TUTSOFT

15 Jan 2018

Mini Key Log 6



Mini Key Log 6
Mini Key Log monitors and records the activities of all users on a computer unnoticed. The monitoring captures not only the most common activities like keystrokes and visited websites, but also screenshots and many more. Mini Key Log is specially designed to monitor a computer quickly and easily.

Monitoring features:
  • Keystrokes
  • Mouse clicks
  • User logon/logoff
  • Clipboard
  • Power state
  • Data medium change
  • Dial-up connections
  • File operations
  • Printer
  • Scanner
  • Screenshots
  • Visited web pages
  • Webcam
  • GPS Position
  • Microphone

More features:
  • Invisible in the process list
  • Selective user monitoring
  • Automatic uninstall
  • Automatically delete records
  • Protection against unauthorized use
  • Filter records



Platform: Windows Server 2003, Windows 2000, Windows XP x32, Windows Server 2012, Windows Server 2008, Windows 7 x32, Windows 7 x64, Windows 8, Windows Server 2008 R2, Windows 8 x32, Windows 8 x64, Windows 7, Windows Vista x64, XP Tablet PC, Windows Vista x32, Windows 8.1, Windows 10, Windows XP x64, Windows Server 2003 x64

PortsLock



PortsLock
PortsLock is a personal firewall for Windows NT/2000/XP that fully supports user-level security. Once PortsLock is installed, administrators can control which users can access what TCP/IP based protocols (HTTP, FTP, SMTP, POP3, Telnet, etc.) on a local computer, depending on the time of day and day of the week. PortsLock lets you set allowed/denied TCP/UDP ports and IP-addresses for incoming and outgoing connections.
Keep in mind that almost 80% of all security breaches come from the inside! PortsLock is an easy-to-use security solution that fully protects corporate networks against attacks from the inside. 


Download Demo  Buy now!   

Platform: Windows Server 2003, Windows NT, Windows 2000, Windows XP x32

CADMAI



CADMAI
CADMAI is a relational CAD system, which has its main focus in the parametric 2D and 3D design. OpenCascade herby serves as the solid modeler basis.
  • Cadmai is completely associative, which means that not only crosshatching / dimensions are related to defined geometry but any other entities can be linked to each another
  • Beside the variance of shape also logical structures can be defined and cover even topological changes
  • By integrating dynamically generated dialogs the geometry can also be steered in the viewer module
  • The modification of the parameter can also be performed by external applications as spreadsheet analysis, databases, PDM systems or web pages, in which the viewer is embedded
  • An open, by configuration tables expandable export concept enables even the transfer of parametric to the destination systems
CADMAI consists of the following modules
  • The main application (cadmai.exe) for creating relational models
  • The Viewer which can be steered remotely by external applications
  • The ActiveX Control, which can be embedded in own applications and serves either as an integrated viewer or as an interactive CAD module
  • An windows API which enables CADMAI to run in native windows in an external application
  • A Object API which can be used as an independent geometry library
  • Batch modules which allows the usage of CADMAI batch processes and the control of loaded CADMAI models.
  • SOA modules which enable the usage of CADMAI in a service oriented environment

Please find additional information at www.cadmai.com


Platform: Windows 8, Windows 7, Windows 10

COMPELSON


  • MOBILedit! Family Edition
    License for 5 phones and one computer; all features available including Phone Copier; online activation required; 6 months of free updates.

  • Password Officer 5.0 DeLuxe
    Ultimate password tool - logon anywhere quickly and securely!

  • Password Officer 5.0 Standard
    Ultimate password tool - logon anywhere quickly and securely!

  • MOBILedit! Basic Edition
    License for 2 phones and one computer; all features available including Phone Copier; online activation required; 6 months of free updates.

  • MOBILedit! Enterprise
    The professional phone management tool for enterprises, organizations, cellular retail stores, service centers and mobile operators. It includes all features including Phone Copier plus Wipe function. License for commercial services, unlimited phones and one computer; no online activation of phones required; 12 months of free updates.

