You are here: WaySofts > Security & Privacy

 
 Advertisements
  You'll find a complete list of Security & Privacy software at Download Center WaySofts See all products in this category.   You can download free or buy online them.
dvd copy memory movie programs
Software
 
298

 
364

 
729

 
 
 

Software
 
189

 
765

 
117

 
463

PREVIOUS     NEXT

Stealth KeyLogger  Stealth KeyLogger

 Stealth KeyLogger is an invisible, easy to use surveillance application, designed to monitor and record all activities on a computer. Perfectly suited for both office and home use Stealth KeyLogger offers detailed information on who uses your computer, their e-mails and chat conversations, the visited web sites, programs run as well as actual screenshots of their activity, websites visited and keystrokes history.You can schedule the exact period when you want that Stealth KeyLogger to monitor or, you can choose to exclude users from monitoring, and to specify when should the application record an user as being IDLE. On the other side there are new functionalities improved from the previous ones for a better surveillance in a better stealthy way. This keylogger keeps up with the technology progress, so that the version of Internet Browsers and Instant Messaging applications does not influence the results of the application. Reports are organized chronologically, always providing informa...

Word Password Recovery  Word Password Recovery

 Word Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Word 2003/2002/2000/97/95 documents protected with password for open. The program supports the "brute-force" attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program automatically saves password searching state and can resume an interrupted attack (after a stop, crash, etc.)...

PrivyPad  PrivyPad

 Create, edit, read and e-mail encrypted and plain text files with this Notepad-like text editor. It supports 4 strong encryption/decryption algorithms: BLOWFISH, Triple DES(3DES), RIJNDAEL(AES) and XOR. It allows to perform up to 100 encrypting/decrypting steps on highly sensitive information to ensure its highest level of protection and security. Use this utility to protect your private info, to encrypt/decrypt a secret document or file, to store business and credit card data or to keep any other strictly confidential data. This software can also be used as a password and electronic key keeper. With this tool you can send and receive an encrypted message through your default email client such as Microsoft Outlook Express or Eudora, and through popular Internet e-mail services such as Yahoo! Mail, Hotmail, AOL Mail, etc. This application can also be used for creating, editing and printing of a .txt, .html or any other text file. It is a very reliable, intuitive and easy-to-use program....

Solid Encryption  Solid Encryption

 This gives you access to unbreakable OTP encryption. You can encrypt to and from files or directly to the clipboard. Paste cipher-text directly into text documents. Generate real random keys with no more than a radio and a sound card. One-Time Pad (OTP) encryption a.k.a. infinite key encryption. OTP encryption is absolutely unbreakable if used correctly. This system is well known and has been used for a long time by various intelligence agencies. When no mistakes were made it has survived unbroken even when the resources off great world powers have been employed to break it. Unlike most encryption schemes today, not only can you be certain that your communications will not be decoded this year, but that your secrets are safe for eternity....

Speed Backdoor Web Bug Keylogger Reporter  Speed Backdoor Web Bug Keylogger Reporter

 Speed Backdoor Web Bug Keylogger Reporter lists all critical areas of your PC like startup programs, BHOs, running programs and loaded libraries. It helps in situations when you have been infected by new and unidentified spyware, adware, keylogger, trojan or worm. A generated log file can be send to Spy Emergency Research Center and the Team of professionals will send you a report of isolated problems so you can fix them immediately. Speed Backdoor Web Bug Keylogger Reporter is standalone and do not need any installation or uninstallation. Protect your PC from harmful threats such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb....

IEProtect  IEProtect

 This password protection software protects access to selected websites on your PC. You do not have to have webmater type access to the web server. All you have to do is to select an access password and type in URLs or domain name that you would like to protect. This software can password protect access to ANY website on your computer. When installed on the PC, IEProtect checks if a URL that is about to be visited is on the protected list. If yes, it displays a password prompt, if not it seemlesly continues browsing. As an additional security measure the software has its own access password and uninstall password protection features. Two operation modes allow IEProtect to work for all users of the computer, or currently logged on user only....

SimonTools CyberGhost VPN  SimonTools CyberGhost VPN

 Everyone is curious by nature. Everyone likes talking about others and exchanging the newest gossip. But no one likes being spied on. That's why we close the doors when we want to be left alone or choose to telephone with friends when no one is listening. Increasingly, however, the Internet gives us fewer such places for privacy. Website hosts want to know about your interests; the industry wants to know about your online activities; state agencies and intelligence services want to know as much as possible about the citizens of their country. To protect yourself and your privacy, you must take action. Why surf anonymously? Would you like to have your bank deny you a loan based on your Internet activities? It is your right to decide for yourself who gets what information about you. Internet surfing leaves a plethora of tracks-not just the ones on your computer. Every Internet provider knows exactly which websites you visit and when you visited them, while every website identifies your a...

