Advertisements
 
 
  You'll find a complete list of Others software at Download Center WaySofts See all products in this category.   You can download free or buy online them.
antispam chat music cd-roms

Others

PREVIOUS     NEXT

FTP Commander Password Recovery  FTP Commander Password Recovery

 FTP Commander Password Recovery is a utility that extracts FTP account password information for all versions of FTP Commander FREE, FTP Commander Pro, FTP Commander Deluxe and the good old FTP Navigator (old name for FTP Commander)....

Password Construction Kit  Password Construction Kit

 Generate 1 to 50,000 unique passwords Specify fixed or random length passwords Selectable character ranges consisting of Uppercase, Lowercase, Numbers and Special characters Dictionary words of 2 to 9 letters in length Mask editing to generate formatted passwords Save password lists as text, delimited, HTML or XML WEP key generator (40, 64, 104, 128, 152, 232 and 256 bit keys) Random byte generator creates random hexidecimal, decimal, octal or binary strings ranging from 256 to 16,384 bytes in length....

Password Spyer 2k  Password Spyer 2k

 Password Spyer 2k is a password recovery tool for windows. Password Spyer 2k reveals passwords hidden by asterkis (***) in all windows version (including 2000 and XP). You can use it to recover lost or forgotten passwords in most windows applications such as outlook, cute ftp, ws ftp, ICQ and others. You can use it to also reveal saved web passwords....

PDF-Recover  PDF-Recover

 pdf-Recover can be used to decrypt protected Adobe Acrobat PDF files, which have "master" password set. If you can not remember your password, pdf-Recover will allow to open encrypted files - and provide without any restrictions. pdf-Recover creates a 1:1 copy of your PDF-file without any password limitations, that means you can edit, copy and print texts and images of this document. pdf-Recover will decrypt files up to 128-bit encryption. If you need some further features, please have a look at pdf-Recover Professional!...

ActMon STARR Computer and Internet Monitoring *PRO Edition*  ActMon STARR Computer and Internet Monitoring *PRO Edition*

 ActMon STARR is the all-round, award-winning Computer and Internet Monitoring tool. It allows companies and individuals to track the use / abuse of PCs easily and invisibly. It logs screenshots, keystrokes, user names, passwords, path names, access times, windows titles, BOTH sides of a CHAT conversation, AOL and visited websites into a password protected encrypted file. In the stealth mode STARR does NOT show up in the system tray, task bar or task list. For remote surveillance of (internet-) networked PCs STARR can invisibly email the log file to another PC via any standard email account or save the log directly to the server. Contains installation wizard for extremely easy setup and use.With STARR you will know who is doing what on which PC, and you can,if you wish, even let them know you know! Too Good to be True? Check it out!...

Ashampoo Security Pack  Ashampoo Security Pack

 Ashampoo Security Pack 2 is the control, installation and launch centre for all your Windows security needs. On installation it checks your computer for existing Ashampoo security tools and automatically integrates them in its launch pad interface. Ashampoo Security Pack 2 combines these tools: Ashampoo AntiSpyWare 2: Protects you against spyware, adware, browser hijackers, tracking cookies, dialers, worms, key loggers, Trojans and even rootkits. Includes 1 year of free signature updates. Ashampoo AntiVirus: Protects you against viruses, worms, Trojans and dialers. Monitors all critical system areas, memory, emails and files. Includes 1 year of free signature updates. Ashampoo FireWall PRO: Combines an industrial-strength firewall with child protection website blocking, stealth ports, traffic volume limiting, Internet accelerator, file wiper and more. Ashampoo Magical Security 2: Military-grade encryption for the critical data on your hard disks, CDs and DVDs. Fully-integrated in Windo...

Process Security Manager  Process Security Manager

 Process Security Manager displays detailed information about all running processes (applications, DLLs, BHOs, and services). For each process, it enhances the functionality of Windows Task Manager by providing a security risk rating, a process description, and file path. The security risk rating indicates the likelihood of the process being potential spyware, malware, a Trojan, or keylogger. This process viewer also recognizes stealth processes and virtual driver software hidden from the Windows Task Manager. This program gives a wealth of detail about each program and process, including whether the program is likely malicious or not, and it lets you delete any program and process with a single click. You'll get an enormous amount of detail about what's running, including the manufacturer, type of program, how it started (for example upon startup or from within Windows Explorer), and the file name. It also rates files according to how harmless or malicious they may be....
 Advertisements

! INSTANT LOCK !  ! INSTANT LOCK !

