Raytown Corp.

Company Homepage: http://www.softsecurity.com

Send e-mail to this Company

Stay always current with our entire product range at a fraction of the price!

TMS software, established in 1995, is a software development company specialized in:

  • VCL, FMX, LCL, FNC, .NET, IntraWeb component development
  • Windows, Web, Android, iOS, macOS, Linux, Node.js development projects
  • Training, consulting & custom project development
  • TMS software has a team of experienced developers with main office in Europe, Belgium as well as offices in Germany, Uruguay & Brazil.

    Company Products

    Total 5 products

    AlertMobile Light v.4.0

    Applications in Delphi and BCB > Security > Administrator Tools

    By Raytown Corp..

    Shareware 23 Aug 2002

    Description

    AlertMobile is a special software for computer security incidents response. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and handles response commands. AlertMobile can be used by security administrators for control of the corporate security policy, by parents for monitoring of their children computer activity, or by anyone else.

    Informations

    • Status: With Nag-Screen
    • Source: N/A
    • price: $59.95
    • Size: 484kB

    Platforms: NT4, W2K, XP,

    AlertMobile Pro v.4.0.2

    Applications in Delphi and BCB > Security > Administrator Tools

    By Raytown Corp..

    Shareware 05 Feb 2015

    Description

    AlertMobile is a special software for computer security incidents response. It monitors all attempts of unauthorized computer activity, sends SMS alerts to mobile device, receives and handles response commands. AlertMobile Pro has the following features:
    • Recording of user logon name, date, time and computer name
    • Monitoring of active tasks list
    • Handling of critical programs list
    • Sending of SMS alerts to the security administrator's mobile phone
    • Receiving of control commands from the security administrator's mobile phone
    • Protection from unauthorized external access
    • Protection from unauthorized physical access.
    With control commands you can remotely administer your computer via mobile phone. Just send the SMS from your mobile and one of the following actions can be performed:
    • Displaying of messages sent from mobile phone
    • Disabling of user's account and forcing system restart
    • Termination of active process
    • Termination of all active processes from monitored processes list
    • Locking of active process
    • Locking of all active processes from monitored processes list
    • Dismounting of all protected drives
    • Tracing the route of stolen or lost notebook or desktop PC
    • Sending to mobile phone the confirmation of command execution status.
    AlertMobile can be used by security administrators for control of the corporate security policy, by parents for monitoring of their children computer activity, or by anyone else who wants to ensure that nobody uses his or her computer without permission.

    Informations

    • Status: Evaluation (time-limit)
    • Source: None
    • price: $89.95
    • Size: 593kB

    Platforms: Vista, W2K, W2K3, W7, W8, XP,

    Invisible Files 2000 Pro v.6.0

    Applications in Delphi and BCB > Files and Drives > Other

    By Raytown Corp..

    Shareware 13 Mar 2002

    Description

    Invisible Files 2000 Pro (IF2000 Pro) is a program for Windows 95/ 98/ ME that allows hiding of any file or folder on the local hard drives of personal computers. The files are not physically deleted but they are invisible (even in Windows safe mode and DOS session). File systems FAT16 and FAT32 are supported. IF2000 Pro also supports long filenames. With IF2000 Pro you can safely wipe the critical information.

    IF2000 Pro features:

    • Hidden files are invisible in Windows safe mode and DOS session.
    • Invisible mode. In this mode program is invisible. For program activation press hotkey combination.
    • Timeout facility. Program termination in the case of user inactivity after defined time period.
    • Wipe facility. The Wipe safely deletes files and their contents. When you delete a file normally by placing it in the Recycle Bin, the name of the file is removed from the file directory, but the data in the file stays on the disk. Wipe removes all traces of a file's data so that no one can use a software tool to recover the file.

    Informations

    • Status: With Nag-Screen
    • Source: N/A
    • price: $59.95
    • Size: 734kB

    Platforms: ME, W95, W98,

    Stealth Email Redirector v.3.0

    Applications in Delphi and BCB > Internet > Mail

    By Raytown Corp..

    Shareware 18 Feb 2002

    Description

    Stealth Email Redirector (SER) is a program that sends the copies of all outgoing emails. SER monitors outgoing traffic of email client software and intercepts all sending emails. Then program sends out intercepted emails to specified email addresses. Stealth Email Redirector (SER) do not intercepts emails are sending from web-based email services like a www.yahoo.com, www.hotmail.com etc...

    Informations

    • Status: With Nag-Screen
    • Source: N/A
    • price: $89.95
    • Size: 100kB

    Platforms: ME, W95, W98,

    Stealth Keyboard Interceptor v.6.0

    Applications in Delphi and BCB > Security > Logging and Monitoring

    By Raytown Corp..

    Shareware 21 Feb 2002

    Description

    Stealth Keyboard Interceptor for Windows NT/2000/ XP (SKIn2000) is a monitoring program which allows to intercept all keystrokes, mouse clicks, captions of active windows, static text and other. It has a unique set of features that makes SKIn2000 the powerful program, suitable for perfect monitoring of user's computer activity.

    Informations

    • Status: Not available
    • Source: N/A
    • price: $69
    • Size: 468kB

    Platforms: NT4, W2K, XP,