SEARCH: leak

Hot Java

Let the java flow by connecting the pipes! Your task in this game is to rearrange the tiles so that they form a pipe which allows the coffee to flow and reach the nozzle. At the start of each level,...

Hide ALL IP

Hide ALL IP is the worlds best IP hide software, hide all your applications and games IP from snoopers & hackers, allows you to surf anonymously, prevent identity theft, and guard against hacker intrusions, all just need a click. Your...

Secure File Access

SFA ? is a high-tech combination of extremely secure data protection solution and real easy to use and manage system. Smart technology of SFA requires no installation, no drivers, no passwords, and uses allowed USB flash drives as access keys,...

Leak Blocker

Leak Blocker prevents data leakage from corporate computers using removable devices. It can be used to achieve two main goals: restricting the use of external devices and activity monitoring (including file access actions). In addition Leak Blocker can allow only...

Alloclave

The Alloclave memory profiler makes it easy to collect detailed information about your C++ Windows application's memory behavior. It displays the information in a visual way that makes your problem jump out at you. It is then easy to fix...

Deleaker

Deleaker is a useful extension for Visual Studio 2005, 2008, 2010, 2012, 2013 that helps you to analyze programming errors, many of which are unique to Visual C++. Deleaker is a great tool for Visual C++ developers who occasionally have...

Firemin

One of the biggest 'improvements' that Mozilla claims is the Firefox memory usage, in particular, the vanquishing of memory leaks. If you thought it was too good to be true you were right. Firefox still uses a lot of memory...

Tenorshare Android Data Recovery

Tenorshare Android Data Recovery is easy yet professional Android file recovery software that can recover lost contactes, photos, text message, call history and video from Android phone and tablet. With fancy inerface, you can easily control it and accomplish the...

CD-DVD Lock

CD-DVD Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two...

Avant Browser

Avant Browser's user-friendly interface brings a new level of clarity and efficiency to your browsing experience, and frequent upgrades have steadily improved its reliability. Multi-Processing: Multi-Processing design offers you a crash-free, lock-up-free, memory-leak-free internet browsing experience and high reliability. When...

Spheres of Chaos 2012

A spectacular retro arcade blaster. Edge online: ... delivers a psychadelic experience that one would be remiss to not experience. Taking the simple concept of a single ship shooting various sized space objects from the sky, Spheres of Chaos delivers...

Hide & Protect any Drives

Hide or restrict access to any drives such as Hard drive, CD, DVD, floppy and flash, and deny access to partitions of your hard drives with "Hide & Protect Drives". Stop unauthorized software installations and data leak by removable media.

PC Spy Monitor 2012

PC Spy Monitor secretly monitors Facebook, chats, emails, keystrokes, passwords and sends reports to your email or ftp. It logs Windows Live Messenger, Skype, Yahoo Messenger and other IMs. It also takes photo shots of online video talk like a...

SecureTower

A complex data leak protection system, SecureTower is an essential for any business that extensively uses Internet communication channels in its daily working. The Internet is often the biggest source of any company's leaks and in order to preserve your...

USB Security

Help guard against information leak and intrusion of malware on your home or business computers using USB Security, a powerful solution which helps users to protect their PCs and organizations to protect their wider networks. With centralized deployment and management,...