Home Order Contact
ModemTools Web Store
More like this:  
Password Protection  
Access Control  
Internet Security  
Enterprise Security  
Network Software  
Net Tools  
Computer Crime  
Corrupt Data  
Information Security  
Data Erasure  
Data Repair  
Security Software  
Recovery Service  
Data Security  
Recover File  
     
  Search:
 





Computer Security Software Store

Recover data from damaged or formatted disks with this automatic tool

DiskInternals FAT Recovery 1.5 by DiskInternals Research $69.95
DiskInternals FAT Recovery

Recover data from damaged or formatted disks




DiskInternals FAT Recovery DiskInternals FAT Recovery is a fully automatic utility that recovers data from damaged or formatted disks. The program scans the disk first and then restores the original structure of files and folders. DiskInternals FAT Recovery Works for all occasions - formatted drive, inaccessible drive, drive not booting, missing or deleted file or directory, corrupted or damaged partition table. Files up to 64 KB are recovered by DiskInternals FAT Recovery absolutely free.

 

Download DiskInternals FAT Recovery 1.5 (1.4 MB)

DiskInternals NTFS Recovery 1.4 by DiskInternals Research $99.95
DiskInternals NTFS Recovery

Restore files from damaged NTFS disks




DiskInternals NTFS Recovery If your drive is damaged or inaccessible, a disk volume has been re-formatted or even deleted, your files, unless physically destroyed or overwritten, can be recovered with DiskInternals NTFS Recovery. DiskInternals NTFS Recovery NTFS is an advanced disk formatting used by XP and other modern operating systems. DiskInternals NTFS Recovery is a tool that utilizes NTFS features allowing you to recover files from Disk volumes in case they were damaged.

 

Download DiskInternals NTFS Recovery 1.4 (1.4 MB)

Program Sentry 1.0.0 by Leithauser Research $25.00
Program Sentry

Access control for programs on your computer




Program Sentry Provides access control and usage management. Allows you to either create a list of blocked programs or a list of allowed programs. Program Sentry In the blocked programs mode, any program on the list is blocked. In the allowed program mode, any program NOT on the list is blocked. Individual programs can be password protected.

 

Download Program Sentry 1.0.0 (500.5 KB)

Program Selector Pro 98/ME 4.3 by Leithauser Research $35.00
Program Selector Pro 98/ME

Provides access control for 98/ME computers

Program Selector Pro 98/ME Program Selector Pro provides access control and usage management. Replaces standard Windows 95/98/ME user interface (task bar, Start button, and icons) with user configurable list box of program names. Program Selector Pro 98/ME Supervisor level password is required to add programs to the program list box. Administrative level password is required to restore the original Windows interface. Programs can also be individually password protected. Virus protection included.

 

Download Program Selector Pro 98/ME 4.3 (510.9 KB)

Program Selector Pro 2000/XP 4.9 by Leithauser Research $35.00
Program Selector Pro 2000/XP

Provides access control for XP/2000 computer

Program Selector Pro 2000/XP Program Selector Pro provides access control and usage management. Replaces standard Windows 2000/XP user interface (task bar, Start button, and icons) with user configurable list box of program names. Program Selector Pro 2000/XP Supervisor password is required to add programs to the program list box. Administrative level password is required to restore the original Windows interface. Programs can also be individually password protected. Virus protection included.

 

Download Program Selector Pro 2000/XP 4.9 (518 KB)

MacPhoneHome 3.0 by Brigadoon Software, Inc. $29.95
MacPhoneHome

PC PhoneHome tracks stolen computers

MacPhoneHome PC PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When the stolen computer goes online it will send a stealth message containing its location. MacPhoneHome Recovery agents at MacPhoneHome will work with our customer, the local ISP and the investigating law enforcement agency to recover the stolen computer.

 

Download MacPhoneHome 3.0 (548.1 KB)

CSSS Video 2.1 by SARBASH Lab. $49.00
CSSS Video

Computer Security System for home or office

CSSS Video Use your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save What is CSSS? CSSS Computer Security System with motion detection by WEB - camera. CSSS Video The principle of action bases on WEB-camera real time survey and if it is necessary do many operation (play sound file (siren) ,record sound, video or snapshot, call by telephone). In case.

 

Download CSSS Video 2.1 (2.9 MB)

CSSS 2.2 by SARBASH $25.00
CSSS

CSSS - Computer Sound Security System

CSSS Use your computer as a home or office security system! Remote listening! If you want: - to guard your home, office or any location; - to eavesdrop; - to save What is CSSS? The CSSS program - Computer Sound Security System. CSSS The principle of action bases on microphone (microphones) real time survey and highly intellectual analysis of coming signals on the basis of special algorithms, and if it is necessaryvcalling you by modem (phone.

 

Download CSSS 2.2 (25 MB)

BPS PC Internet Firewall Security 1.0.0.3 by Bullet Proof Soft $29.99
BPS PC Internet Firewall Security

Prevents Hackers and Adware Communications

BPS PC Internet Firewall Security The BPS PC Internet Firewall Security interface provides one-stop access to the security features that keep your computer safe.Prevents Hackers and Adware Communications.Stops viruses and worms,and protects against emerging viruses before they attack. BPS PC Internet Firewall Security Protects against fraudulent E-mail and web based attacks.You get protection from viruses,worms,Trojan horses and spyware that sneak onto your computer via your web browser,e-mail or instant messaging.

 

Download BPS PC Internet Firewall Security 1.0.0.3 (6 MB)

JM Pager 2.20 by QUIT-UP Ltd $10.00
JM Pager

Remote administration & messaging tool

JM Pager Message sending(here we have WinPopup clone.File sending). Simple reminder.See screenshot of any user's computer. Get folder structures of user's computers. Copy files from and to user's computers. JM Pager Run programs remotely and documents with associated programs. List current processes on remote computers. Kill process in remote systems. Get remote system information. Shutdown remote computer / Restart remote computer. Get computer's database.

 

Download JM Pager 2.20 (2.1 MB)

Whois 2.3 by Nsasoft LLC. $0.00
Whois

Whois obtain domain registration information

Whois Whois Tool is a client utility that communicates with WHOIS servers located around the world to obtain domain registration information. Whois supports IP address queries and automatically selects the appropriate whois server for IP addresses. Whois This tool will lookup information on a domain, IP address, or a domain registration information.

 

Download Whois 2.3 (436.2 KB)

Nsauditor Network Security Auditor 1.3.2 by Nsasoft LLC. $49.00
Nsauditor Network Security Auditor

Scan and monitor network.Over 45 net tools

Nsauditor Network Security Auditor Nsauditor Network Security Auditor is a network security scanner that allows to audit and monitor network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Nsauditor Network Security Auditor Nsauditor is a complete networking utilities package that includes more than 45 network tools for network auditing, scanning, monitoring and more. Overall, this is a very complete package for a surprisingly low price.

 

Download Nsauditor Network Security Auditor 1.3.2 (5.4 MB)

Speaker Verification DLL 2.0 by Research Lab Inc $399.00
Nsauditor Network Security Auditor

Speaker Verification Biometrics SDK

Speaker Verification DLL Create in minutes a Voice Biometrics Package. Gives strong and unbreakable computer protection by voice print. Useful in protecting particular folder, file & important data using voice password. Speaker Verification DLL Try it for Remote Online Server Members Verification. Identify your program users by voice. Speaker Verification DLL is a good solution for computer software programmers looking for measures in biometric security.

 

Download Speaker Verification DLL 2.0 (3.8 MB)

 


Copyright 2005-2007 Pingram Software