You are here: WaySofts > Security & Privacy

 
 Advertisements
  You'll find a complete list of Security & Privacy software at Download Center WaySofts See all products in this category.   You can download free or buy online them.
free download shareware delete edit
Software
 
298

 
364

 
729

 
 
 

Software
 
189

 
765

 
117

 
463

PREVIOUS     NEXT

HandyCrypto  HandyCrypto

 HandyCrypto allows you to hide folders and encrypt files with on-the-fly AES encryption. Just create one or more encrypted secure folders from local folders and move your sensitive files into the specified folder and they will be encrypted/decrypted in real-time. You can work with the files as usual, and when you're done, lock the secure folder, which will store the files securely and also hide the entire folder from view. Additional features include a password-protect interface, supports for FAT/FAT32/NTFS, and protection under Windows Safe Mode. Laptops users will find this tool to be very useful. With HandyCrypto, you will not worry about leak of sensitive business data any longer in case of the computer was stolen. This tool is foolproof, easy-to-use, and self-protected....

XorIt  XorIt

 Most file encryptors use methods that rely on the theory of computational security, that is difficulty of key factorisation prevents decryption of the file. But this method may not work forever. It used to be considered that a 56 bit key was unbreakable to brute force attacks, but the government of the USA now requires all Top Secret data to use keys of at least 192 bits. This bar will keep raising as computing power increases. (It is argued by some though that this will never happen due to the laws of physics!) XorIt is designed to use conventional XOR encryption on keys that are the same size as the file to be encrypted. Furthermore, if you use an unpredictable file that is the same size (or larger) than the original file and you use this file only once, this is known as a "one-time pad" and it is completely unbreakable, even to computers 1000 years from now. This is because there is no algorithm at all, just a big key, and thus there is no pattern to follow once you have decrypted a...

LAN Server to Windows Migration Wizard  LAN Server to Windows Migration Wizard

 Many organizations currently running IBM LAN Server/Warp Server would like to migrate to Windows, but have delayed the migration due to the disruption that such a move would cause. The LAN Server to Windows Migration Wizard is a comprehensive software package that is capable of performing an automated migration of virtually any size LAN Server domain to an equivalent Windows domain in a matter of hours to a few days. Customers may opt for an immediate and full migration during a weekend or via a series of weekly system sweeps. Because both IBM LAN/Warp Server as well as Microsoft's server platforms are both based on the same Microsoft LAN Manager technology, the Migration Wizard is capable of performing a perfect migration of almost everything in the IBM LAN/Warp Server environment to Windows NT, Windows 2000, Windows XP and Server 2003. Most customers are surprised at the ease of the migration and the fact that most users are unaware that they have been upgraded to a Windows domain. I...

Kryptel  Kryptel

 Kryptel is an easy-to-use single-click solution making encryption of files and folders no more complex than copying or moving. On the other hand, Kryptel includes a number of advanced features like creating encrypted filesets or batch mode processing. By default, Kryptel uses the newest Advanced Encryption Standard for data encryption. Other strong ciphers can be selected in the Crypto Settings panel. The encrypted backup feature and efficient data compression make Kryptel an ideal tool for archiving sensitive data. The integrated file shredder provides reliable deletion of sensitive files in accordance to DoD 5220.22-M specification. Kryptel Encryption Suite well-suited for both home and corporate use and can satisfy most demanding security needs. Free trial version can be obtained directly from the Kryptel Web site http://www.kryptel.com...

Advanced Keylogger Software  Advanced Keylogger Software

 Sanmaxi Advanced Keylogger Tool is completely invisible keyboard monitoring, key board logging, snapshots capturing, and user friendly utility. Remote logger tool record microphone sound listing music, song, voice chatting conversations. User activities recording tool record every pressed typed keys, special characters confidential data information. . Keystroke recorder surveillance tool hidden from add remove program, start menu program, task manager. Software supports windows 98, window 2000,/NT/XP and Window VISTA. Utility is password protected. Program is not detected by any antivirus software. All data are stored in a log file and user can send log file remotely through email or ftp. Sanmaxi Key Logger is best solution for concerned parents, college administrators, small and big organizations, cyber cafe owners. Features: # Sanmaxi key logger records all types of keyboard character, website urls, email , voice chat conversations or microphone sound, monitors application usage, des...