 Best folder security software even got better! With award-winning, on- the-fly, folder protection technology, protect any folder instantly. Also, i-LOCK has lots Extra privacy tools like, Cookie eraser, History Cleaner, URL Wiper, Application Recent History Wipers, etc. It has the perfect combination of speed and security. It locks GBs of data or thousands of files in a second! Just drag n drop your files, It is done! Now your files cannot be renamed, deleted, or even seen by other programs or persons. They will stay completely secure, protected, unreadable and invisible even when you boot from another operating system, DOS or safe mode! It doesnt matter which version of Windows it is. Or what configuration your PC has. Instant Lock always works like a charm ! So, download and enjoy this great shareware....

AbuseShield  AbuseShield

 What is protecting your system while you are waiting for a security update? AbuseShield picks up where anti-virus and firewall software fail, by proactively shielding your system from malware such as viruses before they harm your system. Most malware fighting applications such as virus scanners look for known patterns and need to be updated with recent definitions to detect and possibly clean your system. This creates an open window between when a malware is first released and when the protecting application has been updated. In addition, the damage has probably already been done. AbuseShield closes this open window, by directly blocking all programs that have not previously been registered. As an end-user, you will feel a lot safer knowing that your system is not being exposed to malware. Many first time users say that AbuseShield is the first application that makes them feel that they are in control over their own system. AbuseShield offers a great tool for administering your securit...

Process Master  Process Master

 Process Master is an advanced utility for hidden processes detection and killing. These processes usually are the results of the virus, spyware and rootkits activity. And you will not be able to see them using Windows Task Manager. Process Master uses advanced low-level system technics to detect hidden processes. It successfully detects the presence of such famous rootkits as HackerDefender and Fu....

RecentCleaner  RecentCleaner

 RecentCleaner is a personal privacy tool designed to clear recent files lists of various programs. Clearing recent file lists makes it impossible for an intruder to recover any trace of recently accessed files, making it really hard to quickly find private files. RecentCleaner is a plug-in based utility. The authors will continuously improve it by adding support for new programs. RecentCleaner already supports cleaning of recent file records in popular MS Office applications, such as Word, Excel, Power Point, FrontPage, etc. Also, RecentCleaner supports WinZip and WinRAR utilities. Just contact the authors for requests for new plug-ins. The RecentCleaner interface is divided into three parts: Applications, Items and Commands. The Applications list is represented as a tree, where the root elements are groups, such as Office, Utilities, System. Opening each element gives access to a list of recent records for every specified program. The Items section shows what information is accessible...

The Computer Security Tool  The Computer Security Tool

 Windows installations are NOT secure. Hackers exploit security holes to gain unauthorized access to confidential...

Openwall wordlists collection CD  Openwall wordlists collection CD

 A full CD containing an extensive collection of wordlists intended for use with password recovery utilities. Included in this collection are wordlists for 20+ human languages and lists of common passwords. The included languages are: Afrikaans, Croatian, Czech, Danish, Dutch, English, Finnish, French, German, Hungarian, Italian, Japanese, Latin, Norwegian, Polish, Russian, Spanish, Swahili, Swedish, Turkish, and Yiddish. There's also a list of the common passwords and unique words for all the languages combined in one file (over 40 MB for almost 4 million entries). Finally, there's a huge list of all the common passwords and words from all the languages with word mangling rules applied (to form other likely passwords, such as by adding capitalization or digits to words) and any duplicates purged. This wordlist is provided as a single uncompressed text file usable directly off the CD. Its size is almost 500 MB and it has over 40 million entries. For all wordlists, the entries are sorted...

DriveCryptPlusPack  DriveCryptPlusPack

 DCPP allows you to secure your disk(s)(including removable media) with a powerful and proven encryption algorithm(AES-256) at the sector level, ensuring that only authorized users access it. The encryption algorithm is a trusted,validated algorithm chosen by the National Institute of Standards and Technology(NIST) and slated to be the cryptographic standard for years to come. AES-256 is a FIPS-approved symmetric encryption algorithm that may be used by U.S.Government organizations(and others) to protect sensitive information.DCPP is automatic and completely transparent to the user.Not only does this decrease user involvement and training requirements, but it creates the foundation for enforceable security. The careful integration of boot protection and automatic encryption provides a high degree of security with minimal impact on users. Boot protection prevents subversion of the operating system (via floppy bootup, for example) or the introduction of rogue programs while sector by sect...

