Advertisements
 
 
  You'll find a complete list of Others software at Download Center WaySofts See all products in this category.   You can download free or buy online them.
mail windows optimize image

Others

PREVIOUS     NEXT

WashnSweep a Complete Security Suite v2.2  WashnSweep a Complete Security Suite v2.2

 Wash n Sweep puts the power back into your hands giving you the upper hand in the fight for privacy in the world of the Internet. This is a cutting edge software application that safely, securely combs your computers hidden directories seeking out the parasite files and rogue cookies that have infiltrated your system and eliminates them. The companies that were trying to spy on you will have all connections to your information cut off and their stealth snoops will be squashed out. Our software is a true washing application. It literally sweeps out the cluttered, corrupted files that secretly cling to the internal directories of your hard drive. This process scrubs and de clogs your computer so that it can perform with the speed and efficiency it did when you first bought it. In addition to this, we clean up the cling on applications that have secretly enrolled themselves onto your computer and litter your system tray, browser toolbars and have perhaps hijacked your start page. Other so...

ID Process Manager  ID Process Manager

 ID Process Manager is a program designed to help you manage the status of all processes on your computer. It enables you to stop any process or to start a new one, protecting against intruders, including spyware and Trojans. Main Features: - Manages process status - Monitors and removes harmful processes - Protects against adware and Trojans - Deletes and blocks BHO - Secures your shutdown process under password Detailed features: - ID Process Manager monitors your computer's system in search for bad processes. Scans all processes and alerts you whenever a harmful one is attempting to influence your computer's health status. - Gives you the possibility of dividing processes in two major groups: Denied and Allowed. Using ID Process Manager, you can decide which processes will not be able to run on your computer ever again. - Protects your computer against viruses, spyware and Trojan which are malicious processes. ID Process Manager shows you exactly what processes are about to run on yo...

ID Privacy Shield  ID Privacy Shield

 ID Privacy Shield is a program specially designed to protect your privacy of actions, by covering up your Internet tracks as well as all of your computer actions. It shields and automatically erases the history of your moves. Main Features: - Cleans the history of your computer activities - Eliminates junk-files and duplicated dll-s - Erases all tracks of your Internet operations - Optimizes memory usage - Safely removes tracks of deleted items Detailed features: - Eliminates action-evidence from the Recent History part of all Windows documents, and erases history of items that have been looked up through Star Menu Search/Run. It makes it impossible for someone else to find out the route of your actions, or to detect files that have been recently viewed. - Cleans up the Temporary Files directory in Windows, eliminates junk-files, deletes duplicated dll-s, and cleans the free space where deleted files have been. It so increases the performance of your PC and improves the usage of your d...

Anti Hacker  Anti Hacker

 Protect your computer against hackers with Anti Hacker, a powerful hacker and rootkit detector. With Anti Hacker's...

CoffeeCup FTP Password Recovery  CoffeeCup FTP Password Recovery

 CoffeeCup FTP Password Recovery is a utility that will recover FTP passwords for all accounts set-up with CoffeeCup Direct FTP. This tool works by decrypting the password information from the registry and showing it in a simple way. Proxy password information is also shown if CoffeeCup Direct FTP is set-up to connect to remote FTP servers through the proxy. All versions of CoffeeCup Direct FTP are supported. - Functionality of CoffeeCup FTP password recovery - in other words, what this tool can do: - All versions of CoffeeCup FTP are supported - Decrypt CoffeeCup FTP password - Decode CoffeeCup FTP passwords - Crack CoffeeCup FTP account passwords - Recover CoffeeCup FTP password - Find CoffeeCup FTP passwords - CoffeeCup FTP password ripper - CoffeeCup FTP remote account hacker (not implemented) Extra recovery features: - Support for multiple FTP accounts - Proxy password recovered...

Microsoft Sasser.A & .B Worm Removal Tool  Microsoft Sasser.A & .B Worm Removal Tool

 This tool will help remove the Sasser.A and Sasser.B worms from Microsoft Windows systems. For systems with MS04-011 [KB835732], no further action is needed once this tool is installed. Install this tool to help remove this worm from your PC....