  • MOBILedit! Forensic
    Forensic edition is designed for law enforcement agencies, police, detectives and all who need to create detailed reports. It includes 12 months of free phone support updates. No online activation required.

  • Update pack for MOBILedit! Forensic
    Package with 12 months of updates and upgrades for MOBILedit! Forensic

  • MOBILedit! Phone Copier
    The professional phone copy tool for cellular retail stores, service centers, mobile operators, corporations and organizations. This application helps with the most important tasks, such as one-click transfer of contacts between phones, data back-up and phone wipe. License for commercial services, unlimited phones and one computer; no online activation of phones required; 12 months of free updates.

  • MOBILedit! Professional Edition
    License for 10 phones and one computer; all features available including Phone Copier; online activation required; 6 months of free updates.

  • Phone Forensics Express
    Forensic Express is designed for law enforcement agencies, police, detectives or investigators who need an on-the-go tool to perform fast one-touch extractions from any phone. It can be installed on any PC or tablet running Windows. License for commercial services, unlimited phones and one computer; no online activation of phones required; 12 months of free updates.

  • Phone Copier Express
    The touch capable self-serve professional phone copy tool for cellular retail stores, service centers and mobile operators. Designed with a focus on transfer speed and ease of use. Data cannot be viewed or edited on the device protecting customer privacy. License for commercial services, unlimited phones and one computer; no online activation of phones required; 12 months of free updates.

MunSoft Data Recovery Suite Service License



MunSoft Data Recovery Suite Service License
Repair all types of lost data with ease. MunSoft Data Recovery Suite assembles all general-purpose and specialized data recovery tools manufactured by the company under one roof. The data recovery suite can automatically locate and undelete files stored on all kinds of storage media. The suite will also repair damaged Outlook and Outlook Express email databases, and recover ZIP and RAR archives and Microsoft Office documents. 

The comprehensive data recovery pack includes numerous tools to help you successfully recover all types of data - no matter how bad the damage is. Easy Digital Photo Recovery will help you restore photos. Easy Drive Data Recovery undeletes all types of files from corrupted, reformatted, repartitioned and inaccessible disks and memory cards, even if they are no longer registered with the file system. Easy Mail Recovery is aimed to recover email messages, attachments, address books and organizer information managed by Microsoft Outlook and Outlook Express. The application not only finds and undeletes email databases, but analyzes and fixes their data structures in order to extract the last bit of salvageable information. Easy Archive Recovery undeletes and repairs corrupted ZIP and RAR archives, while Easy Office Recovery does the same thing to documents produced by Microsoft Office.

No matter how the data loss had happened or how severe the damage is, MunSoft Data Recovery Suite will do everything to save as much data as theoretically possible. Featuring sophisticated discovery methods, the data recovery toolkit can scan the entire surface of the disk in order to locate files no longer showing up in the file system. Operating completely automatically, MunSoft Data Recovery Suite provides convenient fully guided user interface and comprehensive pre-recovery preview.

Download Demo  Buy now!

Platform: Windows Server 2003, Windows 2000, Windows XP x32, Windows Server 2008, Windows 7 x32, Windows 7 x64, Windows 7, Windows Vista x64, Windows Vista x32, Windows XP x64, Windows Server 2003 x64