Personal Passworder  Personal Passworder

 Personal Passworder keeps more than just passwords! This award-winning password manager will keep your passwords, serial numbers, credit card numbers, phone entries and other information safely and securely. You can even create customized groups for your data! All data is encrypted with hacker-proof, reliable algorithm and all users have their own password-protected accounts. The program supports several interface languages and comes with a number of useful tools for safe work and personal comfort. You will never forget your passwords again, because Personal Passworder will remember them for you!...

Deskman SE  Deskman SE

 Deskman SE allows you to secure your computer in a snap. Combining different options, you can easily achieve the desired level of security. Deskman SE is very easy to use, yet powerful enough for most demanding needs. Now, with the new Desktop Lock you are able to leave your desktop tightly protected while you're away. Only you'd be able to unlock the desktop and continue with your tasks exactly where you left them. The lock is also useful to protect desktops with password, making sure only accredited people use the computer. The new advanced features include the ability to disable Ctrl - Alt - Del, and any other key combination, and the ability to create your own Start Menu, among others. In addition, the new kiosk mode provides you with additional desktop protection possibilities. Whether you need to secure workstations or lock your desktop, Deskman SE is your tool of choice....

Server-To-Server Password Synchronizer  Server-To-Server Password Synchronizer

 Server-to-Server Password Synchronizer keeps a group of accounts/passwords in sync between any mixture of Windows NT, Windows 2000, Windows XP and Server 2003 as well IBM OS/2, LAN Server. Operations are performed by a single workstation/server that has been loaded with Server-to-Server Password Synchronizer - no client modifications are needed. This machine contacts all targets holding accounts/credentials and determines which credentials are out-of-date, updating them automatically. When a user changes their password on one of the appropriate target systems, the Server-to-Server Password Synchronizer will automatically replicate the new password to all other targets. Server-to-Server Password Synchronizer is simple to implement and reduces help desk calls for password resets....

ActMon Computer Monitoring Software  ActMon Computer Monitoring Software

 ActMon CM is the all-round state-of-the-art Computer and Internet recording software, useful at both home and organizational levels. It is an effective monitoring utility which can locate your problem area without being located itself. It tracks all the computer activities and applications, including keyboard strokes, passwords, incoming and outgoing chat conversations, emails, and visited websites. Features which make it unique are its powerful keyboard logger - so powerful, it even logs the keystrokes entered during Windows 2000/XP login. And ActMon has a unique "kernel-level" file protection: Files are not just hidden! They are completely inaccessible to unauthorized users. Files cannot be removed or manipulated by an unauthorized user or so called spyware "cleaner" applications or any other Windows software! View all computer activities with the built-in screenshot recorder. It displays the current window or program that is running on your computer. All information is stored in str...

EZ Lock & Hide  EZ Lock & Hide

 With EZ Lock & Hide you can lock your favorites folder, jpg images, mp3's, etc. Type all your passwords and ID's in a text document then lock and hide them inside a folder! Features: Files are not only locked but hidden inside the folder Hide jpg's, gif's, mp3's, etc. Contents or locked and hidden inside any single folder Uses hardly any RAM (Memory) on your PC Zero learning curve Hide passwords text file inside a folder Future Updates are Free EZ Lock & Hide is free to try for a 7 day trial period. The cost for a single license is $14.95....

O&O SafeErase  O&O SafeErase

 O&O SafeErase 3 is THE solution for the secure deletion of sensitive data from your hard disk and offers you the ultimate protection of your private sphere. With just one click of the mouse you can securely and permanently delete files, folders and partitions. The motives for the deletion of files are many. Old email files, internet history, file cache, financial records, company information, and private files ought to be protected from other‘s access. The reality, however, is much to the contrary. O&O SafeErase 3 puts a stop to this by not only deleting files, but by annihilating them with the help of recognized and recommended methods. In Windows Vista, Windows XP, Windows 2003 and Windows 2000, O&O SafeErase 3 will protect your computer from the unpermissive access of others to your alleged deleted files. New deletion assistant with more options As well as the option with O&O SafeErase 3 for secure deletion over diverse context menus under Microsoft Windows, an Assis...

 

 

Pages : 1 2 3 4 5 6 7 8 9 10 Next >>