Espionage Software
|
|
Caloona
|
congador.com
|
In Caloona you fight a dozen unique AI-personalities in a turn based strategy game. There are more than twenty pre-built, optimized maps and with the easy-to-use editor you can create new galaxies in no time. Get up and running in five minutes or explore the more advanced options: Customize your player, select some thirty special abilities including attack and defense bonuses, omniscience, and an espionage bonus.
Software Keywords: caloona turn strategy turn-based space based
|
|
|
|
|
AMI Spies: A Cold War Daybook
|
Alchemy Mindworks
|
AMI Spies: A Cold War Daybook is a calendar and screen saver with stories from the dark history of 20th century espionage. Meet a spy for each day of the year. Run it on command, add it to your start-up group or install it as a screen saver to live the intrigue. Register as Shareware or choose the special half-price Bookware offer from Alchemy Mindworks. Cold war espionage is decidedly more interesting than anything that turns up in the movies.
Software Keywords: spies russia cia gru spy
|
|
|
|
|
|
|
Secure Storage Pro
|
Rayslab Inc.
|
Want to be absolutely sure your data is always protected? Want to have your files encrypted but don't want to hinder access to them? Get Secure Storage Pro, a virtual disk utility that encrypts data on the fly. Place all your confidential data (files, documents, pictures, e-mails, etc) onto a virtual disk and set the password. Only the password bearer will be able to access data, the others won't even know it's there! 100% FREE Trial.
Software Keywords: file encryption file protection secure disk secure storage data protection
|
|
|
|
|
SpyMyPC PRO
|
Benutec Software, INC
|
SpyMyPC PRO is award-winning, all-round desktop security monitoring solution : logs all keystrokes, applications , windows, websites, internet connections, passwords, chat conversations. Install SpyMyPC PRO, set options "Run in Hidden Mode", so that it makes itself invisible to anyone. Shortcut keys helps you fast access to Log View and Unhide Mode. Perfect for monitoring others who use your PC - children, spouses, employees, or just yourself.
Software Keywords: keyboard secret secretly key easy pc
|
|
|
PC Activity Monitor (PC Acme)
|
Raytown Corp.
|
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
Software Keywords: access control hack intelligence trojan
|
|
|
System Mechanic Professional
|
iolo technologies, LLC
|
A totally integrated suite of powerful PC tools that will keep your system running smoothly, fast, and error-free. Fix stubborn PC errors; maintain peak system performance; stop viruses, hackers, e-mail worms, and Internet threats; eliminate spyware; ensure personal and Internet privacy and security; recover deleted files, pictures, and email; and much more! A suite of award-winning products seamlessly integrated into one easy-to-use solution!
Software Keywords: recover memory utilities drive junk
|
|
|
PC Activity Monitor Net (PC Acme Net)
|
Raytown Corp.
|
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management tool for users and companies, which want to increase their productivity and profitability. This is the most remarkable security product for a computer you have seen.
Software Keywords: spy access control investigation parental control intelligence
|
|
|
Security Department
|
Rayslab Inc.
|
Security Department is a resident file system protector for Windows 95 and Windows 98. It provides several levels of protection for different folders and files. You can prevent various actions for folders and files : copying, moving, deleting, renaming and so on. In addition to the two standard protection levels "Read Only" and "Full protection", there is the Custom Protection level that allows you to fine tune the access.
Software Keywords: department directory encryption pc
|
|
|
Page 1 out of 2
1
2
|
|
|