SurfSolo USA



SurfSolo USA
SurfSolo creates an encrypted virtual tunnel between your computer and one of our high bandwidth security proxy servers. This tunnel shields you from the most sophisticated methods of online spying and snooping, ensuring you of completely anonymous web surfing. SurfSolo is like the secure VPNs (Virtual Private Networks) that corporations use, but designed for personal use. SurfSolo anonymous web browsing is simple to set up and use, and works silently in the background. The internet connection is only slowed down minimally (depending on your internet connection and number of nodes between your computer and our servers). After you configure your Internet applications to send their traffic through the tunnel, your Internet activity is protected. Every packet of data is encrypted using the Advanced Encryption Standard (AES) encryption algorithm. When your data emerges from our privacy proxy at the other end of the tunnel, it appears to outside observers as if your traffic started at our proxy - not your home machine. So SurfSolo, in addition to encrypting your traffic, anonymizes your online activity. Note: The AES algorithm was selected by the National Institute of Standards and Technology from among almost two dozen other candidates in October 2000, after years of analysis and testing, to replace the worldwide encryption protocols that banks and other industries use to protect their data. Its code has been analyzed by the world's cryptographers for holes and exploits before it was approved. The Service is valid for 12 months from the purchase, after that period should be extended a new license to use, it is recommended that the renewal is made 30 days before the validity. Why Do I Need SurfSolo? When you connect normally to the Internet, your transactions are relayed through several servers before reaching their final destination. These servers have the ability to collect information as your requests are routed through them. The most common example of a server that can collect information about your Internet activity is your Internet Service Provider (ISP). Since your requests are not encrypted, any server between you and your final destination can "see" what you are doing. Who is your ISP ? No one knows more about your surfing and downloading habits that your ISP. Your Internet Service Providers can see every site you visit, every page you view, and every file you download. What´s worse, they know exactly who you are and often keep logs for substantial periods of time. How does SurfSolo Work? You can use your SurfSolo account to encrypt the Internet activity between your computer and our servers. This prevents any server between you and us, such as your ISP, from monitoring your activities. Our Privacy-Tunneling accounts allow you to encrypt your incoming and outgoing email, surfing and news posts through a method known as port forwarding. This service can be used independently of or transparently in conjunction with SQUID-Proxies. 

Features of SurfSolo: 

• SurfSolo allows anonymous surfing by obscuring the location of your computer as well as your Internet IP address 
• SurfSolo, is a secure Tunneling SSH2 Service: This powerful encryption technology runs silently and effortlessly in the background whenever you´re online, encrypting all transmissions to and from your computer 
• Powerful AES-256 encryption makes your entire internet traffic your private issue Secure & Private Email Account: Lets you send and receive messages safely, privately and anonymously. By using the secure e-mail address your will receive, your IP-address WILL NOT BE VISIBLE, you will just appear as 'localhost' plus the privacy server's IP 
• Secure & Private Newsgroup Access: Allows safe and private newsgroup posting and reading 
• Secure & Private Instant Messaging & Chat: Automatically protect your chat activity and existing IM accounts 
• P2P capable 
• Nobody will have a clue who and where you are 
• No activity logs kept 
• Ultra high bandwidth

Buy now!


Platform: , Windows XP/Vista/Win7/Win8/Win10 (32 and 64 bit)


PhoneCrypt Voice



PhoneCrypt Voice
The Problem Almost every phone conversation can be intercepted with minimal efforts from competitors, hackers or public institutions. It is well known that companies, politicians, institutions and regular businesspeople are increasingly victimized by illegal phone tapping. An effective solution available on the market is digital encryption (hardware or software based). These solutions may be very secure, but require a data/internet connection (3G, Wifi, CSD, GPRS, etc.) to complete the call. Often, a data connection is however not available or very weak. In this case, the entire digital solution becomes useless. The Solution Unlike most voice encryption solutions, PhoneCrypt VoiCe is a unique, innovative technology able to provide the highest security voice encryption to mobile phones using the normal voice channel rather than requiring a data/internet channel. PhoneCrypt VoiCe encrypts the voice digitally and then transports the encrypted information over the analog voice channel of the phone. PhoneCrypt VoiCe can be used anywhere in the world, even where all other digital solutions fail. Even more, PhoneCrypt VoiCe works with any mobile phone on the market (even the lowest-end models) regardless of the brand or model, as long as they have Bluetooth functionality.

Buy now!



11 Jan 2018

TUTSOFT - INFO BLOG - May 2010 – January 2018

TUTSOFT - INFO BLOG

May 2010 – January 2018

TUTSoft Info is a blog about computer software from the user's point of view. Software reviews, news, and some other software related information can be found here.
Related Posts Plugin for WordPress, Blogger...