Software Time Lock  Software Time Lock

 Control at what times the Web, specific programs, and even Windows itself can be used on a particular computer. Also, control how long these functions can be used in the course of a day. 1) Set blocks of time for each day of the week during which you cannot access the Web on a computer. For example, you can set that you cannot access the Web Monday through Friday from midnight to 6 PM and from 10 PM to midnight. You can set several blocks for each day, such as midnight to 8 AM and 6 PM to midnight, thus creating a limited time period during which the Web can be accessed (in this case, 8 AM to 6 PM). 2) Select specific programs and set blocks of time for each day of the week during which you cannot use these programs. For example, you can set that you cannot use certain games from noon to 8:00 PM Monday through Friday. You can set several blocks for each day, such as midnight to 8 AM and 6 PM to midnight, thus creating a limited time period during which the programs can be used (in this...
 Advertisements

Clean Disk Security  Clean Disk Security

 This program gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk cleaning method is now available as an option. This program can also clean the Window's swap file, and can optionally clean unneeded temporary files from your hard disk, such as your Internet browser cache and history, files in your system's Recycle Bin, and can clear the "recent files" list. Comes with a "Direct Disk Viewer" for discovering all that is hidden on your hard disk. Don't sell your hard drive before cleaning it with this program! Now with improved support for WinNT/2000/XP. Comes with plugins, a plugin editor, and cookie management. Now cleans "index.dat" internet history without having to restart Windows. Protect your private information and help protect against ident...

Hide IP Fast  Hide IP Fast

 Hide IP address for anonymous surfing, access blocked sites, unban yourself from forums and restricted sites, send anonymous e-mails and instant messages. Hide IP is a must have application for everyone who uses Internet....

Hide Real IP  Hide Real IP

 Hide IP address for anonymous Internet access. Fake IP appears instead of real on. All applications supported: web browsers, instant messengers, file sharing and others. Very simple to use: just a few clicks to anonymize your Internet activity and maintain online privacy. Hide Real IP automatically locates highly anonymous proxy servers around the world and makes your computer completely invisible to all web sites and other internet resources you are accessing. Protect yourself from any web site which wants to monitor your personal interests and spy upon you through your unique IP address - your ID in the Internet. Safely bypass restrictions set by some owners of Internet resources on users from certain countries or geographical regions. Hide Real IP was tested with wide variety of applications, including, but not limited to: - Internet Explorer - Firefox - MSN Messenger - Yahoo! Messenger - Kazaa - Outlook Express - ICQ...

Safer Workstation  Safer Workstation

 Safer Workstation will turn your removable media device (iPod or thumb drive, for example) into a "key" for your login. Eject the drive from your system, and Safer Workstation will automatically log out the current user. If the user logs in without the "key" attached, Safer Workstation will log them back out....

SimplyRDP  SimplyRDP

 Convert a desktop PC into a secure, managed network device that achieves all the benefits of thin client computing while prolonging the useful life of existing desktops. Tremendous advantages are gained by providing remote connectivity to Windows desktops. SimplyRDP is a software-only solution; there is no need to physically open the desktop case, and removal of the hard drive is optional. A quick, easy install and GUI configuration templates permit fast setups of desktops. All desktop applications run on the server. SimplyRDP can be installed on any system running Windows 2000 Professional / Server, XP Professional or 2003 Server. It offers easy configuration for diskless client access to Microsoft Terminal Services using the client’s PXE-compliant network cards - emBoot also provides PXE capabilities via the MBA (Managed Boot Agent) either on floppy or as a bootROM. * SimplyRDP allows aging desktops to run the latest applications. This gives you the capability to run the latest Micro...

Task Scheduler Pro  Task Scheduler Pro

 Task Scheduler Pro mass manages the change and reporting process for Scheduled Tasks in Windows Task Scheduler Pro is designed for the administrator that is looking for a powerful no-nonsense Windows interface that allows both simple and complex scheduled tasks to be sent to large groups of systems in seconds. Both file distribution and job creation are handled in a single interface. Built-in deferred processing allows you to create jobs even for machines that are off-line. An automatic retry feature of the program will create all needed jobs as soon as the machine is detected on the network....

Total Commander Password Recovery  Total Commander Password Recovery

 Total Commander Password Recovery is a utility that extracts FTP account password information for all versions of Total Commander with the FTP plug-in. Old version of Total Commander, called Windows Commander is also supported. Proxy passwords are recovered as well. Functionality of Total Commander password recovery - in other words, what this tool can do: * All versions of Total Commander and Windows Commander are supported * Decrypt Total Commander FTP password * Decode Windows Commander FTP plug-in passwords * Crack Total Commander FTP account passwords * Recover Total Commander FTP plugin password * Find Total Commander passwords * Total Commander password ripper * Windows Commander remote account hacker (not implemented)...