Spy Soap  Spy Soap

 Free Spyware and Adware Detection & Removal Software. Provides a real-time protection solution against spyware & adware. Spy Soap detects and remove a multitude of spyware, adware, Trojan horses, keyloggers, and trackware components, sources of irritation that many antivirus products do not deal with. Scans for almost all Spyware components out there today! Easy to use (just one click of a mouse) Cool UI and multi-ways to upgrade Scans Running processes (Memory), Registry, Fixed, and removable drives. Quarantine and restore removed items. Ignore List (Found items can be ignored) Also features BHO Manager Also features Startup Manager Also features HostsFile Manager Also features Immunize hazardous ActiveX...

R-Firewall  R-Firewall

 R-Firewall is an effective and easy-to-use solution to secure your on-line activity. It protects a computer connected to a local network and/or to the Internet against any intrusions, attacks, trojans, spyware, and other external and internal threats. R-Firewall also filters out inappropriate Internet pages content and blocks dangerous active components you may get while browsing over the Internet or receiving e-mail massages. Automatic configuration during setup allows you securely surf the Internet right after the software installation. Mobile users can create multiple and easily switchable configurations for specific network environments (Internet surfing at home, office local networks, or public Wi-Fi spots)....
 Advertisements

eScan Enterprise Edition  eScan Enterprise Edition

 eScan Enterprise Edition is a complete security suite for Corporate and enterprises which provides essential protection against viruses, objectionable content, hackers and privacy threats. It scans the local and network drives for viruses and cleans them on a real-time basis. Built on MWL technology, it has a powerful Anti-Virus, intelligent Heuristic Scan Engine that detects and blocks over 90,000 known and unknown viruses. It offers a combination of features to help you fight the threat of viruses and set security policies. It guards against Internet misuse, block Spam and offensive mails and block PopUp Ads. Comes with adware, spyware, keylogger removal. A very important feature is Browser CleanUp that allows you to protect your privacy and removes traces of websites you visit, removes cookies, active X controls, plugins and other links that reveal your browsing habits. The features include Real time Virus Scanning at Desktops, Servers and Gateways, includes scanning of SMTP, POP3 a...

Xintegrity  Xintegrity

 Xintegrity makes it virtually impossible for anybody or anything to modify your files without being detected. When Xintegrity detects a modified file it will show exactly how and when the file was modified and display the contents of the modified file in comparison with an optionally backed up copy of the file. All your files [including operating system files] can be protected. Xintegrity can automatically create protected backup files [optionally encrypted with 256 bit AES] allowing you the option of restoring the file when modification is detected. Auto restore and email notifications make Xintegrity ideal for monitoring large numbers of servers....

Outpost Security Suite Pro  Outpost Security Suite Pro

 Outpost Security Suite Pro is a robust, proactive Internet security solution that protects against a broad range of current and future threats, from viruses and spyware to rootkits and botnets. Outpost Security Suite Pro brings together the award-winning Outpost Firewall Pro, a new anti-malware engine that combines anti-virus and anti-spyware capabilities, unique Host Protection module and a self-learning anti-spam engine. The robust, bidirectional firewall ensures that your PC is invisible to hackers when you're online, and enables you make your surfing private and secure. Additionally, it safeguards a PC from malicious impact when it's connected to unknown or hostile networks such as WiFi hotspots at an airport. The powerful and efficient anti-malware scanner not only quarantines and/or removes any active or idle malicious objects from your PC but also has deploys proactive behavior to prevent new malware infections. By monitoring how programs interact with each other, the system is ...

Alive File Encryption  Alive File Encryption

 Alive File Encryption is a easy-to-use and strong file encryption program that encrypt your files and folders. Alive File Encryption is integrated with Windows Explorer, you can secure any files with a simple right click. Just right click the files or folders you would like to encrypt or decrypt, and select "Alive File Encryption" -> "Encrypt/Decrypt", and then enter a password to encrypt or decrypt them. You can also encrypt the file into an executable file (EXE-file), which can be decrypted without Alive File Encryption. Finally, The intuitive interface makes Alive File Encryption the perfect file encryption for both new and experienced users. It fully supports Command Line and Drag and Drop, and allows you to protect files in batches....

power Evidence Cleaner 2004  power Evidence Cleaner 2004

 power Evidence Cleaner 2004, is a complete solution to protect your privacy and enhance your PC performance. With PC evidence cleaning software You can securely erase your internet tracks, computer activities and programs history information stored in many hidden files and folders on your computer. power Evidence Cleaner 2004, support Internet Explorer, Eudora and Opera browsers. It also include more than 55 plug-ins to extend cleaning features to support popular programs such as ACDSee, GetRight, GoZilla, ICQ, WinZip, Yaho Player, McAfee virus scan, and much more. Also you can easily schedule cleaning tasks at specific time intervals....