Hope Remove Worm Spy Bot  Hope Remove Worm Spy Bot

 Hope Remove Worm Spy Bot supply the utility tools to configure your system immune with spyware and recover the damages caused by spywars. Anti-virus&Spyware does not conflict with other antivirus programs. Scan and remove spyware such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb from your computer and monitor running programs....

Merry Exploit Popups Worm Removal  Merry Exploit Popups Worm Removal

 Merry Exploit Popups Worm Removal - Easily remove over 100,000 pests such as SpyLocked, WinFixer, SpyAxe, SpyFalcon, or SpywareQuake. Repair broken Internet connections, desktops, registry editing with a unique repair system. Scheduled scan and automatic updates keep you protected against zero-day threats. Dedicated threat research team scours the Web for new threats and provides daily definition updates. Complete support for Windows Vista.detection and removal. Scan, remove, and monitor spyware and malware such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Keyloggers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bombon your PC....

Keyboard Monitor  Keyboard Monitor

 Police the activities that take place on your computer with this handy program. Turn it on and it records all the keys that are pressed until turned off. Use it to ensure that your child's (or spouse's!) chat room and email activities are on the up and up. Recorded information and access to the Keyboard Monitor are safely password protected. Keyboard Monitor can be run as an invisible background process and it can be set so that it turns on automatically when the machine starts up....

DUN Shield  DUN Shield

 Is your Dial-Up Network Insecure?? Who is misusing your Internet account on your computer?? Is your kids surfing and chating for hours or passwords stolen!! Do unauthorized users get your phone calls over billed! then DUN Shield is your right choice. You can control the way your Internet needs to be. Restrict access by Password Protecting your Internet, Dial-Up Connection, installation of new modems & new connections and much more......
 Advertisements

HB Crypt Source DLL  HB Crypt Source DLL

 HB Crypt Source DLL features 12 cryptographic algo''s, compiled in C++. viz. Blowfish, Twofish, Rijndael, Skipjack, Serpent, Gost, RC4, TEA, DES, ARA, AES, RODTHA. This compact C++ DLL saves many man months of a programmers valuable time in R&D. The DLL can be distributed with commercial licenses mentioned on the website of the algorithm developers. Most developers allow commercial distribution. Source code is available wth every purchase....

Shield Firewall 2005  Shield Firewall 2005

 A firewall is a type of software that monitors all incoming network traffic while you're online and allows...

WinDentify  WinDentify

 Windentify Beta Lite is a freeware voice biometric package. Includes fully working voice verified windows logon. Now start your machine with only your voice print. ONLY YOU ...... can start your computer. ONLY YOU CAN START: DELETE: HIDE: DENY-ACCESS TO YOUR FILES/ PROGRAMS. YOU CAN PREVENT TAMPERING OF LOG REPORTS. YOU CAN CHECK AUTHENTICITY OF YOUR ONLINE MEMBERS The software features claimed demonstrate all possible / feasible solutions to clients. Customers are expected to be IT literate and be able to place a custom requirements order. Checkout our sample protection designs here. As per the level of security your project demands hardware and drivers may cost extra. The professional version uses voice, while the SDK/SERVER purchase are DLL/OCX component versions of Windentify Tools. Passwords we all know, can today be compromised by internet spy wares, around 1500 of them. The passwords are hacked and distributed over the internet by thousands of these hacking programs by using dat...

Password Notebook Plus 1.0.2.0  Password Notebook Plus 1.0.2.0

 Password manager that does not take data safety and security for granted. Password Notebook offers data encryption, database password protection with emergency recovery options, multiple layers of backups and easy management....

Destroy System Monitor Keyloggers  Destroy System Monitor Keyloggers

 Destroy System Monitor Keyloggers actively monitors which programs are running on your computer. If it sees a spyware or adware program trying to start, it will stop it dead in it's tracks. Destroy System Monitor Keyloggers prevents any program from changing your Internet Explorer Home Page without your permission: which means that spyware authors can't direct you to their own websites where they can infect you with even more malicious programs. Scan your system for ad-supported software components and remove them. Locate and delete spywares and adwares such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb....

