Computer Theft

Notebak Anti-Theft 1.0.11

Notebak Anti-Theft 1.0.11: Protection of computers and data from being stolen or used unauthorized theft protection on your car. You will get a webcam image of the computer thief by email, and be able to record sound from your computer`s microphone if it goes missing! Notebak Anti-Theft uses precise Wi-Fi GEO tracking locations technology to run a GEO Fence, which sets invisible boundaries around your computer. No one will be able to use your computer outside these boundaries - except for you, to retrieve and delete files, all remotely! Use Notebak

MacPhoneHome 3.0: PC PhoneHome tracks and locates lost and stolen computers
MacPhoneHome 3.0

PC PhoneHome is a stealth computer security program that tracks the location of your computer every time it makes an Internet connection. When the stolen computer goes online it will send a stealth message containing its location. Recovery agents at MacPhoneHome will work with our customer, the local ISP and the investigating law enforcement agency to recover the stolen computer.

computer theft, computer security, ipod, tracing, laptop theft, asset tracking, laptop security, stolen laptop, os x, surveillance, ipod security, mac security, monitoring

No Image

Special Limited Offers available - As its name suggests, ComputerSafeTM provides an internal Safe inside your computer where you can store your vital information and protect yourself against identity theft and data security breaches. While all computers should have anti-virus and firewall protection, these safeguards are only partially effective. Real danger stems from new viruses, spyware and new hacking methods launched over the Internet.

identity theft protection, computer security, internet content filtering, security system, file encryption, parental control software, internet security

Block USB Access USB data theft protection tool track insertion and removal activity of USB media
Block USB Access

USB drive data theft protection software provides real time and offline LAN based activity monitoring to track and monitor insertion, extraction activity of USB drive mass storage on client system configured on Windows network. Easy to use and flexible computer data security service provider software runs invisibly to track USB theft on client machine and even record when network cable is unplugged or disconnected from client machine.

protection, network, windows, extraction, removal, trace, insertion, drive, hardware, tool, plug in, media, transfer

Notebak Alarm 1.0.3: Protection of computers and data from being stolen or used unauthorized
Notebak Alarm 1.0.3

Anti-Theft and Identity Theft Protection. Alerts with sound if a computer is under attack! Get a webcam image of the intruder when away. Sound anti-theft alarm when the power cord is unplugged or laptop lid is closing. USB ports access alert. Unauthorised login attempts alert. Off-line data protection. WiFi GEO locator. Use custom sounds for alarm.

protection, laptop, locator, recovery, identity theft, mobile, alarm, privacy, sound, compliance, alert, stolen, notebook

MacPhoneHome Theft Location & Recovery Software 3.5: MacPhoneHome‚ tracks and locates lost or stolen laptop and desktop computers.
MacPhoneHome Theft Location & Recovery Software 3.5

computers. MacPhoneHome‚ installs in minutes, operates at a very low level using almost no resources and is completely transparent to the user. Every time a MacPhoneHome‚ protected computer connects to the Internet, a stealth email is sent to a pre-determined email address of the user`s choice and to our worldwide control center. In the event your computer is lost or stolen, you file a theft report with the local police and then notify us. Recovery

iphone, stolen, recovery, security, theft, computer, stolen laptop, ipad

PAL PC Tracker Lite 1.01: PAL PC Tracker is a computer tracking and theft recovery software system.
PAL PC Tracker Lite 1.01

PAL PC Tracker is a computer tracking and theft recovery software system. PC Tracker allows the user to do their own monitoring and works with both Laptops and Desktop computers. Every time you boot your computer and have an Internet connection, PC Tracker sends a stealth e-mail message containing its exact location to a pre-determined e-mail address set by the customer.

tracker, lost computers, monitor, internet security, monitoring, theft recovery, system security, theft, tracking, utility

More Results: 1  2  3  4  5  6  

World IT News