E-mail Shredder for Outlook  E-mail Shredder for Outlook

 SafeIT E-mail Shredder for Outlook is a software application for permanently removing (shredding) old and deleted e-mails from your Outlook Personal Storage (.PST) file. Selected e-mails will be shredded along with all the unused space in your PST-file. This includes discarded e-mails, fragments of previously deleted e-mails and old attachments. The product is completely integrated in Microsoft Office and will enhance the way you work with Microsoft Outlook. When you use Microsoft Outlook your e-mails are automatically and consistently duplicated, left behind and hidden away. An e-mail can exist up to eight times in your PST-file and traces of old discarded e-mails can exist from the time you first created your Outlook file. In Microsoft Outlook; when you delete an e-mail, empty the “Deleted Items” folder, or even compress the PST-file, the information is NOT removed from your computer. These commands only alter the structure of the PST-file, leaving most of the data intact and recover...

Active ERASER  Active ERASER

 Active ERASER utility supports a variety of sanitation standards, from simple methods such as One Pass Zero to the military-grade DoD 5220.22-M, to even more sophisticated methods such as Gutmann's. You can erase files, folders, CD-RW discs, logical drives, and entire physical drives. The program also wipes out deleted files, which Windows just renders invisible, from your disk. It cleans the tracks of your Internet and local activities, such as cookies and temporary files. The log lets you control the process. You can schedule erasing to trigger every time you start Active Eraser, shut down Windows, or begin another activity. The interface is handy, letting you erase any file using the right-click context menu. Supports U.S. DoD 5220.22-M, VSITR, GOST P50739-95 and Gutmann sanitation standards....

TopSecret NxG  TopSecret NxG

 Protect your files from unauthorized acces! Send encoded email messages. Encode your private data in your virtual safe and protect your files. TopSecret is a data protecting application, ciphering resources and applications in order to make the data unreadable for other users on the same computer. You need the password to decode and use your files. Data and programs are kept in virtual safes, set by the user. The most important program features: Your personal safes (virtual drives) Users and safes number limited only by hard disc capacity 3 different ciphering algorithms: Rijndael, Serpent, Twofish "On the fly" ciphering technology Safe correspondence by e-mail ciphering Screenlock, in case you go out for a moment. Hide TopSecret NxG option. Program becomes invisible in Windows systems Antivirus security option. Executive files, located in safe File destroyer to irreparable removal of all file types Free e-mail support for registered users for one year...

After Work  After Work

 After your work on PC remain some items wich reduce your privacy level.Use the program and be sure in your privacy!"After Work" erase online and offline history:Temorary Interenet Files,IE history,typed urls,opened documents,started programs,temporary registry values...

EagleEyeOS One  EagleEyeOS One

 Quick and easy-to-manage data protection solution to prevent data leakage. Documents are protected from the unauthorized accesses efficiently and up to date. It generates alerts about portable devices connected illegally to the computer. Access policy can be created for mobile devices (Floppy, CD, DVD, InfraRed, COM, LPT, USB, Bluetooth, Wireless, etc.). Documents are protected in isolated areas. Storages suitable to take out information (e.g. Pen-Drive) can be disabled; furthermore the activities done by them are traceable. EagleEyeOS One sends alerts about connecting or disconnecting of storages, about file processes performed on those storages, if required. Timing and content of the alerts are customizable. Using extended functions, the property panel can be password-protected, running and stopping of the program can be disabled, and provides an option for silent mode. Due to its automatism (e.g. by connecting to the network) it is able to close and block the requests arriving to pr...

Digital Document Shredder  Digital Document Shredder

 Digital Document Shredder is an advanced, powerful and feature rich digital document shredder system, and is the world's leading digital shredding software system that permanently removes selected files and folders and other information from your computer. Digital Document Shredder allows you to completely remove selected stored information on your hard drive and other memories. When you delete a file, empty your Recycle Bin or even format your hard disk, the information is NOT removed from your computer. These commands only alter the structure of the drive, leaving most of the data intact and recoverable with software tools easily available. This means that someone else can recreate the files that you think you have already deleted. The only true way to permanently remove unwanted files and data is to use file shredding software. File shredding utilizes an advanced algorithm technique of overwriting your files multiple times so that the information contained in them is no longer reada...

 

 

Pages : 1 2 3 4 5 6 7 8 9 10 Next >>