Sentinel  Sentinel

 Sentinel works by analyzing exploits in both your Registry and your system folders; integrating with ANY Anti-Virus program to quarantine these threats. Sentinel's Integrity Checker will notify your anti-virus/trojan application(s) if any file has been modified or added in any way whatsoever (using either a heavily optimized CRC32, SHA-1, MD5 or MD4 algorithm--for those of you who don't speak geek: Sentinel is fast, and very secure). Sentinel's RegWatch will watch over your startup registry entries, as well as other commonly exploited tactics viruses use to load--if any file seems suspicious, it is audited. Three new algorithms added since initial release (SHA-1, MD4 and MD5 on top of the CRC32 algorithm)....

Advanced File Protector  Advanced File Protector

 Use Advanced File Protector to protect all your private files using the strongest encryption algorithms available, create self extracting/decrypting archives, and much more. Besides using the common passwords, Advanced File Protector can also create physical keys that will be used to encrypt/decrypt your private files. The key can travel with you in a floppy disk, zip disk, USB disk and other removable disks. That way, it's virtually impossible to decrypt your files without the key. Advanced File Protector uses very strong encryption algorithms including RSA and the newest AES standard Rijndael with key sizes from 64 up to 1024 bits length. It also includes a Key Disaster Recovery tool to rebuild your key case you loose it, a powerful file shredder, a fully customizable interface, full integration with Windows(tm) Explorer shell, Drag & Drop support, built in compression, and many comprehensive tutorials for you to quickly learn how to use Advanced File Protector....

Minos Lock  Minos Lock

 Minos Lock is a highly performed files security software that can hide or encrypt any number of files, folders and documents in seconds. Folders and files are protected with a password when you login the ABC Lock program. Protected files are undeletable, hidden and highly secured, hide files from kids, friends and co-workers, prevent them from viruses, trojans, worms and spyware, protects them from networked computers, cable users and hackers...

AGLAYA Call Magic  AGLAYA Call Magic

 This ground breaking technology is the only one of a kind solution in the mobile industry!. This solution is 100% software based and does not require any hardware tweaking. Call Magic will enable you to answer incoming calls from a pre-defined number at zero ring, i.e. the phone will answer the call automatically without a ring! Every time you call your phone from the pre-defined number, the phone will answer the call without a single ring! After the call is picked up then you can hear what is happening in the surrounding of the phone. After Installation Call Magic allows your phone to have three answer modes -- Reject All, Hands-free and Answer One. In Answer One Mode you can set a pre-defined number and select the number of rings after which the phone should auto-answer. No further user interaction is required. If you selected, zero rings then next time a call is made to your phone from the pre-defined number, your phone will automatically answer it. No rings, it simply answers! Magi...

The Enigma Protector  The Enigma Protector

 The Enigma Protector is software protection tool. It has advanced scheme of registration keys generation: Comfortable interface for creating and verifying of registration keys; Special Enigma API; Hardware locking of registration keys; Time limited registration keys; Unique license manager and automatic mailer. Also it has wide range of features to limit time of module usage: Executions, days, date, time limitations; System clock control. The Enigma Protector has a lot of features to make your software module more safe to crack: Anti-debugger tricks; Control sum checking; Set startup password; Additional features; Hard modifications of import table of executable. The Enigma Protector has features to help programmer to add beautiful things into existing module without writing any additional sources strings: Ssplash screen. Adds splash screen to module startup. Choose your own picture to show it while module is starting....

Multimedia Spoofers Time Bomb Trojan Horses Reporter  Multimedia Spoofers Time Bomb Trojan Horses Reporter

 Multimedia Spoofers Time Bomb Trojan Horses Reporter has the ability to completely remove WinAntiSpyware/WinAntiVirus, SpyAxe, VirusBlast, VirusBursters, and other malware. Version 1.20 may include unspecified updates, enhancements, or bug fixes. Scan the Registry and hard drive for spywares, adwares and malwares such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Keyloggers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit....

 

 

Pages : 1 2 3 4 5 6 7 8 9 10 Next >>