing/consumer electronics/tv, video equipment/projectors/technology, tray, time, icon, appearance, options, messages, people, Professional, version, trayConcepts, Periodization, repair/locks

25Jun/16
rentanadviser-kripto-video-protector-logo.png

Kripto Video Protector

Kripto Video Protector

Prevent others from accessing your private media files (video and audio) by packing media files in to Password Protected Media File (PPMF) with AES-256 encryption at high speed. You can play PPMF files on the fly with no delay, no trace. It doesn’t need any external codecs it can play all media formats including HEVC x265 12-bit. PPMF file contains encrypted media data, poster image, video thumbnails, tags, subtitles, rating, original file name, media codec information etc. PPMF file is lossless, when you know password of PPMF file, you can extract original data whenever you want without any data loss including original file name, file creation time, file last access time etc. Some data of PPMF file can be editable (password required) such as rating, media descriptive tags, poster image, you can embed subtitle files too. You can list PPMF files with thumbnails like images in a folder, you can rate PPMF files, search and filter and sort by title, file name, rating, tags, artist etc, and you can preview thumbnails by moving mouse cursor on poster images to see video thumbnails without playing it. Also you can see thumbnails by moving mouse cursor on player duration slider to see thumbnail before seeking to any position. You can watch movies as dubbed in your native language by using Text to speech to speak aloud subtitle (it is very helpful for people with vision, slow reading or similar problems ). You can download subtitles for movies and TV sires and synchronize subtitles with videos by time synchronization or FPS, it also supports preview of edited subtitles with video. With duplicate PPMF finder you can find and delete duplicate PPMF files. It provides very strong privacy protections. You can use panic button to lock the application or when PC idle timeout is reached application locks itself. You can unlock it by entering one of the previously entered password. When an unauthorized person try to unlock it, application shuts itself down. It uses secure string technology in .NET framework to protect password in memory. In this way there is no way to steal your password from memory while using the application. No need to enter password for every file, when you intent to watch multiple media files leave the application opened, application remembers passwords temporarily until it closes or lock itself when panic button is pressed or when PC idle timeout is reached. So do not worry about your privacy when you leave the application opened. Warning: if you lost password of PPMF file, there is no way to recover, decrypt, play or guess the content of PPMF file. Kiss that file(s) goodbye.

Get Kripto Video Protector now:


Try Kripto Video Protector
Purchase the full version for unlimited use

Summary: access time

Concepts: File system, Computer file, Filename, Cryptography, Filename extension, Synchronization, Nielsen ratings, Image organizer

Categories:
/law, govt and politics/legal issues/civl rights/privacy
/technology and computing/hardware/computer
/home and garden/home improvement and repair/locks and locksmiths

Tags: PPMF file, PC idle timeout, PPMF files, Password Protected Media, previously entered password, file creation time, video thumbnails, original file, media codec information, media descriptive tags, duplicate PPMF finder, poster image, media files, multiple media files, player duration slider, panic button, mouse cursor, Kripto Video Protector, Kripto Video ProtectorPurchase, application remembers passwords, strong privacy protections, politics/legal issues/civl rights/privacy/technology, secure string technology, subtitle files, private media, media formats, media data, AES-256 encryption, aloud subtitle, high speed, external codecs, application shuts, original data, data loss, poster images, Filename extension, access time, time synchronization, native language, similar problems, TV sires, slow reading, subtitles, .NET framework, unlimited useSummary, Image organizerCategories, Nielsen ratings, access timeConcepts, unauthorized person

24Jun/16

Total Spy Remote Edition

Total Spy – the all-in-one spy program which
– intercepts everything that is typed on keyboard;
– controls started applications and active windows;
– monitors visited URLs;
– scans Windows clipboard for changes;
– records both sides of chats in IM (Skype, ICQ, Yahoo Messenger etc);
– captures Social network activity (chats in Facebook , Twitter, MySpace etc.);
– makes invisible screenshots every xx minutes;
– writes this all to hidden folder on a hard drive;
– sends reports to your email, so you can use the program remotely.

…and this program is absolutely invisible for everyone except you. You will only have to press the unhide key combination to show the keylogger. Find out all secrets: passwords, mails, internet navigation etc.!


Get Total Spy Remote Edition now:


Purchase the full version for unlimited use

Summary: windows, Yahoo Messenger, Facebook, MySpace, Twitter, Social network

Concepts: Instant messaging, Comparison of instant messaging clients, Social network service, Internet, Windows Live Messenger, Comparison of instant messaging protocols, Yahoo!, Google

Categories:
/technology and computing/hardware/computer
/technology and computing/software
/technology and computing/internet technology/social network

Tags: instant messaging, scans Windows clipboard, instant messaging clients, instant messaging protocols, Spy Remote Edition, Total Spy, Social network activity, Windows Live Messenger, Yahoo Messenger, unhide key combination, Social network service, computing/internet technology/social network, all-in-one spy, invisible screenshots, active windows, sends reports, hard drive, unlimited useSummary, Social networkConcepts, Facebook, Twitter, MySpace, chats, program, intercepts, Comparison, Skype, xx, keylogger, mails, URLs, ICQ, folder, sides, keyboard, passwords, captures, controls, applications, changes, records, monitors, email, secrets, version

29May/16
spytech-software-spytech-spyanywhere-spyagent-stealth-3-computers-logo.jpg

Spytech SpyAnywhere/SpyAgent STEALTH – 3 Computers

Ever want to monitor your home PC from work? Want to monitor PC’s across your corporate network from your web-browser? Do you want the ability to remote control, administrate, and monitor remote computers?

