001 Picture Recovery is a reliable picture recovery tool for users to recover pictures lost due to accidental deleting, formatting, and other unknown reasons from PC, SD card, USB Drive and other storage devices.
Asoftech Automation records all operation of mouse and keystrokes and saves them as macros. It can play back the recorded macros to automate recorded tasks any number of times.It is very easy to use and doesn't require any programming experience.
Best Spy is an extremely powerful spy software which allows you to secretly record all activities of computer, including emails sent and received, websites visited, every keystroke (including login/password of all kinds of programs and websites).
SafeFile Shredder and Mover will help you delete or move your files safely and securely. Employing the newest data wiping algorithm, the program will not only delete your files; it will totally erase all traces of them, completely eliminating...
Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, microphone, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a spy camera. Automatically sends logs to your email.
Aiseesoft FoneEraser is the most powerful securitytool to preserve your privacy through erasing sensitive data or all other data on the iPhone/iPod/iPad. You can select the erasing level and remove the data from your iPhone and iPad simultaneously.
abylon LOGON protects your computer again illegal access in a comfortable kind. You need only to train a smart card, a USB stick or a CD with your login data. In future you need only this token as key for the logon authentication.
Spyware IT removes all the spyware, adware and malware from your PC for you. It offers total protection, and once installed, works around the clock to ensure constant real-time protection. Spyware IT protects you from over 100,000 threats!
Controls access to files and folders situated on localmedia of Windows 95/98/ME/NT/2000/XP at Windows kernel level, allocates access to files and folders between users according to predefined schedules, and protects system files and folders.