Remora USB Disk Guard Pro  Remora USB Disk Guard Pro

 Remora USB Disk Guard Pro is a project based file encryption/compression tool, or a strong file encryption/compression switch which can startup from your USB storage devices. With Remora USB Disk Guard Pro, you can secure all your files anytime and anywhere, and use them conveniently at the same time....

Hara-Kiri  Hara-Kiri

 "Hara-Kiri" (ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed, The files in a determined folders will be completely erased (without the possibility of reconstructing them with utilities like "UnErase" and "Undelete"). Once it deletes the folders it will delete itself from the disk so that the perpetrator has no idea that there was once sensitive data on the disk! Uses: This program is useful in the case that your computer is stolen, Or if your computer is infiltrated by unwanted users. Imagine several situation, when "Hara-Kiri" may be useful for you: 1. Your PC is stolen Malefactor runs your computer with hope to profit by important secrets of your firm... But he don't know that it is nece...

Bliss Exploit Dialers Backdoor Agent  Bliss Exploit Dialers Backdoor Agent

 Bliss Exploit Dialers Backdoor Agent - Protection against: spyware, adware, spyware trojans, keyloggers, identity theft, hijackers, tracking threats, spybots, rogue anti-spyware, unwanted software, phishing, pop-ups, and bad Web sites. Starter Edition is a free version of Spyware Doctor, with full scan and remove, some real-time and no time limit. Secure your privacy by destroying all hidden activity information such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb....

PC Screen Spy Monitor 2007  PC Screen Spy Monitor 2007

 Have you ever wondered what your spouse, kids or employees have been doing on the computer and Internet? Is your spouse engaging in online sexual conversation while you are asleep? Are your kids taking secret chat conversations with an adult stranger? Are your employees emailing your business secret to your competitors? If you DO worry about these issues, you need a keylogger software, or a spy software. PC Screen Spy Monitor secretly caputres your computer screen. It is like a invisible surveillance camera aimed directly at your PC screen. It records a screenshot every X seconds (adjustable) without being detected. This captures all activity performed on your PC, no matter who performs it! You can view the screenshot images taken directly from the embedded image / slideshow viewer. It is especially useful for administrators or parents, who need to know what their employees or kids are care and talking about with others. It does this stealthily so that the user won't know such mon...

SpyPal AIM/AOL Messenger Spy 2008  SpyPal AIM/AOL Messenger Spy 2008

 SpyPal AIM/AOL Messenger Spy software can secretly record all AIM/AOL Messenger's incoming and outgoing chat text messages. It runs in a complete invisible mode. You can check all recorded messages by simply receiving emails or opening a web page. The re-check merchanism can ensure you get the whole super-large messages, and prevent you from getting the same message repeatedly. You can show all messages in SpyPal AIM/AOL Messenger Spy software directly, export these messages to HTML files in a directory for later analysis, or send a report to a pre-set email address / ftp. Everything will be recorded without being detected. It is especially useful for administrators or parents, who need to know what their employees or kids are care and talking about with others. Use your hotkey to unhide it from complete stealth mode and protect the program access by password. Uninstall it easily from the program interface. You can download SpyPal AIM/AOL Messenger Spy software and take a trial be...

Multimedia AntiVirus BHOs Spyware Bot  Multimedia AntiVirus BHOs Spyware Bot

 Multimedia AntiVirus BHOs Spyware Bot's features include: High-speed file scan engine capable of detecting modified trojans; Memory scanning for detecting any modified variant of a particular build of a trojan; Registry scanning. Protect and block your PC from any malicious software such as Web Bug, RAT, Tracking Cookie, Password Cracker, System Monitor, Trackware, Keylogger, Dialers, Spies, Spy, Hijackers, Unwanted Toolbars, Dialers, Trojan Horses, Malware, Adware, Popups, BHOs, Malware, Trojans, Backdoor, Adload, Worm, Binder, Exploit, Rootkit, Joke, Viking, Bot, Virus, Zombie, spoofers, Time Bomb....

 

 

Pages : 1 2 3 4 5 6 7 8 9 10 Next >>