SpyAnywhere is your solution! SpyAnywhere provides the power to remotely control computer’s with SpyAnywhere installed – all from your favorite web-browser! SpyAnywhere allows many powerful controls for remote control, and also allows you to remotely monitor other computers.

SpyAgent allows you to accurately log ALL activity on your PC: websites visited, applications ran, internet connections made, windows viewed, passwords used, keystrokes typed, and even screenshots! SpyAnywhere integrates with SpyAgent to create a superb local and remote monitoring solution!

Get Spytech SpyAnywhere/SpyAgent STEALTH – 3 Computers now:


Purchase the full version for unlimited use

Summary: remote control, SpyAgent, windows

Concepts: Graphical user interface, Personal computer, Wireless, Computer, Electrical engineering, Server

Categories:
/technology and computing/hardware/computer
/technology and computing/networking/vpn and remote access
/technology and computing/hardware/computer peripherals/computer monitors

Tags: Spytech SpyAnywhere/SpyAgent STEALTH, Graphical user interface, remote monitoring solution, computing/hardware/computer peripherals/computer monitors, favorite web-browser, home PC, corporate network, powerful controls, remote computers, unlimited useSummary, internet connections, Electrical engineering, remote control, remote access/technology, passwords, ability, activity, version, websites, applications, windowsConcepts, windows, Personal, Wireless, screenshots, ServerCategories

23May/16
spytech-software-spytech-spyagent-3-computer-license-logo.gif

Spytech SpyAgent – 3 Computer License

SpyAgent is a powerful monitoring and surveillance tool that is useful on all Windows platforms. SpyAgent allows you to monitor and record all system keystrokes, websites visited, windows viewed, applications ran, internet connections, passwords used, internet chats (icq/aim/msn/yahoo), and even take snapshots of the desktop. SpyAgent allows you to see how long websites and programs have been used, as well as the username of the user using them. SpyAgent allows you to get an accurate picture of who is using your PC, when, how, and what for. SpyAgent also has built in content filtering so you can keep others from running specified applications and websites!

Get Spytech SpyAgent – 3 Computer License now:


Purchase the full version for unlimited use

Summary: SpyAgent, windows

Concepts: Personal computer, Internet, Computer program, Password, User, Content-control software, Internet censorship, Server

Categories:
/technology and computing/hardware/computer
/technology and computing/hardware/computer/portable computer/laptop
/law, govt and politics/espionage and intelligence/surveillance

Tags: SpyAgent, surveillance tool, powerful monitoring, Windows platforms, internet chats, accurate picture, internet connections, Internet censorship, unlimited useSummary, long websites, Content-control software, computing/hardware/computer/portable computer/laptop/law, Spytech SpyAgent, applications, user, govt, username, passwords, snapshots, Password, icq/aim/msn/yahoo, desktop, programs, PC, License, version, windowsConcepts, Personal, program, ServerCategories, /technology

23May/16
spytech-software-spytech-spyagent-stealth-edition-3-computers-logo.gif

Spytech SpyAgent Stealth Edition – 3 Computers

SpyAgent is a powerful monitoring and surveillance tool that is useful on all Windows platforms. SpyAgent allows you to monitor and record all system keystrokes, websites visited, windows viewed, applications ran, internet connections, passwords used, internet chats (icq/aim/msn/yahoo), and even take snapshots of the desktop. SpyAgent allows you to see how long websites and programs have been used, as well as the username of the user using them. SpyAgent allows you to get an accurate picture of who is using your PC, when, how, and what for. SpyAgent also has built in content filtering so you can keep others from running specified applications and websites!

SpyAgent Stealth Edition comes pre-configured for OPTIMAL stealth – no user interaction or configuration is needed – just double click the installer and SpyAgent will be installed and executed immediately – with no visible trace during or after install.

Get Spytech SpyAgent Stealth Edition – 3 Computers now:


Purchase the full version for unlimited use

Summary: SpyAgent, windows, double click

Concepts: Internet, Personal computer, Password, User, Content-control software, Internet censorship, Internet pornography, Microsoft Windows

Categories:
/technology and computing/hardware/computer/portable computer/laptop
/technology and computing/hardware/computer
/law, govt and politics/espionage and intelligence/surveillance

Tags: SpyAgent Stealth Edition, Spytech SpyAgent Stealth, OPTIMAL stealth, surveillance tool, powerful monitoring, Windows platforms, internet chats, internet connections, visible trace, accurate picture, Internet censorship, long websites, Internet pornography, unlimited useSummary, Content-control software, user interaction, Microsoft WindowsCategories, computing/hardware/computer/portable computer/laptop/technology, double clickConcepts, applications, govt, username, passwords, snapshots, installer, icq/aim/msn/yahoo, desktop, programs, configuration, Password, PC, Computers, version, Personal

17Apr/16

Folder Lock Pro

Folder Lock Pro is a professional security tool to lock, hide and protect your folders and files. With very easy to use interface, just a few click, you can lock your folder and keep it safe, no one can open it without a password. This tool also provide protect for your folder and files to avoid delete, modify by mistake. You can also monitor a specified folder, any file created, modified and deleted will be logged.

Get Folder Lock Pro now:


Purchase the full version for unlimited use