Advertisement

Way of the Tangram

Help Yan-Yan, a young chinese girl, to rebuild more than 150 Tangram figures and complete the Great Puzzle! Walk the Way of the Tangram, become a great master and unlock wallpapers, trophies and famou...

465 34.1 MB

Download

IP Hider

Keeps your Internet habits and activities private by hiding the IP....

493 3.8 MB

Download

SDI LPD

SDI LPD is a 32-bit print daemon (RFC 1179) which accepts print jobs from a remote computer...

465 1.03MB

Download

COM API

Create applications with virtual port interaction features....

608 314.99K

Download

Easy Drive Lock

This software was created to help you protect important data on your PC against accidental or intentional deletion or intrusion....

494 225 KB

Download

Vectir

Control a computer via smartphone using wireless and Bluetooth connections....

478 42.1 MB

Download

TheLaptopLock

If a computer is lost the hardware can be replaced, but the data is priceless. The LaptopLock allows you to remain in control of your data. Encrypt or delete files if the computer is lost, or execute...

504 461 KB

Download

Advertisement

AccessPoint SSL VPN Software

AccessPoint SSL VPN Software is a complete SSL VPN solution, including hardened operating system, SSL VPN portal and web management interface. AccessPoint includes HTTP/HTTPS proxy, file sharing, FTP,...

518 22000K

Download

IM Lock

It blocks access to user-defined websites, programs or system-specific tasks....

463 N/A

Download

Win Spy Software

Win-Spy is an invisible key recorder and screen-capture utility that secretly captures anything the user sees or types on the keyboard. Win-Spy operates in stealth mode. Users will not be aware of its...

513 1.7 MB

Download

LockDown 2000

LockDown 2000 was designed and developed to protect Internet users from being hacked by even the most sophisticated Hacker. LockDown 2000 provides complete security and privacy whenever you go online....

489 2,285K

Download

Hack Tracer

Hack Tracer will make your computer 'stealthed.' Any attempts at pinging or port scanning will receive no response. Unsolicited UDP packets and TCP connections will not get through. In short, the comp...

509 1,113K

Download

BlackICE Basic

Intrusion detection system. It scans your Internet connectionlooking for hacker activity, much like antivirus programs scan your hard disk looking for viruses. BlackICE Basic will identify the type of...

587 2,700K

Download